Security Lapses Found at Border Patrol Facilities

Security Lapses Found at Border Patrol Facilities

Security issues were found at nearly all of the U.S. Customs and Border Protection’s remote facilities along the Southwest border, according to a Department of Homeland Security Inspector General report released to the public Feb. 18.

Inspectors visited seven of the 11 facilities, known as “Forward Operating Bases,” in the El Paso, Rio Grande Valley and Tucson regions. Three of the 11 were not operational at the time of the inspection. Six of the seven facilities had security lapses, such as inoperable security cameras as well as ongoing challenges with providing safe drinking water to personnel. One of the facilities also had inadequate living conditions.

The operating bases are very remote CBP facilities built to reduce the response time for Border Patrol agents working in harsh areas of the border region. They are also intended to increase law enforcement presence in the area.

Four of the bases did not have fully functioning closed-circuit security camera systems, which are required by CBP rules to allow agents on guard duty to monitor the facility and grounds. The inspectors also found that customs officials were not performing all the required inspections of the facilities and didn’t keep the necessary documentation of repairs. A camera at one of the facilities had been broken since August of 2014 and still hadn’t been repaired at the time of the April 2015 investigation.

The report states that because of the location of these facilities, so close to the border, it is imperative that they have necessary security measures.

CBP agreed with all of the recommendations made in the report and said it is taking the necessary steps to fix the problems, including camera repairs and upgrading fence gates.

“U.S. Customs and Border Protection (CBP) is committed to ensuring the health and well-being of all employees, including those assigned to the remote Forward Operating Bases (FOB) that represent a vital component of Border Patrol operations,” said Michael Friel, CBP Director of Media.

The agency had already begun to take many of the steps needed, such as identifying water contamination and moving agents to a newly constructed facility while upgrades were being met, said Friel.


About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3