CBP Border Technology and Surveillance Systems

U.S. Customs and Border Protection operates one of the most extensive surveillance and detection technology networks in the federal government, spanning land, sea, and air domains across thousands of miles of border. This page covers the major systems CBP deploys, the legal and operational frameworks that govern them, the tensions between security effectiveness and civil liberties, and the classification boundaries that distinguish different technology categories. Understanding these systems matters because they affect millions of travelers, importers, and border communities annually.


Definition and scope

CBP border technology encompasses the electronic, sensor-based, biometric, and data-analytic systems the agency uses to detect unauthorized crossings, screen travelers and cargo, and enforce customs and immigration law. The scope extends from fixed infrastructure — towers, cameras, ground sensors — to mobile platforms including unmanned aerial systems (UAS), marine vessels equipped with radar, and vehicle-mounted surveillance units.

The statutory basis for deploying these systems derives primarily from Title 8 of the U.S. Code (Immigration and Nationality Act) and Title 19 (Tariff Act of 1930), which collectively authorize CBP to inspect persons, conveyances, and cargo at the border and within the functional border zone. The Department of Homeland Security Privacy Office and the DHS Office for Civil Rights and Civil Liberties maintain oversight roles over how specific technologies are deployed and what data they collect.

CBP's technology portfolio is organized under its Integrated Fixed Towers, Remote Video Surveillance Systems, and Autonomous Surveillance Tower programs, among others, and is funded through annual congressional appropriations tracked in the CBP budget and funding cycle.


Core mechanics or structure

Integrated Fixed Towers (IFT)
IFTs are steel structures mounting radar, day/night cameras, and laser range-finding equipment at fixed positions along the southwest border. Each tower autonomously detects movement, classifies the detected object (person, vehicle, animal), and cues a human operator at a remote workstation. The IFT program, contracted through Elbit Systems of America, covers portions of the Tucson Sector in Arizona. As of the program's public contract documentation, CBP planned 53 towers in the Tucson Sector alone (CBP IFT Acquisition Program documentation).

Remote Video Surveillance Systems (RVSS)
RVSS consists of camera pods mounted on towers or elevated structures, connected to agent workstations via fiber-optic or wireless links. Unlike IFT, RVSS does not incorporate autonomous object classification — agents monitor feeds directly. RVSS installations are concentrated along the Rio Grande Valley and other high-traffic corridors.

Autonomous Surveillance Towers (AST)
Deployed as a lighter, lower-cost alternative to IFT, ASTs use solar power, onboard computing for motion detection, and cellular data links. The AST program expanded significantly after FY2021, with CBP awarding contracts to Anduril Industries for units designated Sentry Tower deployed across the southwest border.

Biometric Entry-Exit Systems
CBP's Biometric Entry-Exit program captures fingerprints, photographs, and iris scans at ports of entry. The facial recognition component — operating under the brand Simplified Arrival — compares traveler faces against existing DHS photo databases. CBP's Office of Field Operations reports that facial recognition was in use at more than 200 airports and land ports as of the agency's public program updates (CBP Biometric Entry-Exit Program).

Unmanned Aerial Systems (UAS)
CBP Air and Marine Operations (AMO) operates a fleet of Predator B drones (designated Guardian in the maritime variant) manufactured by General Atomics. These aircraft carry electro-optical/infrared sensors and synthetic aperture radar. AMO's UAS fleet has logged more than 100,000 flight hours since the program's inception according to CBP's own program fact sheets.

Non-Intrusive Inspection (NII) Systems
NII encompasses X-ray and gamma-ray imaging systems used to scan vehicles, rail cars, and shipping containers without physical unloading. Large-scale systems such as the VACIS (Vehicle and Cargo Inspection System) use gamma-ray sources to generate density images that reveal concealed cargo anomalies. CBP's NII program processes millions of conveyances annually at land ports of entry.

Automated Targeting System (ATS)
ATS is a risk-scoring platform that aggregates data from traveler reservations, cargo manifests, financial records, and law enforcement databases to assign risk scores before a person or shipment arrives at the border. ATS operates under a Privacy Act System of Records Notice published in the Federal Register, which defines retention periods and data categories (DHS/CBP-006 ATS SORN, Federal Register).


Causal relationships or drivers

Several distinct pressures have driven CBP's technology expansion:

Congressional mandates: The Intelligence Reform and Terrorism Prevention Act of 2004 directed DHS to implement a biometric entry-exit system. The Secure Fence Act of 2006 funded physical and technological infrastructure along the southern border. These statutory directives created funded procurement cycles that persist across administrations.

Staffing constraints: Border Patrol agent hiring consistently falls below congressionally authorized levels. Technology deployment is explicitly framed in CBP budget justifications as a force-multiplier — allowing fewer agents to monitor longer stretches of terrain. The FY2023 DHS Budget in Brief documents this relationship directly (DHS FY2023 Budget in Brief).

Smuggling route shifts: Each time physical enforcement concentrates on one corridor, smuggling networks adapt to lower-density zones. This displacement effect, documented in reports by the Government Accountability Office, drives demand for extended sensor coverage across remote terrain.

Cargo volume growth: Total trade value processed by CBP exceeded $3 trillion annually (CBP Trade Statistics) in recent fiscal years, making physical inspection of every shipment impossible. Automated targeting and NII systems are structural responses to this volume constraint.


Classification boundaries

CBP technology systems fall into distinct regulatory and operational categories that determine oversight requirements:

Biometric vs. non-biometric systems: Systems collecting biometric identifiers (fingerprints, facial geometry, iris patterns) trigger additional Privacy Act obligations, mandatory System of Records Notices, and DHS Privacy Impact Assessments. Non-biometric sensors such as seismic ground sensors and radar do not carry the same documentation requirements.

Fixed vs. mobile platforms: Fixed infrastructure requires environmental review under the National Environmental Policy Act (NEPA) and coordination with land management agencies where deployment occurs on federal lands administered by the Bureau of Land Management or National Park Service. Mobile platforms, including UAS, operate under Federal Aviation Administration certificates of authorization rather than NEPA-triggered site reviews.

Ports of entry vs. between ports: At ports of entry, CBP operates under its statutory inspection authority with broad powers to examine persons and cargo. Between ports, CBP operates within a zone extending 100 air miles from any external boundary under 8 U.S.C. § 1357, but Fourth Amendment constraints on warrantless search vary by specific technology type and location.

Targeting systems vs. detection systems: ATS and similar risk-scoring platforms are classified as law enforcement sensitive information technology systems, governed by DHS information security standards under the Federal Information Security Modernization Act (FISMA). Physical detection sensors are governed primarily by operational directives rather than FISMA information classification frameworks.


Tradeoffs and tensions

Accuracy vs. civil liberties in biometrics: Facial recognition accuracy varies by demographic group. The National Institute of Standards and Technology's Face Recognition Vendor Testing program documented differential error rates across race and sex groupings in its FISTV dataset analysis (NIST FRVT 2019), raising due process concerns when the technology is used in enforcement decisions.

Surveillance coverage vs. tribal sovereignty: Integrated towers and ground sensors deployed in areas including the Tohono O'odham Nation in Arizona operate on tribal lands, creating jurisdictional tensions between CBP operational requirements and tribal governance authority. Formal consultation requirements under the National Historic Preservation Act apply, but the adequacy of those consultations has been contested.

Data retention vs. privacy: ATS retains traveler risk-assessment records for 15 years for non-U.S. persons and 15 years for U.S. persons under existing SORN terms. The Electronic Frontier Foundation and American Civil Liberties Union have challenged these retention periods as disproportionate to the operational purpose.

UAS surveillance vs. community oversight: CBP's Predator B drones have been loaned to other federal and local law enforcement agencies, a practice documented in a 2013 GAO report (GAO-13-628) that found CBP lacked adequate policies governing third-party use of its UAS assets.

Cargo scanning throughput vs. trade facilitation: Increasing NII scan rates at land ports reduces dwell time for legitimate trade. CBP's scan rate targets and their relationship to commercial vehicle delay costs are tracked in annual trade statistics published on the CBP statistics and data page.


Common misconceptions

Misconception: The 100-mile border zone suspends Fourth Amendment protections
The 100-mile operational zone defined in 8 U.S.C. § 1357 and 8 C.F.R. § 287.1 grants CBP authority to board vessels and conduct roving patrol stops — it does not eliminate Fourth Amendment warrant requirements for searches of private homes or create a blanket surveillance authorization. Courts have consistently distinguished between immigration stop authority and general Fourth Amendment law.

Misconception: Facial recognition at airports is mandatory for all travelers
U.S. citizens retain the right to opt out of facial recognition biometric capture at airport departure gates. CBP's Simplified Arrival program documentation and the agency's Biometric Entry-Exit Privacy Impact Assessments confirm this opt-out right, though the process varies by carrier and port (CBP Biometric PIA).

Misconception: NII scanning exposes cargo to harmful radiation
Commercial VACIS-type systems use low-dose gamma radiation calibrated to penetrate cargo without damaging sensitive electronics or perishables at standard settings. Radiation dose levels are governed by Nuclear Regulatory Commission guidelines, not CBP discretion.

Misconception: Autonomous surveillance towers make enforcement decisions
AST and IFT systems classify and cue detected objects but do not initiate enforcement action autonomously. Human agents review all alerts before any response is dispatched. CBP program documentation consistently describes the agent as the decision-maker in all interdiction actions.

Misconception: ATS risk scores are based solely on criminal records
ATS draws on passenger name record (PNR) data, commercial databases, financial records, and travel history — not exclusively criminal history. The breadth of input data types is disclosed in the DHS/CBP-006 SORN and has been a subject of Congressional oversight hearings on algorithmic decision-making in government.


Checklist or steps (non-advisory)

Elements present in a complete CBP technology deployment program (as defined by DHS acquisition policy and Privacy Act requirements):


Reference table or matrix

Technology System Primary Function Data Type Collected Governing Framework Oversight Body
Integrated Fixed Tower (IFT) Autonomous detection and cueing Video, radar track data DHS Acquisition Policy; NEPA CBP Acquisition Directorate
Remote Video Surveillance (RVSS) Camera monitoring Video CBP Operational Directives CBP Border Patrol
Autonomous Surveillance Tower (AST) Mobile detection and cueing Video, motion data DHS Acquisition Policy CBP Acquisition Directorate
Simplified Arrival (facial recognition) Identity verification at ports Biometric (facial image) Privacy Act; DHS PIA; SORN DHS/CBP-021 DHS Privacy Office; DHS CRCL
Automated Targeting System (ATS) Risk scoring for travelers/cargo PNR, financial, law enforcement records Privacy Act; SORN DHS/CBP-006 DHS Privacy Office; Congress
Non-Intrusive Inspection (NII) Cargo scanning Radiographic image NRC radiation standards; CBP NII policy CBP Office of Field Operations
Predator B UAS Aerial surveillance Electro-optical/IR video; radar FAA Certificate of Authorization; CBP UAS policy FAA; DHS Inspector General
Ground Sensors (seismic/magnetic) Intrusion detection Sensor trigger data CBP Operational Directives CBP Border Patrol

The complete CBP authority reference — covering organizational structure, enforcement powers, and program operations — is available at the site index.