Skip to main content

U.S. border agency says photos of travelers stolen in cyberattack

A “malicious cyberattack” on a U.S. Customs and Border Protection subcontractor compromised photographs of travelers going into and out of the country, along with license plates, the agency said Monday.

Customers and Border Protection has known about the attack since May 31. According to agency, a subcontractor transferred the images to its network “in violation of CBP policies and without CBP’s authorization or knowledge.”

The images include fewer than 100,000 people in vehicles entering and exiting the United States “through a few specific lanes at a single land border Port of Entry over a 1.5 month period,” according to a CBP spokesperson.

Officials claim that the stolen information hasn’t shown up on the internet or dark web. The Register found files from CBP contractor Perceptics, which makes license plate readers, on the dark web last month.

CBP hasn’t confirmed which of its contractors was attacked, so it’s not clear if the two incidents are connected.

The breach drew condemnation from privacy advocates, including the Electronic Frontier Foundation (EEF).

“EFF is disappointed by reports of the theft from CBP of photos of travelers’ faces and license plates,” said the organization’s senior staff attorney Adam Schwartz. “The inherent risk of such theft is among the reasons why the government should not be amassing this sensitive information in the first place.”

Initial reports reports were unclear about whether photos of travelers entering through airports were involved in the breach, but the CBP says passport and other travel document photos were not compromised, nor were images of airline passengers. When you arrive in the U.S. after an international flight, your stop at customs may include an agent snapping a photo of you. Using facial recognition technology, the agent can then match it with a “biometric template.” That template is a string of numbers representing, say, your passport photo.

“These templates are irreversible and cannot be reverse-engineered by anyone outside of CBP to reconstruct the photo,” according to the CBP.

Customers and Border Protection says it discards” photos of U.S. citizens and exempt aliens within 12 hours of verifying their identity. It can take 14 days to delete other travelers’ photographs. According to agency rules, airports and other partners aren’t allowed to keep any traveler photos they take for identification purposes.

The breach comes at a time when some airlines are planning on using facial recognition not just at customs but for flight check-in and baggage drop, The Washington Post reports.

There are some protections if your license plate information is stolen. While the Driver’s Privacy Protection Act makes it difficult to track down someone’s personal information just from a license plate, some privacy advocates have raised concerns about the amount of data automated plate readers suck up. 

The image quality will depend on whether vehicles at the border crossing had to stop and wait for long stretches due to lots of traffic, Dr. Jennifer King, director of privacy at Stanford’s Center for Internet and Society, told Digital Trends. As for how the images could be used, “It all depends on who stole it,” she said. Criminal hackers and foreign governments would have different motives and uses for the data.

“Having more data to feed into a facial recognition system is always useful, sadly, especially high-quality images taken for that purpose, to really try to focus on identifying people,” said King.

“We’re at the point where training data is hard to find, and getting good training data is invaluable in and of itself, even if it doesn’t ultimately lead to identification of individuals, for example, in the short term,” she added.

The CBP and federal authorities are investigating the breach and monitoring for the stolen information.

Update 6/11/2019: This story was updated to include new details about the amount and type of photographs stolen and to include remarks by Dr. Jennifer King. 

Jenny McGrath
Former Digital Trends Contributor
Jenny McGrath is a senior writer at Digital Trends covering the intersection of tech and the arts and the environment. Before…
Hackers are pretending to be cybersecurity firm to lock your entire PC
A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

As hackers come up with new ways to attack, not even trustworthy names can be taken at face value. This time, a ransom-as-a-service (RaaS) attack is being used to impersonate a cybersecurity vendor called Sophos.

The RaaS, referred to as SophosEncrypt, can take hold of your files -- or even your whole PC -- and requires payment to have them decrypted.

Read more
‘World’s largest sundial’ to double as green energy provider
Houston's Arco del Tiempo (Arch of Time).

Houston’s next piece of public art is being described as "the world's largest sundial" and will also produce solar power for the local community.

The striking Arco del Tiempo (Arch of Time) is the creation of Berlin-based artist and architect Riccardo Mariano and will be installed in the Texan city’s East End district in 2024.

Read more
Nvidia’s peace offering isn’t working
Two MSI RTX 4060 Ti 16GB GPUs over a black background.

Nvidia's RTX 4060 Ti 16GB is here, but you wouldn't know it if you didn't follow GPU news closely. It seems that the GPU might just be so far behind some of the best graphics cards that Nvidia isn't advertising it too much. As a result, early benchmarks are scarce.

MSI has released some benchmarks of its own, comparing the 8GB and the 16GB versions of the RTX 4060 Ti. It turns out that the new GPU might actually be slower. Is this why Nvidia didn't even make its own version of this card?

Read more