Biometrics: primed for business use

Size: px
Start display at page:

Download "Biometrics: primed for business use"

Transcription

1 Article Biometrics: primed for business use Introduction For the regular traveller, identity and security checks are becoming ever more intrusive. Walk though an airport today, and you are likely to be tracked by CCTV. That CCTV will be monitored by security officers, and may well use automated, facial recognition to scan for terrorist suspects or smugglers. Hand your passport to the immigration officer, and he or she will check it, and quite possibly, the biometric details contained in a tiny microchip concealed in the cover. Alternatively, depending on the airport, you might walk through a gate controlled by iris scanners, or by facial recognition. At others, your photograph is taken before you head to security. Before stepping on the aircraft, the traveller might be subject to a full body scan, using millimeter wave technology, which delivers images leaving little to the imagination. And, at the end of the journey, the traveller might have their fingerprints scanned; this is already standard practice for visitors to the United States. These measures have generated controversy, not least among privacy campaigners. But they are also changing the way many members of the public view biometric security. As security measures generally become more stringent and more intrusive, biometrics can offer greater levels of assurance, as well as convenience. Irrefutable, or at least stronger, proofs of identity can reduce the need for the background checks and questioning that goes hand in hand with biographical identification. It is increasingly common for organizations to position biometrics as a convenience, allowing for automated identity or credential checking which would simply not be secure enough, with other forms of identification. Stronger identity checks and the increased use of biometrics might be at their most visible in areas such as public transport and the criminal justice system, or for controlling access to critical infrastructure. But the support for stronger identification is gaining ground in fields such as health care provision and financial services. Concerns about identity theft and related financial fraud remain high on the public agenda. Countering such threats means improving identity verification, or relying on less robust and possibly more inconvenient or intrusive antifraud measures. These measures include transaction pattern analysis or the need to attend a branch or medical facility in person, in order to prove identity or entitlement. Where an organization needs to prove someone s identity beyond reasonable doubt and at a manageable cost to itself and minimal inconvenience to the consumer, then biometrics provide an increasingly practical option. Security and government drive biometric acceptance The widespread use of biometrics for identity verification means overcoming a number of technical and practical hurdles; this applies equally to government-backed schemes and to the use of biometrics by business. However, partly as a result of heightened concerns about security, partly because of more effective and efficient biometric identification technologies, and partly because of the advent of national, biometric-backed identification and travel document schemes, the public is now more willing than ever to accept biometric IDs. In the UK, for example, 56% of consumers are willing to provide biometric data for identity verification for retail or financial transactions. As many as 95% of Britons are prepared to use biometric identity information and are willing to use fingerprints when dealing with banks and government agencies, according to Unisys, the technology vendor. International data, also from Unisys, showed that acceptance of biometrics ranged from 50% in Germany to 66% in Australia. Again, fingerprints appear to be the most readily accepted biometric ID, proving more popular than facial scans or voice recordings but also more acceptable than PINs. Passports and national ID cards that incorporate biometrics are bringing the technology to the attention of a much wider group. Government initiatives to persuade the public about the security benefits of biometrics, together with efforts to minimize the inconvenience of enrollment, have had an impact. Similarly, heightened public concerns over information theft and fraud, have increased public awareness of, and the appetite for, stronger forms of authentication. Biometric technologies have also improved rapidly as a result of investment made by public safety and security agencies. Read rates, false rejects and false acceptances have reduced significantly during the last five years, and biometrics seem largely to have shaken off their association with criminal justice.

2 Authors Stephen Davies is a senior manager in the Advisory Practice, Ernst & Young, London, United Kingdom Biometrics: primed for business use Seamus Reilly is a director in the IT Risk and Assurance Practice, Ernst & Young, London, United Kingdom The widespread use of biometrics for identity verification means overcoming a number of technical and practical hurdles 13

3 Importantly for business users, the economies of scale of biometric technologies have changed for the better. The large orders placed by governments for national ID and travel document schemes have driven down costs and brought technology that was once limited to niche applications into the mainstream. One example is the move by agencies such as the US Department of Homeland Security to scan multiple fingers of arriving visitors. This improves both accuracy and speed of entry, compared with the previous single-finger scans. Such technologies were initially too expensive for large-scale deployment. Organizations that have implemented biometric security measures have also learned from their experience. Not only are biometric sensors more accurate, but experience from the early projects and trials has shown the importance of robust and reliable procedures for handling citizens or customers who fail the biometric tests. Concerns, expressed by some privacy groups, that biometric controls would unfairly lock out genuine service users or customers, have not so far proved to be a major stumbling block, although it is essential that any organization has adequate fall-back systems both for verifying the identity of those whose biometrics are not recognized or cannot be recorded, and for allowing identity verification in the event of a systems failure. These developments present an opportunity to businesses: to make use of biometric identity technologies to improve the accuracy of customer identification, to reduce the inconvenience of the checks and verification processes associated with accessing services, and strengthening the security of critical processes and business systems. The business case for biometrics Building a business case for a biometric identity system is necessarily industry specific. In government and national ID card deployments, improved security is often the primary driver. In other areas such as proving entitlement to health or social services, or benefits, fraud reductions can provide a financial payback. In Australia, the business case underpinning the Department of Human Services Access Card initiative estimates that fraud savings could range from AU$1.6 billion to AU$3 billion over a 10 year period. In the private sector, the largest potential application for biometric identification is in financial services. Financial services firms need to deter and reduce fraud and biometrics offers a practical way to do this. Financial services organizations are governed by increasingly strict rules on money laundering. This requires the industry to ensure robust identity verification of customers. Biometrics could well have a role to play, especially if banks and other financial services firms could access national biometric identification documents, perhaps as part of a federated model of biometric identification. Identity fraud prevention could prove to be a strong driver for biometrics, as it impacts the bottom line of consumer facing companies, not just in finance, but also in retail. Estimates of the cost of identity fraud in the US range from US$5 billion to over US$50 billion a year. In the UK, the Government has estimated the total cost to be over 1.7 billion a year. Finance companies are already looking at the feasibility of replacing or supplementing biographical identity documents such as passports or birth certificates with biometrics for identity checks. The measures would largely improve security for existing processes, rather than require the creation of an entirely new identification infrastructure. For example, a customer with a validated biometric identity might need to present fewer documents in order to open an account, or open an account more quickly as the bank will need to carry out fewer checks. Banks and financial services firms could roll out biometric authentication for higher-risk transactions at first. They might also offer the technology as an additional assurance measure for high net worth account holders, as some banks have already done with CAP (Chip Authentication Program) verification for account access. The use of biometrics as an additional method of authentication, for example, for high-value transactions could also help to reduce transaction losses, if some of the practical hurdles can be overcome. Public concerns about identity theft, as

4 Biometrics: primed for business use well as the indirect costs of online fraud to the consumer, are making biometric verification more acceptable. Businesses are also examining some of the ways in which biometric authentication can be used to secure access to confidential data or sensitive systems. Biometrics can be used to replace passwords or tokens for users who need to log in to software applications, or access secure areas such as data centers or trading rooms. The owners of sites that represent critical national infrastructure such as power stations, chemical plants, oil rigs and airports are already using biometric authentication, as are some medical facilities and prisons. Safety-critical industries, in particular, are early adopters of biometrics. The travel and transportation industries have also had early success with voluntary biometric systems, such as Privium in the Netherlands and IRIS in the UK. These systems allow enrolled members of the public to use automated, fast-track lines avoiding queues. The technology appeals to frequent travellers, who value the convenience. For more general use of biometrics for day-to-day transaction authentication and identity management public acceptance levels may still be too low to support widespread deployments. However, such acceptance might be as little as three to five years away. For businesses to be positioned to exploit the technology, they need to establish their approach to biometric authentication now. Deploying biometrics in practice Although public acceptance of biometrics is growing, deploying biometric identification and authentication in the private sector poses a number of challenges. These can range from the issues affecting government deployment to those related to travel documentation and security. A number of early biometric authentication trials in banking, retail and travel have failed to meet expectations, typically because too many genuine users were rejected, because the cost of enrolling customers and deploying the systems was higher than expected, because of reliability issues, or because consumer take up and acceptance was low. Concerns about privacy have led to campaigns against biometrics by both consumer and privacy groups. There has also been negative press coverage. Suggestions that biometric identity data could be hacked, cloned or intercepted have also raised questions about the appropriateness of the technology. Technology has overcome some of the early problems that were experienced. In the case of travel documents, such as biometric passports, facial recognition is based on the holder s photograph. This removes the need for the individual to attend an enrollment session in person, as is the case with systems such as IRIS. Better and more accurate scanners are improving pass rates. The introduction of stronger encryption as well as an 15

5 Businesses looking to implement biometrics need to appreciate that a biometric authentication is a probabilitybased solution, not a binary pass or fail understanding that full biometric data does not need to be held on systems or transmitted if the technology is implemented correctly, have addressed some of the main fraud and security concerns. However, it is essential for any organization planning to use biometric technology to select the correct biometric identifier for each situation. Face recognition can be unobtrusive and carried out through CCTV, but the false reject rate can be as high as 15% to 20%. Fingerprint recognition, which requires the individual to stop and be scanned, can have false reject rates (where a genuine identity holder is barred) which are as low as 0.01%. A fingerprint test might be appropriate for opening a bank account or authenticating a transaction, whereas CCTV-based facial recognition has tended to be used so far to identify suspects, rather than to allow entry to a facility. Businesses looking to implement biometrics need to appreciate that a biometric authentication is a probabilitybased solution, not a binary pass or fail. No biometric system can be right every time. Organizations need to find their own balance for rates of acceptance and rejection: increasing acceptance rates may well increase the likelihood of a false result. What will drive finding this balance will be the organization s own score rates for acceptance and rejection, based on the technology they are using, the level of importance of the transaction or business process, and the other authentication options available. Biometric identification must be managed appropriately with respect to the business process. The security of biometric information is also critical. In all biometrics, an identity consists of a template or information the key which is compared with a data base. Any biometric information is likely to be addressed by privacy regulations and should be treated as personal information, with agreed usage, collection and retention processes in place. Businesses must implement safeguards to ensure that the data is kept private and protected as far as possible from interception or tampering. If biometric identity information is not needed once authentication has taken place, it must be discarded. An organization that is planning to implement a biometric system should also pay close attention to enrollment. The biometric authentication chain is only as strong as the enrollment process: if identity thieves or other criminals can use false documents to create a false biometric ID, it can be very hard to repudiate that identity later. In closed environments where individuals are known and trusted such as for access to part of a site or to an IT system enrollment might be possible based on existing HR and management records. For public systems, so-called footprint checks need to be done with care to ensure the person enrolling is who they say they are and can provide appropriate evidence. The thinking around how such checks might be applied to commercial biometric systems is still developing. Hand in hand with enrollment is the issue of federation. Other two-factor authentication systems, such as tokens and CAP in banking, have been hampered by the inconvenience for customers of having to hold multiple identity devices. If consumers are required to enroll in multiple biometric identity schemes run by differing service providers, take-up will remain low and businesses will not see the security benefits or scale economies. Therefore, the federation of biometric identity between service providers in a sector, or between the private sector and government, is essential for largescale adoption. At the same time, individuals should only be asked to supply the minimum amount of information necessary, and identity information should be held in as few places as possible. Businesses also need to ensure that any biometrics they use fit in with the relevant national legislative framework, as well as taking into account any local cultural issues; in some countries, for example, separate scanning lanes might be needed for male and female customers. Above all, organizations need to understand that biometrics, although attractive, are not an end in themselves. The technology needs to be part of an overall response to risk management.

6 Biometrics: primed for business use Conclusions Biometrics are already being used successfully across a number of sectors, including national identities, travel documentation, transport and safety-critical industries. Business should be actively exploring this technology now and looking for ways to utilize it to reduce risk, but at the same time, to bring process efficiencies and benefits to customers in terms of better security and reduced inconvenience. Financial services organizations, in particular, should be looking at the opportunity to use biometric technology in the short to medium term as a way to reduce losses due through identity theft in high-value transactions. Figure 1. The three models of biometrics The majority of large-scale biometric deployments fall under one of three categories, depending on their scale and scope. Industry-centric programs Government-enabled programs The large-scale adoption of biometrics in the private sector is likely to involve industry cooperation. For example, deploying biometrics instead of, or as well as, a PIN when presenting a credit card would require collaboration from retailers, card manufacturers and financial service providers. Source: Ernst & Young analysis Organization-specific programs Some organizations will develop their own solutions, particularly for providing access control for employees to critical or secure areas of premises. But Organization-specific programs can also be used to verify potential high-value (or high-risk) transactions within a defined customer base, or to meet particular national or international legislative requirements. The widespread rollout of national biometric schemes, for example, for national identity cards, offers an opportunity for cooperation between industries and governments on the delivery of biometric services. Governments would provide the frameworks for the schemes, as has happened in the UK with the Automated Clearance System developed jointly with BAA. In the longer term, as consumer confidence in biometrics increases, more opportunities are likely to emerge for industry-centric or governmentenabled biometric schemes. Most of all, businesses need to monitor the technology actively and consider not only how it can be used to improve security today, but also how it can bring competitive advantage in the near future(see Figure 1). In each case, whether the biometric identification is interoperable or federated, the consumer should not have to give their biometric details to multiple providers. Doing so drives up costs, and causes increased privacy and security risks. Instead, businesses should be working with the vendors, industry regulators and governments to build a federated interoperability model for biometric identification. 17

Recommended Practice 1701 l

Recommended Practice 1701 l Recommended Practice 1701 l Background: The International Traveler Scheme aims to bring registered travelers schemes together under one overall program. The purpose of an International Traveler Scheme

More information

BIOMETRICS - WHY NOW?

BIOMETRICS - WHY NOW? BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,

More information

International Biometrics & Identification Association

International Biometrics & Identification Association International Biometrics & Identification Association 1 Biometrics and Policy Presented by Walter Hamilton, Chairman & President The International Biometrics & Identification Association whamilton@idtp.com

More information

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? ACCENTURE CITIZEN SURVEY ON BORDER MANAGEMENT AND BIOMETRICS 2014 FACILITATING THE DIGITAL TRAVELER EXPLORING BIOMETRIC BARRIERS With

More information

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong Biometric Applications

More information

CASE STUDY 2 Portuguese Immigration & Border Service

CASE STUDY 2 Portuguese Immigration & Border Service CASE STUDY 2 Portuguese Immigration & Border Service Page 1 Table of Contents EXECUTIVE SUMMARY... 3 1 CUSTOMER NAME... 4 2 BUSINESS CASE BUSINESS DRIVERS... 4 3 CHALLENGE... 4 4 SOLUTION DESCRIPTION...

More information

SUMMARY INTRODUCTION. xiii

SUMMARY INTRODUCTION. xiii SUMMARY INTRODUCTION The U.S. Army has a growing need to control access to its systems in times of both war and peace. In wartime, the Army s dependence on information as a tactical and strategic asset

More information

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A. IDEMIA Identity & Security N.A. Providing identity assurance to secure & simplify lives IDEMIA IDENTITY & SECURITY N.A. 3 Only you can assert your identity Identity is unique it s who we are, where we

More information

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012 BALI PROCESS AD HOC GROUP WORKSHOP ON BIOMETRICS FOR IDENTITY INTEGRITY IN IMMIGRATION NEW DELHI, INDIA, 23-26 APRIL 2012 CO-CHAIRS' STATEMENT 1. The Bali Process on People Smuggling, Trafficking in Persons

More information

The Angola National ID Card

The Angola National ID Card The Angola National ID Card Advanced document security for a widely dispersed population 25 by Uwe Ludwig The Republic of Angola in south-central Africa is bordered by Namibia to the South, the Democratic

More information

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) International Civil Aviation Organization WORKING PAPER TAG-MRTD/18-WP/8 22/4/08 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) EIGHTEENTH MEETING Montréal, 5 to

More information

Biometrics Technology for Human Recognition

Biometrics Technology for Human Recognition Biometrics Technology for Human Recognition Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 15, 2012 Foreigners Arriving at Incheon G20 Seoul Summit 2010 Face recognition system

More information

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16 PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention

More information

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements Announcements Introduction-cont Pattern classification Biometrics CSE 190 Lecture 2 Sign up for the course. Web page is up: http://www.cs.ucsd.edu/classes/wi12/ cse190-c/ HW0 posted. Intro to Matlab How

More information

Identity Verification in Passport Issuance

Identity Verification in Passport Issuance Identity Verification in Passport Issuance and dcivil ilregistration i The importance of context and continuity of identity Mr Ross Greenwood Principal Identity Matters Consulting 1 PURPOSE To invite a

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21916 Updated February 7, 2005 CRS Report for Congress Received through the CRS Web Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues Summary Daniel

More information

Introduction-cont Pattern classification

Introduction-cont Pattern classification How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something

More information

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER CONTENTS Executive summary 4 Sophisticated security threats stretch national borders 5 Widespread adoption of biometrics

More information

Achieving Interoperability

Achieving Interoperability Fact Sheet IDENT and IAFIS Interoperability Goal of IDENT and IAFIS Interoperability As a part of the U.S. government s efforts to enhance our nation s security to meet the needs and challenges of the

More information

Policy Framework for the Regional Biometric Data Exchange Solution

Policy Framework for the Regional Biometric Data Exchange Solution Policy Framework for the Regional Biometric Data Exchange Solution Part 10 : Privacy Impact Assessment: Regional Biometric Data Exchange Solution REGIONAL SUPPORT OFFICE THE BALI PROCESS 1 Attachment 9

More information

Position Paper IDENT Implementation for U.S. VISIT

Position Paper IDENT Implementation for U.S. VISIT Position Paper IDENT Implementation for U.S. VISIT LDENT Proven Value o Currently supporting 14,000+ trained active users and over 2,200 workstations (including international locations) o Currently approximate1

More information

Singapore's Automated Clearance using Biometrics

Singapore's Automated Clearance using Biometrics Singapore's Automated Clearance using Biometrics Dr. Yau Wei Yun 1 & Ms. Koh Ting Ting 2 Institute for Infocomm Research, Singapore 1 Ministry of Home Affairs 2 Biometric Passports Meant for better border

More information

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives Introduction e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives Following the events of September 11, 2001 many countries accelerated plans for the adoption of a new

More information

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver Machine Readable Travel Documents: Biometrics Deployment Barry J. Kefauver Smart Card Alliance March 10, 2004 International Civil Aviation Organization (ICAO) United Nations organization Established in

More information

How biometrics can improve the targeting of social protection. What we do. How we do it.

How biometrics can improve the targeting of social protection. What we do. How we do it. How biometrics can improve the targeting of social protection What we do. How we do it. How biometrics can improve the targeting of social protection What we do. How we do it 3 In developing countries,

More information

BIOMETRIC RESIDENCE PERMITS General Information for Applicants, Employers and Sponsors

BIOMETRIC RESIDENCE PERMITS General Information for Applicants, Employers and Sponsors GUIDANCE NOTES BIOMETRIC RESIDENCE PERMITS General Information for Applicants, Employers and Sponsors July 2013 This leaflet explains the Home Office process for applying for a biometric residence permit

More information

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs)

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs) INTERNATIONAL CIVIL AVIATION ORGANIZATION MACHINE READABLE TRAVEL DOCUMENTS (MRTDs) TOWARDS BETTER PRACTICE IN NATIONAL IDENTIFICATION MANAGEMENT Guidance Material (Guide) Version: Release 3 Status: Draft

More information

Biometrics & Accessibility

Biometrics & Accessibility Biometrics & Accessibility Rawlson O'Neil King Lead Researcher, Biometrics Research Group, Inc. Contributing Editor, BiometricUpdate.com rawlson@biometricupdate.com Biometrics Research Group, Inc. Biometrics

More information

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference John Kendall Director Public Sector and Security Programs, Asia-Pacific 27 May 2015 Key Border Security Challenges

More information

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program US-Visit In the wake of the attacks of September 11, 2001, the United States federal

More information

The digital traveler. Automating border management solutions to facilitate travel and enhance security

The digital traveler. Automating border management solutions to facilitate travel and enhance security The digital traveler Automating border management solutions to facilitate travel and enhance security For anyone who has waited in a queue that seems longer than their flight, the prospect of passing

More information

MARYLAND Maryland MVA Real ID Act - Impact Analysis

MARYLAND Maryland MVA Real ID Act - Impact Analysis MARYLAND Maryland MVA Real ID Act - Impact Analysis REAL ID ACT REQUIREMENT IMPACT ASSUMPTIONS Full Legal Name into Driver Licensing System (DLS) (In Record, on Document) Modify DLS application and databases.

More information

An overview of the European approach to the cross-jurisdictional and societal aspects of biometrics

An overview of the European approach to the cross-jurisdictional and societal aspects of biometrics An overview of the European approach to the cross-jurisdictional and societal aspects of biometrics Mario Savastano Senior Researcher IBB / National Research Council of Italy DIEL Federico II University

More information

CORPORATE HEADQUARTERS

CORPORATE HEADQUARTERS 113 South Columbus Street, Suite 400 Tel: (703) 797-2600 Fax: (703) 706-9549 June 5, 2013 The Honorable Jeff Sessions 326 Russell Senate Office Building Washington, D.C. 20510 The Honorable Dianne Feinstein

More information

The Legal Workforce Act 1 Section-by-Section

The Legal Workforce Act 1 Section-by-Section The Legal Workforce Act 1 Section-by-Section Sec. 1: Short Title Legal Workforce Act. PROCESS FOR EMPLOYMENT ELIGBILITY VERIFICATION Sec. 2: Employment Eligibility Verification Process Amends INA 274A(b)

More information

INTRODUCTION 4 Borders under pressure 4 On the move 4 Open for business 4 Experience matters 4

INTRODUCTION 4 Borders under pressure 4 On the move 4 Open for business 4 Experience matters 4 CONTENTS INTRODUCTION 4 Borders under pressure 4 On the move 4 Open for business 4 Experience matters 4 AUTOMATING THE FRONT LINE 5 Automated border control process 5 Trusted travelers 5 TECHNOLOGY MATURITY

More information

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents EDPS Opinion 7/2018 on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents 10 August 2018 1 Page The European Data Protection Supervisor ( EDPS

More information

A unique digital identity from birth and for a lifetime Civil registration as the foundation for digital identification systems

A unique digital identity from birth and for a lifetime Civil registration as the foundation for digital identification systems A unique digital identity from birth and for a lifetime Civil registration as the foundation for digital identification systems An estimated 1.1 billion people around the world are without any proof of

More information

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program Manitoba s Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program A voluntary, affordable alternative for travelling to the United States by land or water APPLICANT S GUIDE Manitoba

More information

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003 Order Code RL31727 Report for Congress Received through the CRS Web Border Security: Immigration Issues in the 108 th Congress February 4, 2003 Lisa M. Seghetti Analyst in Social Legislation Domestic Social

More information

STANDING COMMITTEE ON CITIZENSHIP AND IMMIGRATION COMITÉ PERMANENT DE LA CITOYENNETÉ ET DE L IMMIGRATION. Ian Williams BY FACSIMILE PAR TÉLÉCOPIEUR

STANDING COMMITTEE ON CITIZENSHIP AND IMMIGRATION COMITÉ PERMANENT DE LA CITOYENNETÉ ET DE L IMMIGRATION. Ian Williams BY FACSIMILE PAR TÉLÉCOPIEUR STANDING COMMITTEE ON CITIZENSHIP AND IMMIGRATION COMITÉ PERMANENT DE LA CITOYENNETÉ ET DE L IMMIGRATION HOUSE OF COMMONS CHAMBRE DES COMMUNES OTTAWA, CANADA K1A 0A6 CONFIRMATION OF APPEARANCE CONFIRMATION

More information

CRS Report for Congress

CRS Report for Congress Order Code RL31727 CRS Report for Congress Received through the CRS Web Border Security: Immigration Issues in the 108 th Congress Updated May 18, 2004 Lisa M. Seghetti Analyst in Social Legislation Domestic

More information

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of Senator Daniel K. Akaka Statement on the REAL ID Act December 8, 2006 Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of 2005. The REAL ID Act became law over a year and a half ago, but

More information

Frequently Asked Questions for Participating Members and Organizations

Frequently Asked Questions for Participating Members and Organizations Frequently Asked Questions for Participating Members and Organizations Version 3.0.0 SWAC is a trademark of Secure Worker Access Consortium, LLC. 2010 Secure Worker Access Consortium LLC Page 2 of 9 Ref:

More information

Biometrics from a legal perspective dr. Ronald Leenes

Biometrics from a legal perspective dr. Ronald Leenes Biometrics from a legal perspective dr. Ronald Leenes TILT - Tilburg Institute for Law, Technology, and Society outline introduction biometrics, use legal aspects privacy/data protection biometrics as

More information

Government of Pakistan NADRA Headquarters, Islamabad

Government of Pakistan NADRA Headquarters, Islamabad Abbaba Government of Pakistan NADRA Headquarters, Islamabad 1 Who We Are 2 Social Support Initiatives 3 Future Strategy National Database and Registration Authority Registrar General of Pakistan NADRA

More information

Consumer Attitudes About Biometric Authentication

Consumer Attitudes About Biometric Authentication Consumer Attitudes About Biometric Authentication A UT CID Report by Rachel L. German and K. Suzanne Barber May 2018 The Center for Identity greatly appreciates and acknowledges the following organization

More information

AUTOMATED AND ELECTRIC VEHICLES BILL DELEGATED POWERS MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT

AUTOMATED AND ELECTRIC VEHICLES BILL DELEGATED POWERS MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT AUTOMATED AND ELECTRIC VEHICLES BILL DELEGATED POWERS MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT Introduction 1. This Memorandum has been prepared for the Delegated Powers and Regulatory Reform Committee

More information

Pros and Cons of a fully Automated Border Crossing. Alejandro Gomez de Cuenca Solutions Sales Director Middle East Gemalto

Pros and Cons of a fully Automated Border Crossing. Alejandro Gomez de Cuenca Solutions Sales Director Middle East Gemalto Pros and Cons of a fully Automated Border Crossing Alejandro Gomez de Cuenca Solutions Sales Director Middle East Gemalto We enable secure services in six main markets Bringing trust to connected devices,

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 April 11, 2012 CPSC 467b, Lecture 23 1/39 Biometrics Security and Privacy of Biometric Authentication

More information

MoneyPad, The Future Wallet

MoneyPad, The Future Wallet MoneyPad, The Future Wallet What Is MONeYPaD? Money Pad - A form of credit card or smart card similar to floppy disk, which is introduced to provide, secure e-cash transactions. The Money Pad introduced

More information

ABC systems in Europe and beyond - status and recommendations for the way forward

ABC systems in Europe and beyond - status and recommendations for the way forward ABC systems in Europe and beyond - status and recommendations for the way forward Markus Clabian, AIT Austrian Institute of Technology GmbH, Coordinator FastPass Andreas Kriechbaum-Zabini AIT Austrian

More information

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009 NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, 100.1 Complaints Per 100,000 Population, 19319 Complaints (2007) Updated January 25, 2009 Current Laws: A person is guilty of identity theft when he knowingly

More information

BIOMETRICS IN A HUMANITARIAN CONTEXT

BIOMETRICS IN A HUMANITARIAN CONTEXT BIOMETRICS IN A HUMANITARIAN CONTEXT Andrew Hopkins & Justin Hughes 1 Presentation Overview s global footprint The Genesis of Biometrics within The Biometrics Implementation Project Conclusions, the Future

More information

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned Page 1 of 5 URL: http://www.aclu.org/safeandfree/safeandfree.cfm?id=13356&c=206 The Five Problems With CAPPS II August 25, 2003 The new version of CAPPS II is all dressed up in the language of privacy

More information

Privacy Impact Assessment Update for the. E-Verify RIDE. DHS/USCIS/PIA-030(b) May 6, 2011

Privacy Impact Assessment Update for the. E-Verify RIDE. DHS/USCIS/PIA-030(b) May 6, 2011 for the E-Verify RIDE DHS/USCIS/PIA-030(b) May 6, 2011 Contact Point Janice Jackson Acting Privacy Branch Chief Verification Division, Enterprise Services Directorate Department of Homeland Security (202)

More information

Checklist for Conforming Laws Related to Remote Online Notarization ( RON )

Checklist for Conforming Laws Related to Remote Online Notarization ( RON ) Checklist for Conforming Laws Related to Remote Online Notarization ( RON ) PURPOSE The purpose of this checklist is to assist state land title associations, state mortgage bankers associations, and other

More information

Ad-Hoc Query on identity documents issued by EU Member States. Requested by EE EMN NCP on 2 nd June Compilation produced on 9 th August 2010

Ad-Hoc Query on identity documents issued by EU Member States. Requested by EE EMN NCP on 2 nd June Compilation produced on 9 th August 2010 Ad-Hoc Query on identity documents issued by EU Member States Requested by EE EMN NCP on 2 nd June 2010 Compilation produced on 9 th August 2010 Responses from Austria, Estonia, Finland, Germany, Hungary,

More information

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections. 222 individuals who entered Spain illegally were arrested. These persons had no travel documents These detainees claimed origin from Indian held Kashmir. 124 individuals were identified by through biometrics

More information

Using Identification for Development: Some Guiding Principles

Using Identification for Development: Some Guiding Principles CGD NOTES Using Identification for Development: Some Guiding Principles 2/22/16 (http://www.cgdev.org/publication/using identification development some guiding principles) Alan Gelb and Anna Diofasi There

More information

Case Study. MegaMatcher Accelerator

Case Study. MegaMatcher Accelerator MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,

More information

Approximately eight months after the terrorist

Approximately eight months after the terrorist Backgrounder June 2002 The Enhanced Border Security and Visa Entry Reform Act of 2002 A Summary of H.R. 3525 By Rosemary Jenks Approximately eight months after the terrorist attacks of September 11, on

More information

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early

More information

BIOMETRIC INDUSTRY LETTERS

BIOMETRIC INDUSTRY LETTERS BIOMETRIC INDUSTRY LETTERS 919 18TH STREET, NW, SUITE 901, WASHINGTON, DC 20006 USA TEL 202.587.4855 FAX 202.587.4888 * WWW.IBIA.ORG June 5, 2013 Re: US VISIT Biometric Exit Dear Senators: The Honorable

More information

Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals

Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals Detlef Houdeau Infineon Technologies AG, Munich, Germany Detlef.Houdeau@Infineon.com Abstract The first implementation

More information

Cross-Border & Regional Identity Management

Cross-Border & Regional Identity Management Cross-Border & Regional Identity Management Grahame Saunders: Chief Technology Officer: NEC Africa April 2017 Who we are Leading social value innovator Provides telecommunications, IT and Enterprise business

More information

Biometric Technology for DLID

Biometric Technology for DLID Canada Day at DLID Summit, Houston, Texas, February 29 th, 2004 An introduction to the science (as applied to Canadian requirements) Ian Williams Principal www.idsysgroup.com Biometrics: Defined Automatically

More information

Public Consultation on the Smart Borders Package

Public Consultation on the Smart Borders Package Case Id: db7db520-ef0e-48aa-aa12-4d18d2070548 Date: 22/10/2015 15:06:12 Public Consultation on the Smart Borders Package Fields marked with are mandatory. Questions to all contributors You are responding

More information

The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528

The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528 The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC1-2-37 Washington, DC 20528 Re: Docket# DHS-2006-0030 Minimum Standards for Driver Licenses and Identification

More information

EVIDENCE OF IDENTIFICATION

EVIDENCE OF IDENTIFICATION Regional Seminar on MRTDs, Biometrics and Identification Management Sint Maarten, 9 11 July 2013 EVIDENCE OF IDENTIFICATION Mauricio Siciliano ICAO MRTD Officer Overview Where are we? ICAO Answer Guide

More information

The Perception of Biometric Technology: A Survey

The Perception of Biometric Technology: A Survey The Perception of Biometric Technology: A Survey Stephen J. Elliott, Ph.D. Department of Industrial Technology, Purdue University West Lafayette, Indiana, USA elliottgpurdue.edu Sarah A. Massie Department

More information

Ten Years of Reforms Structural impact

Ten Years of Reforms Structural impact 2006 2015 Ten Years of Reforms Structural impact CONTENTS LIFE-SAVING OPERATIONS BOOSTED BY REFORMS 4 TO MAKE THIS POSSIBLE 6 FLEXIBILITY THROUGH PARTNERSHIP 8 IMPROVED DELIVERY 10 INNOVATION AS A DRIVER

More information

German Federal Ministry of the Interior 20 August / 6

German Federal Ministry of the Interior 20 August / 6 German Federal Ministry of the Interior 20 August 2008 1 / 6 KEESING Journal of Documents & Identity Issue October 2008 Andreas Reisen As Head of Biometrics, Travel & ID Documents, Registration Division

More information

TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL (TWIC) FACTS

TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL (TWIC) FACTS TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL (TWIC) FACTS TWIC RULEMAKING STATUS In response to comments received on the joint TSA/CG Notice of Proposed Rule Making (NPRM) published 22 May 2006, TSA

More information

Moving to the Second Generation of Electronic Passports

Moving to the Second Generation of Electronic Passports Moving to the Second Generation of Electronic Passports Fingerprint biometrics for enhanced security & privacy July 2007 B A N K I N G & R E TA I L E N T R E P R I S E I N T E R N E T C O N T E N T P R

More information

The public consultation consisted of four different questionnaires targeting respectively:

The public consultation consisted of four different questionnaires targeting respectively: REPORT ON THE PUBLIC CONSULTATION ON SMART BORDERS 1. INTRODUCTION The objectives of the public consultation were: 1. to collect views and opinions on the policy options, their likely impact and hence

More information

Going with the flow. Helping border agencies to exploit technology convergence to gain consistent, comprehensive and automated border management

Going with the flow. Helping border agencies to exploit technology convergence to gain consistent, comprehensive and automated border management Going with the flow Helping border agencies to exploit technology convergence to gain consistent, comprehensive and automated border management With a growing traveling population and the virtualization

More information

AGENDA. Focal Ideas A systemic approach. The enrolment The deliverance The control. Needs & Challenges Conclusion Look ahead

AGENDA. Focal Ideas A systemic approach. The enrolment The deliverance The control. Needs & Challenges Conclusion Look ahead AGENDA Focal Ideas A systemic approach The enrolment The deliverance The control Needs & Challenges Conclusion Look ahead 3 Focal Ideas 4 Key Factors to achieve Security Balance Identity Chain [processes]

More information

U.S. Customs and Border Protection

U.S. Customs and Border Protection U.S. Customs and Border Protection Protecting America by Securing Our Borders Adele J. Fasano, Director San Diego Field Office November 2005 CBP secures America s borders to protect the American people

More information

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009 Ad-Hoc Query on Implementation of Council Regulation 380/2008 Requested by FI EMN NCP on 10 th September 2009 Compilation produced on 8 th December 2009 Responses from Austria, Belgium, Denmark, Estonia,

More information

REDMOND MUNICIPAL AIRPORT INITIAL ID APPLICATION AOA ID

REDMOND MUNICIPAL AIRPORT INITIAL ID APPLICATION AOA ID REDMOND MUNICIPAL AIRPORT INITIAL ID APPLICATION AOA ID AIRPORT USE - DATE RECEIVED NAME: LAST NAME LEGAL FIRST NAME MIDDLE NAME ALL - NICK NAMES / FORMER NAMES / ALIAS: ID PIN = LAST - 4 OF SSN OR PHONE

More information

ID4D IDENTIFICATION FOR DEVELOPMENT

ID4D IDENTIFICATION FOR DEVELOPMENT ID4D IDENTIFICATION FOR DEVELOPMENT The World Bank Group s ID4D initiative uses global knowledge and expertise across sectors to help countries realize the transformational potential of digital identification

More information

Frequently Asked Questions for Participating Members and Organizations

Frequently Asked Questions for Participating Members and Organizations Frequently Asked Questions for Participating Members and Organizations Version 3.0.6 SWAC is a trademark of Secure Worker Access Consortium, LLC. Table of Contents ABOUT SWAC... What is SWAC?... 3 What

More information

Biometric Authentication

Biometric Authentication CS 361S Biometric Authentication Vitaly Shmatikov Biometric Authentication Nothing to remember Passive Nothing to type, no devices to carry around Can t share (usually) Can be fairly unique if measurements

More information

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6 DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6 2 DATA PROTECTION (JERSEY) LAW 2005: CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV PART 1: CODE OF PRACTICE Introduction

More information

The United Nations study on fraud and the criminal misuse and falsification of identity

The United Nations study on fraud and the criminal misuse and falsification of identity The United Nations study on fraud and the criminal misuse and falsification of identity Facts and figures Total volume of fraud losses for the UK in 2005 was US$ 27.4 billion (ACPO study). Online banking

More information

Identification checking guidelines

Identification checking guidelines Identification checking guidelines Contents Revised and enhanced identification checking process......2 Identification checking process...2 List of valid identity documents 5 External validation service.5

More information

2.8 Country of Birth >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> 2.9 Nationality 2.10 Do you hold any other nationalities? >>>>>>>>>>>>>>>> 2.11 If please provid

2.8 Country of Birth >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> 2.9 Nationality 2.10 Do you hold any other nationalities? >>>>>>>>>>>>>>>> 2.11 If please provid POINTS BASED SYSTEM FORM (VAF9 DECEMBER 2012) PERSONAL DETAILS This form is for use outside the UK only. This form is provided free of charge. READ THIS FIRST This form must be completed in blue or black

More information

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card Abstract Have you ever wondered how Identity Theft, Fraud, and Corruption could be eliminated, while

More information

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters March 2009 DEPARTMENT OF STATE Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process

More information

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council The National Crime Prevention and Privacy Compact Council (Compact Council) is

More information

IDENTITY CARDS BILL REGULATORY IMPACT ASSESSMENT

IDENTITY CARDS BILL REGULATORY IMPACT ASSESSMENT IDENTITY CARDS BILL REGULATORY IMPACT ASSESSMENT 1. Purpose and Intended Effects (a) Objective 1. The identity cards scheme will help to deliver the following outcomes: (iii) (iv) less illegal migration

More information

Changes in Schengen visa application process

Changes in Schengen visa application process Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries

More information

The Modern TENPRINT Examiner

The Modern TENPRINT Examiner The Modern TENPRINT Examiner CJIS DIVISION FACILITY CLARKSBURG, WV Customer Service 304-625 625-55905590 THE BIOMETRIC SERVICES SECTION To provide person-centric identification services that support law

More information

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit. PRESENTATION TITLE Lorem ipsum dolor sit amet, consectetur adipiscing elit. WHAT S THE PLAN? What are Biometrics? Biometrics in Airports Laws & Regulations Privacy & Accuracy Technical Bias 2 3 OUR GOOD

More information

GAO HOMELAND SECURITY. Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed

GAO HOMELAND SECURITY. Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed GAO United States Government Accountability Office Report to Congressional Requesters November 2009 HOMELAND SECURITY Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable

More information

COUNCIL OF AUSTRALIAN GOVERNMENTS COMMUNIQUÉ SPECIAL MEETING ON COUNTER-TERRORISM 27 SEPTEMBER 2005

COUNCIL OF AUSTRALIAN GOVERNMENTS COMMUNIQUÉ SPECIAL MEETING ON COUNTER-TERRORISM 27 SEPTEMBER 2005 COUNCIL OF AUSTRALIAN GOVERNMENTS COMMUNIQUÉ SPECIAL MEETING ON COUNTER-TERRORISM 27 SEPTEMBER 2005 The Council of Australian Governments (COAG), comprising the Prime Minister, Premiers, the Chief Ministers

More information

EXHIBIT A EXHIBIT B EXHIBIT C EXHIBIT D WRITTEN TESTIMONY of ALEJANDRO N. MAYORKAS DIRECTOR U.S. CITIZENSHIP AND IMMIGRATION SERVICES FOR A HEARING ON SAFEGUARDING

More information