Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1
|
|
- Gordon Carpenter
- 6 years ago
- Views:
Transcription
1 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1 Gap Analysis of the Department of Homeland Security s Use of Biometrics Camille J. Acred Southwestern College Professional Studies MSA 570 Homeland Security Defense and Administration Week Six Portfolio Assignment Professor William J. Howard 23 September 2012
2 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 2 Abstract Resulting from the terrorist attacks of 9/11, the United States is extremely focused on advances in technology supporting the safety of our homeland. The Department of Homeland Security was instituted to keep America safe from all attacks. Immigration reform and the increased risk of terrorism on American soil have spawned the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program, aimed at enhancing the security of our citizens and visitors. US-VISIT does this by supplying the technology for collecting and storing biometric data, and providing it to designated federal agencies in order to support information sharing by the law enforcement and intelligent communities. There are several types of biometric modalities in use today and several other modalities currently being developed which could make our data profiles on individuals even more accurate.
3 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 3 Gap Analysis of the Department of Homeland Security s Use of Biometrics Biometrics is a term commonly used in America with the increase in terrorism and security awareness. By definition, biometrics are the measurable biological (anatomical and physiological) and behavioral characteristics that can be used for automated recognition (Bush, 2008). Examples of biometrics include fingerprints, facial recognition, and iris recognition. Since the catastrophic terrorist attacks of 9/11, The Department of Homeland Security (DHS), whose primary mission is to keep America safe from any type of threats, is deeply involved in all aspects of terrorism defense, including biometric technologies. This gap analysis will discuss DHS s current use of biometrics and any potential uses which may be used in the future to further protect our nation. DHS s biometrics program is the United States Visitor and Immigrant Status Indicator Technology program, commonly referred to as US-VISIT. The Office of US-VISIT falls under the National Protection and Programs Directorate (NPPD). DHS s organization can be confusing, therefore I have included the following chart for further explanation (see figure 1). US-VISIT initially provided fingerprint-based and photographic identity verification and analysis services to federal, state, and local government decision-makers to help them accurately identify the people they encounter and determine whether those people pose a risk to the United States. Focusing primarily on international travelers at U.S. visa-issuing ports of entry, US- VISIT helps immigration officers determine whether a person is eligible to receive a visa or enter the United States. The biometric collection processes used by US-VISIT is simple, convenient, and secure (US-VISIT). US-VISIT is continuously improving and adding to the standards and capabilities of the program as new technologies become available.
4 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 4 Figure 1 DHS Organization (DHS Organization Chart) Organizations supported by US-VISIT are the Department of Defense (DoD), U.S. Coast Guard, Department of Justice (DoJ), U.S. Customs and Border Protection, and U.S. Citizen and Immigration Services. Organization Requirements or Mandates US-VISIT is required to meet objectives outlines in National Security Presidential Directive (NSPD) 59, Biometrics for Identification and Screening to Enhance National Security. This directive requires them to coordinate the sharing of biometric and associated biographic and contextual information with other Federal agencies and foreign partners in accordance with applicable law (Bush, 2008). This policy stemmed from the lack of information sharing by law enforcement and other government agencies leading up to 9/11. NSPD 59 resulted in US-VISIT being the centralized location of all biometrics collecting, handling, and storage for all federal entities. The DHS document, Biometrics Standards Requirements for US-VISIT, clearly states
5 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 5 requirements for the collection, handling, storage, and transmission of biometric profiles of all types; including details such as the types of computer systems and encryption codes that must be used for each modality. US-VISIT also participates in the development of new biometric technology. There are constant technological advances in the field of biometrics, and US-VISIT is directly involved with many of the organizations responsible for these advances, e.g. The Registry of United States Government Recommended Biometric Standards. An investigative technique that began with fingerprints and photographs has evolved to iris scans, palm prints, etc. The main focus of US-VISIT is to support our fight against terrorism. US-VISIT provides data profiles to The Terrorist Watchlist (TWL), working directly with the Federal Bureau of Investigation (FBI), DoJ, Central Intelligence Agency (CIA), and Terrorist Screening Center (TSC). Data profiles which are part of the TWL are extremely sensitive and require transmission only through The Terrorist Watchlist Person Data Exchange Standard (TWPDES); this procedure is also outlined in Biometrics Standards Requirements for US-VISIT. It is important to remember that prior to 9/11 each agency, whether it be state, federal, or DoD, was completely separate from other agencies. Because of this, each of their standards were completely different. It is only in the past couple years that we have tried to merge them together into one standard; a difficult task. This is further supported by DHS in their statement: The diversity of transmission profiles and standards is due in part to the fact that the systems were implemented at different times and were intended to address the different mission requirements of Federal, State, and local law enforcement, military applications, and International police action; and in some cases because the standards available at the
6 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 6 time were not sufficiently developed or have been updated since the original system implementation. (Biometrics Standards Requirements for US-VISIT, 2012) Current Performance Effectiveness In the field of biometrics, there are two primary tools for measuring effectiveness; False Rejection Rate (FRR) (also known as False Non-Match Rate [FNMR]) and False Accept Rate (FAR) (also known as False Match Rate [FMR]). FRR is basically the number of times people are not identified when they should be while FAR is the opposite; the number of times people are identified when they should not be (Identity One). To give an idea of the actual results of biometrics within the US-VISIT program I have included the following analysis: According to the U.S. Department of Justice s analysis of US-VISIT after its first year of operation, on average 118,000 people pass through each day. Of these, 22,350 are subject to secondary inspection and 1,811 of these are refused entry. Of those who are subject to secondary inspection, 92 percent are subsequently admitted to the United States. (Jain, 2007) Currently, biometrics used within US-VISIT are extremely effective, with a much lower FRR and FAR than in The main issue of effectiveness now is the actual data profiles, which are having issues such as multiple names associated with a fingerprint, name misspellings, or date of birth issues. NSPD 59 requires federal agencies to disseminate accurate information associated with individuals and as of now, this is the biggest violation in the biometrics industry. Based on a recent inspection of US-VISIT published by DHS, it was found that US-VISIT needs to improve procedures that specifically target individuals using multiple biographic identities to enter the United States (Office of the Inspector General, DHS, 2012).
7 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 7 Gap Analysis Biometric technology has improved greatly in the last decade, a prime example being fingerprints. Initially two fingerprints were taken from individuals entering the United States, leaving two fingerprints which needed to be matched for identity verification. Currently all ten fingerprints are taken when entering the United States, ensuring much more accuracy because of the requirement of matching all ten prints. This is also true within the DoD where initially we took two fingerprints of suspected terrorists or detainees, and now we take all ten. Forensic labs supporting Iraq and Afghanistan take latent prints off weapons and explosive devices, having more fingerprints on file results in a greater chance of catching those responsible for attacks against coalition forces. The point of this system is information sharing, and all fingerprints taken by DoD are accessible to the aforementioned agencies. If a former Iraqi detainee attempted to enter the United States, we would identify him through US-VISIT. In this following, the biometric modalities currently in use are presented in addition to their advantages and disadvantages, and also the direction they appear to be going in the future. Examples will be used to help illustrate these points as much as possible. Fingerprints Fingerprints are the most popular form of biometrics and have been around the longest; over one hundred years. Fingerprints are very easy to collect; collection no longer requires ink and they can be taken in a mobile or even combat environment using small digital devices. The accuracy of using fingerprints for identification has proven effective over time. Fingerprints are unique to an individual and remain permanent throughout a person s life unless disfigured in some way.
8 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 8 The disadvantages of fingerprinting are that there is so much fingerprint data, storage and handling can cause problems. As with all biometric data, care must be taken during collection to ensure the best results. In combat situations, it is easy to input fingerprints incorrectly. Collecting ten fingerprints per individual generates more data, and increasing the quantity of data unfortunately increases the chances of inaccuracy. Many of the problems arising within US- VISIT are dealing with incorrectly processed fingerprints, leading to multiple identities popping up for one set of prints. The National Science and Technology Council (NSTC) (2012) mention another disadvantage being public perception and the link between fingerprinting and criminalizing people. This disadvantage is insignificant; we are concerned with immigrants and possible terrorists entering the United States, biometric procedures are now standard for entering the country therefore; there is no reason to associate this procedure with criminal processing. There should not be many changes in the future regarding fingerprinting. This technology has already improved by taking ten prints rather than two from each individual. What does need to be perfected is the collection, storage, and transmission of fingerprint data. The errors currently in this system within individual data profiles need to be fixed as well. As a biometric collector in Iraq there were many times we had multiple identities listed for one fingerprint, the process to fix the database was lengthy, but possible if you had the person in custody. If we wait and release the individual there is less of a chance of the profile getting corrected. This means at US ports of entry, time would have to be spent on the individuals who brought up multiple profiles in order to correct them. Iris Scans Technology has been established that makes scanning the iris very simple through the use of handheld devices, even in combat situations. I have conducted iris scanning on hundreds of
9 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 9 individuals using handheld devices and when done properly it is effective. The iris is like a fingerprint and does not change throughout your life. The iris is more advantageous than a fingerprint however since it is protected within the eye and less prone to injury. Although it is easy to scan an iris, it does take proper training and in many cases, proper lighting. The eye has to be open wide and focused in the correct position. This is a difficult task when working with foreigners just due to the language barrier and directing them in which way to look. I did not have any problems when using interpreters. As with fingerprints, there can be problems with the data. In Iraq there were individuals who had biometric profiles but they would not pop up using only an iris scan. This problem usually resulted from a poorly taken iris scan in the initial collection of the individual. As with the fingerprint, this could also be fixed in the database, but it had to be done with the person present. Another issue addressed by NSTC (2012) is that an iris scan cannot be analyzed or verified by a human. This modality relies solely on technology, which is a big disadvantage. A reliance on technology contributes to the FRR and FAR resulting from iris scanning. Facial recognition Taking a photograph of an individual for identification purposes is not a new idea. This modality is great because it is easy, requires little technology (a camera or phone), and can be verified by human eyes. A photograph is always attached to an individual s data profile. There are plenty of disadvantages to using photographs for identification purposes, the most obvious being disguises. A face can be easily disguised or even altered by plastic surgery. Faces also change naturally over your lifetime. There is also a huge variance in the quality of photographs available, which is why US-VISIT has a standard it must follow governing the quality of photos which are used.
10 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 10 I used photographs in data collection in Iraq. All of our subjects had immense data profiles which even included DNA. These subjects were issued a number coinciding with their data profile, their photo was attached and used mostly for quick identification while under U.S. control (e.g., through daily use by guards). For any other (external) identification, for example for the FBI or other government agency, their fingerprints, iris scan, etc. were used. Many of our detainees had been under U.S. control for many years, and an intelligence specialist brought to our attention that some of our photographs were close to eight years old. Because of this we brought all detainees in and took new photos. Comparing the two photos side-by-side was shocking; there were photographs less than five years old that did not resemble the detainees in the slightest bit. Photographs are not dependable however; I do believe they should be included in a data profile. US-VISIT should be required to obtain an up-to-date photograph when people enter the country, and the photographs included in the individual data profile should have the date stamped on them. Other modalities There are several other biometric modalities, some currently in use and some being developed. One of them that I have had experience with is palm prints. Just as with fingerprints, palm prints remain basically unchanged throughout your lifetime. These palm prints are taken in the same way as fingerprints and involve the same type of machine, only slightly larger. This print adds to the overall accuracy of the data profile. With the current use of fingerprints, iris scans, and photographs, palm prints probably will not become a vital part of biometric recognition for entry into the United States, it would be more beneficial in the law enforcement
11 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 11 community or when identifying a high level terrorist however, the subject would have had to be in a situation prior to identification where he gave his palm print. Another modality involving the hand is the use of hand vein patterns. This modality is not currently in use but is being researched. Researchers state that the pattern of blood vessels hidden underneath the skin is quite distinct in individuals, even among identical twins and is stable over long period of time (Brindha, 2012, p. 2). Obtaining hand vein patterns would require the use of a handheld type device which would not make contact with the skin, because of this it would be less prone to error than obtaining finger or palm prints on current devices. Brindha (2012) also explains that duplicating hand vein patterns would be impossible, while it is possible to duplicate both finger and palm prints (although difficult). Voice identification is another modality that is heavily reliant on technology. The advantage to using the voice modality is that it can be collected from video or telephone feeds. Voice identification is not very accurate and requires the filtering of background noises. This technology will become more advanced in the future however; it probably will not be used for immigration purposes. Ear identification gives great potential to the field of biometrics. According to oral pathologists, ears have also been proposed as a new class of biometrics for passive identification which have both reliable and robust features which are extractable from a distance (Kaushal, 2011, p. 3). It has been shown that many subjects leave ear prints at a crime scene from listening at doors, lying on the floor, etc. Ear prints, or photographs or sketches of ears could potentially add to the overall accuracy of an individual data profile. I predict that ear identification will be the next big breakthrough in biometrics.
12 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 12 America has come a long way in biometrics since 9/11. What started as photographs and ink flat fingerprints in criminal investigation department filing cabinets has morphed into fingerprint and iris scan technology you can download onto your smartphone. I have used handheld devices in Iraq which linked someone to a crime in another country from a fingerprint on a bomb. I have also uploaded data into the database from a subject captured within the hour while simultaneously taking to someone at the pentagon as they viewed the same information. The potential for biometric technology in the next ten years is limitless. Consequently, DHS has the massive responsibility of protecting our country and it does so by developing risk-reduction measures through the NPPD. One of NPPD s programs is US- VISIT, charged with (in NSPD 59) providing all designated agencies accurate information using biometric data. US-VISIT does this primarily through the use of photographs and fingerprints, however it also uses biometric modalities such as palm prints and iris scans. Great strides have been made in our biometric technology and are about as accurate as you can get however, we must ensure proper training collection, storage, handling, and transmission so that we do not nullify our efforts for the past eleven years.
13 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 13 References Biometrics Standards Requirements for US-VISIT. (2012, March 15th). Retrieved September 15th, 2012, from Department of Homeland Security: Brindha, V. E. (2012). Biometric Template Security using Dorsal Hand Vein Fuzzy Vault. Journal of Biometrics and Biostatistics, 1-6. Bush, G. W. (2008, June 5th). National Security Presidential Directive 59. Retrieved September 11th, 2012, from The White House: DHS Organization Chart. (n.d.). Retrieved September 11th, 2012, from Department of Homeland Security: Identity One. (n.d.). Retrieved September 15th, 2012, from Biometric Technology: Jain, A. K. (2007, October 16th). Debate over usefulness, pitfalls of biometrics intensifies. Retrieved September 13th, 2012, from Homeland Security New Wire: Kaushal, N. a. (2011). Human Earprints: A review. Jornal of Biometrics and Biostatistics, 1-5. National Science and Technology Council. (n.d.). Biometrics "Foundation Documents". Retrieved Septemeber 13th, 2012, from Biometrics.gov: Office of the Inspector General, DHS. (2012, August). US-VISIT Faces Challenges in Identifying and Reporting Mulitple Biographic Identities. Retrieved Septemeber 17th, 2012, from
14 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 14 Office of the Inspector General, DHS: US-VISIT. (n.d.). Retrieved September 10th, 2012, from Department of Homeland Security:
International Biometrics & Identification Association
International Biometrics & Identification Association 1 Biometrics and Policy Presented by Walter Hamilton, Chairman & President The International Biometrics & Identification Association whamilton@idtp.com
More informationDHS Biometrics Strategic Framework
U.S. Department of Homeland Security DHS Biometrics Strategic Framework 2015 2025 Version 1.0 June 9, 2015 Prepared by the IBSV Biometrics Sub-Team Contents 1 INTRODUCTION... 2 1.1 PURPOSE... 2 1.2 CONTEXT...
More informationAchieving Interoperability
Fact Sheet IDENT and IAFIS Interoperability Goal of IDENT and IAFIS Interoperability As a part of the U.S. government s efforts to enhance our nation s security to meet the needs and challenges of the
More informationPosition Paper IDENT Implementation for U.S. VISIT
Position Paper IDENT Implementation for U.S. VISIT LDENT Proven Value o Currently supporting 14,000+ trained active users and over 2,200 workstations (including international locations) o Currently approximate1
More informationWhy Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology
Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or
More informationDHS Biometric Screening
DHS Biometric Screening 9/22/2015 National Protection and Programs Directorate (NPPD) Who We Are OBIM is the designated lead provider for biometric identity services for the Department of Homeland Security
More informationWhat is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services
United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services What is US-VISIT? US-VISIT supports DHS s mission of protecting the United States from dangerous people US-VISIT
More informationBiometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:
Introduction Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: As a process: 1. A measurable biological (anatomical and physiological) and
More informationBIOMETRICS - WHY NOW?
BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services
More informationCOMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY
COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to the DEPARTMENT OF HOMELAND SECURITY Privacy Act of 1974; Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of the System
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 April 11, 2012 CPSC 467b, Lecture 23 1/39 Biometrics Security and Privacy of Biometric Authentication
More informationCRS Report for Congress
Order Code RS21916 Updated February 7, 2005 CRS Report for Congress Received through the CRS Web Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues Summary Daniel
More information1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?
Introduction Who are you?? Biometrics CSE 190-C00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,
More informationCORPORATE HEADQUARTERS
113 South Columbus Street, Suite 400 Tel: (703) 797-2600 Fax: (703) 706-9549 June 5, 2013 The Honorable Jeff Sessions 326 Russell Senate Office Building Washington, D.C. 20510 The Honorable Dianne Feinstein
More informationThis tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.
Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities
More informationPrepared by Space and Naval Warfare Systems Center Atlantic
System Assessment and Validation for Emergency Responders (SAVER) Biometric Systems Application Note June 2015 Prepared by Space and Naval Warfare Systems Center Atlantic Approved for public release, distribution
More informationRefugee Security Screening
Office of Communications Fact Sheet Dec. 3, 2015 Refugee Security Screening U.S. Citizenship and Immigration Services (USCIS) is deeply committed to safeguarding the American public from threats to public
More informationU.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program
U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program US-Visit In the wake of the attacks of September 11, 2001, the United States federal
More informationCase Study. MegaMatcher Accelerator
MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,
More informationOpinion 3/2012 on developments in biometric technologies
ARTICLE 29 DATA PROTECTION WORKING PARTY 00720/12/EN WP193 Opinion 3/2012 on developments in biometric technologies Adopted on 27 th April 2012 This Working Party was set up under Article 29 of Directive
More information1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements
Announcements Introduction-cont Pattern classification Biometrics CSE 190 Lecture 2 Sign up for the course. Web page is up: http://www.cs.ucsd.edu/classes/wi12/ cse190-c/ HW0 posted. Intro to Matlab How
More information4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:
Introduction Who are you?? Biometrics CSE 190-B00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,
More informationMoneyPad, The Future Wallet
MoneyPad, The Future Wallet What Is MONeYPaD? Money Pad - A form of credit card or smart card similar to floppy disk, which is introduced to provide, secure e-cash transactions. The Money Pad introduced
More informationIDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.
IDEMIA Identity & Security N.A. Providing identity assurance to secure & simplify lives IDEMIA IDENTITY & SECURITY N.A. 3 Only you can assert your identity Identity is unique it s who we are, where we
More informationSECURE REMOTE VOTER REGISTRATION
SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current
More informationHong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data
Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong Biometric Applications
More informationThe Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card
The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card Abstract Have you ever wondered how Identity Theft, Fraud, and Corruption could be eliminated, while
More informationfor fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council
for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council The National Crime Prevention and Privacy Compact Council (Compact Council) is
More informationResearch Article. ISSN (Print)
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(1A):37-41 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationThe Open Biometrics Initiative and World Card
The Open Biometrics Initiative and World Card Notes on RealTechSupport for Biometrics Marc Böhlen, MediaRobotics Lab, University at Buffalo Out-collect the data collectors WhatTheHack2005, The Netherlands
More informationDOD Capstone Concept of Operations for Employing Biometrics in Military Operations
DOD Capstone Concept of Operations for Employing Biometrics in Military Operations Approved by Deputy Chief of Staff, G-3/5/7, United States Army 10 June 2012 Table of Contents EXECUTIVE SUMMARY... iii
More informatione-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives
Introduction e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives Following the events of September 11, 2001 many countries accelerated plans for the adoption of a new
More informationOverview Purpose of the EU-VIS
Overview Purpose of the EU-VIS The EU-VIS Mission In 2004, faced with the growing problem of visa shopping - people from countries outside Europe s Schengen borderless area shopping around different European
More informationINTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014
INTERPOL s face programme for a safer world Mark Branchflower Monday 17th March 2014 Why Facial Recognition? The International Perspective Proliferation of surveillance cameras The International Perspective
More informationUS-VISIT 2010 YEAR IN REVIEW
0 10 2010 YEAR IN REVIEW From the DIRECTOR Since 2004, US-VISIT s innovative use of biometrics has strengthened our Nation s immigration and border management system to an unprecedented level. Today, our
More informationThe problems with a paper based voting
The problems with a paper based voting system A White Paper by Thomas Bronack Problem Overview In today s society where electronic technology is growing at an ever increasing rate, it is hard to understand
More informationBiometrics Technology for Human Recognition
Biometrics Technology for Human Recognition Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 15, 2012 Foreigners Arriving at Incheon G20 Seoul Summit 2010 Face recognition system
More informationPRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16
PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention
More informationPolicy Framework for the Regional Biometric Data Exchange Solution
Policy Framework for the Regional Biometric Data Exchange Solution Part 10 : Privacy Impact Assessment: Regional Biometric Data Exchange Solution REGIONAL SUPPORT OFFICE THE BALI PROCESS 1 Attachment 9
More informationEmergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference
Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference John Kendall Director Public Sector and Security Programs, Asia-Pacific 27 May 2015 Key Border Security Challenges
More informationThe Angola National ID Card
The Angola National ID Card Advanced document security for a widely dispersed population 25 by Uwe Ludwig The Republic of Angola in south-central Africa is bordered by Namibia to the South, the Democratic
More informationPotentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records
Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records September 8, 2016 OIG-16-130 DHS OIG HIGHLIGHTS Potentially Ineligible Individuals Have Been
More informationBIOMETRICS. Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre
NEW doctrinal concepts BIOMETRICS by Wing Commander Mark Lunan Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre with additional contributions from Lieutenant Colonel Joel
More informationBiometrics how to put to use and how not at all?
1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät
More informationSUMMARY INTRODUCTION. xiii
SUMMARY INTRODUCTION The U.S. Army has a growing need to control access to its systems in times of both war and peace. In wartime, the Army s dependence on information as a tactical and strategic asset
More informationPublication Scheme Y/N N Fingerprints,DNA and Photographs Version 4 Student Lesson Note
Protective Marking Not Protectively Marked Publication Scheme Y/N N Title Fingerprints,DNA and Photographs Version 4 Summary Student Lesson Note Branch/OCU HR3-7 Author Hetal Halai 080441 Date created
More informationIntroduction-cont Pattern classification
How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something
More informationImmigration and Customs Enforcement (ICE) Secure Communities (SC)
Immigration and Customs Enforcement (ICE) Secure Communities (SC) Standard Operating Procedures (SOP) Distributed for adoption by participating county and local law enforcement agencies Table of Contents
More informationHow biometrics can improve the targeting of social protection. What we do. How we do it.
How biometrics can improve the targeting of social protection What we do. How we do it. How biometrics can improve the targeting of social protection What we do. How we do it 3 In developing countries,
More informationMARYLAND Maryland MVA Real ID Act - Impact Analysis
MARYLAND Maryland MVA Real ID Act - Impact Analysis REAL ID ACT REQUIREMENT IMPACT ASSUMPTIONS Full Legal Name into Driver Licensing System (DLS) (In Record, on Document) Modify DLS application and databases.
More informationThe forensic use of bioinformation: ethical issues
The forensic use of bioinformation: ethical issues A guide to the Report 01 The Nuffield Council on Bioethics has published a Report, The forensic use of bioinformation: ethical issues. It considers the
More informationNews Release May 11, 2010
Office of Communications News Release May 11, 2010 USCIS To Issue Redesigned Green Card State-of-the-Art Technology Makes New Card More Secure WASHINGTON U.S. Citizenship and Immigration Services (USCIS)
More informationBiometrics: primed for business use
Article Biometrics: primed for business use Introduction For the regular traveller, identity and security checks are becoming ever more intrusive. Walk though an airport today, and you are likely to be
More informationBiometrics & Accessibility
Biometrics & Accessibility Rawlson O'Neil King Lead Researcher, Biometrics Research Group, Inc. Contributing Editor, BiometricUpdate.com rawlson@biometricupdate.com Biometrics Research Group, Inc. Biometrics
More informationSenator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of
Senator Daniel K. Akaka Statement on the REAL ID Act December 8, 2006 Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of 2005. The REAL ID Act became law over a year and a half ago, but
More informationGAO. BORDER SECURITY Joint, Coordinated Actions by State and DHS Needed to Guide Biometric Visas and Related Programs
GAO United States Government Accountability Office Testimony Before the Committee on Government Reform, House of Representatives For Release on Delivery Expected at 10:00 a.m. EDT Thursday, September 9,
More informationVoting Corruption, or is it? A White Paper by:
Voting Corruption, or is it? A White Paper by: By: Thomas Bronack Bronackt@gmail.com JASTGAR Systems, Mission and Goal (917) 673-6992 Eliminating Voting Fraud and Corruption Our society is too far along
More informationEU Information Systems
Workshop on Migration Management : Sharing Experiences between Europe and Thailand co-organized by the European Union and Royal Thai Government, Ministry of Foreign Affairs EU Information Systems Bangkok,
More informationMEMORANDUM OF UNDERSTANDING ON TERRORIST WATCHLIST REDRESS PROCEDURES
Case 3:10-cv-00750-BR Document 85-3 Filed 02/13/13 Page 1 of 22 Page ID#: 1111 MEMORANDUM OF UNDERSTANDING ON TERRORIST WATCHLIST REDRESS PROCEDURES The Department of Justice (DOJ), the Federal Bureau
More information5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.
222 individuals who entered Spain illegally were arrested. These persons had no travel documents These detainees claimed origin from Indian held Kashmir. 124 individuals were identified by through biometrics
More informationHOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?
HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? ACCENTURE CITIZEN SURVEY ON BORDER MANAGEMENT AND BIOMETRICS 2014 FACILITATING THE DIGITAL TRAVELER EXPLORING BIOMETRIC BARRIERS With
More informationFEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending,
DISJOINTED PROGRESS JULY 2016 Bottom Line Up Front Despite significant advances and proliferation of biometric technology in the commercial market, the federal government has yet to take full advantage
More informationBiometrics Strategy Better public services Maintaining public trust. June 2018
Biometrics Strategy Better public services Maintaining public trust June 2018 Crown copyright 2018 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise
More informationPage 1 of 9 YALE UNIVERSITY POLICE DEPARTMENT CRIME SCENE PROCESSING GENERAL ORDER JUL 2012 ANNUAL
Page 1 of 9 YALE UNIVERSITY POLICE DEPARTMENT GENERAL ORDERS Serving with Integrity, Trust, Commitment and Courage Since 1894 ORDER TYPE: NEED TO REFER 413 EFFECTIVE DATE: REVIEW DATE: 25 JUL 2012 ANNUAL
More informationTRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER
TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER CONTENTS Executive summary 4 Sophisticated security threats stretch national borders 5 Widespread adoption of biometrics
More informationStatement on Security & Auditability
Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It
More informationTransportation Worker Identification Credential (TWIC) Final Rulemaking Overview. 17 January 2007 Seattle, WA
Transportation Worker Identification Credential (TWIC) Final Rulemaking Overview 17 January 2007 Seattle, WA Highlights of Presentation Program Challenges TWIC Rulemaking Status Applicability Enrollment
More informationPRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
PRESENTATION TITLE Lorem ipsum dolor sit amet, consectetur adipiscing elit. WHAT S THE PLAN? What are Biometrics? Biometrics in Airports Laws & Regulations Privacy & Accuracy Technical Bias 2 3 OUR GOOD
More informationEnhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program
Manitoba s Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program A voluntary, affordable alternative for travelling to the United States by land or water APPLICANT S GUIDE Manitoba
More informationThe Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528
The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC1-2-37 Washington, DC 20528 Re: Docket# DHS-2006-0030 Minimum Standards for Driver Licenses and Identification
More informationDRAFT. C-4 Crack Cocaine
U.S. Department of Justice Office of the Inspector General The Immigration and Naturalization Service's Contacts With Two September 11 Terrorists: A Review of the INS's Admissions of Mohamed Atta and Marwan
More informationMachine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver
Machine Readable Travel Documents: Biometrics Deployment Barry J. Kefauver Smart Card Alliance March 10, 2004 International Civil Aviation Organization (ICAO) United Nations organization Established in
More information3M Cogent, Inc. Case Study. 3M Cogent s. MobileID Solution in theuk. a 3M Company
3M Cogent, Inc. Case Study in theuk a 3M Company case study: MobileID Service is now being delivered to the UK s Police Service through a contract with the National Policing Improvement Agency (NPIA).
More informationUsers Guide to the Automated Gates (For Foreign Nationals)
Users Guide to the Automated Gates (For Foreign Nationals) Ministry of Justice, Immigration Bureau This guide is for foreign nationals who wish to use the automated gates. Please read the contents given
More informationEVIDENCE OF IDENTIFICATION
Regional Seminar on MRTDs, Biometrics and Identification Management Sint Maarten, 9 11 July 2013 EVIDENCE OF IDENTIFICATION Mauricio Siciliano ICAO MRTD Officer Overview Where are we? ICAO Answer Guide
More informationTITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: DEPARTMENT OF STATE POLICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: DEPARTMENT
More informationFederal Agencies + Travel = Quality Control
Slide 1 Federal Agencies + Travel = Quality Control Travel and Tourism Management Page1 Slide 2 Copyright Copyright Texas Education Agency, 2015. These Materials are copyrighted and trademarked as the
More information8 USC 1365b. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see
TITLE 8 - ALIENS AND NATIONALITY CHAPTER 12 - IMMIGRATION AND NATIONALITY SUBCHAPTER II - IMMIGRATION Part IX - Miscellaneous 1365b. Biometric entry and exit data system (a) Finding Consistent with the
More informationMACHINE READABLE TRAVEL DOCUMENTS (MRTDs)
INTERNATIONAL CIVIL AVIATION ORGANIZATION MACHINE READABLE TRAVEL DOCUMENTS (MRTDs) TOWARDS BETTER PRACTICE IN NATIONAL IDENTIFICATION MANAGEMENT Guidance Material (Guide) Version: Release 3 Status: Draft
More informationSECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM
SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early
More informationBallot Reconciliation Procedure Guide
Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most
More informationMassachusetts Executive Office of Public Safety and Security. Statewide Applicant Fingerprint Identification Services (SAFIS) Program
Massachusetts Executive Office of Public Safety and Security Statewide Applicant Fingerprint Identification Services (SAFIS) Program Registration Guide Massachusetts Department of Children and Families
More informationUNITED STATES DEPARTMENT OF JUSTICE EXECUTIVE OFFICE FOR IMMIGRATION REVIEW BOARD OF IMMIGRATION APPEALS FALLS CHURCH, VIRGINIA
Kara Hartzler, Esq. Attorney for Respondent Florence Immigrant & Refugee Rights Project 2601 N. Pinal Parkway P.O. Box 654 Florence, AZ 85232 Telephone: (520) 868-0191 ext. 103 Facsimile: (520) 868-0192
More informationIdentity Management Transcending Markets in Today's Society. October 11th, 2005 Patrick McQuown Adjunct Professor - Georgetown University
Identity Management Transcending Markets in Today's Society October 11th, 2005 Patrick McQuown Adjunct Professor - Georgetown University Agenda Who am I? What do I do? Identity Management Drivers Identification
More informationADMINISTRATION OF JUSTICE HOMELAND SECURITY
ADMINISTRATION OF JUSTICE HOMELAND SECURITY I. CREATION AND ROLE OF THE DEPARTMENT OF HOMELAND SECURITY A. Millions of people all over the world watched TV in utter disbelief as the Twin Towers, which
More informationTECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)
International Civil Aviation Organization WORKING PAPER TAG-MRTD/18-WP/8 22/4/08 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) EIGHTEENTH MEETING Montréal, 5 to
More informationRunning Head: How National Security Influences Immigration Policy 1
Running Head: How National Security Influences Immigration Policy 1 How National Security Influences Immigration Policy Jonathan Snow Virginia Commonwealth University Running Head: How National Security
More informationCOMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY
COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY Agency Information Collection Activities: Biometric Identity [Docket No. 1651-0138]
More informationBiometrics Glossary. Introduction. Glossary Terms
Introduction This set of terms was developed by the National Science & Technology Council s (NSTC) Subcommittee on Biometrics with the full understanding that national (INCITS/M1) and international (ISO/IEC
More informationBiometric Authentication
CS 361S Biometric Authentication Vitaly Shmatikov Biometric Authentication Nothing to remember Passive Nothing to type, no devices to carry around Can t share (usually) Can be fairly unique if measurements
More informationBiometrics in Border Management Grand Challenges for Security, Identity and Privacy
Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,
More informationHaving regard to the opinion of the European Economic and Social Committee ( 1 ),
L 327/20 Official Journal of the European Union 9.12.2017 REGULATION (EU) 2017/2226 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 30 November 2017 establishing an Entry/Exit System (EES) to register
More informationGovernment of Pakistan NADRA Headquarters, Islamabad
Abbaba Government of Pakistan NADRA Headquarters, Islamabad 1 Who We Are 2 Social Support Initiatives 3 Future Strategy National Database and Registration Authority Registrar General of Pakistan NADRA
More informationTestimony of Paul Morris. May 2, Committee Information 6 Go 5/18/ :05 PM
Committee Information 6 Go HOME > HEARINGS > "INTERRUPTING TERRORIST TRAVEL: STRENGTHENING THE SECURITY OF INTERNATIONAL TRAVEL DOCUMENTS " Testimony of Paul Morris May 2, 2007 PRINTABLE VERSION Statement
More informationCRS Report for Congress
Order Code RL31727 CRS Report for Congress Received through the CRS Web Border Security: Immigration Issues in the 108 th Congress Updated May 18, 2004 Lisa M. Seghetti Analyst in Social Legislation Domestic
More informationIdentity Verification in Passport Issuance
Identity Verification in Passport Issuance and dcivil ilregistration i The importance of context and continuity of identity Mr Ross Greenwood Principal Identity Matters Consulting 1 PURPOSE To invite a
More informationAttachment 1. Workflow Designs. NOTE: These workflow designs are for reference only and should not be considered exact specifications or requirements.
Attachment 1 Workflow Designs NOTE: These workflow designs are for reference only and should not be considered exact specifications or requirements. ATTACHMENT 1 WORKFLOW DESIGN FOR REFERENCE ONLY; NOT
More informationIntroduction to Homeland Security
Introduction to Homeland Security Chapter 6 Border Security, Immigration, & Customs Enforcement Border Control The borders of any country are strategically important because of the critical role they play
More informationThe changes are aimed at fighting both terrorism and identity theft.
From: Bell, Stephen Sent: Friday, May 30, 2014 5:21 PM To: Peters, Joe; Watkins, Paul; Rodriguez, Tony; Gipson, Sheri; Hibbs, Rebekah; Mastracchio, JoeAnna Cc: Vinger, Tom Subject: FW: Verification questions
More informationBiometrics how to put to use and how not at all?
1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät
More information