Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

Size: px
Start display at page:

Download "Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1"

Transcription

1 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1 Gap Analysis of the Department of Homeland Security s Use of Biometrics Camille J. Acred Southwestern College Professional Studies MSA 570 Homeland Security Defense and Administration Week Six Portfolio Assignment Professor William J. Howard 23 September 2012

2 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 2 Abstract Resulting from the terrorist attacks of 9/11, the United States is extremely focused on advances in technology supporting the safety of our homeland. The Department of Homeland Security was instituted to keep America safe from all attacks. Immigration reform and the increased risk of terrorism on American soil have spawned the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program, aimed at enhancing the security of our citizens and visitors. US-VISIT does this by supplying the technology for collecting and storing biometric data, and providing it to designated federal agencies in order to support information sharing by the law enforcement and intelligent communities. There are several types of biometric modalities in use today and several other modalities currently being developed which could make our data profiles on individuals even more accurate.

3 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 3 Gap Analysis of the Department of Homeland Security s Use of Biometrics Biometrics is a term commonly used in America with the increase in terrorism and security awareness. By definition, biometrics are the measurable biological (anatomical and physiological) and behavioral characteristics that can be used for automated recognition (Bush, 2008). Examples of biometrics include fingerprints, facial recognition, and iris recognition. Since the catastrophic terrorist attacks of 9/11, The Department of Homeland Security (DHS), whose primary mission is to keep America safe from any type of threats, is deeply involved in all aspects of terrorism defense, including biometric technologies. This gap analysis will discuss DHS s current use of biometrics and any potential uses which may be used in the future to further protect our nation. DHS s biometrics program is the United States Visitor and Immigrant Status Indicator Technology program, commonly referred to as US-VISIT. The Office of US-VISIT falls under the National Protection and Programs Directorate (NPPD). DHS s organization can be confusing, therefore I have included the following chart for further explanation (see figure 1). US-VISIT initially provided fingerprint-based and photographic identity verification and analysis services to federal, state, and local government decision-makers to help them accurately identify the people they encounter and determine whether those people pose a risk to the United States. Focusing primarily on international travelers at U.S. visa-issuing ports of entry, US- VISIT helps immigration officers determine whether a person is eligible to receive a visa or enter the United States. The biometric collection processes used by US-VISIT is simple, convenient, and secure (US-VISIT). US-VISIT is continuously improving and adding to the standards and capabilities of the program as new technologies become available.

4 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 4 Figure 1 DHS Organization (DHS Organization Chart) Organizations supported by US-VISIT are the Department of Defense (DoD), U.S. Coast Guard, Department of Justice (DoJ), U.S. Customs and Border Protection, and U.S. Citizen and Immigration Services. Organization Requirements or Mandates US-VISIT is required to meet objectives outlines in National Security Presidential Directive (NSPD) 59, Biometrics for Identification and Screening to Enhance National Security. This directive requires them to coordinate the sharing of biometric and associated biographic and contextual information with other Federal agencies and foreign partners in accordance with applicable law (Bush, 2008). This policy stemmed from the lack of information sharing by law enforcement and other government agencies leading up to 9/11. NSPD 59 resulted in US-VISIT being the centralized location of all biometrics collecting, handling, and storage for all federal entities. The DHS document, Biometrics Standards Requirements for US-VISIT, clearly states

5 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 5 requirements for the collection, handling, storage, and transmission of biometric profiles of all types; including details such as the types of computer systems and encryption codes that must be used for each modality. US-VISIT also participates in the development of new biometric technology. There are constant technological advances in the field of biometrics, and US-VISIT is directly involved with many of the organizations responsible for these advances, e.g. The Registry of United States Government Recommended Biometric Standards. An investigative technique that began with fingerprints and photographs has evolved to iris scans, palm prints, etc. The main focus of US-VISIT is to support our fight against terrorism. US-VISIT provides data profiles to The Terrorist Watchlist (TWL), working directly with the Federal Bureau of Investigation (FBI), DoJ, Central Intelligence Agency (CIA), and Terrorist Screening Center (TSC). Data profiles which are part of the TWL are extremely sensitive and require transmission only through The Terrorist Watchlist Person Data Exchange Standard (TWPDES); this procedure is also outlined in Biometrics Standards Requirements for US-VISIT. It is important to remember that prior to 9/11 each agency, whether it be state, federal, or DoD, was completely separate from other agencies. Because of this, each of their standards were completely different. It is only in the past couple years that we have tried to merge them together into one standard; a difficult task. This is further supported by DHS in their statement: The diversity of transmission profiles and standards is due in part to the fact that the systems were implemented at different times and were intended to address the different mission requirements of Federal, State, and local law enforcement, military applications, and International police action; and in some cases because the standards available at the

6 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 6 time were not sufficiently developed or have been updated since the original system implementation. (Biometrics Standards Requirements for US-VISIT, 2012) Current Performance Effectiveness In the field of biometrics, there are two primary tools for measuring effectiveness; False Rejection Rate (FRR) (also known as False Non-Match Rate [FNMR]) and False Accept Rate (FAR) (also known as False Match Rate [FMR]). FRR is basically the number of times people are not identified when they should be while FAR is the opposite; the number of times people are identified when they should not be (Identity One). To give an idea of the actual results of biometrics within the US-VISIT program I have included the following analysis: According to the U.S. Department of Justice s analysis of US-VISIT after its first year of operation, on average 118,000 people pass through each day. Of these, 22,350 are subject to secondary inspection and 1,811 of these are refused entry. Of those who are subject to secondary inspection, 92 percent are subsequently admitted to the United States. (Jain, 2007) Currently, biometrics used within US-VISIT are extremely effective, with a much lower FRR and FAR than in The main issue of effectiveness now is the actual data profiles, which are having issues such as multiple names associated with a fingerprint, name misspellings, or date of birth issues. NSPD 59 requires federal agencies to disseminate accurate information associated with individuals and as of now, this is the biggest violation in the biometrics industry. Based on a recent inspection of US-VISIT published by DHS, it was found that US-VISIT needs to improve procedures that specifically target individuals using multiple biographic identities to enter the United States (Office of the Inspector General, DHS, 2012).

7 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 7 Gap Analysis Biometric technology has improved greatly in the last decade, a prime example being fingerprints. Initially two fingerprints were taken from individuals entering the United States, leaving two fingerprints which needed to be matched for identity verification. Currently all ten fingerprints are taken when entering the United States, ensuring much more accuracy because of the requirement of matching all ten prints. This is also true within the DoD where initially we took two fingerprints of suspected terrorists or detainees, and now we take all ten. Forensic labs supporting Iraq and Afghanistan take latent prints off weapons and explosive devices, having more fingerprints on file results in a greater chance of catching those responsible for attacks against coalition forces. The point of this system is information sharing, and all fingerprints taken by DoD are accessible to the aforementioned agencies. If a former Iraqi detainee attempted to enter the United States, we would identify him through US-VISIT. In this following, the biometric modalities currently in use are presented in addition to their advantages and disadvantages, and also the direction they appear to be going in the future. Examples will be used to help illustrate these points as much as possible. Fingerprints Fingerprints are the most popular form of biometrics and have been around the longest; over one hundred years. Fingerprints are very easy to collect; collection no longer requires ink and they can be taken in a mobile or even combat environment using small digital devices. The accuracy of using fingerprints for identification has proven effective over time. Fingerprints are unique to an individual and remain permanent throughout a person s life unless disfigured in some way.

8 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 8 The disadvantages of fingerprinting are that there is so much fingerprint data, storage and handling can cause problems. As with all biometric data, care must be taken during collection to ensure the best results. In combat situations, it is easy to input fingerprints incorrectly. Collecting ten fingerprints per individual generates more data, and increasing the quantity of data unfortunately increases the chances of inaccuracy. Many of the problems arising within US- VISIT are dealing with incorrectly processed fingerprints, leading to multiple identities popping up for one set of prints. The National Science and Technology Council (NSTC) (2012) mention another disadvantage being public perception and the link between fingerprinting and criminalizing people. This disadvantage is insignificant; we are concerned with immigrants and possible terrorists entering the United States, biometric procedures are now standard for entering the country therefore; there is no reason to associate this procedure with criminal processing. There should not be many changes in the future regarding fingerprinting. This technology has already improved by taking ten prints rather than two from each individual. What does need to be perfected is the collection, storage, and transmission of fingerprint data. The errors currently in this system within individual data profiles need to be fixed as well. As a biometric collector in Iraq there were many times we had multiple identities listed for one fingerprint, the process to fix the database was lengthy, but possible if you had the person in custody. If we wait and release the individual there is less of a chance of the profile getting corrected. This means at US ports of entry, time would have to be spent on the individuals who brought up multiple profiles in order to correct them. Iris Scans Technology has been established that makes scanning the iris very simple through the use of handheld devices, even in combat situations. I have conducted iris scanning on hundreds of

9 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 9 individuals using handheld devices and when done properly it is effective. The iris is like a fingerprint and does not change throughout your life. The iris is more advantageous than a fingerprint however since it is protected within the eye and less prone to injury. Although it is easy to scan an iris, it does take proper training and in many cases, proper lighting. The eye has to be open wide and focused in the correct position. This is a difficult task when working with foreigners just due to the language barrier and directing them in which way to look. I did not have any problems when using interpreters. As with fingerprints, there can be problems with the data. In Iraq there were individuals who had biometric profiles but they would not pop up using only an iris scan. This problem usually resulted from a poorly taken iris scan in the initial collection of the individual. As with the fingerprint, this could also be fixed in the database, but it had to be done with the person present. Another issue addressed by NSTC (2012) is that an iris scan cannot be analyzed or verified by a human. This modality relies solely on technology, which is a big disadvantage. A reliance on technology contributes to the FRR and FAR resulting from iris scanning. Facial recognition Taking a photograph of an individual for identification purposes is not a new idea. This modality is great because it is easy, requires little technology (a camera or phone), and can be verified by human eyes. A photograph is always attached to an individual s data profile. There are plenty of disadvantages to using photographs for identification purposes, the most obvious being disguises. A face can be easily disguised or even altered by plastic surgery. Faces also change naturally over your lifetime. There is also a huge variance in the quality of photographs available, which is why US-VISIT has a standard it must follow governing the quality of photos which are used.

10 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 10 I used photographs in data collection in Iraq. All of our subjects had immense data profiles which even included DNA. These subjects were issued a number coinciding with their data profile, their photo was attached and used mostly for quick identification while under U.S. control (e.g., through daily use by guards). For any other (external) identification, for example for the FBI or other government agency, their fingerprints, iris scan, etc. were used. Many of our detainees had been under U.S. control for many years, and an intelligence specialist brought to our attention that some of our photographs were close to eight years old. Because of this we brought all detainees in and took new photos. Comparing the two photos side-by-side was shocking; there were photographs less than five years old that did not resemble the detainees in the slightest bit. Photographs are not dependable however; I do believe they should be included in a data profile. US-VISIT should be required to obtain an up-to-date photograph when people enter the country, and the photographs included in the individual data profile should have the date stamped on them. Other modalities There are several other biometric modalities, some currently in use and some being developed. One of them that I have had experience with is palm prints. Just as with fingerprints, palm prints remain basically unchanged throughout your lifetime. These palm prints are taken in the same way as fingerprints and involve the same type of machine, only slightly larger. This print adds to the overall accuracy of the data profile. With the current use of fingerprints, iris scans, and photographs, palm prints probably will not become a vital part of biometric recognition for entry into the United States, it would be more beneficial in the law enforcement

11 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 11 community or when identifying a high level terrorist however, the subject would have had to be in a situation prior to identification where he gave his palm print. Another modality involving the hand is the use of hand vein patterns. This modality is not currently in use but is being researched. Researchers state that the pattern of blood vessels hidden underneath the skin is quite distinct in individuals, even among identical twins and is stable over long period of time (Brindha, 2012, p. 2). Obtaining hand vein patterns would require the use of a handheld type device which would not make contact with the skin, because of this it would be less prone to error than obtaining finger or palm prints on current devices. Brindha (2012) also explains that duplicating hand vein patterns would be impossible, while it is possible to duplicate both finger and palm prints (although difficult). Voice identification is another modality that is heavily reliant on technology. The advantage to using the voice modality is that it can be collected from video or telephone feeds. Voice identification is not very accurate and requires the filtering of background noises. This technology will become more advanced in the future however; it probably will not be used for immigration purposes. Ear identification gives great potential to the field of biometrics. According to oral pathologists, ears have also been proposed as a new class of biometrics for passive identification which have both reliable and robust features which are extractable from a distance (Kaushal, 2011, p. 3). It has been shown that many subjects leave ear prints at a crime scene from listening at doors, lying on the floor, etc. Ear prints, or photographs or sketches of ears could potentially add to the overall accuracy of an individual data profile. I predict that ear identification will be the next big breakthrough in biometrics.

12 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 12 America has come a long way in biometrics since 9/11. What started as photographs and ink flat fingerprints in criminal investigation department filing cabinets has morphed into fingerprint and iris scan technology you can download onto your smartphone. I have used handheld devices in Iraq which linked someone to a crime in another country from a fingerprint on a bomb. I have also uploaded data into the database from a subject captured within the hour while simultaneously taking to someone at the pentagon as they viewed the same information. The potential for biometric technology in the next ten years is limitless. Consequently, DHS has the massive responsibility of protecting our country and it does so by developing risk-reduction measures through the NPPD. One of NPPD s programs is US- VISIT, charged with (in NSPD 59) providing all designated agencies accurate information using biometric data. US-VISIT does this primarily through the use of photographs and fingerprints, however it also uses biometric modalities such as palm prints and iris scans. Great strides have been made in our biometric technology and are about as accurate as you can get however, we must ensure proper training collection, storage, handling, and transmission so that we do not nullify our efforts for the past eleven years.

13 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 13 References Biometrics Standards Requirements for US-VISIT. (2012, March 15th). Retrieved September 15th, 2012, from Department of Homeland Security: Brindha, V. E. (2012). Biometric Template Security using Dorsal Hand Vein Fuzzy Vault. Journal of Biometrics and Biostatistics, 1-6. Bush, G. W. (2008, June 5th). National Security Presidential Directive 59. Retrieved September 11th, 2012, from The White House: DHS Organization Chart. (n.d.). Retrieved September 11th, 2012, from Department of Homeland Security: Identity One. (n.d.). Retrieved September 15th, 2012, from Biometric Technology: Jain, A. K. (2007, October 16th). Debate over usefulness, pitfalls of biometrics intensifies. Retrieved September 13th, 2012, from Homeland Security New Wire: Kaushal, N. a. (2011). Human Earprints: A review. Jornal of Biometrics and Biostatistics, 1-5. National Science and Technology Council. (n.d.). Biometrics "Foundation Documents". Retrieved Septemeber 13th, 2012, from Biometrics.gov: Office of the Inspector General, DHS. (2012, August). US-VISIT Faces Challenges in Identifying and Reporting Mulitple Biographic Identities. Retrieved Septemeber 17th, 2012, from

14 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 14 Office of the Inspector General, DHS: US-VISIT. (n.d.). Retrieved September 10th, 2012, from Department of Homeland Security:

International Biometrics & Identification Association

International Biometrics & Identification Association International Biometrics & Identification Association 1 Biometrics and Policy Presented by Walter Hamilton, Chairman & President The International Biometrics & Identification Association whamilton@idtp.com

More information

DHS Biometrics Strategic Framework

DHS Biometrics Strategic Framework U.S. Department of Homeland Security DHS Biometrics Strategic Framework 2015 2025 Version 1.0 June 9, 2015 Prepared by the IBSV Biometrics Sub-Team Contents 1 INTRODUCTION... 2 1.1 PURPOSE... 2 1.2 CONTEXT...

More information

Achieving Interoperability

Achieving Interoperability Fact Sheet IDENT and IAFIS Interoperability Goal of IDENT and IAFIS Interoperability As a part of the U.S. government s efforts to enhance our nation s security to meet the needs and challenges of the

More information

Position Paper IDENT Implementation for U.S. VISIT

Position Paper IDENT Implementation for U.S. VISIT Position Paper IDENT Implementation for U.S. VISIT LDENT Proven Value o Currently supporting 14,000+ trained active users and over 2,200 workstations (including international locations) o Currently approximate1

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

DHS Biometric Screening

DHS Biometric Screening DHS Biometric Screening 9/22/2015 National Protection and Programs Directorate (NPPD) Who We Are OBIM is the designated lead provider for biometric identity services for the Department of Homeland Security

More information

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services What is US-VISIT? US-VISIT supports DHS s mission of protecting the United States from dangerous people US-VISIT

More information

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: Introduction Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: As a process: 1. A measurable biological (anatomical and physiological) and

More information

BIOMETRICS - WHY NOW?

BIOMETRICS - WHY NOW? BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services

More information

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to the DEPARTMENT OF HOMELAND SECURITY Privacy Act of 1974; Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of the System

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 April 11, 2012 CPSC 467b, Lecture 23 1/39 Biometrics Security and Privacy of Biometric Authentication

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21916 Updated February 7, 2005 CRS Report for Congress Received through the CRS Web Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues Summary Daniel

More information

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified? Introduction Who are you?? Biometrics CSE 190-C00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,

More information

CORPORATE HEADQUARTERS

CORPORATE HEADQUARTERS 113 South Columbus Street, Suite 400 Tel: (703) 797-2600 Fax: (703) 706-9549 June 5, 2013 The Honorable Jeff Sessions 326 Russell Senate Office Building Washington, D.C. 20510 The Honorable Dianne Feinstein

More information

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems. Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities

More information

Prepared by Space and Naval Warfare Systems Center Atlantic

Prepared by Space and Naval Warfare Systems Center Atlantic System Assessment and Validation for Emergency Responders (SAVER) Biometric Systems Application Note June 2015 Prepared by Space and Naval Warfare Systems Center Atlantic Approved for public release, distribution

More information

Refugee Security Screening

Refugee Security Screening Office of Communications Fact Sheet Dec. 3, 2015 Refugee Security Screening U.S. Citizenship and Immigration Services (USCIS) is deeply committed to safeguarding the American public from threats to public

More information

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program US-Visit In the wake of the attacks of September 11, 2001, the United States federal

More information

Case Study. MegaMatcher Accelerator

Case Study. MegaMatcher Accelerator MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,

More information

Opinion 3/2012 on developments in biometric technologies

Opinion 3/2012 on developments in biometric technologies ARTICLE 29 DATA PROTECTION WORKING PARTY 00720/12/EN WP193 Opinion 3/2012 on developments in biometric technologies Adopted on 27 th April 2012 This Working Party was set up under Article 29 of Directive

More information

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements Announcements Introduction-cont Pattern classification Biometrics CSE 190 Lecture 2 Sign up for the course. Web page is up: http://www.cs.ucsd.edu/classes/wi12/ cse190-c/ HW0 posted. Intro to Matlab How

More information

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means: Introduction Who are you?? Biometrics CSE 190-B00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,

More information

MoneyPad, The Future Wallet

MoneyPad, The Future Wallet MoneyPad, The Future Wallet What Is MONeYPaD? Money Pad - A form of credit card or smart card similar to floppy disk, which is introduced to provide, secure e-cash transactions. The Money Pad introduced

More information

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A. IDEMIA Identity & Security N.A. Providing identity assurance to secure & simplify lives IDEMIA IDENTITY & SECURITY N.A. 3 Only you can assert your identity Identity is unique it s who we are, where we

More information

SECURE REMOTE VOTER REGISTRATION

SECURE REMOTE VOTER REGISTRATION SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current

More information

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong Biometric Applications

More information

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card Abstract Have you ever wondered how Identity Theft, Fraud, and Corruption could be eliminated, while

More information

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council The National Crime Prevention and Privacy Compact Council (Compact Council) is

More information

Research Article. ISSN (Print)

Research Article. ISSN (Print) Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(1A):37-41 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

The Open Biometrics Initiative and World Card

The Open Biometrics Initiative and World Card The Open Biometrics Initiative and World Card Notes on RealTechSupport for Biometrics Marc Böhlen, MediaRobotics Lab, University at Buffalo Out-collect the data collectors WhatTheHack2005, The Netherlands

More information

DOD Capstone Concept of Operations for Employing Biometrics in Military Operations

DOD Capstone Concept of Operations for Employing Biometrics in Military Operations DOD Capstone Concept of Operations for Employing Biometrics in Military Operations Approved by Deputy Chief of Staff, G-3/5/7, United States Army 10 June 2012 Table of Contents EXECUTIVE SUMMARY... iii

More information

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives Introduction e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives Following the events of September 11, 2001 many countries accelerated plans for the adoption of a new

More information

Overview Purpose of the EU-VIS

Overview Purpose of the EU-VIS Overview Purpose of the EU-VIS The EU-VIS Mission In 2004, faced with the growing problem of visa shopping - people from countries outside Europe s Schengen borderless area shopping around different European

More information

INTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014

INTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014 INTERPOL s face programme for a safer world Mark Branchflower Monday 17th March 2014 Why Facial Recognition? The International Perspective Proliferation of surveillance cameras The International Perspective

More information

US-VISIT 2010 YEAR IN REVIEW

US-VISIT 2010 YEAR IN REVIEW 0 10 2010 YEAR IN REVIEW From the DIRECTOR Since 2004, US-VISIT s innovative use of biometrics has strengthened our Nation s immigration and border management system to an unprecedented level. Today, our

More information

The problems with a paper based voting

The problems with a paper based voting The problems with a paper based voting system A White Paper by Thomas Bronack Problem Overview In today s society where electronic technology is growing at an ever increasing rate, it is hard to understand

More information

Biometrics Technology for Human Recognition

Biometrics Technology for Human Recognition Biometrics Technology for Human Recognition Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 15, 2012 Foreigners Arriving at Incheon G20 Seoul Summit 2010 Face recognition system

More information

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16 PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention

More information

Policy Framework for the Regional Biometric Data Exchange Solution

Policy Framework for the Regional Biometric Data Exchange Solution Policy Framework for the Regional Biometric Data Exchange Solution Part 10 : Privacy Impact Assessment: Regional Biometric Data Exchange Solution REGIONAL SUPPORT OFFICE THE BALI PROCESS 1 Attachment 9

More information

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference John Kendall Director Public Sector and Security Programs, Asia-Pacific 27 May 2015 Key Border Security Challenges

More information

The Angola National ID Card

The Angola National ID Card The Angola National ID Card Advanced document security for a widely dispersed population 25 by Uwe Ludwig The Republic of Angola in south-central Africa is bordered by Namibia to the South, the Democratic

More information

Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records

Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records September 8, 2016 OIG-16-130 DHS OIG HIGHLIGHTS Potentially Ineligible Individuals Have Been

More information

BIOMETRICS. Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre

BIOMETRICS. Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre NEW doctrinal concepts BIOMETRICS by Wing Commander Mark Lunan Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre with additional contributions from Lieutenant Colonel Joel

More information

Biometrics how to put to use and how not at all?

Biometrics how to put to use and how not at all? 1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät

More information

SUMMARY INTRODUCTION. xiii

SUMMARY INTRODUCTION. xiii SUMMARY INTRODUCTION The U.S. Army has a growing need to control access to its systems in times of both war and peace. In wartime, the Army s dependence on information as a tactical and strategic asset

More information

Publication Scheme Y/N N Fingerprints,DNA and Photographs Version 4 Student Lesson Note

Publication Scheme Y/N N Fingerprints,DNA and Photographs Version 4 Student Lesson Note Protective Marking Not Protectively Marked Publication Scheme Y/N N Title Fingerprints,DNA and Photographs Version 4 Summary Student Lesson Note Branch/OCU HR3-7 Author Hetal Halai 080441 Date created

More information

Introduction-cont Pattern classification

Introduction-cont Pattern classification How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something

More information

Immigration and Customs Enforcement (ICE) Secure Communities (SC)

Immigration and Customs Enforcement (ICE) Secure Communities (SC) Immigration and Customs Enforcement (ICE) Secure Communities (SC) Standard Operating Procedures (SOP) Distributed for adoption by participating county and local law enforcement agencies Table of Contents

More information

How biometrics can improve the targeting of social protection. What we do. How we do it.

How biometrics can improve the targeting of social protection. What we do. How we do it. How biometrics can improve the targeting of social protection What we do. How we do it. How biometrics can improve the targeting of social protection What we do. How we do it 3 In developing countries,

More information

MARYLAND Maryland MVA Real ID Act - Impact Analysis

MARYLAND Maryland MVA Real ID Act - Impact Analysis MARYLAND Maryland MVA Real ID Act - Impact Analysis REAL ID ACT REQUIREMENT IMPACT ASSUMPTIONS Full Legal Name into Driver Licensing System (DLS) (In Record, on Document) Modify DLS application and databases.

More information

The forensic use of bioinformation: ethical issues

The forensic use of bioinformation: ethical issues The forensic use of bioinformation: ethical issues A guide to the Report 01 The Nuffield Council on Bioethics has published a Report, The forensic use of bioinformation: ethical issues. It considers the

More information

News Release May 11, 2010

News Release May 11, 2010 Office of Communications News Release May 11, 2010 USCIS To Issue Redesigned Green Card State-of-the-Art Technology Makes New Card More Secure WASHINGTON U.S. Citizenship and Immigration Services (USCIS)

More information

Biometrics: primed for business use

Biometrics: primed for business use Article Biometrics: primed for business use Introduction For the regular traveller, identity and security checks are becoming ever more intrusive. Walk though an airport today, and you are likely to be

More information

Biometrics & Accessibility

Biometrics & Accessibility Biometrics & Accessibility Rawlson O'Neil King Lead Researcher, Biometrics Research Group, Inc. Contributing Editor, BiometricUpdate.com rawlson@biometricupdate.com Biometrics Research Group, Inc. Biometrics

More information

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of Senator Daniel K. Akaka Statement on the REAL ID Act December 8, 2006 Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of 2005. The REAL ID Act became law over a year and a half ago, but

More information

GAO. BORDER SECURITY Joint, Coordinated Actions by State and DHS Needed to Guide Biometric Visas and Related Programs

GAO. BORDER SECURITY Joint, Coordinated Actions by State and DHS Needed to Guide Biometric Visas and Related Programs GAO United States Government Accountability Office Testimony Before the Committee on Government Reform, House of Representatives For Release on Delivery Expected at 10:00 a.m. EDT Thursday, September 9,

More information

Voting Corruption, or is it? A White Paper by:

Voting Corruption, or is it? A White Paper by: Voting Corruption, or is it? A White Paper by: By: Thomas Bronack Bronackt@gmail.com JASTGAR Systems, Mission and Goal (917) 673-6992 Eliminating Voting Fraud and Corruption Our society is too far along

More information

EU Information Systems

EU Information Systems Workshop on Migration Management : Sharing Experiences between Europe and Thailand co-organized by the European Union and Royal Thai Government, Ministry of Foreign Affairs EU Information Systems Bangkok,

More information

MEMORANDUM OF UNDERSTANDING ON TERRORIST WATCHLIST REDRESS PROCEDURES

MEMORANDUM OF UNDERSTANDING ON TERRORIST WATCHLIST REDRESS PROCEDURES Case 3:10-cv-00750-BR Document 85-3 Filed 02/13/13 Page 1 of 22 Page ID#: 1111 MEMORANDUM OF UNDERSTANDING ON TERRORIST WATCHLIST REDRESS PROCEDURES The Department of Justice (DOJ), the Federal Bureau

More information

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections. 222 individuals who entered Spain illegally were arrested. These persons had no travel documents These detainees claimed origin from Indian held Kashmir. 124 individuals were identified by through biometrics

More information

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? ACCENTURE CITIZEN SURVEY ON BORDER MANAGEMENT AND BIOMETRICS 2014 FACILITATING THE DIGITAL TRAVELER EXPLORING BIOMETRIC BARRIERS With

More information

FEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending,

FEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending, DISJOINTED PROGRESS JULY 2016 Bottom Line Up Front Despite significant advances and proliferation of biometric technology in the commercial market, the federal government has yet to take full advantage

More information

Biometrics Strategy Better public services Maintaining public trust. June 2018

Biometrics Strategy Better public services Maintaining public trust. June 2018 Biometrics Strategy Better public services Maintaining public trust June 2018 Crown copyright 2018 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise

More information

Page 1 of 9 YALE UNIVERSITY POLICE DEPARTMENT CRIME SCENE PROCESSING GENERAL ORDER JUL 2012 ANNUAL

Page 1 of 9 YALE UNIVERSITY POLICE DEPARTMENT CRIME SCENE PROCESSING GENERAL ORDER JUL 2012 ANNUAL Page 1 of 9 YALE UNIVERSITY POLICE DEPARTMENT GENERAL ORDERS Serving with Integrity, Trust, Commitment and Courage Since 1894 ORDER TYPE: NEED TO REFER 413 EFFECTIVE DATE: REVIEW DATE: 25 JUL 2012 ANNUAL

More information

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER CONTENTS Executive summary 4 Sophisticated security threats stretch national borders 5 Widespread adoption of biometrics

More information

Statement on Security & Auditability

Statement on Security & Auditability Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It

More information

Transportation Worker Identification Credential (TWIC) Final Rulemaking Overview. 17 January 2007 Seattle, WA

Transportation Worker Identification Credential (TWIC) Final Rulemaking Overview. 17 January 2007 Seattle, WA Transportation Worker Identification Credential (TWIC) Final Rulemaking Overview 17 January 2007 Seattle, WA Highlights of Presentation Program Challenges TWIC Rulemaking Status Applicability Enrollment

More information

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit. PRESENTATION TITLE Lorem ipsum dolor sit amet, consectetur adipiscing elit. WHAT S THE PLAN? What are Biometrics? Biometrics in Airports Laws & Regulations Privacy & Accuracy Technical Bias 2 3 OUR GOOD

More information

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program Manitoba s Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program A voluntary, affordable alternative for travelling to the United States by land or water APPLICANT S GUIDE Manitoba

More information

The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528

The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528 The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC1-2-37 Washington, DC 20528 Re: Docket# DHS-2006-0030 Minimum Standards for Driver Licenses and Identification

More information

DRAFT. C-4 Crack Cocaine

DRAFT. C-4 Crack Cocaine U.S. Department of Justice Office of the Inspector General The Immigration and Naturalization Service's Contacts With Two September 11 Terrorists: A Review of the INS's Admissions of Mohamed Atta and Marwan

More information

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver Machine Readable Travel Documents: Biometrics Deployment Barry J. Kefauver Smart Card Alliance March 10, 2004 International Civil Aviation Organization (ICAO) United Nations organization Established in

More information

3M Cogent, Inc. Case Study. 3M Cogent s. MobileID Solution in theuk. a 3M Company

3M Cogent, Inc. Case Study. 3M Cogent s. MobileID Solution in theuk. a 3M Company 3M Cogent, Inc. Case Study in theuk a 3M Company case study: MobileID Service is now being delivered to the UK s Police Service through a contract with the National Policing Improvement Agency (NPIA).

More information

Users Guide to the Automated Gates (For Foreign Nationals)

Users Guide to the Automated Gates (For Foreign Nationals) Users Guide to the Automated Gates (For Foreign Nationals) Ministry of Justice, Immigration Bureau This guide is for foreign nationals who wish to use the automated gates. Please read the contents given

More information

EVIDENCE OF IDENTIFICATION

EVIDENCE OF IDENTIFICATION Regional Seminar on MRTDs, Biometrics and Identification Management Sint Maarten, 9 11 July 2013 EVIDENCE OF IDENTIFICATION Mauricio Siciliano ICAO MRTD Officer Overview Where are we? ICAO Answer Guide

More information

TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: DEPARTMENT OF STATE POLICE

TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: DEPARTMENT OF STATE POLICE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: DEPARTMENT

More information

Federal Agencies + Travel = Quality Control

Federal Agencies + Travel = Quality Control Slide 1 Federal Agencies + Travel = Quality Control Travel and Tourism Management Page1 Slide 2 Copyright Copyright Texas Education Agency, 2015. These Materials are copyrighted and trademarked as the

More information

8 USC 1365b. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

8 USC 1365b. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see TITLE 8 - ALIENS AND NATIONALITY CHAPTER 12 - IMMIGRATION AND NATIONALITY SUBCHAPTER II - IMMIGRATION Part IX - Miscellaneous 1365b. Biometric entry and exit data system (a) Finding Consistent with the

More information

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs)

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs) INTERNATIONAL CIVIL AVIATION ORGANIZATION MACHINE READABLE TRAVEL DOCUMENTS (MRTDs) TOWARDS BETTER PRACTICE IN NATIONAL IDENTIFICATION MANAGEMENT Guidance Material (Guide) Version: Release 3 Status: Draft

More information

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early

More information

Ballot Reconciliation Procedure Guide

Ballot Reconciliation Procedure Guide Ballot Reconciliation Procedure Guide One of the most important distinctions between the vote verification system employed by the Open Voting Consortium and that of the papertrail systems proposed by most

More information

Massachusetts Executive Office of Public Safety and Security. Statewide Applicant Fingerprint Identification Services (SAFIS) Program

Massachusetts Executive Office of Public Safety and Security. Statewide Applicant Fingerprint Identification Services (SAFIS) Program Massachusetts Executive Office of Public Safety and Security Statewide Applicant Fingerprint Identification Services (SAFIS) Program Registration Guide Massachusetts Department of Children and Families

More information

UNITED STATES DEPARTMENT OF JUSTICE EXECUTIVE OFFICE FOR IMMIGRATION REVIEW BOARD OF IMMIGRATION APPEALS FALLS CHURCH, VIRGINIA

UNITED STATES DEPARTMENT OF JUSTICE EXECUTIVE OFFICE FOR IMMIGRATION REVIEW BOARD OF IMMIGRATION APPEALS FALLS CHURCH, VIRGINIA Kara Hartzler, Esq. Attorney for Respondent Florence Immigrant & Refugee Rights Project 2601 N. Pinal Parkway P.O. Box 654 Florence, AZ 85232 Telephone: (520) 868-0191 ext. 103 Facsimile: (520) 868-0192

More information

Identity Management Transcending Markets in Today's Society. October 11th, 2005 Patrick McQuown Adjunct Professor - Georgetown University

Identity Management Transcending Markets in Today's Society. October 11th, 2005 Patrick McQuown Adjunct Professor - Georgetown University Identity Management Transcending Markets in Today's Society October 11th, 2005 Patrick McQuown Adjunct Professor - Georgetown University Agenda Who am I? What do I do? Identity Management Drivers Identification

More information

ADMINISTRATION OF JUSTICE HOMELAND SECURITY

ADMINISTRATION OF JUSTICE HOMELAND SECURITY ADMINISTRATION OF JUSTICE HOMELAND SECURITY I. CREATION AND ROLE OF THE DEPARTMENT OF HOMELAND SECURITY A. Millions of people all over the world watched TV in utter disbelief as the Twin Towers, which

More information

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) International Civil Aviation Organization WORKING PAPER TAG-MRTD/18-WP/8 22/4/08 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) EIGHTEENTH MEETING Montréal, 5 to

More information

Running Head: How National Security Influences Immigration Policy 1

Running Head: How National Security Influences Immigration Policy 1 Running Head: How National Security Influences Immigration Policy 1 How National Security Influences Immigration Policy Jonathan Snow Virginia Commonwealth University Running Head: How National Security

More information

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY Agency Information Collection Activities: Biometric Identity [Docket No. 1651-0138]

More information

Biometrics Glossary. Introduction. Glossary Terms

Biometrics Glossary. Introduction. Glossary Terms Introduction This set of terms was developed by the National Science & Technology Council s (NSTC) Subcommittee on Biometrics with the full understanding that national (INCITS/M1) and international (ISO/IEC

More information

Biometric Authentication

Biometric Authentication CS 361S Biometric Authentication Vitaly Shmatikov Biometric Authentication Nothing to remember Passive Nothing to type, no devices to carry around Can t share (usually) Can be fairly unique if measurements

More information

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,

More information

Having regard to the opinion of the European Economic and Social Committee ( 1 ),

Having regard to the opinion of the European Economic and Social Committee ( 1 ), L 327/20 Official Journal of the European Union 9.12.2017 REGULATION (EU) 2017/2226 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 30 November 2017 establishing an Entry/Exit System (EES) to register

More information

Government of Pakistan NADRA Headquarters, Islamabad

Government of Pakistan NADRA Headquarters, Islamabad Abbaba Government of Pakistan NADRA Headquarters, Islamabad 1 Who We Are 2 Social Support Initiatives 3 Future Strategy National Database and Registration Authority Registrar General of Pakistan NADRA

More information

Testimony of Paul Morris. May 2, Committee Information 6 Go 5/18/ :05 PM

Testimony of Paul Morris. May 2, Committee Information 6 Go 5/18/ :05 PM Committee Information 6 Go HOME > HEARINGS > "INTERRUPTING TERRORIST TRAVEL: STRENGTHENING THE SECURITY OF INTERNATIONAL TRAVEL DOCUMENTS " Testimony of Paul Morris May 2, 2007 PRINTABLE VERSION Statement

More information

CRS Report for Congress

CRS Report for Congress Order Code RL31727 CRS Report for Congress Received through the CRS Web Border Security: Immigration Issues in the 108 th Congress Updated May 18, 2004 Lisa M. Seghetti Analyst in Social Legislation Domestic

More information

Identity Verification in Passport Issuance

Identity Verification in Passport Issuance Identity Verification in Passport Issuance and dcivil ilregistration i The importance of context and continuity of identity Mr Ross Greenwood Principal Identity Matters Consulting 1 PURPOSE To invite a

More information

Attachment 1. Workflow Designs. NOTE: These workflow designs are for reference only and should not be considered exact specifications or requirements.

Attachment 1. Workflow Designs. NOTE: These workflow designs are for reference only and should not be considered exact specifications or requirements. Attachment 1 Workflow Designs NOTE: These workflow designs are for reference only and should not be considered exact specifications or requirements. ATTACHMENT 1 WORKFLOW DESIGN FOR REFERENCE ONLY; NOT

More information

Introduction to Homeland Security

Introduction to Homeland Security Introduction to Homeland Security Chapter 6 Border Security, Immigration, & Customs Enforcement Border Control The borders of any country are strategically important because of the critical role they play

More information

The changes are aimed at fighting both terrorism and identity theft.

The changes are aimed at fighting both terrorism and identity theft. From: Bell, Stephen Sent: Friday, May 30, 2014 5:21 PM To: Peters, Joe; Watkins, Paul; Rodriguez, Tony; Gipson, Sheri; Hibbs, Rebekah; Mastracchio, JoeAnna Cc: Vinger, Tom Subject: FW: Verification questions

More information

Biometrics how to put to use and how not at all?

Biometrics how to put to use and how not at all? 1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät

More information