FEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending,

Size: px
Start display at page:

Download "FEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending,"

Transcription

1 DISJOINTED PROGRESS JULY 2016 Bottom Line Up Front Despite significant advances and proliferation of biometric technology in the commercial market, the federal government has yet to take full advantage of new biometric capabilities. The three primary federal customers, Department of Defense (DOD), Department of Homeland Security (DHS), and Department of Justice (DOJ) have aging biometric systems that require modernization and overhaul. The combination of the new security environment, budgetary constraints, and unclear federal guidelines have impeded efforts. In particular, while the commercial market has readily adopted new biometric collection capabilities or modalities that allow immediate identification and authentication, federal agencies use systems that have limited flexibility, scalability, and interoperability. Nevertheless, the hybrid threat environment of non-state and transnational actors necessitates an enhanced ability to track people of interests. Our national security apparatus requires the tools and integrated systems that allow for quick identification and flagging of people anywhere in the world. Fortunately, the federal government is aware of the importance of biometrics in national security and has begun modernization efforts, albeit at an uneven pace across the entirety of the government. Federal Biometric Spending, % DOD DHS DOJ OTHER 6% MILLIONS OF DOLLARS % 65% 2 0 DOD $332 Million DHS $131 Million OTHER DOJ $33 Million $14 Million Source: FPDS 1

2 Types of Biometrics Federal Biometric Marketspace VISUAL SPATIAL Biometrics, or measuring life in Latin, encompass a variety of means to identify an individual based on their unique biology (i.e. eyes, DNA, fingerprints). The FBI has been at the forefront of this field for several decades, and DOD started to show interest in the late 1990s. Using a variety of hardware, such as handheld scanners, and software, federal agencies employ biometric systems to both authenticate good guys as well as identify bad guys. From the beginning, the collection of biometric data was stovepiped in each agency, and sharing of information was limited. This lack of coordination created gaps and exposure. In recent years, federal agencies have begun modernizing their aging biometric systems and developed data sharing capabilities. However, much of these data sharing efforts are piecemeal solutions that have left the U.S. exposed to potential threats. Nevertheless, each government agency faces a set of challenges that impede the growth of biometric use. For the DOD, it is the lack of clear guidelines to mark the way for future biometric systems. For DHS, it is a history of poor organizational management and resource allocation. And for DOJ, it is the growing privacy concerns of emerging biometric capabilities. The successful expansion of federal biometrics will depend on each agency s ability to address these issues. Summary of Federal Biometric Programs PROGRAM PURPOSE/MODALITIES STATUS DOD - Automated Biometric Idenfication System (ABIS) DOD - Joint Personnel Identification (JPI) DOD - SOCOM Sensitive Site Exploitation - Biometrics DHS - Arrival and Departure System (ADIS) DHS - Automated Biometric Identification System (IDENT) DHS - Homeland Advanced Recognition Technology (HART) DOJ/FBI - Integrated Automated Fingerprint System (IAFS) DOJ/FBI - Next Generation Identification (NGI) Fingerprint, Facial, Iris, Palm Fingerprint, Facial, Iris, Palm Fingerprint, Facial, Iris, DNA Fingerpint, Photograph Fingerprint Fingerprint, Facial, Iris Fingerprint Fingerprint, Facial, Iris, Voice Fingerpints Tattoo/Scars Face Iris Ears Footprints BEHAVIORAL Gait Mouse Keystroke Considered legacy technology and alternatives being sought Retained until life-cycle replacement/waiting for approval for new requirement Uses COTS technology. Issued Broad Agency Announcement ( ) for white papers and proposals Entry System implemented since 2006 but exit system still in pilot Legacy database being phased out New biometric system set to replace IDENT by 2019 Currently expanding into iris and facial modalities. Legacy database being phase out Fingers/Hand Signature OLFACTORY Odor AUDITORY Voice CHEMICAL DNA New biometric system initiated in 2008 to be completed by

3 DEPARTMENT OF DEFENSE Since 2003, United States Central Command has employed multi-modal biometric technologies to enhance the effectiveness of traditional military operations. Biometrics have been used to screen people entering or working at U.S. and coalition bases, to identify recidivist criminals, and to tie suspects to terrorist activities. DOD Challenges Aging biometric systems Budgetary constraints Evolving security environment Undefined new requirements Emphasis on Whole of Government MILLIONS OF DOLLARS In the past decade, DOD has spent approximately $332M on biometric-related goods and services. The majority of the spending comes from the Army and Special Operations Command (SOCOM). Since 2012, the Army has experienced an almost 70% decline in funding for biometric programs from $116M in FY12 to $17M and $28M in FY16 and FY17 (projected), respectively. SOCOM s biometric spending is much smaller, averaging $3M annually over the last five years. The Army s reduction reflects the drawdown in Iraq and Afghanistan as well as a shifting focus from procurement of new systems to sustainment of Department of Defense Biometric Funding existing systems and research and evaluation of next-generation capabilities. With the exception 140 of FY15, Research Development Testing & 120 PROCUREMENT Evaluation (RDTE) funding for Army biometric RDTE programs has been double that of procurement 100 since FY FY2011 FY2012 FY2013 FY2014 FY2015 FY2016 FY2017 Source: Department of Defense A contributing factor to the Army s diminishing funding for biometric programs is the programs unclear status within the DOD. Born out of a 2004 Joint Urgent Operational Needs Statement (JUONS), the Army s biometric programs were developed as a quick reaction capability (QRC) and were never converted into a Program of Record (POR). Without POR status, biometric initiatives are more susceptible to budgetary constraints and overseas operations. The Army has a software and a hardware biometric program: the central biometric repository known as the Automated Biometric Identification System (ABIS) and the family of tactical biometric devices under the Joint Personnel Identification (JPI) program. Originally the Army planned to develop PORs of next-gen systems to replace ABIS and JPI. However, in the post-iraq and Afghanistan environment, the program office decided instead to focus on upgrading and sustaining current systems. The Army plans to explore alternatives to the current ABIS system while existing biometric devices are to be retained until life cycle replacement or new requirements approved. Sustainment for ABIS and JPI began in 2014 and is expected to last through DOD has yet to identify alternatives or new requirements for successor programs, instead focusing on small pilot programs to test emerging capabilities. These delays in replacing legacy systems will have profound implications on the Army s ability to carry out its biometric mission. A 2013 report from the Director of Office of Testing & Evaluation noted that an upgraded version of ABIS under evaluation was actually less accurate due to its 3

4 legacy technology. The current systems also suffer from severe cybersecurity flaws due to software obsolescence and old hardware. The current DOD inventory of biometric collection devices is also failing to meet emerging biometric needs that have surpassed sustainment levels. The Biometric Automated Toolset - Army (BAT-A), used to capture iris, facial, and fingerprints images, has been criticized for being difficult and costly to modify due to its rigidity and outdated design. Similarly, the Handheld Interagency Identity Detection Equipment (HIIDE) is at capacity and cannot handle the growing Afghan Watch List. These shortcomings stemming from outdated technology pose a security risk to U.S. troops abroad who depend on biometrics to verify credentials and identify adversaries. Contributing to the uncertainty surrounding the Army s biometric programs is DOD s emphasis on a Whole of Government (WOG) approach. According to DOD, a WOG approach means a shift away from the current biometrics and forensics capability-centric focus to a more holistic concept of identity biometric, biographical, and contextual attributes that help distinguish a friend from an adversary. However, DOD admits that it has yet to define the concept of identity and looks to industry for input and innovation. This admission presents an opportunity for the industry to engage DOD and Congress to influence the development of future biometric requirements. While the Army does not have a POR, SOCOM does under the Sensitive Site Exploitation (SSE) program. SOCOM has a reputation for rapidly fielding Commercial Off-the-Shelf (COTS) technologies that would later be adopted by other service components. Last year, SOCOM issued a Broad Agency Announcement (BAA) for white papers and proposals and capabilities that meet its biometric mission requirement in an effort to modernize and upgrade its biometric capabilities. The Army is very likely to incorporate elements of SOCOM s SSE program as it reevaluates its own biometric programs in the coming years. Furthermore, with the Army s withdrawal from Iraq and Afghanistan, SOCOM has arguably become the primary users of biometric devices, which calls into question whether the Army should be the ones funding procurement. DEPARTMENT OF HOMELAND SECURITY DHS Challenges The Department of Homeland Security (DHS) is the second Lack of clear policy guidelines largest federal biometric customer, spending approximately Poor organizational structures $131M in the last decade. The DHS entity responsible for Mismatch of biometric missions and biometrics is known as the Office of Biometric Identity resource allocation Management (OBIM), whose primary mission is to serve Growing biometric demand and need customers across DHS, at other federal agencies, in state for additional modalities and local law enforcement and overseas through storage of biometric identities, recurrent matching against derogatory information, and other biometric expertise and services. The agency oversees two biometric databases, the Arrival and Departure System (ADIS) and the Automated Biometric Identification System (IDENT). The IDENT system is the most widely used biometric database in the U.S. with 95 million subjects processed last year. The number of subjects processed is expected to grow to 174 million annually by 2022, an 83% increase. 4

5 MILLIONS OF DOLLARS DHS Biometric Funding, US-VISIT OBIM HART FY2013 FY2014 FY2015 FY2016 FY2017 Source: Department of Homeland Security Historically, DHS biometric programs have been stymied by the lack of clear policy guidelines and poor organizational structures. In the wake of 9/11, the U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT) program was created to track the entry and exit of foreign visitors to and from the United States. The program quickly expanded beyond its initial mandate to include providing services to other national security agencies as well as developing and testing biometric entry/exit systems. In 2006, US-VISIT successfully established an entry system that collected biometric data from incoming foreign visitors but failed to do the same with an exit system. A 2010 DHS memo claimed this failure was due to the (1) disruptive nature of biometric collection on travelers; (2) lack of cooperation from air carriers and airports, and (3) questions on personnel responsible for biometric data collection. In reality, the failure was due to the lack of communication and collaboration with the existing system s end users. U.S. Customs and Border Protection (CBP), who is ultimately responsible for the full implementation of entry/exit programs, participated and contributed inputs during pilots, but never had the final say, control, or accountability for getting the job done. US-VISIT s failure to develop an exit biometric system for over ten years has attracted congressional attention. Over the last three years, Congress has made a number of policy adjustments and reorganizations of the US- VISIT program. However, rather than streamlining and clarifying responsibilities, these reorganizations simply served to mismatch missions and available resources. CBP gained full control and accountability on developing a biometric exit system but the funding remained with OBIM. The administration has recognized this misalignment and in the FY7 Presidential Budget Request proposed that US-VISIT, renamed the Office of Biometric Identity Management (OBIM), be transferred from NPPD to CBP. Moving OBIM to CBP, the largest user of the IDENT system, will ensure that the new biometric system addresses the customer s needs. FY22 FY21 FY20 FY19 FY18 FY17 FY16 FY15 FY14 FY13 FY12 FY11 FY10 Projected Growth of IDENT/HART Searches and Gallery Size SEARCHES GALLERY SIZE Although it has taken several years for the federal FY09 government to properly reorganize DHS biometric mission, the future looks bright. OBIM is modernizing its IDENT system through the Homeland Advanced Recognition Technology (HART) program over a course of four years from HART will include more flexibility to allow better plug-and-play architecture, scalability, and multi-modality recognition such as the already available fingerprinting along with additions of iris, face, and THOUSANDS Source: Department of Homeland Security 5

6 possibly voice and DNA. In FY16, DHS was given $52.8M for HART Increment I, which began the process of transferring IDENT s core systems to HART. The FY17 Presidential Budget Requests includes another $65M for Increment 2, which would expand the system to include iris and facial recognition. At the completion of Increment 4 in FY19, HART will reach Full Operating Capability. It will support 450 million unique identities and 720 thousand daily fingerprint transactions while offering greater efficiency, capacity, and performance for more modalities than the legacy IDENT system. DEPARTMENT OF JUSTICE The Department of Justice has the most extensive and mature biometric programs in the United States. Primarily under the jurisdiction of the Federal Bureau of Investigation, DOJ has a longstanding history of biometric DOJ Challenges Accuracy of new modalities from lack of control over collection Privacy concerns of new modalities use and served as a model of best practices for other agencies. For example, DOD modeled its ABIS system after the FBI s Integrated Automated Fingerprint Identification System (IAFIS). In contrast to DOD and DHS, the FBI has a more comprehensive approach to biometrics that includes not only the development and prototyping of new capabilities but also addressing standards, best practices, and privacy and policy concerns. For example, to further centralize biometric activities, the FBI established the Biometrics Center of Excellence (BCOE), a one-stop-shop for biometric collaboration and expertise. In 2015, BCOE established the Biometrics Technology Center, a collaborative effort between the FBI and DOD on advancing biometric capabilities for the entire federal government. Like the DOD and DHS, the FBI is undergoing massive modernization efforts. Starting in 2008, the FBI initiated a $1.2 billion Next Generation Identification (NGI) program. Over the course of 10-years, the program would replace IAFIS with multi-modal capabilities for the collection and repository of Federal Biometric Data Sharing fingerprints, facial images, iris scans, and voice samples. NGI became fully operational in 2014 and quickly became the world s largest and most efficient STORES BIOMETRICS FROM - VISA APPLICATIONS electronic repository of biometric - IMMIGRATION VIOLATORS - OTHER BORDER CREDENTIALS criminal information. According to Amy - LATENT PRINTS FROM DHS, DOJ, DOD Hess, the Executive Assistant Director of the FBI s Science & Technology Division, a fingerprint inquiry from local law enforcement to NGI now only takes five minutes compared to hours with the old IAFS system. In FY 2014 and FY15, approximately 70 million and 77 million fingerprint background checks were processed, respectively. DHS IDENT DOJ NGI SHARES BIOMETRIC FILES SHARES BIOMETRIC FILES SHARES BIOMETRIC FILES STORES BIOMETRICS FROM - DOMESTIC ARRESTS - LIMITED INTERNATIONAL ARRESTS - LATENT PRINTS FROM CRIME SCENES - SOME LICENSING EMPLOYMENT AND OTHER APPLICATIONS Furthermore, the FBI has been the pioneer in efforts to incorporate new biometric capabilities, though not without some challenges. From 2002 DOD ABIS STORES BIOMETRICS FROM - BIOMETRICS ENABLED WATCH LIST (BEWL) - ENEMY COMBATANT; OTHER CRIMINAL MASTER FILES 6

7 to 2004, the FBI ran a number of vendor tests to evaluate existing commercial face recognition and fingerprinting technologies. These technologies would later form the foundations of the NGI program. However, a May 2016 GAO report expressed concerns about the privacy and accuracy of the facial recognition technology. The FBI has rejected calls to reassess the privacy impact of the system or ensure the accuracy of its matches. The agency claims it has adequate internal policies to avoid privacy violations and that match accuracy depends on the quality of data provided by local law enforcement. BCOE is also evaluating iris scans, voice samples, contactless fingerprinting, profile and ear recognition, and scar/tattoo recognition as potential modalities. Other Issues INTEROPERABILITY In a 2008 report, the GAO concluded that gaps in [government] agencies biometric collection and sharing processes can increase the risk that terrorists will avoid identification in subsequent encounters with U.S. personnel during military operations, the visa application process, and U.S. border crossing. Interoperability between different biometric systems has been a longstanding concern among government agencies, with potential national security implications. While the agencies have established formal and informal data sharing arrangements, a formalized, government-wide biometrics data-sharing architecture is still missing. The lack of common architecture means future systems will continue to experience interoperability issues and will require additional investments. Moreover, the federal government lacks a centralized watch list or database of biometric data on possible terrorists. Currently, government officials have to initiate separate searches on the different biometric databases, an inefficient and sometimes impractical process. Facial recognition technology is a new and powerful tool that holds great promise for law enforcement, he said. But if we don t ensure its accuracy and guard against misuse, I am concerned about the risk of innocent Americans being inadvertently swept up in criminal investigations. -U.S. Senator, Al Franken (D-Minnesota) Another area of concern is the need to standardize biometric data being collected, which does not have a straightforward solution. For example, DOD prefers to give commanders in the field the flexibility to gather what they deem is appropriate under the circumstances. This preference for flexibility results in the collection of different data that are not necessarily comparable to each other or with other systems. The balance between flexibility data collection and consistency will have to be addressed to increase interoperability. PRIVACY The expansion of biometric use in the commercial and federal space has attracted the attention of privacy advocates. Advocates argue that biometrics are intrusive and that there is a high potential a third party (particularly other government agencies) can gain access and abuse such data. In essence, there is an impression that biometric data lowers or removes an individual s control of who has access to their personal information. 7

8 The FBI s facial recognition system has become the focal point of privacy advocates in recent years. Although still in pilot testing, critics argue that equipping facial recognition technology to a surveillance system would allow administrators to actively track any individual throughout his/ her daily life. Moreover, advocates insist digitized biometric information can be stolen and used improperly. However, many of these arguments demonstrate a lack of understanding of how biometric technologies work. Digitized biometric information in itself cannot be easily used by third party interlopers as they would require physical replicas. The attacker would have to find a way to decode the digitized biometric data and then convert them into physical copies to bypass a biometric security system. Nevertheless, abuse of biometric information by those with lawful access to biometric systems is a legitimate concern. Currently, only Texas and Illinois have laws regarding biometric capture for commercial uses. Congress last attempt to pass a Biometric Information Privacy Act in 2014 never reached the floor for votes. As new modalities are introduced and federal agencies modernize their biometric collection system, the calls for privacy legislation are likely to increase significantly. 8

9 Glossary ABIS Automated Biometic Identification System (DOD) ADIS Arrival and Departure System DHS Department of Homeland Security IDENT JPI NGI Automated Biometric Identification System (DHS) Joint Personnel Identification Next Generation Identification DOD Department of Defense OBIM Office of Biometric and Identity Management DOJ Department of Justice POR Program of Record FBI Federal Bureau of Investigation QRC Quick Reaction Capability HART IAFS Homeland Advanced Recognition Technology Integrated Automated Fingerprint System US-VISIT United States Visitor and Immigrant Status Indicator Technology BlackArch Partners Third Party Independent Research Disclaimer: This constitutes a research report prepared by an independent third party research provider. BlackArch has not reviewed the accuracy of this report. Any opinions expressed herein are statements of judgment on the date of the report and are subject to future change without notice. Neither this information nor any opinions expressed herein are a solicitation to purchase or sell any securities, and nothing contained in this report is or should be construed as investment advice. This information contains forward looking predictions that are subject to certain risks and uncertainties which could cause actual results to differ materially from those currently anticipated or projected. BlackArch provides this information to its clients in an effort to provide comprehensive information of a broad range of possible opportunities. Any questions regarding this report or its contents must be addressed to your BlackArch Representative. Neptune Advisory th Street SE Washington, DC Scott Ellison scott@neptuneasc.com Kevin Jiang kevin@neptuneasc.com Patrick McCarthy, CFA patrick@neptuneasc.com David Schopler schop@neptuneasc.com This report is proprietary to Neptune Advisory and is intended for the exclusive use of the recipient and its employees and should not be copied or further distributed, circulated, disseminated, or discussed. Neptune Advisory does not provide advice, reports, or analyses regarding securities and this report should not be understood as performing any analysis or making any judgment or giving any opinion, judgment or other information pertaining to the nature, value, potential, or suitability of any particular investment. This report is based upon information believed to be reliable at the time it was prepared. However, Neptune Advisory cannot guarantee the accuracy or correctness of any judgment, opinion or other information contained in this report. Neptune Advisory, its partners, employees or agents have no obligation to correct, update, or revise this report or advise or inform recipient should Neptune Advisory or any of its partners, employees or agents determine that any judgment, opinion, or other information contained in this report is inaccurate or incorrect or should Neptune Advisory or any of its partners, employees or agents change their view as to any judgment, opinion or other information expressed herein. Neptune Advisory, its partners, employees and agents shall have no liability to you or any third party claiming through you with respect to your use of this report or for any errors of transmission. Partners and employees of Neptune Advisory or their family members may own securities or other financial interest of, or have other relationships or financial ties to, of one or more of the issuers discussed herein. 9

DHS Biometric Screening

DHS Biometric Screening DHS Biometric Screening 9/22/2015 National Protection and Programs Directorate (NPPD) Who We Are OBIM is the designated lead provider for biometric identity services for the Department of Homeland Security

More information

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program US-Visit In the wake of the attacks of September 11, 2001, the United States federal

More information

Achieving Interoperability

Achieving Interoperability Fact Sheet IDENT and IAFIS Interoperability Goal of IDENT and IAFIS Interoperability As a part of the U.S. government s efforts to enhance our nation s security to meet the needs and challenges of the

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21916 Updated February 7, 2005 CRS Report for Congress Received through the CRS Web Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues Summary Daniel

More information

DHS Biometrics Strategic Framework

DHS Biometrics Strategic Framework U.S. Department of Homeland Security DHS Biometrics Strategic Framework 2015 2025 Version 1.0 June 9, 2015 Prepared by the IBSV Biometrics Sub-Team Contents 1 INTRODUCTION... 2 1.1 PURPOSE... 2 1.2 CONTEXT...

More information

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1 Gap Analysis of the Department of Homeland Security s Use of Biometrics Camille J. Acred Southwestern College Professional Studies MSA 570 Homeland

More information

CORPORATE HEADQUARTERS

CORPORATE HEADQUARTERS 113 South Columbus Street, Suite 400 Tel: (703) 797-2600 Fax: (703) 706-9549 June 5, 2013 The Honorable Jeff Sessions 326 Russell Senate Office Building Washington, D.C. 20510 The Honorable Dianne Feinstein

More information

US-VISIT 2010 YEAR IN REVIEW

US-VISIT 2010 YEAR IN REVIEW 0 10 2010 YEAR IN REVIEW From the DIRECTOR Since 2004, US-VISIT s innovative use of biometrics has strengthened our Nation s immigration and border management system to an unprecedented level. Today, our

More information

Biometrics: primed for business use

Biometrics: primed for business use Article Biometrics: primed for business use Introduction For the regular traveller, identity and security checks are becoming ever more intrusive. Walk though an airport today, and you are likely to be

More information

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services What is US-VISIT? US-VISIT supports DHS s mission of protecting the United States from dangerous people US-VISIT

More information

Refugee Security Screening

Refugee Security Screening Office of Communications Fact Sheet Dec. 3, 2015 Refugee Security Screening U.S. Citizenship and Immigration Services (USCIS) is deeply committed to safeguarding the American public from threats to public

More information

SUMMARY INTRODUCTION. xiii

SUMMARY INTRODUCTION. xiii SUMMARY INTRODUCTION The U.S. Army has a growing need to control access to its systems in times of both war and peace. In wartime, the Army s dependence on information as a tactical and strategic asset

More information

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16 PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention

More information

Position Paper IDENT Implementation for U.S. VISIT

Position Paper IDENT Implementation for U.S. VISIT Position Paper IDENT Implementation for U.S. VISIT LDENT Proven Value o Currently supporting 14,000+ trained active users and over 2,200 workstations (including international locations) o Currently approximate1

More information

BIOMETRICS - WHY NOW?

BIOMETRICS - WHY NOW? BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services

More information

GAO HOMELAND SECURITY. Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed

GAO HOMELAND SECURITY. Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed GAO United States Government Accountability Office Report to Congressional Requesters November 2009 HOMELAND SECURITY Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable

More information

a GAO GAO HOMELAND SECURITY Planned Expenditures for U.S. Visitor and Immigrant Status Program Need to Be Adequately Defined and Justified

a GAO GAO HOMELAND SECURITY Planned Expenditures for U.S. Visitor and Immigrant Status Program Need to Be Adequately Defined and Justified GAO United States Government Accountability Office Report to Congressional Committees February 2007 HOMELAND SECURITY Planned Expenditures for U.S. Visitor and Immigrant Status Program Need to Be Adequately

More information

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to the DEPARTMENT OF HOMELAND SECURITY Privacy Act of 1974; Implementation of Exemptions; Department of Homeland Security/ALL-030 Use of the System

More information

United States Government Accountability Office GAO. Report to Congressional Committees

United States Government Accountability Office GAO. Report to Congressional Committees GAO United States Government Accountability Office Report to Congressional Committees August 2007 HOMELAND SECURITY U.S. Visitor and Immigrant Status Program s Long-standing Lack of Strategic Direction

More information

Going with the flow. Helping border agencies to exploit technology convergence to gain consistent, comprehensive and automated border management

Going with the flow. Helping border agencies to exploit technology convergence to gain consistent, comprehensive and automated border management Going with the flow Helping border agencies to exploit technology convergence to gain consistent, comprehensive and automated border management With a growing traveling population and the virtualization

More information

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER CONTENTS Executive summary 4 Sophisticated security threats stretch national borders 5 Widespread adoption of biometrics

More information

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY Agency Information Collection Activities: Biometric Identity [Docket No. 1651-0138]

More information

CASE STUDY 2 Portuguese Immigration & Border Service

CASE STUDY 2 Portuguese Immigration & Border Service CASE STUDY 2 Portuguese Immigration & Border Service Page 1 Table of Contents EXECUTIVE SUMMARY... 3 1 CUSTOMER NAME... 4 2 BUSINESS CASE BUSINESS DRIVERS... 4 3 CHALLENGE... 4 4 SOLUTION DESCRIPTION...

More information

CRS Report for Congress

CRS Report for Congress Order Code RL31727 CRS Report for Congress Received through the CRS Web Border Security: Immigration Issues in the 108 th Congress Updated May 18, 2004 Lisa M. Seghetti Analyst in Social Legislation Domestic

More information

STATEMENT JOHN COHEN DEPUTY COUNTERTERRORISM COORDINATOR DEPARTMENT OF HOMELAND SECUIRTY AND PETER T. EDGE

STATEMENT JOHN COHEN DEPUTY COUNTERTERRORISM COORDINATOR DEPARTMENT OF HOMELAND SECUIRTY AND PETER T. EDGE 1 STATEMENT OF JOHN COHEN DEPUTY COUNTERTERRORISM COORDINATOR DEPARTMENT OF HOMELAND SECUIRTY AND PETER T. EDGE DEPUTY EXECUTIVE ASSOCIATE DIRECTOR HOMELAND SECURITY INVESTIGATIONS U.S. IMMIGRATION AND

More information

Special Report - House FY 2013 Department of Homeland Security Appropriations and California Implications - June 2012

Special Report - House FY 2013 Department of Homeland Security Appropriations and California Implications - June 2012 THE CALIFORNIA INSTITUTE FOR FEDERAL POLICY RESEARCH 1608 Rhode Island Avenue, NW, Suite 213, Washington, D.C. 20036 202-785-5456 fax:202-223-2330 e-mail: sullivan@calinst.org web: http://www.calinst.org

More information

GAO. BORDER SECURITY Joint, Coordinated Actions by State and DHS Needed to Guide Biometric Visas and Related Programs

GAO. BORDER SECURITY Joint, Coordinated Actions by State and DHS Needed to Guide Biometric Visas and Related Programs GAO United States Government Accountability Office Testimony Before the Committee on Government Reform, House of Representatives For Release on Delivery Expected at 10:00 a.m. EDT Thursday, September 9,

More information

Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records

Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records September 8, 2016 OIG-16-130 DHS OIG HIGHLIGHTS Potentially Ineligible Individuals Have Been

More information

Biometrics & Accessibility

Biometrics & Accessibility Biometrics & Accessibility Rawlson O'Neil King Lead Researcher, Biometrics Research Group, Inc. Contributing Editor, BiometricUpdate.com rawlson@biometricupdate.com Biometrics Research Group, Inc. Biometrics

More information

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit. PRESENTATION TITLE Lorem ipsum dolor sit amet, consectetur adipiscing elit. WHAT S THE PLAN? What are Biometrics? Biometrics in Airports Laws & Regulations Privacy & Accuracy Technical Bias 2 3 OUR GOOD

More information

Prepared by Space and Naval Warfare Systems Center Atlantic

Prepared by Space and Naval Warfare Systems Center Atlantic System Assessment and Validation for Emergency Responders (SAVER) Biometric Systems Application Note June 2015 Prepared by Space and Naval Warfare Systems Center Atlantic Approved for public release, distribution

More information

DIVISION E--INFORMATION TECHNOLOGY MANAGEMENT REFORM

DIVISION E--INFORMATION TECHNOLOGY MANAGEMENT REFORM DIVISION E--INFORMATION TECHNOLOGY MANAGEMENT REFORM SEC. 5001. SHORT TITLE. This division may be cited as the `Information Technology Management Reform Act of 1995'. SEC. 5002. DEFINITIONS. In this division:

More information

The digital traveler. Automating border management solutions to facilitate travel and enhance security

The digital traveler. Automating border management solutions to facilitate travel and enhance security The digital traveler Automating border management solutions to facilitate travel and enhance security For anyone who has waited in a queue that seems longer than their flight, the prospect of passing

More information

International Biometrics & Identification Association

International Biometrics & Identification Association International Biometrics & Identification Association 1 Biometrics and Policy Presented by Walter Hamilton, Chairman & President The International Biometrics & Identification Association whamilton@idtp.com

More information

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver Machine Readable Travel Documents: Biometrics Deployment Barry J. Kefauver Smart Card Alliance March 10, 2004 International Civil Aviation Organization (ICAO) United Nations organization Established in

More information

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference John Kendall Director Public Sector and Security Programs, Asia-Pacific 27 May 2015 Key Border Security Challenges

More information

Keeping Pace with the Immigration Security Measures Implemented by the Departments of State and Homeland Security

Keeping Pace with the Immigration Security Measures Implemented by the Departments of State and Homeland Security As published in the handbook for the Area IV SHRM & HR Houston International Conference, November 6, 2000. Keeping Pace with the Immigration Security Measures Implemented by the Departments of State and

More information

EPIC seeks records related to alternative screening procedures in CBP s biometric entry/exit program. 1

EPIC seeks records related to alternative screening procedures in CBP s biometric entry/exit program. 1 VIA MAIL Sabrina Burroughs, FOIA Officer FOIA Division U.S. Customs and Border Protection 1300 Pennsylvania Avenue, N.W. Mail Stop 1181 Washington, DC 20229 Dear Ms. Burroughs: This letter constitutes

More information

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003 Order Code RL31727 Report for Congress Received through the CRS Web Border Security: Immigration Issues in the 108 th Congress February 4, 2003 Lisa M. Seghetti Analyst in Social Legislation Domestic Social

More information

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A. IDEMIA Identity & Security N.A. Providing identity assurance to secure & simplify lives IDEMIA IDENTITY & SECURITY N.A. 3 Only you can assert your identity Identity is unique it s who we are, where we

More information

Arrival and Departure Information System Information Sharing Update

Arrival and Departure Information System Information Sharing Update for the Arrival and Departure Information System Information Sharing Update DHS/CBP/PIA 024 March 7, 2014 Contact Point Matt Schneider Assistant Director, DHS/CBP/OFO/PPAE Entry/Exit Transformation Office

More information

a GAO GAO BORDER SECURITY Additional Actions Needed to Eliminate Weaknesses in the Visa Revocation Process

a GAO GAO BORDER SECURITY Additional Actions Needed to Eliminate Weaknesses in the Visa Revocation Process GAO July 2004 United States General Accounting Office Report to the Chairman, Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of

More information

The Modern TENPRINT Examiner

The Modern TENPRINT Examiner The Modern TENPRINT Examiner CJIS DIVISION FACILITY CLARKSBURG, WV Customer Service 304-625 625-55905590 THE BIOMETRIC SERVICES SECTION To provide person-centric identification services that support law

More information

I. PARTIES AUTHORITIES

I. PARTIES AUTHORITIES Page 1 of 8 MEMORANDUM OF UNDERSTANDING BETWEEN AIRPORT OPERATOR OR AIRCRAFT OPERATOR AND TRANSPORTATION SECURITY ADMINISTRATION FOR PARTICIPATION IN THE TSA AVIATION RAP BACK PROGRAM I. PARTIES The Airport

More information

Case Study. MegaMatcher Accelerator

Case Study. MegaMatcher Accelerator MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,

More information

GAO. HOMELAND SECURITY: Prospects For Biometric US-VISIT Exit Capability Remain Unclear

GAO. HOMELAND SECURITY: Prospects For Biometric US-VISIT Exit Capability Remain Unclear GAO For Release on Delivery Expected at 1 p.m. EDT Thursday, June 28, 2007 United States Government Accountability Office Testimony before the Subcommittee on Border, Maritime and Global Counterterrorism,

More information

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) International Civil Aviation Organization WORKING PAPER TAG-MRTD/18-WP/8 22/4/08 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) EIGHTEENTH MEETING Montréal, 5 to

More information

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems. Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities

More information

Key Considerations for Implementing Bodies and Oversight Actors

Key Considerations for Implementing Bodies and Oversight Actors Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made

More information

Testimony of Paul Morris. May 2, Committee Information 6 Go 5/18/ :05 PM

Testimony of Paul Morris. May 2, Committee Information 6 Go 5/18/ :05 PM Committee Information 6 Go HOME > HEARINGS > "INTERRUPTING TERRORIST TRAVEL: STRENGTHENING THE SECURITY OF INTERNATIONAL TRAVEL DOCUMENTS " Testimony of Paul Morris May 2, 2007 PRINTABLE VERSION Statement

More information

BIOMETRIC INDUSTRY LETTERS

BIOMETRIC INDUSTRY LETTERS BIOMETRIC INDUSTRY LETTERS 919 18TH STREET, NW, SUITE 901, WASHINGTON, DC 20006 USA TEL 202.587.4855 FAX 202.587.4888 * WWW.IBIA.ORG June 5, 2013 Re: US VISIT Biometric Exit Dear Senators: The Honorable

More information

JOCK SCHARFEN DEPUTY DIRECTOR U.S. CITIZENSHIP AND IMMIGRATION SERVICES U.S. DEPARTMENT OF HOMELAND SECURITY

JOCK SCHARFEN DEPUTY DIRECTOR U.S. CITIZENSHIP AND IMMIGRATION SERVICES U.S. DEPARTMENT OF HOMELAND SECURITY STATEMENT OF JOCK SCHARFEN DEPUTY DIRECTOR U.S. CITIZENSHIP AND IMMIGRATION SERVICES U.S. DEPARTMENT OF HOMELAND SECURITY REGARDING A HEARING ON Problems in the Current Employment Verification and Worksite

More information

Case 1:17-cv Document 1 Filed 07/19/17 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:17-cv Document 1 Filed 07/19/17 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:17-cv-01438 Document 1 Filed 07/19/17 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ELECTRONIC PRIVACY INFORMATION CENTER 1718 Connecticut Avenue, NW Suite 200 Washington,

More information

PRE BEEISI8PJAL/ FeR 8FFlEI:\L else 8PJLY. Biometric Pathway. Transforming Air Travel. December 1, 2016 Version 3.0

PRE BEEISI8PJAL/ FeR 8FFlEI:\L else 8PJLY. Biometric Pathway. Transforming Air Travel. December 1, 2016 Version 3.0 PRE BEEISI8PJAL/ FeR 8FFlEI:\L else 8PJLY Biometric Pathway Transforming Air Travel December 1, 2016 Version 3.0 RE I5Eel!HEJfJAt/ FeR efflelat erjt, epic.org EPIC-17-10-17-CBP-FOIA-20180319-Production

More information

the third day of January, one thousand nine hundred and ninety-six prescribe personnel strengths for such fiscal year for the Armed

the third day of January, one thousand nine hundred and ninety-six prescribe personnel strengths for such fiscal year for the Armed INFORMATION TECHNOLOGY MANAGEMENT REFORM ACT (Now the Clinger/Cohen Act) s.1124 One Hundred Fourth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 April 11, 2012 CPSC 467b, Lecture 23 1/39 Biometrics Security and Privacy of Biometric Authentication

More information

Statement on Security & Auditability

Statement on Security & Auditability Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It

More information

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Adapting the common visa policy to new challenges

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Adapting the common visa policy to new challenges EUROPEAN COMMISSION Brussels, 14.3.2018 COM(2018) 251 final COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Adapting the common visa policy to new challenges EN EN 1. INTRODUCTION

More information

BIOMETRICS. Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre

BIOMETRICS. Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre NEW doctrinal concepts BIOMETRICS by Wing Commander Mark Lunan Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre with additional contributions from Lieutenant Colonel Joel

More information

Introduction-cont Pattern classification

Introduction-cont Pattern classification How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something

More information

DOD Capstone Concept of Operations for Employing Biometrics in Military Operations

DOD Capstone Concept of Operations for Employing Biometrics in Military Operations DOD Capstone Concept of Operations for Employing Biometrics in Military Operations Approved by Deputy Chief of Staff, G-3/5/7, United States Army 10 June 2012 Table of Contents EXECUTIVE SUMMARY... iii

More information

Recent Privacy Developments in the United States, Particularly with Respect to Travelers Using Air Transport

Recent Privacy Developments in the United States, Particularly with Respect to Travelers Using Air Transport Recent Privacy Developments in the United States, Particularly with Respect to Travelers Using Air Transport Marc Rotenberg President, Electronic Privacy Information Center (EPIC) Adjunct Professor, Georgetown

More information

Homeland Security Opportunity Analysis:

Homeland Security Opportunity Analysis: Homeland Security Opportunity Analysis: An Assessment of DHS Budget and Contracting Trends Christina Balis and Tim Garnett PREPARED FOR NDIA 2007 Heartland Security Conference July 11, 2007 The Avascent

More information

Policy Framework for the Regional Biometric Data Exchange Solution

Policy Framework for the Regional Biometric Data Exchange Solution Policy Framework for the Regional Biometric Data Exchange Solution Part 10 : Privacy Impact Assessment: Regional Biometric Data Exchange Solution REGIONAL SUPPORT OFFICE THE BALI PROCESS 1 Attachment 9

More information

Approximately eight months after the terrorist

Approximately eight months after the terrorist Backgrounder June 2002 The Enhanced Border Security and Visa Entry Reform Act of 2002 A Summary of H.R. 3525 By Rosemary Jenks Approximately eight months after the terrorist attacks of September 11, on

More information

8 USC 1365b. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

8 USC 1365b. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see TITLE 8 - ALIENS AND NATIONALITY CHAPTER 12 - IMMIGRATION AND NATIONALITY SUBCHAPTER II - IMMIGRATION Part IX - Miscellaneous 1365b. Biometric entry and exit data system (a) Finding Consistent with the

More information

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: Introduction Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: As a process: 1. A measurable biological (anatomical and physiological) and

More information

MARYLAND Maryland MVA Real ID Act - Impact Analysis

MARYLAND Maryland MVA Real ID Act - Impact Analysis MARYLAND Maryland MVA Real ID Act - Impact Analysis REAL ID ACT REQUIREMENT IMPACT ASSUMPTIONS Full Legal Name into Driver Licensing System (DLS) (In Record, on Document) Modify DLS application and databases.

More information

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER Alan G. Hevesi COMPTROLLER DEPARTMENT OF MOTOR VEHICLES CONTROLS OVER THE ISSUANCE OF DRIVER S LICENSES AND NON-DRIVER IDENTIFICATIONS 2001-S-12

More information

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters March 2009 DEPARTMENT OF STATE Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process

More information

DIVISION E INFORMATION TECHNOLOGY MANAGEMENT REFORM

DIVISION E INFORMATION TECHNOLOGY MANAGEMENT REFORM DIVISION E INFORMATION TECHNOLOGY MANAGEMENT REFORM SEC. 5001. SHORT TITLE. This division may be cited as the Information Technology Management Reform Act of 1996. SEC. 5002. DEFINITIONS. In this division:

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Implementation of the United States Visitor and Immigrant Status Indicator Technology Program at Land Border Ports of Entry Office of Inspections,

More information

Special Report - Senate FY 2012 Department of Homeland Security Appropriations and California Implications - October 2011

Special Report - Senate FY 2012 Department of Homeland Security Appropriations and California Implications - October 2011 THE CALIFORNIA INSTITUTE FOR FEDERAL POLICY RESEARCH 1608 Rhode Island Avenue, NW, Suite 213, Washington, D.C. 20036 202-785-5456 fax:202-223-2330 e-mail: sullivan@calinst.org web: http://www.calinst.org

More information

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? ACCENTURE CITIZEN SURVEY ON BORDER MANAGEMENT AND BIOMETRICS 2014 FACILITATING THE DIGITAL TRAVELER EXPLORING BIOMETRIC BARRIERS With

More information

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements Announcements Introduction-cont Pattern classification Biometrics CSE 190 Lecture 2 Sign up for the course. Web page is up: http://www.cs.ucsd.edu/classes/wi12/ cse190-c/ HW0 posted. Intro to Matlab How

More information

GAO. HOMELAND SECURITY Challenges to Implementing the Immigration Interior Enforcement Strategy

GAO. HOMELAND SECURITY Challenges to Implementing the Immigration Interior Enforcement Strategy GAO For Release on Delivery Expected at 10:00 a.m. EDT Thursday, April 10, 2003 United States General Accounting Office Testimony Before the Subcommittee on Immigration, Border Security and Claims, Committee

More information

Research Article. ISSN (Print)

Research Article. ISSN (Print) Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(1A):37-41 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

GAO BUILDING SECURITY. Interagency Security Committee Has Had Limited Success in Fulfilling Its Responsibilities. Report to Congressional Requesters

GAO BUILDING SECURITY. Interagency Security Committee Has Had Limited Success in Fulfilling Its Responsibilities. Report to Congressional Requesters GAO United States General Accounting Office Report to Congressional Requesters September 2002 BUILDING SECURITY Interagency Security Committee Has Had Limited Success in Fulfilling Its Responsibilities

More information

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of Senator Daniel K. Akaka Statement on the REAL ID Act December 8, 2006 Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of 2005. The REAL ID Act became law over a year and a half ago, but

More information

News Release May 11, 2010

News Release May 11, 2010 Office of Communications News Release May 11, 2010 USCIS To Issue Redesigned Green Card State-of-the-Art Technology Makes New Card More Secure WASHINGTON U.S. Citizenship and Immigration Services (USCIS)

More information

The problems with a paper based voting

The problems with a paper based voting The problems with a paper based voting system A White Paper by Thomas Bronack Problem Overview In today s society where electronic technology is growing at an ever increasing rate, it is hard to understand

More information

ARTICLE 29 Data Protection Working Party

ARTICLE 29 Data Protection Working Party ARTICLE 29 Data Protection Working Party Brussels, 6 April 2010 D(2010) 5054 Juan Fernando LÓPEZ AGUILAR Chairman of the Committee on Civil Liberties, Justice and Home Affairs European Parliament B-1047

More information

Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation

Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation Hubert Laferrière, Director, Immigration Refugees and Citizenship Canada, Government of Canada Gordon

More information

GAO. VISA SECURITY Additional Actions Needed to Strengthen Overstay Enforcement and Address Risks in the Visa Process

GAO. VISA SECURITY Additional Actions Needed to Strengthen Overstay Enforcement and Address Risks in the Visa Process GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, September 13, 2011 United States Government Accountability Office Testimony Before the Subcommittee on Border and Maritime Security, Committee

More information

Member Statements Chuck Grassley, Chairman, Senate Judiciary Committee [view pdf]

Member Statements Chuck Grassley, Chairman, Senate Judiciary Committee [view pdf] JANUARY 20, 2016 WHY IS THE BIOMETRIC EXIT TRACKING SYSTEM STILL NOT IN PLACE? UNITED STATES SENATE, COMMITTEE ON THE JUDICIARY, SUBCOMMITTEE ON IMMIGRATION AND THE NATIONAL INTEREST ONE HUNDRED FOURTEENTH

More information

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early

More information

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong Biometric Applications

More information

DEPARTMENT OF HOMELAND SECURITY Border and Transportation Directorate

DEPARTMENT OF HOMELAND SECURITY Border and Transportation Directorate DEPARTMENT OF HOMELAND SECURITY Border and Transportation Directorate Docket No. DHS-2007-0002 Interim Rule United States Visitor and Immigrant Status Indicator Technology Program COMMENTS OF THE ELECTRONIC

More information

CRS Report for Congress

CRS Report for Congress Order Code RL32531 CRS Report for Congress Received through the CRS Web Critical Infrastructure Protections: The 9/11 Commission Report and Congressional Response Updated January 11, 2005 John Moteff Specialist

More information

GAO. HOMELAND SECURITY DHS Has Taken Actions to Strengthen Border Security Programs and Operations, but Challenges Remain

GAO. HOMELAND SECURITY DHS Has Taken Actions to Strengthen Border Security Programs and Operations, but Challenges Remain GAO For Release on Delivery Expected at 9:30 a.m. EST Thursday, March 6, 2008 United States Government Accountability Office Testimony Before the Subcommittee on Homeland Security, Committee on Appropriations,

More information

Case: 1:17-cv Document #: 1 Filed: 08/18/17 Page 1 of 13 PageID #:1

Case: 1:17-cv Document #: 1 Filed: 08/18/17 Page 1 of 13 PageID #:1 Case: 1:17-cv-06052 Document #: 1 Filed: 08/18/17 Page 1 of 13 PageID #:1 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS, EASTERN DIVISION BENITO VALLADARES, individually and

More information

Connecticut Informational Guide for Noncriminal Justice Use of Criminal History Record Information (CHRI)

Connecticut Informational Guide for Noncriminal Justice Use of Criminal History Record Information (CHRI) Connecticut Informational Guide for Noncriminal Justice Use of Criminal History Record Information (CHRI) This document is designed to guide criminal justice and noncriminal justice agencies, with access

More information

GAO. VISA WAIVER PROGRAM Limitations with Department of Homeland Security s Plan to Verify Departure of Foreign Nationals

GAO. VISA WAIVER PROGRAM Limitations with Department of Homeland Security s Plan to Verify Departure of Foreign Nationals GAO For Release on Delivery Expected at 2:30p.m.EST Thursday, February 28, 2008 United States Government Accountability Office Testimony Before the Subcommittee on Terrorism, Technology, and Homeland Security,

More information

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card Abstract Have you ever wondered how Identity Theft, Fraud, and Corruption could be eliminated, while

More information

Recommended Practice 1701 l

Recommended Practice 1701 l Recommended Practice 1701 l Background: The International Traveler Scheme aims to bring registered travelers schemes together under one overall program. The purpose of an International Traveler Scheme

More information

MEMORANDUM OF UNDERSTANDING ON TERRORIST WATCHLIST REDRESS PROCEDURES

MEMORANDUM OF UNDERSTANDING ON TERRORIST WATCHLIST REDRESS PROCEDURES Case 3:10-cv-00750-BR Document 85-3 Filed 02/13/13 Page 1 of 22 Page ID#: 1111 MEMORANDUM OF UNDERSTANDING ON TERRORIST WATCHLIST REDRESS PROCEDURES The Department of Justice (DOJ), the Federal Bureau

More information

Fact Sheet: Electronic System for Travel Authorization (ESTA)

Fact Sheet: Electronic System for Travel Authorization (ESTA) DHS: Fact Sheet: Electronic System for Travel Authorization (ESTA) http://www.dhs.gov/xnews/releases/pr_1212498415724.shtm 2 of 3 6/3/2008 12:13 PM Fact Sheet: Electronic System for Travel Authorization

More information

The Legal Workforce Act 1 Section-by-Section

The Legal Workforce Act 1 Section-by-Section The Legal Workforce Act 1 Section-by-Section Sec. 1: Short Title Legal Workforce Act. PROCESS FOR EMPLOYMENT ELIGBILITY VERIFICATION Sec. 2: Employment Eligibility Verification Process Amends INA 274A(b)

More information