Position Paper IDENT Implementation for U.S. VISIT

Similar documents
What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

Achieving Interoperability

CRS Report for Congress

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003

Case Study. MegaMatcher Accelerator

CRS Report for Congress

Biometrics: primed for business use

Statement on Security & Auditability

Introduction-cont Pattern classification

GAO HOMELAND SECURITY. Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed

Office of Inspector General

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

US-VISIT 2010 YEAR IN REVIEW

DHS Biometric Screening

Approximately eight months after the terrorist

Biometrics Technology for Human Recognition

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program

a GAO GAO HOMELAND SECURITY First Phase of Visitor and Immigration Status Program Operating, but Improvements Needed

CASE STUDY 2 Portuguese Immigration & Border Service

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Policy Framework for the Regional Biometric Data Exchange Solution

GAO. HOMELAND SECURITY DHS Has Taken Actions to Strengthen Border Security Programs and Operations, but Challenges Remain

a GAO GAO HOMELAND SECURITY Planned Expenditures for U.S. Visitor and Immigrant Status Program Need to Be Adequately Defined and Justified

The problems with a paper based voting

STATEMENT JAMES W. ZIGLAR COMMISSIONER IMMIGRATION AND NATURALIZATION SERVICE BEFORE THE

The Angola National ID Card

REPORT VOLUME 6 MAY/JUNE 2017

INTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014

SUMMARY INTRODUCTION. xiii

Einsatz von Fingerabdrücken im Europäischen Visumverfahren. Bundesverwaltungsamt (BVA) Bundesamt für Sicherheit in der Informationstechnik (BSI)

DHS Biometrics Strategic Framework

LIMITE EN/FR COUNCIL OF THE EUROPEAN UNION. Brussels, 15 May /09 ADD 2 LIMITE FRONT 28 COMIX 294 NOTE

CORPORATE HEADQUARTERS

Visa Information System (VIS) FAQs

3M Cogent, Inc. Case Study. 3M Cogent s. MobileID Solution in theuk. a 3M Company

Changes in Schengen visa application process

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

The Modern TENPRINT Examiner

EU Information Systems

GAO. BORDER SECURITY Joint, Coordinated Actions by State and DHS Needed to Guide Biometric Visas and Related Programs

SECURE REMOTE VOTER REGISTRATION

U.S. Customs and Border Protection

BIOMETRICS - WHY NOW?

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Interstate Commission for Adult Offender Supervision

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

Visa Information System (VIS) FAQs

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

E-gate case study: The German EasyPASS Project

INTRODUCTION 4 Borders under pressure 4 On the move 4 Open for business 4 Experience matters 4

United States Government Accountability Office GAO. Report to Congressional Committees

Annex to the EXTENDED IMPACT ASSESSMENT. {COM(2004)835 final}

International Biometrics & Identification Association

5/6/2009. NADRA 72 Million

PRE BEEISI8PJAL/ FeR 8FFlEI:\L else 8PJLY. Biometric Pathway. Transforming Air Travel. December 1, 2016 Version 3.0

EPIC seeks records related to alternative screening procedures in CBP s biometric entry/exit program. 1

If your answer to Question 1 is No, please skip to Question 6 below.

Control Process. Border. Fernando Moya Castro

EVIDENCE OF IDENTIFICATION

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)

a GAO GAO BORDER SECURITY Additional Actions Needed to Eliminate Weaknesses in the Visa Revocation Process

Invitation to tender Outsourcing of tasks related to receipt of Schengen visa applications

Prepared by Space and Naval Warfare Systems Center Atlantic

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

ICE. I.C.E. Under D.H.S. Customs and INS Investigations DRO

Policy Framework for the Regional Biometric Data Exchange Solution

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009

Smart Voting System using UIDAI

US-VISIT Program, Increment 2 Privacy Impact Assessment

Voting Corruption, or is it? A White Paper by:

Cross-Border & Regional Identity Management

Overview Purpose of the EU-VIS

Refugee Security Screening

Case 1:17-cv Document 1 Filed 07/19/17 Page 1 of 15 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

CPSC 467b: Cryptography and Computer Security

Chairman Feinstein, Ranking Member Kyl, distinguished members of the Subcommittee:

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Research Article. ISSN (Print)

Singapore's Automated Clearance using Biometrics

Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

e-borders: Friends of Presidency Group meeting Brussels

BIOMETRICS IN A HUMANITARIAN CONTEXT

GAO. ILLEGAL IMMIGRATION Status of Southwest Border Strategy Implementation. Report to Congressional Committees

NEW JERSEY. Jurisdiction Impact Analysis Real ID Act

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Biometrics & Accessibility

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

BIOMETRIC INDUSTRY LETTERS

The Open Biometrics Initiative and World Card

Question & Answer May 27, 2008

Global Conditions (applies to all components):

Opinion 3/2012 on developments in biometric technologies

Transcription:

Position Paper IDENT Implementation for U.S. VISIT LDENT Proven Value o Currently supporting 14,000+ trained active users and over 2,200 workstations (including international locations) o Currently approximate1 y I2M+ individuals (1 6M+ encounters) in IDENT P "Lookout" database contains the FBI's MIS active "Wants and Warrants" and are updated bi-weekly from the FBI to maintain currency of the data. Since August 200 I, IDENT users have identified 6,547 confirmed hits against the wants and warrants. "Lookout" database also contains the known terrorist prints from the FBI and deported aggravated felons. o "Recividist" database contains alerts for previous enforcement actions (including photographs) not available in other Federal databases, FBI Criminal Master File records (e.g. NSEERS special interest countries), and agent safety concerns. IDENT Proven Maturity and Scalability o The successful implementation of the NSEERS functionality in IDENT in less than 90 days proves the ability to modify and deploy the system in a short amount of time. This included the deployment of approximately 900 terminals and associated training to the majority of the POEs and all District Offices. The hardware is proven, stable, easy to acquire, and simple to install using a standard PC workstation, camera and a fingerprint scanner P The current contractors have been on this task for several years and provide a wealth of lessons learned and excellent past performance D The data communications infrastructure already supports a large number of transactions with minimal performance ISSU~S o The technical field support and existing help desk support personnel are very familiar with the technology o The system meets computer security requirements (Certification and Accreditation) including redundancy and continuity of operations IDENT Proven Performance a Processed approximately 3M transactions in last twelve months including all Border Patrol apprehensions and NSEERS registrations resulting in 26,238 confirmed Lookout hits and 463,247 confirmed Recidivist hits. 0 The system is currently used by the vast majority of the Inspections community requiring less training for modifications Is IDENT Feasible And Scalable For U.S. VISIT Implementation? Assumptions for Implementation o Fingerprints and photographs will be captured at Primary on individuals entering the U.S. from Visa countries. a Potential population is estimated at 25 million encounters during the first year of U.S. VISIT. o Perform a real-time one-to-one match on individuals previously enrolled or perform a search against a "Lookout" database during the current Primary inspection without substantially increasing the Inspection time. o Enrollment into the U.S. VISIT biomehic database will be performed during off-peak hours within 24 hours after entrv to the U.S. o Fingerprint examiner resources will be augmented to enhance data integrity. o As new lookout fingerprints are added they are associated to all previous encounters and available for future one-toone matches. Redacted information withheld under FOlA exemption high (b)(2) Developed by: ENFORCWIDENT PMO Junc 1 1.2003

Feasibility and Scalability of Two-Prints DENT has proven the feasibility and scalability of capturing two-prints and successfully identifying individuals with greater than 99% accuracy against a current population of 12M. o The size of the database poses no problems with identification for one-to-one verification or search against the solution. o Given the number of travelers in the first year and the number of repeat travelers, two-prints will be sufficient to maintain the current data integrity for the first nine to twelve months of U.S. VISIT. Migration Plan to Additional Prints o The U.S. VISIT program office will develop a migration plan to transition to a multi-print capability within the first year. o Development of the multi-print capability will be built upon the two-print platform incorporating lessons learned and technological advances. o The current "Lookout" database contains multi-prints, minimizing the difficulty of the transition to multi-print capability. What Are The Sunk Costs For Migration To The Multi-Print From The Two-Print Capability? o The proposed implementation for U.S. VISIT is not a proprietary solution or architecture limiting future acquisition of other vendor solutions. Although a major investment of the current vendor's hardware will be incurred for the initial implementation, this will not preclude U.S. VISIT from augmenting the environment with other vendor's solutions and not impacting the technical capability. o The infrastructure upgrades to support a two-print or multi-print capability require the same initial investment. o Development of the multi-print capability will be built upon the two-print platform incorporating lessons learned and technological advances. o Fingerprint scanners at $425 each would require replacement with a multi-print scanner resulting in a initial investment of $750,000 that will not be recoverable. Redacted informatton withheld under FOlA exempt~on h~gh (b)(2) Developed by: ENFORCEJIDENT PMO June 1 1,2003

Two-Print Searches in ENFORCEIIDENT and US-VISIT IDENT The ENFORCEILDENT and US-VISIT two-print searches do not search all of the same data sources. The ENFORCEIIDENT two-print search does not query US-VISIT enrollments and the US-VISIT two-print print search does not query enforcement apprehensions (ENFORCE): ENFORCE Two-Print US-VISIT Two-Print Search IDENT Lookout Search IDENT USand Apprehension, VISIT Watchlist and (Recidivist) databases Enrollment databases Known or Suspected Known or Suspected 1 Terrorists I Terrorists Wanted Persons IDENT Databases not Searched by ENFORCE or US- VISIT Sexual Registrants DENT Lookout Sexual Registrants DENT Lookout I Enrollments I Enrollments I 1 / ( Previous qhminal 1 Previous Criminal I 1 / ) Latent Prihts (off-line 1 Latent'bnts (off-line I 1 search) search) \ \ Asylum Database Border Crossing Card Database IDENT Apprehensions \ US-VISIT Enrollments NSEERS Registrants is contained in shadowed boxes that may not be clearly visible to reader.

US-VISIT - 2 print vs. 10 print Issue paper Background: The four goals of the US-VISIT program are: - Enhance National Security; - Improve the integrity of the immigration process; - Facilitate legitimate trade and travel; and - Adhere to all relevant privacy regulations and policies. To support these goals a biometric system must be able to do two things: first, verify the identity of an individual (is he who he says he is) and second check current databases to see if this person has been seen before (has he been previously enrolled or is he on a lookout list). To facilitate trade and travel the capture of the biometric must be quick, unobtrusive, and must use a device that can fit into the current operational environment (i.e. small desks at the consular post, or primary inspection lane). The results must be returned with a high degree of confidence in a time frame that is operationally feasible (i.e. within seconds at the primary lane - as even a few more seconds could increase wait times and back up port traffic to unacceptable levels). The decision on which biometric to use should be based on the requirement. 2 prints vs. 10 prints: The following table summarizes some of the differences and similarities between 2 prints and 10 prints. Fingerprint Biometric 2 flat 10 rolled 10 flat Speed of capture 15 sec ' 5-6 min4 45 sec7 Accuracy (TAR) 96%2 97.5%5 Footprint Size (HxLxW) 2.45" x 6.38" x 3.25"= 6.7" x 15.9" x 10.3"~ 96.65%v6.7" x 15.9" 10.3"~ Human Contact Traveler Impression None Non- ~ ~ 1 intrusive 1 Criminal process Limited Cumbersome ' Average times as they have been captured in US-VISIT since January 5'2004 Matching performance for the US-VISIT DENT system using flat fingerprints taken from a NIST report titled "Matching performance of the US-VISIT IDENT system using flat fingerprints" NISTIR 71 10 ' Crossmatch verifier 300 LC model used for US-VISIT Taken from experience of the application support centers that take 2 million rolled prints a year * NIST Studies of plain to rolled fingerprint matching using NIST Algorithmic Test Bed (ATB) Page 18 table 9 Crossmatch ID 500 scanner specs ' Estimated time frames as there is currently no one performing this in a live environment similar to US- VISIT (language barriers) NIST Studies of plain to rolled fingerprint matching using NIST Algorithmic Test Bed (ATB) Page 18 table 9 Crossmatch ID 500 scanner specs

Speed: The US-VISIT system in place at all air and sea ports collects 2 prints for the purposes of enrollment and returns a lookout hitlno hit in seconds (1 5 seconds for the process of capturing the prints and 10 seconds to return the result to the inspector). The time required to collect 10 prints is substantially longer. In addition the time required to perform a 10 print match is substantial. As part of the IDENTIIAFIS integration program, the FBI's IAFIS system returns 10 print-based queries to DHS within 2 to 10 minutes. However, even a one-minute delay would be devastating to wait times. System Availability: The IDENT system is available on a 24 X 7 basis. In the last two years there has not been a single unscheduled outage for any of the IDENT databases or systems. Accuracy: Both 2 prints and 10 prints have a very high degree of accuracy. Both have a True Acceptance Rate (TAR) of over 95% (a measure of false negative). The US-VISIT IDENT system has TAR of 96%. What this means in practical temls is if an individual wishes to enter the country under a new name using a fraudulent document, they would have to pass the pre-inspections intelligence checks including name1date of Birth checks, the normal inspections process, and then they would only have a 3.5% chance of avoiding identification through biometric means. A very unlikely scenario. Although there was some early concern about false positives, a recent NIST study of the US-VISIT IDENT system showed that the False Acceptance Rate (FAR) appears to rise in a consistent manner with the rise in the size of the fingerprint database. This has been born out empirically. The FAR has proved to be measurable and consistent. To deal with this the US-VISIT has developed processes to efficiently manage the false positives as they occur. For example, of the roughly 35,000 travelers which are processed through the US-VISIT IDENT system every day, about 30 of these are false positives against the lookout list and are sent to secondary. The average time for a fingerprint examiner to clear a lookout false positive is only 3 minutes and 40 seconds. The performance of the US-VISIT IDENT system is monitored very closely. As the FAR rises with the size of the database, the US-VISIT program office will make the necessary adjustments in the numbers of fingerprint examiners and in the technology to manage this. Note: Shortly after September 1 1, NIST performed what has become known as the 303 study. Since that time NIST has had the opportunity to do additional studies of biometric systems and scenarios. In a recent NIST study of the US-VISIT IDENT system - where it is suggested that 2 prints may be adequate for identification - NIST discussed the findings of the 303 report "The conclusions of that report should be updated in light of NIST's recent findings that the VTB fingerprint matcher is substantially less accurate than commercial systems"'0 NIST's original conclusions were based on the performance of the IAFIS VTB system, 10 Extract taken from a NIST report titled "Matching performance of the US-VISIT IDENT system using flat fingerprints" NISTIR 71 10 page 4 footnote 3

and not on some of the more advanced, commercially available, fingerprint matching systems. Foot print Size: Height x Length x Width of the device. The size of the primary booths at an air or seaport is limited in size. The time and effort required for the facilities build out required to accommodate a multi-print scanner would be substantial. Human contact and Traveler Impression: The 2 print devices do not require operator assistance to obtain the prints. The devices used to take 10 prints often require the operator to come in physical contact with the subject. According to the Department of State, taking 10 prints is perceived by many cultures as intrusive and is done only for criminal processing. This was confirmed in our own conversations with representatives from the Canadian and Mexican governments and with various privacy advocacy groups. Latent processing: Latent processing is an investigative tool, not a real-time identification tool. In order to initiate a latent search, the owner/originator of the print must first go through a lengthy and manually intensive process to map the fingerprint minutiae into a form that the can be matched against a database. When the latent print is searched against the database a candidate list is generated and the images (and associated biographic data) are returned to the originator of the print. Using a combination of the images, the biographic data, and investigative techniques, the originator of the prints will make a determination whether or not the individual can be placed at the crime scene. This is a lengthy labor-intensive process and is prone to error. It is used solely for investigative purposes and not for real time identification. Future Biornetrics: Future increments of US-VISIT will incorporate not just fingerprints but also facial recognition. In the future it is very possible that other biometrics such as voice recognition or iris scanning will be employed. A combination of biometrics will be hsed into a multimodal approach with the particular biometric used, dependent upon the particular operational requirement. Redacted information withheld under FOlA exemption high (b)(2)