Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

Similar documents
International Biometrics & Identification Association

DHS Biometrics Strategic Framework

Achieving Interoperability

Position Paper IDENT Implementation for U.S. VISIT

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

DHS Biometric Screening

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

BIOMETRICS - WHY NOW?

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY

CPSC 467b: Cryptography and Computer Security

CRS Report for Congress

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

CORPORATE HEADQUARTERS

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

Prepared by Space and Naval Warfare Systems Center Atlantic

Refugee Security Screening

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program

Case Study. MegaMatcher Accelerator

Opinion 3/2012 on developments in biometric technologies

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

MoneyPad, The Future Wallet

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

SECURE REMOTE VOTER REGISTRATION

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

Research Article. ISSN (Print)

The Open Biometrics Initiative and World Card

DOD Capstone Concept of Operations for Employing Biometrics in Military Operations

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

Overview Purpose of the EU-VIS

INTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014

US-VISIT 2010 YEAR IN REVIEW

The problems with a paper based voting

Biometrics Technology for Human Recognition

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

Policy Framework for the Regional Biometric Data Exchange Solution

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

The Angola National ID Card

Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records

BIOMETRICS. Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre

Biometrics how to put to use and how not at all?

SUMMARY INTRODUCTION. xiii

Publication Scheme Y/N N Fingerprints,DNA and Photographs Version 4 Student Lesson Note

Introduction-cont Pattern classification

Immigration and Customs Enforcement (ICE) Secure Communities (SC)

How biometrics can improve the targeting of social protection. What we do. How we do it.

MARYLAND Maryland MVA Real ID Act - Impact Analysis

The forensic use of bioinformation: ethical issues

News Release May 11, 2010

Biometrics: primed for business use

Biometrics & Accessibility

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of

GAO. BORDER SECURITY Joint, Coordinated Actions by State and DHS Needed to Guide Biometric Visas and Related Programs

Voting Corruption, or is it? A White Paper by:

EU Information Systems

MEMORANDUM OF UNDERSTANDING ON TERRORIST WATCHLIST REDRESS PROCEDURES

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

FEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending,

Biometrics Strategy Better public services Maintaining public trust. June 2018

Page 1 of 9 YALE UNIVERSITY POLICE DEPARTMENT CRIME SCENE PROCESSING GENERAL ORDER JUL 2012 ANNUAL

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

Statement on Security & Auditability

Transportation Worker Identification Credential (TWIC) Final Rulemaking Overview. 17 January 2007 Seattle, WA

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program

The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528

DRAFT. C-4 Crack Cocaine

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

3M Cogent, Inc. Case Study. 3M Cogent s. MobileID Solution in theuk. a 3M Company

Users Guide to the Automated Gates (For Foreign Nationals)

EVIDENCE OF IDENTIFICATION

TITLE 20: CORRECTIONS, CRIMINAL JUSTICE, AND LAW ENFORCEMENT CHAPTER II: DEPARTMENT OF STATE POLICE

Federal Agencies + Travel = Quality Control

8 USC 1365b. NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs)

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

Ballot Reconciliation Procedure Guide

Massachusetts Executive Office of Public Safety and Security. Statewide Applicant Fingerprint Identification Services (SAFIS) Program

UNITED STATES DEPARTMENT OF JUSTICE EXECUTIVE OFFICE FOR IMMIGRATION REVIEW BOARD OF IMMIGRATION APPEALS FALLS CHURCH, VIRGINIA

Identity Management Transcending Markets in Today's Society. October 11th, 2005 Patrick McQuown Adjunct Professor - Georgetown University

ADMINISTRATION OF JUSTICE HOMELAND SECURITY

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

Running Head: How National Security Influences Immigration Policy 1

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY

Biometrics Glossary. Introduction. Glossary Terms

Biometric Authentication

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Having regard to the opinion of the European Economic and Social Committee ( 1 ),

Government of Pakistan NADRA Headquarters, Islamabad

Testimony of Paul Morris. May 2, Committee Information 6 Go 5/18/ :05 PM

CRS Report for Congress

Identity Verification in Passport Issuance

Attachment 1. Workflow Designs. NOTE: These workflow designs are for reference only and should not be considered exact specifications or requirements.

Introduction to Homeland Security

The changes are aimed at fighting both terrorism and identity theft.

Biometrics how to put to use and how not at all?

Transcription:

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1 Gap Analysis of the Department of Homeland Security s Use of Biometrics Camille J. Acred Southwestern College Professional Studies MSA 570 Homeland Security Defense and Administration Week Six Portfolio Assignment Professor William J. Howard 23 September 2012

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 2 Abstract Resulting from the terrorist attacks of 9/11, the United States is extremely focused on advances in technology supporting the safety of our homeland. The Department of Homeland Security was instituted to keep America safe from all attacks. Immigration reform and the increased risk of terrorism on American soil have spawned the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) program, aimed at enhancing the security of our citizens and visitors. US-VISIT does this by supplying the technology for collecting and storing biometric data, and providing it to designated federal agencies in order to support information sharing by the law enforcement and intelligent communities. There are several types of biometric modalities in use today and several other modalities currently being developed which could make our data profiles on individuals even more accurate.

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 3 Gap Analysis of the Department of Homeland Security s Use of Biometrics Biometrics is a term commonly used in America with the increase in terrorism and security awareness. By definition, biometrics are the measurable biological (anatomical and physiological) and behavioral characteristics that can be used for automated recognition (Bush, 2008). Examples of biometrics include fingerprints, facial recognition, and iris recognition. Since the catastrophic terrorist attacks of 9/11, The Department of Homeland Security (DHS), whose primary mission is to keep America safe from any type of threats, is deeply involved in all aspects of terrorism defense, including biometric technologies. This gap analysis will discuss DHS s current use of biometrics and any potential uses which may be used in the future to further protect our nation. DHS s biometrics program is the United States Visitor and Immigrant Status Indicator Technology program, commonly referred to as US-VISIT. The Office of US-VISIT falls under the National Protection and Programs Directorate (NPPD). DHS s organization can be confusing, therefore I have included the following chart for further explanation (see figure 1). US-VISIT initially provided fingerprint-based and photographic identity verification and analysis services to federal, state, and local government decision-makers to help them accurately identify the people they encounter and determine whether those people pose a risk to the United States. Focusing primarily on international travelers at U.S. visa-issuing ports of entry, US- VISIT helps immigration officers determine whether a person is eligible to receive a visa or enter the United States. The biometric collection processes used by US-VISIT is simple, convenient, and secure (US-VISIT). US-VISIT is continuously improving and adding to the standards and capabilities of the program as new technologies become available.

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 4 Figure 1 DHS Organization (DHS Organization Chart) Organizations supported by US-VISIT are the Department of Defense (DoD), U.S. Coast Guard, Department of Justice (DoJ), U.S. Customs and Border Protection, and U.S. Citizen and Immigration Services. Organization Requirements or Mandates US-VISIT is required to meet objectives outlines in National Security Presidential Directive (NSPD) 59, Biometrics for Identification and Screening to Enhance National Security. This directive requires them to coordinate the sharing of biometric and associated biographic and contextual information with other Federal agencies and foreign partners in accordance with applicable law (Bush, 2008). This policy stemmed from the lack of information sharing by law enforcement and other government agencies leading up to 9/11. NSPD 59 resulted in US-VISIT being the centralized location of all biometrics collecting, handling, and storage for all federal entities. The DHS document, Biometrics Standards Requirements for US-VISIT, clearly states

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 5 requirements for the collection, handling, storage, and transmission of biometric profiles of all types; including details such as the types of computer systems and encryption codes that must be used for each modality. US-VISIT also participates in the development of new biometric technology. There are constant technological advances in the field of biometrics, and US-VISIT is directly involved with many of the organizations responsible for these advances, e.g. The Registry of United States Government Recommended Biometric Standards. An investigative technique that began with fingerprints and photographs has evolved to iris scans, palm prints, etc. The main focus of US-VISIT is to support our fight against terrorism. US-VISIT provides data profiles to The Terrorist Watchlist (TWL), working directly with the Federal Bureau of Investigation (FBI), DoJ, Central Intelligence Agency (CIA), and Terrorist Screening Center (TSC). Data profiles which are part of the TWL are extremely sensitive and require transmission only through The Terrorist Watchlist Person Data Exchange Standard (TWPDES); this procedure is also outlined in Biometrics Standards Requirements for US-VISIT. It is important to remember that prior to 9/11 each agency, whether it be state, federal, or DoD, was completely separate from other agencies. Because of this, each of their standards were completely different. It is only in the past couple years that we have tried to merge them together into one standard; a difficult task. This is further supported by DHS in their statement: The diversity of transmission profiles and standards is due in part to the fact that the systems were implemented at different times and were intended to address the different mission requirements of Federal, State, and local law enforcement, military applications, and International police action; and in some cases because the standards available at the

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 6 time were not sufficiently developed or have been updated since the original system implementation. (Biometrics Standards Requirements for US-VISIT, 2012) Current Performance Effectiveness In the field of biometrics, there are two primary tools for measuring effectiveness; False Rejection Rate (FRR) (also known as False Non-Match Rate [FNMR]) and False Accept Rate (FAR) (also known as False Match Rate [FMR]). FRR is basically the number of times people are not identified when they should be while FAR is the opposite; the number of times people are identified when they should not be (Identity One). To give an idea of the actual results of biometrics within the US-VISIT program I have included the following analysis: According to the U.S. Department of Justice s analysis of US-VISIT after its first year of operation, on average 118,000 people pass through each day. Of these, 22,350 are subject to secondary inspection and 1,811 of these are refused entry. Of those who are subject to secondary inspection, 92 percent are subsequently admitted to the United States. (Jain, 2007) Currently, biometrics used within US-VISIT are extremely effective, with a much lower FRR and FAR than in 2007. The main issue of effectiveness now is the actual data profiles, which are having issues such as multiple names associated with a fingerprint, name misspellings, or date of birth issues. NSPD 59 requires federal agencies to disseminate accurate information associated with individuals and as of now, this is the biggest violation in the biometrics industry. Based on a recent inspection of US-VISIT published by DHS, it was found that US-VISIT needs to improve procedures that specifically target individuals using multiple biographic identities to enter the United States (Office of the Inspector General, DHS, 2012).

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 7 Gap Analysis Biometric technology has improved greatly in the last decade, a prime example being fingerprints. Initially two fingerprints were taken from individuals entering the United States, leaving two fingerprints which needed to be matched for identity verification. Currently all ten fingerprints are taken when entering the United States, ensuring much more accuracy because of the requirement of matching all ten prints. This is also true within the DoD where initially we took two fingerprints of suspected terrorists or detainees, and now we take all ten. Forensic labs supporting Iraq and Afghanistan take latent prints off weapons and explosive devices, having more fingerprints on file results in a greater chance of catching those responsible for attacks against coalition forces. The point of this system is information sharing, and all fingerprints taken by DoD are accessible to the aforementioned agencies. If a former Iraqi detainee attempted to enter the United States, we would identify him through US-VISIT. In this following, the biometric modalities currently in use are presented in addition to their advantages and disadvantages, and also the direction they appear to be going in the future. Examples will be used to help illustrate these points as much as possible. Fingerprints Fingerprints are the most popular form of biometrics and have been around the longest; over one hundred years. Fingerprints are very easy to collect; collection no longer requires ink and they can be taken in a mobile or even combat environment using small digital devices. The accuracy of using fingerprints for identification has proven effective over time. Fingerprints are unique to an individual and remain permanent throughout a person s life unless disfigured in some way.

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 8 The disadvantages of fingerprinting are that there is so much fingerprint data, storage and handling can cause problems. As with all biometric data, care must be taken during collection to ensure the best results. In combat situations, it is easy to input fingerprints incorrectly. Collecting ten fingerprints per individual generates more data, and increasing the quantity of data unfortunately increases the chances of inaccuracy. Many of the problems arising within US- VISIT are dealing with incorrectly processed fingerprints, leading to multiple identities popping up for one set of prints. The National Science and Technology Council (NSTC) (2012) mention another disadvantage being public perception and the link between fingerprinting and criminalizing people. This disadvantage is insignificant; we are concerned with immigrants and possible terrorists entering the United States, biometric procedures are now standard for entering the country therefore; there is no reason to associate this procedure with criminal processing. There should not be many changes in the future regarding fingerprinting. This technology has already improved by taking ten prints rather than two from each individual. What does need to be perfected is the collection, storage, and transmission of fingerprint data. The errors currently in this system within individual data profiles need to be fixed as well. As a biometric collector in Iraq there were many times we had multiple identities listed for one fingerprint, the process to fix the database was lengthy, but possible if you had the person in custody. If we wait and release the individual there is less of a chance of the profile getting corrected. This means at US ports of entry, time would have to be spent on the individuals who brought up multiple profiles in order to correct them. Iris Scans Technology has been established that makes scanning the iris very simple through the use of handheld devices, even in combat situations. I have conducted iris scanning on hundreds of

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 9 individuals using handheld devices and when done properly it is effective. The iris is like a fingerprint and does not change throughout your life. The iris is more advantageous than a fingerprint however since it is protected within the eye and less prone to injury. Although it is easy to scan an iris, it does take proper training and in many cases, proper lighting. The eye has to be open wide and focused in the correct position. This is a difficult task when working with foreigners just due to the language barrier and directing them in which way to look. I did not have any problems when using interpreters. As with fingerprints, there can be problems with the data. In Iraq there were individuals who had biometric profiles but they would not pop up using only an iris scan. This problem usually resulted from a poorly taken iris scan in the initial collection of the individual. As with the fingerprint, this could also be fixed in the database, but it had to be done with the person present. Another issue addressed by NSTC (2012) is that an iris scan cannot be analyzed or verified by a human. This modality relies solely on technology, which is a big disadvantage. A reliance on technology contributes to the FRR and FAR resulting from iris scanning. Facial recognition Taking a photograph of an individual for identification purposes is not a new idea. This modality is great because it is easy, requires little technology (a camera or phone), and can be verified by human eyes. A photograph is always attached to an individual s data profile. There are plenty of disadvantages to using photographs for identification purposes, the most obvious being disguises. A face can be easily disguised or even altered by plastic surgery. Faces also change naturally over your lifetime. There is also a huge variance in the quality of photographs available, which is why US-VISIT has a standard it must follow governing the quality of photos which are used.

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 10 I used photographs in data collection in Iraq. All of our subjects had immense data profiles which even included DNA. These subjects were issued a number coinciding with their data profile, their photo was attached and used mostly for quick identification while under U.S. control (e.g., through daily use by guards). For any other (external) identification, for example for the FBI or other government agency, their fingerprints, iris scan, etc. were used. Many of our detainees had been under U.S. control for many years, and an intelligence specialist brought to our attention that some of our photographs were close to eight years old. Because of this we brought all detainees in and took new photos. Comparing the two photos side-by-side was shocking; there were photographs less than five years old that did not resemble the detainees in the slightest bit. Photographs are not dependable however; I do believe they should be included in a data profile. US-VISIT should be required to obtain an up-to-date photograph when people enter the country, and the photographs included in the individual data profile should have the date stamped on them. Other modalities There are several other biometric modalities, some currently in use and some being developed. One of them that I have had experience with is palm prints. Just as with fingerprints, palm prints remain basically unchanged throughout your lifetime. These palm prints are taken in the same way as fingerprints and involve the same type of machine, only slightly larger. This print adds to the overall accuracy of the data profile. With the current use of fingerprints, iris scans, and photographs, palm prints probably will not become a vital part of biometric recognition for entry into the United States, it would be more beneficial in the law enforcement

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 11 community or when identifying a high level terrorist however, the subject would have had to be in a situation prior to identification where he gave his palm print. Another modality involving the hand is the use of hand vein patterns. This modality is not currently in use but is being researched. Researchers state that the pattern of blood vessels hidden underneath the skin is quite distinct in individuals, even among identical twins and is stable over long period of time (Brindha, 2012, p. 2). Obtaining hand vein patterns would require the use of a handheld type device which would not make contact with the skin, because of this it would be less prone to error than obtaining finger or palm prints on current devices. Brindha (2012) also explains that duplicating hand vein patterns would be impossible, while it is possible to duplicate both finger and palm prints (although difficult). Voice identification is another modality that is heavily reliant on technology. The advantage to using the voice modality is that it can be collected from video or telephone feeds. Voice identification is not very accurate and requires the filtering of background noises. This technology will become more advanced in the future however; it probably will not be used for immigration purposes. Ear identification gives great potential to the field of biometrics. According to oral pathologists, ears have also been proposed as a new class of biometrics for passive identification which have both reliable and robust features which are extractable from a distance (Kaushal, 2011, p. 3). It has been shown that many subjects leave ear prints at a crime scene from listening at doors, lying on the floor, etc. Ear prints, or photographs or sketches of ears could potentially add to the overall accuracy of an individual data profile. I predict that ear identification will be the next big breakthrough in biometrics.

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 12 America has come a long way in biometrics since 9/11. What started as photographs and ink flat fingerprints in criminal investigation department filing cabinets has morphed into fingerprint and iris scan technology you can download onto your smartphone. I have used handheld devices in Iraq which linked someone to a crime in another country from a fingerprint on a bomb. I have also uploaded data into the database from a subject captured within the hour while simultaneously taking to someone at the pentagon as they viewed the same information. The potential for biometric technology in the next ten years is limitless. Consequently, DHS has the massive responsibility of protecting our country and it does so by developing risk-reduction measures through the NPPD. One of NPPD s programs is US- VISIT, charged with (in NSPD 59) providing all designated agencies accurate information using biometric data. US-VISIT does this primarily through the use of photographs and fingerprints, however it also uses biometric modalities such as palm prints and iris scans. Great strides have been made in our biometric technology and are about as accurate as you can get however, we must ensure proper training collection, storage, handling, and transmission so that we do not nullify our efforts for the past eleven years.

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 13 References Biometrics Standards Requirements for US-VISIT. (2012, March 15th). Retrieved September 15th, 2012, from Department of Homeland Security: http://www.dhs.gov/xlibrary/assets/usvisit/usvisit_biometric_standards.pdf Brindha, V. E. (2012). Biometric Template Security using Dorsal Hand Vein Fuzzy Vault. Journal of Biometrics and Biostatistics, 1-6. Bush, G. W. (2008, June 5th). National Security Presidential Directive 59. Retrieved September 11th, 2012, from The White House: http://www.fas.org/irp/offdocs/nspd/nspd-59.html DHS Organization Chart. (n.d.). Retrieved September 11th, 2012, from Department of Homeland Security: http://ipv6.dhs.gov/xlibrary/assets/dhs-orgchart.pdf Identity One. (n.d.). Retrieved September 15th, 2012, from Biometric Technology: http://www.identityone.net/biometrictechnology.aspx Jain, A. K. (2007, October 16th). Debate over usefulness, pitfalls of biometrics intensifies. Retrieved September 13th, 2012, from Homeland Security New Wire: http://www.homelandsecuritynewswire.com/debate-over-usefulness-pitfalls-biometricsintensifies Kaushal, N. a. (2011). Human Earprints: A review. Jornal of Biometrics and Biostatistics, 1-5. National Science and Technology Council. (n.d.). Biometrics "Foundation Documents". Retrieved Septemeber 13th, 2012, from Biometrics.gov: http://www.biometrics.gov/documents/biofoundationdocs.pdf Office of the Inspector General, DHS. (2012, August). US-VISIT Faces Challenges in Identifying and Reporting Mulitple Biographic Identities. Retrieved Septemeber 17th, 2012, from

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 14 Office of the Inspector General, DHS: http://www.oig.dhs.gov/assets/mgmt/2012/oig_12-111_aug12.pdf US-VISIT. (n.d.). Retrieved September 10th, 2012, from Department of Homeland Security: http://ipv6.dhs.gov/files/programs/usv.shtm