Technology Assessment

Technology Assessment

Author: Government Accountability Office

Publisher: CreateSpace

Published: 2013-09-22

Total Pages: 244

ISBN-13: 9781492751113

DOWNLOAD EBOOK

One facet of the homeland security strategy focuses on border security— preventing the illegal entry of people and goods into the United States without impeding their legitimate flow. Security concerns need to be balanced with practical cost and operational considerations as well as political and economic interests. A risk-based approach can help identify and address security concerns.


Information Security

Information Security

Author: Keith A. Rhodes

Publisher:

Published: 2003

Total Pages: 23

ISBN-13:

DOWNLOAD EBOOK

One of the primary functions of any security system is the control of people into or out of protected areas, such as physical buildings, information systems, and our national border. Technologies called biometrics can automate the identification of people by one or more of their distinct physical or behavioral characteristics. The term biometrics covers a wide range of technologies that can be used to verify identity by measuring and analyzing human characteristics--relying on attributes of the individual instead of things the individual may have or know. In the last 2 years, laws have been passed that will require a more extensive use of biometric technologies in the federal government. Last year, GAO conducted a technology assessment on the use of biometrics for border security. GAO was asked to testify about the issues that it raised in the report, the use of biometrics in the federal government, and the current state of the technology. Biometric technologies are available today that can be used in security systems to help protect assets. Biometric technologies vary in complexity, capabilities, and performance and can be used to verify or establish a person's identity. Leading biometric technologies include facial recognition, fingerprint recognition, hand geometry, iris recognition, retina recognition, signature recognition, and speaker recognition. Biometric technologies have been used in federal applications such as access control, criminal identification, and border security. However, it is important to bear in mind that effective security cannot be achieved by relying on technology alone. Technology and people must work together as part of an overall security process. Weaknesses in any of these areas diminishes the effectiveness of the security process. The security process needs to account for limitations in biometric technology. For example, some people cannot enroll in a biometrics system. Similarly, errors sometimes occur during matching operations. Procedures need to be developed to handle these situations. Exception processing that is not as good as biometric-based primary processing could also be exploited as a security hole. We have found that three key considerations need to be addressed before a decision is made to design, develop, and implement biometrics into a security system: (1) decisions must be made on how the technology will be used; (2) a detailed cost-benefit analysis must be conducted to determine that the benefits gained from a system outweigh the costs; and (3) a trade-off analysis must be conducted between the increased security, which the use of biometrics would provide, and the effect on areas such as privacy and convenience. Security concerns need to be balanced with practical cost and operational considerations as well as political and economic interests. A risk management approach can help federal agencies identify and address security concerns. As federal agencies consider the development of security systems with biometrics, they need to define what the high-level goals of this system will be and develop the concept of operations that will embody the people, process, and technologies required to achieve these goals. With these answers, the proper role of biometric technologies in security can be determined. If these details are not resolved, the estimated cost and performance of the resulting system will be at risk.


The Biometric Border World

The Biometric Border World

Author: Karen Fog Olwig

Publisher: Routledge

Published: 2019-10-22

Total Pages: 398

ISBN-13: 1000713032

DOWNLOAD EBOOK

Since the 1990s, biometric border control has attained key importance throughout Europe. Employing digital images of, for example, fingerprints, DNA, bones, faces or irises, biometric technologies use bodies to identify, categorize and regulate individuals’ cross-border movements. Based on innovative collaborative fieldwork, this book examines how biometrics are developed, put to use and negotiated in key European border sites. It analyses the disparate ways in which the technologies are applied, perceived and experienced by border control agents and others managing the cross-border flow of people, by scientists and developers engaged in making the technologies, and by migrants and non-government organizations attempting to manoeuvre in the complicated and often-unpredictable systems of technological control. Biometric technologies are promoted by national and supranational authorities and industry as scientifically exact and neutral methods of identification and verification, and as an infallible solution to security threats. The ethnographic case studies in this volume demonstrate, however, that the technologies are, in fact, characterized by considerable ambiguity and uncertainty and subject to substantial subjective interpretation, translation and brokering with different implications for migrants, border guards, researchers and other actors engaged in the border world.


Biometric Recognition

Biometric Recognition

Author: National Research Council

Publisher: National Academies Press

Published: 2010-12-12

Total Pages: 182

ISBN-13: 0309142075

DOWNLOAD EBOOK

Biometric recognition-the automated recognition of individuals based on their behavioral and biological characteristic-is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric recognition has been applied to identification of criminals, patient tracking in medical informatics, and the personalization of social services, among other things. In spite of substantial effort, however, there remain unresolved questions about the effectiveness and management of systems for biometric recognition, as well as the appropriateness and societal impact of their use. Moreover, the general public has been exposed to biometrics largely as high-technology gadgets in spy thrillers or as fear-instilling instruments of state or corporate surveillance in speculative fiction. Now, as biometric technologies appear poised for broader use, increased concerns about national security and the tracking of individuals as they cross borders have caused passports, visas, and border-crossing records to be linked to biometric data. A focus on fighting insurgencies and terrorism has led to the military deployment of biometric tools to enable recognition of individuals as friend or foe. Commercially, finger-imaging sensors, whose cost and physical size have been reduced, now appear on many laptop personal computers, handheld devices, mobile phones, and other consumer devices. Biometric Recognition: Challenges and Opportunities addresses the issues surrounding broader implementation of this technology, making two main points: first, biometric recognition systems are incredibly complex, and need to be addressed as such. Second, biometric recognition is an inherently probabilistic endeavor. Consequently, even when the technology and the system in which it is embedded are behaving as designed, there is inevitable uncertainty and risk of error. This book elaborates on these themes in detail to provide policy makers, developers, and researchers a comprehensive assessment of biometric recognition that examines current capabilities, future possibilities, and the role of government in technology and system development.


Defense Biometrics

Defense Biometrics

Author: Davi M. D'Agostino

Publisher: DIANE Publishing

Published: 2011-08

Total Pages: 50

ISBN-13: 1437985351

DOWNLOAD EBOOK

Biometrics technologies that collect and facilitate the sharing of fingerprint records, and other identity data, are important to national security and federal agencies recognize the need to share such information. The Department of Defense (DoD) plans to spend $3.5 billion for fiscal years 2007 to 2015 on biometrics. This report examined the extent to which DoD has: (1) adopted standards and taken actions to facilitate the collection of biometrics that are interoperable with other key federal agencies; and (2) shares biometric information across key federal agencies. Includes recommendations. Charts and tables. This is a print on demand edition of an important, hard-to-find publication.


Privacy Impact Assessment for the Automated Biometric Identification System

Privacy Impact Assessment for the Automated Biometric Identification System

Author: Department of Department of Homeland Security

Publisher: CreateSpace

Published: 2015-01-05

Total Pages: 86

ISBN-13: 9781505988741

DOWNLOAD EBOOK

The legacy Immigration and Naturalization Service (INS) developed IDENT in 1994 as a law enforcement system for collecting and processing biometrics. In 2004, the Department of Homeland Security (DHS) established the U.S. Visitor and Immigrant Status Indicator Technology (US-VISIT) Program as the first large-scale biometric identification program to support immigration and border management. IDENT has evolved over the years into the central DHS-wide system for the storage and processing of biometric data. IDENT stores and processes biometric data-digital fingerprints, photographs, iris scans, and facial images-and links biometrics with biographic information to establish and verify identities. IDENT serves as a biographic and biometric repository for the Department. As a data steward, US-VISIT provides a service to its data providers and data users. US-VISIT identifies each collection by data provider and its authority to use, retain, and share it. IDENT enables sharing with authorized users after the data provider has approved the sharing. The process of retaining data provided to IDENT is referred to as enrollment. Each time an individual's biometrics are enrolled in IDENT, it is an encounter. Adding encounters to an already existing identity is referred to as an assignment. With each encounter, IDENT: Checks a person's biometrics against the IDENT watch list of known or suspected terrorists(KST), criminals, and immigration violators; Checks a person's biometrics against the entire database of fingerprints to help determine if a person is using an alias and/or attempting to use fraudulent identification; and Checks a person's biometrics against those associated with the identification document presented to help ensure that the document belongs to the person presenting it and not someone else.