2016 Global Identity Summit Pre-Conference Paper. Fingerprints
|
|
- Alexandrina Tate
- 5 years ago
- Views:
Transcription
1 2016 Global Identity Summit Pre-Conference Paper Fingerprints
2 This is a community-developed document. Information and viewpoints provided within are not necessarily the opinions of the paper coordinators nor their employers. Special thanks to the MITRE Corporation for their editorial assistance and coordination guidance.
3 Fingerprints Introduction The 2016 edition of the Global Identity Summit (GIS) will come at a unique time in federal circles, as it will be 50 days before a presidential election and 123 days before the new President takes office. Clearly, this is a very busy time for all federal officials, as they will be working with transition teams to explain current capabilities and draft plans for the next administration to implement. The GIS Planning Committee is using the 2016 conference to assist agencies during this critically important transition period. This information will be equally useful to the private sector as it develops its future strategies. The Planning Committee s ultimate goal is to gather and publicly post information that explains current capabilities and issues, provides a vision of future capabilities, and develops initial concepts for public and/or private activities for the next five years. The Planning Committee has identified approximately 20 critical identity topics to focus on at the 2016 GIS. Within each topical session, speakers will present information on the current state as well as discuss needs and priorities for the future. The session moderator will then invite feedback from audience members via an open floor and/or targeted workshops. This paper serves as a read-ahead on one of these topics, so that GIS attendees can be prepared to participate in onsite discussions. Abstract Introduction Fingerprints have been used in law enforcement for more than 100 years, but until the mid-1980s matching was almost exclusively done by human examiners. While slow and labor-intensive, the accuracy of the manual systems could be quite good. For example, when technology advanced to the level that automated comparison for the then 36-million person Federal Bureau of Investigation (FBI) criminal master file against itself was possible, the file was found to be 99 percent accurate despite 75 years of entirely manual operation by thousands of fallible humans. An extensive quality control process was required to maintain such accuracy. Until the late 1980s, reference fingerprint collection consisted of inked finger impressions on paper fingerprint cards. At crime scenes, manual techniques were employed for developing latent impressions. Initial standards for electronic capture focused on technology for converting paper fingerprint cards into an electronic format. Subsequent live scan devices were an extrapolation from the earlier specifications. Today most nations, many of their subdivisions, and a large number of commercial entities operate automated fingerprint identification/verification systems. In the United States, at the national level, virtually all tenprints are received electronically, although perhaps 15 percent are still initially collected on inked cards and converted into an electronic transaction. Commercial use of fingerprints, such
4 2016 Global Identity Summit as an authentication mechanism for mobile devices, has or will soon likely exceed the number of government fingerprint capture devices. Optical and capacitive fingerprint sensors emerged in the 1990s and were soon incorporated into physical and logical access control systems. Due to higher cost and relative satisfaction with userid/ password/ personal identification number (PIN) protection, fingerprint-based access control did not see widespread use until recently. That changed with the introduction of the Apple iphone 5S in September The 5S included the AuthenTec capacitive finger scanner providing a feature called TouchID. Before the 5S, about 49 percent of iphone owners used a passcode for access protection; afterwards about 83 percent used TouchID access protection. A year later, with the introduction of the iphone 6S and the Apple Pay application, fingerprint scans began to be used to authenticate financial transactions. Mobile fingerprint-based identification proved hugely useful to the warfighter in Iraq and Afghanistan. In 1999, the Army developed and fielded the initial Biometric Automated Toolset (BAT), which quickly proved its worth as a force multiplier. Addressing tactical identification needs, the device was not suitable for enrollment into, or querying, the FBI criminal master file. This led to the FBI fielding a Quick Capture device in 2003 to support military activities. BAT was followed by the more capable Handheld Interagency Identity Detection Equipment (HIIDE) in 2007 and the Secure Electronic Enrollment Device II (SEEK II) in Battlefield fingerprint identification success had proven the worth of mobile positive identification. However, the early mobile devices were far too large, expensive, and slow for domestic law enforcement. Planning for Next Generation Identification (NGI) included mobile near real-time search from the streets or at remote locations without the need to transport subjects to a central office increasing officer safety and greatly reducing the inconvenience to many subjects. In the last decade, fingerprint sensing technology has further advanced with sensors focused on presentation attack detection (PAD), semi-penetrating, non-contact, and standoff capture. A new generation of semi-penetrating fingerprint capture sensors serve two primary goals. First, they seek to improve the quality of captured for prints for individuals who have traditionally been hard to capture well. Second, they seek to detect presentation attacks. Non-contact and standoff fingerprint sensors are primarily aimed at improving high-volume throughput for access control. On the whole, these new fingerprint capture technologies are aimed at improving the usability and reliability of fingerprint technology. This trend is driven by fingerprint technology moving from government to commercial applications and autonomous usage without a human in the loop. Capabilities There are three major U.S. government national biometric screening systems: NGI, operated by FBI/ Criminal Justice Information Services; IDENT, operated by the Department of Homeland Security (DHS)/Office of Biometric Identity Management; and ABIS, operated by the Department of Defense (DoD)/Defense Forensics and Biometrics Agency. These systems, among other things, ensure an accurate criminal history, identify wanted persons, ensure that persons requiring licensing or employed in positions of trust have no disqualifying criminal history, verify admissibility for visitors and immigrants, and ensure battlefield identity dominance. All three systems interoperate effectively. Fingerprint 2
5 Voice Biometric matching is the principal mode for each. The fingerprint matching technology is excellent, with automated search accuracies of about 99.7 percent and stoplight response times within seconds. When they are augmented with human examiners to address the most difficult comparisons, both search accuracy and response time increase. To make the foregoing more concrete, we will consider the FBI NGI system and the Biometric Services Section staff that operates it. The NGI repository contains over 111 million subjects, of which over 71 million are for criminal justice purposes and nearly 40 million are for civil purposes. About 209,000 tenprint checks are conducted each day, 35 percent for criminal justice purposes and 65 percent for civil purposes, including national security. About 97 percent of transactions are fully automated. Response time for transactions referred to human examiners is determined by staffing levels in several functions. Civil fingerprint checks are performed on a fee-for-service basis, with a committed response time of 24 hours and an urgent transaction available (at a higher cost) with a 15-minute response. Criminal transactions have a committed response time of two hours. Criminal response time fiscal year to date averages less than seven minutes. Civil response time fiscal year to date averages less than one hour, 23 minutes. The FBI operates a Six Sigma quality program on fingerprint matching. In 2002, the hybrid machine/human examiner accuracy was percent. By 2003, the hybrid accuracy rate improved to percent. Since 2013, the hybrid miss rate has been unmeasurable. Comparable performance would be expected for other national-level hybrid fingerprint matching systems. Fingerprint positive identification systems are highly scalable. The Unique Identification Authority of India operates a biometrically enabled identification system with over a billion subjects enrolled, nearly all supported primarily by fingerprints. Using relatively low-cost equipment, it operates countrywide for a variety of applications, including identity proofing, benefits eligibility authentication, and attendance, among others. Biometric access control systems, including those that are fingerprint based, have yet to gain significant traction. Personal identity verification cards coupled with PINs have been regarded as a cost-effective solution thus far. Consumer adoption of fingerprints on mobile devices was the most significant trend in biometrics during 2013 through Apple alone shipped 286 million Touch ID-enabled iphones and ipads in the fiscal year that ended September Goode Intelligence predicted there would be over 16 billion mobile biometrics (fingerprint) payments by A May 2016 survey of 4,000 consumers in the United States and the United Kingdom found that some 80 percent of consumers believe biometric authentication (overwhelmingly fingerprint based) is more secure than traditional usernames and passwords. Mobile use of fingerprints for authentication to the device and ecommerce appear a massive trend both domestically and internationally. However, as good as the technology has become, shortcomings remain. Lights Out search reliability in the 99.7 percent range with low (roughly one per thousand) false positives would be exceptional absent the consequences of failing to identify a known terrorist or person wanted for serial commission of heinous crime. As a result, expensive and far slower human examiners, supported by complex quality control and review mechanisms, must augment the technology. Beyond 3
6 2016 Global Identity Summit that, fingerprint searching is limited by the quality of the submissions. The awkward rolling motions required to complete a tenprint card are a difficult skill to acquire. At the national level, about 2 percent of criminal and 3 percent of civil transactions must be rejected, primarily for image quality reasons. Fingerprints are unique among face, finger, and iris biometrics in that they alone can leave behind physical evidence of their presence in the form of latent fingerprints. Law enforcement crime scene latent fingerprint identification remains entirely dependent upon human examiners. The vast majority of the nation s over 18,000 law enforcement agencies do not have crime scene identification (CSI) units or fingerprint examiners, relying on big city, state, and federal agencies for such support for only the most serious crimes. Landscape Many countries have deployed, or are deploying, comprehensive biometrically based (primarily fingerprints) immigration and visitor control systems tracking both entry and exit. A few, notably India, are biometrically enrolling their entire populations. Most countries have a national automated fingerprint identification system, and a few, including the United States, have such systems widely deployed. Academic research into fingerprint capture technology, fingerprint matching, the scientific basis for forensic analysis, and other aspects is active at multiple institutions in the United States, Europe, Australia, Japan, India, and China, and less represented elsewhere. Development and marketing of commercial products tends to focus in the same areas. Within the United States, centers of excellence for fingerprint-related advances are within the FBI, National Institute of Standards and Technology, National Institute of Justice, DHS, DoD, and Intelligence Advanced Research Projects Activity. Future By 2021, advanced fingerprint capture technology should be commercially available, which will reduce the image quality reject rate to not more than 0.1 percent. Automated matching technology should provide a search reliability of 99.9 percent at a false non-match rate of not more than percent. Non-chemical latent fingerprint collection devices suitable for use by police officers without specialized CSI training should be commercially available, and automated latent matching algorithms should advance to the stage that candidate matches above a threshold score are suitable for lead generation without review by a qualified latent fingerprint examiner. 4
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More information2016 Global Identity Summit Pre-Conference Paper Hardening Authentication Technologies
2016 Global Identity Summit Pre-Conference Paper Hardening Authentication Technologies Paper development coordinated by Cathy Tilton, CSRA This is a community-developed document. Information and viewpoints
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationIAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2
IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated
More informationFBI Next Generation Identification (NGI)
FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest
More informationThe National Biometrics Challenge 2011 Update
The National Biometrics Challenge 2011 Update James Loudermilk Federal Bureau of Investigation Larry Hornak National Science Foundation Update Co-Chairs About the National Science and Technology Council
More informationBiometric Center of Excellence (BCOE)
Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationKeystroke Dynamics: Low Impact Biometric Verification
Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,
More informationEV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND
EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR
More informationStatement of Chief Richard Beary President of the International Association of Chiefs of Police
Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationCYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME
FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List
More informationUNCLASSIFIED / FOUO UNCLASSIFIED / FOUO
1 Integrated Automated Fingerprint Identification System (IAFIS) IAFIS has lived up to and vastly exceeded performance expectations Now is the time to design for the future, rather than reacting to it
More informationI I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:
From: Sent: lleo.gov] arch 24, 2011 1:55 PM To: I Cc: le.gov Subject: White House Domestic Policy Request Attachments: NG[ Summary.pdf; IAQ Data Dictionary.pdf; IAQscreenshot.pdf Attached, please find
More informationFederal Bureau of Investigation CJIS Division Next Generation Identification
Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment
More informationMobile ID, the Size Compromise
Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationNational Counterterrorism Center
National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate
More informationTHE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE
THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration
More informationPut Identity at the Heart of Security
Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the
More informationNational Transportation Worker ID Card (TWIC) Credentialing Direct Action Group Functional Requirements DRAFT
Purpose: National Transportation Worker ID Card (TWIC) Credentialing Direct Action Group Functional Requirements DRAFT 1. The primary goal of the CDAG is to fashion a nationwide transportation worker identity
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationWHAT IS THE FEASIBILITY OF A NATIONAL BIOMETRIC CENTER?
Chapter Five WHAT IS THE FEASIBILITY OF A NATIONAL BIOMETRIC CENTER? As noted in Chapter One, biometrics are a potential solution to Army needs. However, the findings of the previous two chapters indicate
More informationNGI and Rap Back Focus Group Briefing
NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus
More informationSECURITY ENHANCEMENT OF E-VOTING SYSTEM
SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN
More informationAppendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014
Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate
More informationTHE STATE OF IT TRANSFORMATION FOR RETAIL
THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State
More informationHelping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching
Helping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching Against the backdrop of budget constraints, threats from terrorism, organised
More informationNational Biometric Security Project
National Biometric Security Project Activity Update: 2003-2005 Biometric Consortium Conference 2005 National Biometric Security Project Mission Assist government and private sector organizations deter
More informationEMERGING TRENDS AROUND AUTHENTICATION
EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,
More informationSurvey Guide: Businesses Should Begin Preparing for the Death of the Password
Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their
More informationNext Generation Identification Rap Back Services
Next Generation Identification Rap Back Services Presented by: Jimmy Mills Management and Program Analyst Rap Back Services Team Theresa Yarboro Management and Program Analyst Rap Back Services Team 1
More informationNATIONAL INFORMATION SHARING STRATEGY
The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides
More informationActions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650
Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 President Obama issued Executive Order (EO) 13650 - Improving Chemical
More informationDomestic Nuclear Detection Office (DNDO) DNDO Overview
Domestic Nuclear Detection Office (DNDO) DNDO Overview Summer 2008 Outline DNDO Mission, Objectives and Organization Defining the radiological and nuclear threat Multi-layered approach to security Global
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationState of the Satellite Industry Report June 2013
State of the Satellite Industry Report June 2013 Sponsored by the Prepared by 1 1 1 0 1 0 0 0 1 0 1 0 0 1 1 0 1 0 1 0 0 1 1 0 The Satellite Industry Association: 18 Years as the Voice of the U.S. Satellite
More informationTESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)
TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT
More informationSecurity for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationBENEFITS of MEMBERSHIP FOR YOUR INSTITUTION
PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment
More informationCall for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis)
Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis) (CFI-12-IGCI-02) Background INTERPOL recognizes that police worldwide
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationKansas City s Metropolitan Emergency Information System (MEIS)
Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)
More informationFBI Criminal History Record Certification Program
FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section
More informationBiometrics 101. Presented by The International Biometrics & Identification Association (IBIA)
Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationIntelligence-Led Policing. Executive Summary
Intelligence-Led Policing Executive Summary Five Trends to Help You See Ahead & Create Safer Communities Chicago debuted the first police call boxes in 1877, allowing citizens and police to report threats
More informationBiometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange. LTC Eric Pavlick PM, Biometric Enabling Capabilities
Biometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange LTC Eric Pavlick PM, Biometric Enabling Capabilities 30 JULY 2013 BEC Inc 1 Agenda Program Overview LTC Eric Pavlick, Product
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationNational Response Plan & Nuclear/Radiological Incident Annex. OSC Readiness Training November 17, 2004
National Response Plan & Nuclear/Radiological Incident Annex OSC Readiness Training November 17, 2004 National Response Plan! DHS will be the overall Federal coordinating agency for Incidents of National
More informationGlobal Wildlife Cybercrime Action Plan1
Global Wildlife Cybercrime Action Plan1 A Call to Action for the London Conference on Illegal Wildlife Trade October 11-12, 2018 1 Wildlife cybercrime in this context refers to cyber-enabled wildlife trafficking.
More informationEDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying
What you need to know to become a Certified EDUCATOR in Florida General Certification Requirements for Individuals Applying for Initial Certification Beginning July 1, 2002 Bureau of Educator Certification
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationMassive Scalability With InterSystems IRIS Data Platform
Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special
More informationExtremely-Large-Scale Biometric Authentication System - Its Practical Implementation
Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation SU Leiming, SAKAMOTO Shizuo Abstract The Indian Unique ID (UID) is an extremely-large-scale system that attempts to
More informationComprehensive Study on Cybercrime
Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationESSA Q INTEGRITY REPORT
ESSA Q3 2017 INTEGRITY REPORT EDITORIAL ESSA held its first major event on sports betting and integrity at Lords Cricket ground in mid-october. It was fitting that the event took place at the home of cricket,
More informationWORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe
WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such
More informationSEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.
SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT www.hackersday.org ABOUT NISS National Information Security (NISS) is an initiative of National Information Security Council which is
More informationIntroduction to the National Response Plan and National Incident Management System
Introduction to the National Response Plan and National Incident Management System This presentation will cover: Homeland Security Presidential Directive (HSPD)-5 National Incident Management System (NIMS)
More informationSupplemental Programmatic Environmental Assessment (SPEA) for the Proposed
This document is scheduled to be published in the Federal Register on 12/15/2016 and available online at https://federalregister.gov/d/2016-30187, and on FDsys.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY
More informationRequirements for Forensic Photography & Imaging Certification (08/2017)
Requirements for Forensic Photography & Imaging Certification (08/2017) A. General Requirements 1. An applicant for certification must possess a high ethical and professional standing. 2. All applicants
More informationNIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA
NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY
More informationFIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies
FIDO AND PAYMENTS AUTHENTICATION Philip Andreae Vice President Oberthur Technologies The Problem The Solution The Alliance Updates Data Breaches 781 data breaches in 2015 170 million records in 2015 (up
More informationMobile Fingerprint Authentication Solution
Mobile Fingerprint Authentication Solution 1 BioSign 2.0 I WHY BioSign 2.0? WORLD S FASTEST SPEED WORLD S MOST ACCURATE ALGORITHM ROBUST PERFORMANCE OVER TIME FLEXIBILITY IN DESIGN 50ms* authentication
More informationTexas Commission on Fire Protection
2017 Texas Commission on Fire Protection OVERVIEW, REVENUE, DATA MANAGEMENT PROJECT, PERFORMANCE MEASURES Page 1 of 9 Overview The Commission on Fire Protection is charged with developing and enforcing
More informationGood Technology State of BYOD Report
Good Technology State of BYOD Report New data finds Finance and Healthcare industries dominate BYOD picture and that users are willing to pay device and service plan costs if they can use their own devices
More informationAnnual Report for the Utility Savings Initiative
Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page
More informationF-1 OPTIONAL PRACTICAL TRAINING STEM EXTENSION
Global Education Office (GEO) 2120 Mesa Vista Hall MSC06 3850 1 University of New Mexico Albuquerque, NM 87131-1056 Phone (505) 277-4032 Fax (505) 277-1867 Email geo@unm.edu Web: www.geo.unm.edu/ F-1 OPTIONAL
More informationTRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING
TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING In 2014, West Midlands Police (WMP) committed to a striking transformation programme that would help the force meet current and future policing
More informationNSI. Suspicious Activity Reporting Line Officer Training
Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding
More informationProgram Approval Form
For approval of new programs and deletions or X Program Approval Form modifications to an existing program. Action Requested: Type (Check one): Create New (SCHEV approval required except for minors) B.A.
More informationM.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program
Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable
More informationPROFILE: ACCESS DATA
COMPANY PROFILE PROFILE: ACCESS DATA MARCH 2011 AccessData Group provides digital investigations and litigation support software and services for corporations, law firms, law enforcement, government agencies
More informationFIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017
FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The
More informationTHE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS
THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at telecommunication organizations transform to business-focused service
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationCOMPUTER HACKING Forensic Investigator
COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach
More informationMicrosoft Certified Trainer
Microsoft Certified Trainer Enrollment and Renewal Guide Updated November 2018 Microsoft Certified Trainers (MCTs) are the premier technical and instructional experts in Microsoft technologies. Join this
More informationHomeland Security and Geographic Information Systems
Page 1 of 5 Homeland Security and Geographic Information Systems How GIS and mapping technology can save lives and protect property in post-september 11th America Introduction Timely, accurate information,
More informationConnecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1
Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Presentation Overview What is BTOP? Making BTOP work for our state What
More informationUNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This
Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland
More informationAdvances in Stand-off Biometrics
Advances in Stand-off Biometrics Behnam (Ben) Bavarian, President and CEO AFIS and Biometrics Consulting Inc. 2011 AFIS and Biometrics Consulting Inc. The developments in this presentation is supported
More informationThe Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment
Framework Interoperability for a Seamless Joint Training Environment Warren Bizub Technical Division Chief US Joint Forces Command Joint Warfighting Center warren.bizub@jfcom.mil Derek Bryan Experimentation
More informationBiometric Standards for DoD Operational Requirements
Biometric Standards for DoD Operational Requirements Mr. Benji Hutchinson James.Hutchinson@hqda.army.mil Biometrics Task Force 28 Feb 2008 1 Overview Rationale for Biometric Standards in DoD BTF Biometric
More informationTHE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)
ASEAN REGIONAL FORUM INTER-SESSIONAL SUPPORT GROUP MEETING ON CONFIDENCE BUILDING MEASURES (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)
More informationNASS Remote Notarization Task Force
NASS Remote Notarization Task Force Knowledge-Based Verification David Temoshok Applied Cybersecurity IT Laboratory National Institute of Standards and Technology (NIST) 2/23/2017 1 Today s Discussion
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationA quick guide to getting the most from your Idox Information Service membership
A quick guide to getting the most from your Idox Information Service membership The Idox Information Service The Idox Information Service is the most complete and accessible source of public sector knowledge
More information