2016 Global Identity Summit Pre-Conference Paper. Fingerprints

Size: px
Start display at page:

Download "2016 Global Identity Summit Pre-Conference Paper. Fingerprints"

Transcription

1 2016 Global Identity Summit Pre-Conference Paper Fingerprints

2 This is a community-developed document. Information and viewpoints provided within are not necessarily the opinions of the paper coordinators nor their employers. Special thanks to the MITRE Corporation for their editorial assistance and coordination guidance.

3 Fingerprints Introduction The 2016 edition of the Global Identity Summit (GIS) will come at a unique time in federal circles, as it will be 50 days before a presidential election and 123 days before the new President takes office. Clearly, this is a very busy time for all federal officials, as they will be working with transition teams to explain current capabilities and draft plans for the next administration to implement. The GIS Planning Committee is using the 2016 conference to assist agencies during this critically important transition period. This information will be equally useful to the private sector as it develops its future strategies. The Planning Committee s ultimate goal is to gather and publicly post information that explains current capabilities and issues, provides a vision of future capabilities, and develops initial concepts for public and/or private activities for the next five years. The Planning Committee has identified approximately 20 critical identity topics to focus on at the 2016 GIS. Within each topical session, speakers will present information on the current state as well as discuss needs and priorities for the future. The session moderator will then invite feedback from audience members via an open floor and/or targeted workshops. This paper serves as a read-ahead on one of these topics, so that GIS attendees can be prepared to participate in onsite discussions. Abstract Introduction Fingerprints have been used in law enforcement for more than 100 years, but until the mid-1980s matching was almost exclusively done by human examiners. While slow and labor-intensive, the accuracy of the manual systems could be quite good. For example, when technology advanced to the level that automated comparison for the then 36-million person Federal Bureau of Investigation (FBI) criminal master file against itself was possible, the file was found to be 99 percent accurate despite 75 years of entirely manual operation by thousands of fallible humans. An extensive quality control process was required to maintain such accuracy. Until the late 1980s, reference fingerprint collection consisted of inked finger impressions on paper fingerprint cards. At crime scenes, manual techniques were employed for developing latent impressions. Initial standards for electronic capture focused on technology for converting paper fingerprint cards into an electronic format. Subsequent live scan devices were an extrapolation from the earlier specifications. Today most nations, many of their subdivisions, and a large number of commercial entities operate automated fingerprint identification/verification systems. In the United States, at the national level, virtually all tenprints are received electronically, although perhaps 15 percent are still initially collected on inked cards and converted into an electronic transaction. Commercial use of fingerprints, such

4 2016 Global Identity Summit as an authentication mechanism for mobile devices, has or will soon likely exceed the number of government fingerprint capture devices. Optical and capacitive fingerprint sensors emerged in the 1990s and were soon incorporated into physical and logical access control systems. Due to higher cost and relative satisfaction with userid/ password/ personal identification number (PIN) protection, fingerprint-based access control did not see widespread use until recently. That changed with the introduction of the Apple iphone 5S in September The 5S included the AuthenTec capacitive finger scanner providing a feature called TouchID. Before the 5S, about 49 percent of iphone owners used a passcode for access protection; afterwards about 83 percent used TouchID access protection. A year later, with the introduction of the iphone 6S and the Apple Pay application, fingerprint scans began to be used to authenticate financial transactions. Mobile fingerprint-based identification proved hugely useful to the warfighter in Iraq and Afghanistan. In 1999, the Army developed and fielded the initial Biometric Automated Toolset (BAT), which quickly proved its worth as a force multiplier. Addressing tactical identification needs, the device was not suitable for enrollment into, or querying, the FBI criminal master file. This led to the FBI fielding a Quick Capture device in 2003 to support military activities. BAT was followed by the more capable Handheld Interagency Identity Detection Equipment (HIIDE) in 2007 and the Secure Electronic Enrollment Device II (SEEK II) in Battlefield fingerprint identification success had proven the worth of mobile positive identification. However, the early mobile devices were far too large, expensive, and slow for domestic law enforcement. Planning for Next Generation Identification (NGI) included mobile near real-time search from the streets or at remote locations without the need to transport subjects to a central office increasing officer safety and greatly reducing the inconvenience to many subjects. In the last decade, fingerprint sensing technology has further advanced with sensors focused on presentation attack detection (PAD), semi-penetrating, non-contact, and standoff capture. A new generation of semi-penetrating fingerprint capture sensors serve two primary goals. First, they seek to improve the quality of captured for prints for individuals who have traditionally been hard to capture well. Second, they seek to detect presentation attacks. Non-contact and standoff fingerprint sensors are primarily aimed at improving high-volume throughput for access control. On the whole, these new fingerprint capture technologies are aimed at improving the usability and reliability of fingerprint technology. This trend is driven by fingerprint technology moving from government to commercial applications and autonomous usage without a human in the loop. Capabilities There are three major U.S. government national biometric screening systems: NGI, operated by FBI/ Criminal Justice Information Services; IDENT, operated by the Department of Homeland Security (DHS)/Office of Biometric Identity Management; and ABIS, operated by the Department of Defense (DoD)/Defense Forensics and Biometrics Agency. These systems, among other things, ensure an accurate criminal history, identify wanted persons, ensure that persons requiring licensing or employed in positions of trust have no disqualifying criminal history, verify admissibility for visitors and immigrants, and ensure battlefield identity dominance. All three systems interoperate effectively. Fingerprint 2

5 Voice Biometric matching is the principal mode for each. The fingerprint matching technology is excellent, with automated search accuracies of about 99.7 percent and stoplight response times within seconds. When they are augmented with human examiners to address the most difficult comparisons, both search accuracy and response time increase. To make the foregoing more concrete, we will consider the FBI NGI system and the Biometric Services Section staff that operates it. The NGI repository contains over 111 million subjects, of which over 71 million are for criminal justice purposes and nearly 40 million are for civil purposes. About 209,000 tenprint checks are conducted each day, 35 percent for criminal justice purposes and 65 percent for civil purposes, including national security. About 97 percent of transactions are fully automated. Response time for transactions referred to human examiners is determined by staffing levels in several functions. Civil fingerprint checks are performed on a fee-for-service basis, with a committed response time of 24 hours and an urgent transaction available (at a higher cost) with a 15-minute response. Criminal transactions have a committed response time of two hours. Criminal response time fiscal year to date averages less than seven minutes. Civil response time fiscal year to date averages less than one hour, 23 minutes. The FBI operates a Six Sigma quality program on fingerprint matching. In 2002, the hybrid machine/human examiner accuracy was percent. By 2003, the hybrid accuracy rate improved to percent. Since 2013, the hybrid miss rate has been unmeasurable. Comparable performance would be expected for other national-level hybrid fingerprint matching systems. Fingerprint positive identification systems are highly scalable. The Unique Identification Authority of India operates a biometrically enabled identification system with over a billion subjects enrolled, nearly all supported primarily by fingerprints. Using relatively low-cost equipment, it operates countrywide for a variety of applications, including identity proofing, benefits eligibility authentication, and attendance, among others. Biometric access control systems, including those that are fingerprint based, have yet to gain significant traction. Personal identity verification cards coupled with PINs have been regarded as a cost-effective solution thus far. Consumer adoption of fingerprints on mobile devices was the most significant trend in biometrics during 2013 through Apple alone shipped 286 million Touch ID-enabled iphones and ipads in the fiscal year that ended September Goode Intelligence predicted there would be over 16 billion mobile biometrics (fingerprint) payments by A May 2016 survey of 4,000 consumers in the United States and the United Kingdom found that some 80 percent of consumers believe biometric authentication (overwhelmingly fingerprint based) is more secure than traditional usernames and passwords. Mobile use of fingerprints for authentication to the device and ecommerce appear a massive trend both domestically and internationally. However, as good as the technology has become, shortcomings remain. Lights Out search reliability in the 99.7 percent range with low (roughly one per thousand) false positives would be exceptional absent the consequences of failing to identify a known terrorist or person wanted for serial commission of heinous crime. As a result, expensive and far slower human examiners, supported by complex quality control and review mechanisms, must augment the technology. Beyond 3

6 2016 Global Identity Summit that, fingerprint searching is limited by the quality of the submissions. The awkward rolling motions required to complete a tenprint card are a difficult skill to acquire. At the national level, about 2 percent of criminal and 3 percent of civil transactions must be rejected, primarily for image quality reasons. Fingerprints are unique among face, finger, and iris biometrics in that they alone can leave behind physical evidence of their presence in the form of latent fingerprints. Law enforcement crime scene latent fingerprint identification remains entirely dependent upon human examiners. The vast majority of the nation s over 18,000 law enforcement agencies do not have crime scene identification (CSI) units or fingerprint examiners, relying on big city, state, and federal agencies for such support for only the most serious crimes. Landscape Many countries have deployed, or are deploying, comprehensive biometrically based (primarily fingerprints) immigration and visitor control systems tracking both entry and exit. A few, notably India, are biometrically enrolling their entire populations. Most countries have a national automated fingerprint identification system, and a few, including the United States, have such systems widely deployed. Academic research into fingerprint capture technology, fingerprint matching, the scientific basis for forensic analysis, and other aspects is active at multiple institutions in the United States, Europe, Australia, Japan, India, and China, and less represented elsewhere. Development and marketing of commercial products tends to focus in the same areas. Within the United States, centers of excellence for fingerprint-related advances are within the FBI, National Institute of Standards and Technology, National Institute of Justice, DHS, DoD, and Intelligence Advanced Research Projects Activity. Future By 2021, advanced fingerprint capture technology should be commercially available, which will reduce the image quality reject rate to not more than 0.1 percent. Automated matching technology should provide a search reliability of 99.9 percent at a false non-match rate of not more than percent. Non-chemical latent fingerprint collection devices suitable for use by police officers without specialized CSI training should be commercially available, and automated latent matching algorithms should advance to the stage that candidate matches above a threshold score are suitable for lead generation without review by a qualified latent fingerprint examiner. 4

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.

More information

2016 Global Identity Summit Pre-Conference Paper Hardening Authentication Technologies

2016 Global Identity Summit Pre-Conference Paper Hardening Authentication Technologies 2016 Global Identity Summit Pre-Conference Paper Hardening Authentication Technologies Paper development coordinated by Cathy Tilton, CSRA This is a community-developed document. Information and viewpoints

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2 IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated

More information

FBI Next Generation Identification (NGI)

FBI Next Generation Identification (NGI) FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest

More information

The National Biometrics Challenge 2011 Update

The National Biometrics Challenge 2011 Update The National Biometrics Challenge 2011 Update James Loudermilk Federal Bureau of Investigation Larry Hornak National Science Foundation Update Co-Chairs About the National Science and Technology Council

More information

Biometric Center of Excellence (BCOE)

Biometric Center of Excellence (BCOE) Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND

EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR

More information

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Statement of Chief Richard Beary President of the International Association of Chiefs of Police Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of

More information

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Good morning, Chairman Harman, Ranking Member Reichert, and Members of Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO 1 Integrated Automated Fingerprint Identification System (IAFIS) IAFIS has lived up to and vastly exceeded performance expectations Now is the time to design for the future, rather than reacting to it

More information

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments: From: Sent: lleo.gov] arch 24, 2011 1:55 PM To: I Cc: le.gov Subject: White House Domestic Policy Request Attachments: NG[ Summary.pdf; IAQ Data Dictionary.pdf; IAQscreenshot.pdf Attached, please find

More information

Federal Bureau of Investigation CJIS Division Next Generation Identification

Federal Bureau of Investigation CJIS Division Next Generation Identification Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment

More information

Mobile ID, the Size Compromise

Mobile ID, the Size Compromise Mobile ID, the Size Compromise Carl Gohringer, Strategic Business Development E-MOBIDIG Meeting, Bern, 25/26 September 1 Presentation Plan The quest for increased matching accuracy. Increased adoption

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

National Counterterrorism Center

National Counterterrorism Center National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate

More information

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

National Transportation Worker ID Card (TWIC) Credentialing Direct Action Group Functional Requirements DRAFT

National Transportation Worker ID Card (TWIC) Credentialing Direct Action Group Functional Requirements DRAFT Purpose: National Transportation Worker ID Card (TWIC) Credentialing Direct Action Group Functional Requirements DRAFT 1. The primary goal of the CDAG is to fashion a nationwide transportation worker identity

More information

Trends in Mobile Forensics from Cellebrite

Trends in Mobile Forensics from Cellebrite Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

WHAT IS THE FEASIBILITY OF A NATIONAL BIOMETRIC CENTER?

WHAT IS THE FEASIBILITY OF A NATIONAL BIOMETRIC CENTER? Chapter Five WHAT IS THE FEASIBILITY OF A NATIONAL BIOMETRIC CENTER? As noted in Chapter One, biometrics are a potential solution to Army needs. However, the findings of the previous two chapters indicate

More information

NGI and Rap Back Focus Group Briefing

NGI and Rap Back Focus Group Briefing NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus

More information

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

SECURITY ENHANCEMENT OF E-VOTING SYSTEM SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN

More information

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014

Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate

More information

THE STATE OF IT TRANSFORMATION FOR RETAIL

THE STATE OF IT TRANSFORMATION FOR RETAIL THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State

More information

Helping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching

Helping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching Helping to Counter the Terrorist Threat using Face Recognition: Forensic Media Analysis Integrated with Live Surveillance Matching Against the backdrop of budget constraints, threats from terrorism, organised

More information

National Biometric Security Project

National Biometric Security Project National Biometric Security Project Activity Update: 2003-2005 Biometric Consortium Conference 2005 National Biometric Security Project Mission Assist government and private sector organizations deter

More information

EMERGING TRENDS AROUND AUTHENTICATION

EMERGING TRENDS AROUND AUTHENTICATION EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

Next Generation Identification Rap Back Services

Next Generation Identification Rap Back Services Next Generation Identification Rap Back Services Presented by: Jimmy Mills Management and Program Analyst Rap Back Services Team Theresa Yarboro Management and Program Analyst Rap Back Services Team 1

More information

NATIONAL INFORMATION SHARING STRATEGY

NATIONAL INFORMATION SHARING STRATEGY The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides

More information

Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650

Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 Actions to Improve Chemical Facility Safety and Security A Shared Commitment Report of the Federal Working Group on Executive Order 13650 President Obama issued Executive Order (EO) 13650 - Improving Chemical

More information

Domestic Nuclear Detection Office (DNDO) DNDO Overview

Domestic Nuclear Detection Office (DNDO) DNDO Overview Domestic Nuclear Detection Office (DNDO) DNDO Overview Summer 2008 Outline DNDO Mission, Objectives and Organization Defining the radiological and nuclear threat Multi-layered approach to security Global

More information

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP) To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the

More information

State of the Satellite Industry Report June 2013

State of the Satellite Industry Report June 2013 State of the Satellite Industry Report June 2013 Sponsored by the Prepared by 1 1 1 0 1 0 0 0 1 0 1 0 0 1 1 0 1 0 1 0 0 1 1 0 The Satellite Industry Association: 18 Years as the Voice of the U.S. Satellite

More information

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis)

Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis) Call for Interest for the INTERPOL Digital Crime Centre 2 nd round (area of advanced technology required for the Malware/BotNet analysis) (CFI-12-IGCI-02) Background INTERPOL recognizes that police worldwide

More information

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

Kansas City s Metropolitan Emergency Information System (MEIS)

Kansas City s Metropolitan Emergency Information System (MEIS) Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)

More information

FBI Criminal History Record Certification Program

FBI Criminal History Record Certification Program FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section

More information

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA) Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

Intelligence-Led Policing. Executive Summary

Intelligence-Led Policing. Executive Summary Intelligence-Led Policing Executive Summary Five Trends to Help You See Ahead & Create Safer Communities Chicago debuted the first police call boxes in 1877, allowing citizens and police to report threats

More information

Biometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange. LTC Eric Pavlick PM, Biometric Enabling Capabilities

Biometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange. LTC Eric Pavlick PM, Biometric Enabling Capabilities Biometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange LTC Eric Pavlick PM, Biometric Enabling Capabilities 30 JULY 2013 BEC Inc 1 Agenda Program Overview LTC Eric Pavlick, Product

More information

National Strategy for CBRNE Standards

National Strategy for CBRNE Standards National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September

More information

National Response Plan & Nuclear/Radiological Incident Annex. OSC Readiness Training November 17, 2004

National Response Plan & Nuclear/Radiological Incident Annex. OSC Readiness Training November 17, 2004 National Response Plan & Nuclear/Radiological Incident Annex OSC Readiness Training November 17, 2004 National Response Plan! DHS will be the overall Federal coordinating agency for Incidents of National

More information

Global Wildlife Cybercrime Action Plan1

Global Wildlife Cybercrime Action Plan1 Global Wildlife Cybercrime Action Plan1 A Call to Action for the London Conference on Illegal Wildlife Trade October 11-12, 2018 1 Wildlife cybercrime in this context refers to cyber-enabled wildlife trafficking.

More information

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying What you need to know to become a Certified EDUCATOR in Florida General Certification Requirements for Individuals Applying for Initial Certification Beginning July 1, 2002 Bureau of Educator Certification

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

Massive Scalability With InterSystems IRIS Data Platform

Massive Scalability With InterSystems IRIS Data Platform Massive Scalability With InterSystems IRIS Data Platform Introduction Faced with the enormous and ever-growing amounts of data being generated in the world today, software architects need to pay special

More information

Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation

Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation Extremely-Large-Scale Biometric Authentication System - Its Practical Implementation SU Leiming, SAKAMOTO Shizuo Abstract The Indian Unique ID (UID) is an extremely-large-scale system that attempts to

More information

Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited

More information

G7 Bar Associations and Councils

G7 Bar Associations and Councils COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat

More information

ESSA Q INTEGRITY REPORT

ESSA Q INTEGRITY REPORT ESSA Q3 2017 INTEGRITY REPORT EDITORIAL ESSA held its first major event on sports betting and integrity at Lords Cricket ground in mid-october. It was fitting that the event took place at the home of cricket,

More information

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS Okechukwu Emmanuel Ibe INTRODUCTION The Intelligence and Security Committee (ISC) is a Unit in the Office of the Chairperson of the

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT.

SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT. SEPTEMBER 24-25, 2017 Lucknow, India SPONSORSHIP KIT SPONSORSHIP KIT www.hackersday.org ABOUT NISS National Information Security (NISS) is an initiative of National Information Security Council which is

More information

Introduction to the National Response Plan and National Incident Management System

Introduction to the National Response Plan and National Incident Management System Introduction to the National Response Plan and National Incident Management System This presentation will cover: Homeland Security Presidential Directive (HSPD)-5 National Incident Management System (NIMS)

More information

Supplemental Programmatic Environmental Assessment (SPEA) for the Proposed

Supplemental Programmatic Environmental Assessment (SPEA) for the Proposed This document is scheduled to be published in the Federal Register on 12/15/2016 and available online at https://federalregister.gov/d/2016-30187, and on FDsys.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY

More information

Requirements for Forensic Photography & Imaging Certification (08/2017)

Requirements for Forensic Photography & Imaging Certification (08/2017) Requirements for Forensic Photography & Imaging Certification (08/2017) A. General Requirements 1. An applicant for certification must possess a high ethical and professional standing. 2. All applicants

More information

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA

NIGERIA SECURITY AND CIVIL DEFENCE CORPS INSTITUTE OF SECURITY OF NIGERIA NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN COLLABORATION WITH THE INSTITUTE OF SECURITY OF NIGERIA 2015/2016 ADMISSION INTO MANDATORY BASIC PROFESSIONAL CERTIFICATE COURSES FOR PRIVATE AND PUBLIC SECURITY

More information

FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies

FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies FIDO AND PAYMENTS AUTHENTICATION Philip Andreae Vice President Oberthur Technologies The Problem The Solution The Alliance Updates Data Breaches 781 data breaches in 2015 170 million records in 2015 (up

More information

Mobile Fingerprint Authentication Solution

Mobile Fingerprint Authentication Solution Mobile Fingerprint Authentication Solution 1 BioSign 2.0 I WHY BioSign 2.0? WORLD S FASTEST SPEED WORLD S MOST ACCURATE ALGORITHM ROBUST PERFORMANCE OVER TIME FLEXIBILITY IN DESIGN 50ms* authentication

More information

Texas Commission on Fire Protection

Texas Commission on Fire Protection 2017 Texas Commission on Fire Protection OVERVIEW, REVENUE, DATA MANAGEMENT PROJECT, PERFORMANCE MEASURES Page 1 of 9 Overview The Commission on Fire Protection is charged with developing and enforcing

More information

Good Technology State of BYOD Report

Good Technology State of BYOD Report Good Technology State of BYOD Report New data finds Finance and Healthcare industries dominate BYOD picture and that users are willing to pay device and service plan costs if they can use their own devices

More information

Annual Report for the Utility Savings Initiative

Annual Report for the Utility Savings Initiative Report to the North Carolina General Assembly Annual Report for the Utility Savings Initiative July 1, 2016 June 30, 2017 NORTH CAROLINA DEPARTMENT OF ENVIRONMENTAL QUALITY http://portal.ncdenr.org Page

More information

F-1 OPTIONAL PRACTICAL TRAINING STEM EXTENSION

F-1 OPTIONAL PRACTICAL TRAINING STEM EXTENSION Global Education Office (GEO) 2120 Mesa Vista Hall MSC06 3850 1 University of New Mexico Albuquerque, NM 87131-1056 Phone (505) 277-4032 Fax (505) 277-1867 Email geo@unm.edu Web: www.geo.unm.edu/ F-1 OPTIONAL

More information

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING In 2014, West Midlands Police (WMP) committed to a striking transformation programme that would help the force meet current and future policing

More information

NSI. Suspicious Activity Reporting Line Officer Training

NSI. Suspicious Activity Reporting Line Officer Training Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding

More information

Program Approval Form

Program Approval Form For approval of new programs and deletions or X Program Approval Form modifications to an existing program. Action Requested: Type (Check one): Create New (SCHEV approval required except for minors) B.A.

More information

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program

M.S. IN INFORMATION ASSURANCE MAJOR: CYBERSECURITY. Graduate Program Detroit Mercy s Master of Science in Information Assurance with a major in Cybersecurity is a multi-disciplinary 30-credit-hour graduate degree. It is designed to produce a comprehensively knowledgeable

More information

PROFILE: ACCESS DATA

PROFILE: ACCESS DATA COMPANY PROFILE PROFILE: ACCESS DATA MARCH 2011 AccessData Group provides digital investigations and litigation support software and services for corporations, law firms, law enforcement, government agencies

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS

THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at telecommunication organizations transform to business-focused service

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

COMPUTER HACKING Forensic Investigator

COMPUTER HACKING Forensic Investigator COMPUTER HACKING Forensic Investigator H.H. Sheik Sultan Tower (0) Floor Corniche Street Abu Dhabi U.A.E www.ictd.ae ictd@ictd.ae Course Introduction: CHFIv8 presents a detailed methodological approach

More information

Microsoft Certified Trainer

Microsoft Certified Trainer Microsoft Certified Trainer Enrollment and Renewal Guide Updated November 2018 Microsoft Certified Trainers (MCTs) are the premier technical and instructional experts in Microsoft technologies. Join this

More information

Homeland Security and Geographic Information Systems

Homeland Security and Geographic Information Systems Page 1 of 5 Homeland Security and Geographic Information Systems How GIS and mapping technology can save lives and protect property in post-september 11th America Introduction Timely, accurate information,

More information

Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1

Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Connecticut Department of Department of Administrative Services and the Broadband Technology Opportunity Program (BTOP) 8/20/2012 1 Presentation Overview What is BTOP? Making BTOP work for our state What

More information

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland

More information

Advances in Stand-off Biometrics

Advances in Stand-off Biometrics Advances in Stand-off Biometrics Behnam (Ben) Bavarian, President and CEO AFIS and Biometrics Consulting Inc. 2011 AFIS and Biometrics Consulting Inc. The developments in this presentation is supported

More information

The Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment

The Joint Live Virtual Constructive Data Translator Framework Interoperability for a Seamless Joint Training Environment Framework Interoperability for a Seamless Joint Training Environment Warren Bizub Technical Division Chief US Joint Forces Command Joint Warfighting Center warren.bizub@jfcom.mil Derek Bryan Experimentation

More information

Biometric Standards for DoD Operational Requirements

Biometric Standards for DoD Operational Requirements Biometric Standards for DoD Operational Requirements Mr. Benji Hutchinson James.Hutchinson@hqda.army.mil Biometrics Task Force 28 Feb 2008 1 Overview Rationale for Biometric Standards in DoD BTF Biometric

More information

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT) ASEAN REGIONAL FORUM INTER-SESSIONAL SUPPORT GROUP MEETING ON CONFIDENCE BUILDING MEASURES (ISG on CBMs) Beijing, 20-22 November 2003 THE SOUTHEAST ASIA REGIONAL CENTRE FOR COUNTER-TERRORISM (SEARCCT)

More information

NASS Remote Notarization Task Force

NASS Remote Notarization Task Force NASS Remote Notarization Task Force Knowledge-Based Verification David Temoshok Applied Cybersecurity IT Laboratory National Institute of Standards and Technology (NIST) 2/23/2017 1 Today s Discussion

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

A quick guide to getting the most from your Idox Information Service membership

A quick guide to getting the most from your Idox Information Service membership A quick guide to getting the most from your Idox Information Service membership The Idox Information Service The Idox Information Service is the most complete and accessible source of public sector knowledge

More information