Biometric Offender Movement

Similar documents
Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.

FBI Next Generation Identification (NGI)

Advanced Biometric Access Control Training Course # :

Mobile ID, the Size Compromise

FSN-PalmSecureID-for ATM Machines

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

Access Control Biometrics User Guide

NASCIO Recognition Award Nomination. Title: Central Issuance of State Drivers Licenses. Category: Digital Government Government to Citizen

Biometric Security Roles & Resources

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Cornerstone Access Control

1TouchXL & 1TouchXLS

INTUS 1600PS Palm Vein Authentication

Role of Biometrics in Cybersecurity. Sam Youness

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

Managing user access through NAC

Biometric Technology

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

International Journal of Emerging Technology & Research

A quick guide to iris recognition. Click on blue squares to navigate

Reliability Standard Audit Worksheet 1

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 4/15/18

InterCall Virtual Environments and Webcasting

M07/3/ITGSX/SP2/ENG/TZ0/XX. Information technology in a global society Standard level. Thursday 17 May 2007 (morning) 2 hours

SO OS Secure Online Voting System

COSEC Visitor Management. Right People in Right Place at Right Time

UltraMatch. Standalone Iris Recognition System

CIP Compliance Workshop Boise, ID March 29, 2018

Biometric Center of Excellence (BCOE)

T h e re is an upgrade route to larger configurations. O v e rv i e w

Fujitsu World Tour 2016

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Hassle-free banking in the DIGITAL AGE through NEXT-GEN. Technologies W H I T E PA P E R

IDENTIFICATION THINK EXCELLENCE, CHOOSE MULTIMODALITY

Hans Joachim Jelena Mirkovic Ivica Milanovic Øyvind Bakkeli

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

Data Centre Security. Presented by: M. Javed Wadood Managing Director (MEA)

Voice, Face and Behavioural Biometrics

Identification or Verification? Advanced Identification Technology

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

PassagePoint. PassagePoint. User Manual. Version 4.5

NERC Staff Organization Chart Budget 2018

81 -key The Power of a Touch. ID DIRECTOR for Windows. Microsoft Partner. Adress 3349 Highway 138 BLDG A STE E Wall, NJ 07719

DigitalPersona for Healthcare Organizations

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP

Using the Prototype TWIC for Access A System Integrator Perspective

DHS Cloud Strategy and Trade Nexus. May 2011

Table of Contents CHILD CHECK IN OVERVIEW Check In / Out Process...3 Check In Methods...3 Name Tags and Security Tags...5 Check Out...

Fingerprint Door Lock OPERATOR S MANUAL

Fingerprint Door Lock User MANUAL

Biometrics problem or solution?

Biometric Fingerprint Reader Unit OZD-ABC-OA99 Technical Specification Data Sheet

Biometric Data Acquisition using MATLAB GUIs

Multimodal Simultaneous Biometric Authentication + Random Challenge Response = for secure mobile payment

Keystroke Dynamics: Low Impact Biometric Verification

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

Identity and Access Management. Michael Sheketoff Senior Solutions Architect, Unisys Corp.

Information Security Identification and authentication. Advanced User Authentication II

Start Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE

Biometric identity verification for large-scale high-security apps. Face Verification SDK

Palm Vein Technology

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

Challenges in Aadhaar Implementation : Opportunities for products and innovations Proposal Presentation

The European Union approach to Biometrics

Solution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator

6 facts about GenKey s ABIS

User Authentication and Human Factors

Identity Proofing Standards and Beyond

The epassport: What s Next?

Biometric Enabling Capabilities Increment 1 (BEC Inc 1) Information Exchange. LTC Eric Pavlick PM, Biometric Enabling Capabilities

Smart Card and Biometrics Used for Secured Personal Identification System Development

VizVox: Securing the future of video visitation

A UK perspective: The use of modern technology. Simon Peachey

Duo End User Education Templates

Proposal On Visitor Management System For Client

Proposition to participate in the International non-for-profit Industry Association: Energy Efficient Buildings

EMBEDDED MAJOR PROJECTS LIST

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

IP Video For Law Enforcement

Command Center Access Control Software

Verwelkoming. 20 September Fort Lent

NERC Staff Organization Chart Budget 2019

Biometrics Our Past, Present, and Future Identity

Put Identity at the Heart of Security

NGI and Rap Back Focus Group Briefing

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Joney Technology Co., Ltd

This qualification has been reviewed. The last date to meet the requirements is 31 December 2017.

Airport Security & Safety Thales, Your Trusted Hub Partner

Leveraging Smartphone Technology for Offender Monitoring. Technology in Corrections: Challenges for the Future, Prague 2017

EXHIBIT A. - HIPAA Security Assessment Template -

L-1 Fingerprint Reader Solutions. V-Station 4G

NERC Staff Organization Chart Budget 2019

Inmate Population Forecast and Analysis Update for Minnehaha County South Dakota. Bill Garnos

SW6000-CAA. Conference Admin Application. SW6000 Conference Management Software, Version 6.4.1

Transcription:

Biometric Offender Movement Case Study Northern Ireland Prison Service CTA 2011 Patricia O Hagan, CEO Edward Hanna, Technical Director

Agenda Background Northern Ireland Prison Service (NIPS) biometric history Context Project aims / drivers Technical project description Conclusions

Hand Geometry Access Control Introduced 1998 for staff, contractors, official visitors From stand alone to network Integration into security management system

Fingerprint Logon Secure Image Processing System 1999 Staff fingerprint logon Authentication and audit trail

Secure Biometric Logon Introduced 2006 Prisoner records in accommodation areas Authentication linked to network layer

Visitor Management Fingerprint identification of visitors and offenders Check offenders and visitors in and out of visits Check visitors against red list

Context Recently devolved Ministry of Justice April 2010 Increased political scrutiny Bid for resources prisons over health and education Reform of Prison Service Move towards normalization of service Shift in focus from security to rehabilitation 1,800 staff supervise 1600 offenders Staff cuts of 500 Public service budget cuts Save $105 Million over 4 years Annual operating budget $224M Improve efficiency CPP is $152,000 p.a. 2 x UK ($72,000)

Complex Offender Population HMP Maghaberry high security Prison Remand prisoner (pre-sentenced) Sentenced prisoners low, medium and high security Sex offenders Illegal immigrants Separated population (paramilitary / terrorists) Informants (super grasses)

Offender Movements No contact between paramilitaries and general population Lockdown when paramilitaries are moving Effects general population, impacts constructive hours Movements under escort, 1 staff to 3 offenders per movement

Offender Movement Aims Reduce escorted movements and associated staff costs Operate multiple security regimes appropriate to offender security classifications Real time offender location information

Current Visitor Management System Separate system to manage visit booking and workflow Uses biometric finger print identification for offenders and visitors The system is installed on multiple sites

Movements Visitor arrives at reception, Gets enrolled / identified Visits Reception Move to Search Visitor Search Move to Waiting Visitor exits site Visitor Waiting Move to visits room Offender moves to search area Visits Room Offender Housing Block Offender moves back to housing Offender moves to search area Search & Holding Area Offender moves into room

Current Visitor Management System Issues Not multi-site aware Only enrols a single finger No automatic update of offender location Not integrated with the Offender Management System Not designed to be expandable for general offender movement tracking Officer time wasted escorting low risk offenders

Requirements Integration with the Offender Management System Multi-site aware Automatic update of offender location Allow for use of biometrics for other tasks Biometric must be capable of identification

Requirements (contd...) A system capacity for at least 20,000 offenders and 100,000 visitors 1 in 500 error for false accept or false reject Registration process should take less than 3 minutes on 99% of registration transactions The system should be independently penetration tested. Biometric identification should be on average less than 2 seconds The biometric must be suitable for use with children from age 5

Biometric Selection What are Biometrics? Technologies considered Iris recognition Finger vein Facial recognition Fingerprint recognition Hand geometry

Selection Matrix Technology Meets Requirements Ease of Use User Perception User Volume Matching Speed Accuracy Iris M L H H VH $$$ Finger Vein H M L M M $$ Facial Rec. M H M/H M M $$ Finger Print H M H M H $$ Hand Geometry H M M H M $$ Cost

Chosen Technology Fingerprint recognition Reason for choice Familiarity for users Cost Ease of enrolment Accuracy

Fingerprint Device Choice Mixture of sensors 4 finger scanners Speed of capture for all fingers High resolution images 1 finger scanners Cost

Algorithm Choice High volume of templates >1 million Fast matching speed and scalable deployment Should cope with AFIS standards Should have some form of certification Chose MegaMatcher from NeuroTechnology

System Architecture Other Applications Access Control OMS (Visits) BioEngine Kiosks Movement Tracking Client PCs Iris Scanner Hand Geometry Reader 4 Finger Print Reader Single Finger Print Reader Other Biometrics

BioEngine Applications Access Control Login Guard Tour Movement Muster Application Interface Audit trail Alerting Status monitoring Template management Unique Biometric Interface Modules Iris Face Finger Hand Vein

User Enrolment Visitor arrives at reception, Gets enrolled / identified Visits Reception Move to Point A Visitor Search

Movement Station Visitor arrives at reception, Gets enrolled / identified Visits Reception Move to Point A Visitor Search Move to Point B Visitor Waiting

Implementation SITE 1 OM S HQ Backup OMS Backup Master Server Testing System s Local Server Master Server WAN SITE 3 SITE 2 Local Server Local Server 201 1 Testing June Aug Oct Dec 2012 Installation & Go Live For Site 1 & HQ Rollout of Site 2 Rollout of Site 3

Matching performance Maximum expected template database of around 180,000 templates Current installation can match around 300,000 templates per second Matching speed of around 2 seconds for reception area Matching speed of around 0.5 second for movement stations Matching performance can be increased by Adding more resources to servers Adding more servers Sorting templates or changing matching order

Future Options Ability to import/export standard fingerprint images Addition of facial recognition as a primary or secondary identification for children Evaluation of gait recognition for offenders moving between housing areas and visits

Conclusions The strategic biometric architecture developed in this project presents many opportunities to; Improve return on investment Achieve operational cost savings by automating the identification process Improve security through centralized template management Improve data accuracy of offender location information Share the biometric data with other agencies Future proofing - ability to use other biometric technologies and link with other systems

Contact Details We are at Booth # 302 Patricia O Hagan pohagan@tusa-usa.com Edward Hanna ehanna@tusa-usa.com Phone: 707-888-8556 Website: