The National Biometrics Challenge 2011 Update

Similar documents
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

COUNTERING IMPROVISED EXPLOSIVE DEVICES

National Strategy for CBRNE Standards

I I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:

Biometric Standards for DoD Operational Requirements

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

National Science and Technology Council. Interagency Working Group on Digital Data

National Policy and Guiding Principles

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign

UNCLASSIFIED / FOUO UNCLASSIFIED / FOUO

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

National Counterterrorism Center

Biometric Center of Excellence (BCOE)

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Domestic Nuclear Detection Office (DNDO) DNDO Overview

Department of Homeland Security Updates

The US National Near-Earth Object Preparedness Strategy and Action Plan

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration

2016 Global Identity Summit Pre-Conference Paper. Fingerprints

Mobile ID, the Size Compromise

Shaping of Public Environmental Policy: User Community Impact. Samuel P. Williamson Federal Coordinator for Meteorology

Department of Homeland Security

Section One of the Order: The Cybersecurity of Federal Networks.

The NIST Cybersecurity Framework

National Science and Technology Council Committee on Science Subcommittee on Forensic Science. Initial Overview Briefing

White Paper. View cyber and mission-critical data in one dashboard

The U.S. National Spatial Data Infrastructure

Supplemental Programmatic Environmental Assessment (SPEA) for the Proposed

NATIONAL INFORMATION SHARING STRATEGY

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

National Strategy for Trusted Identities in Cyberspace

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

G7 Bar Associations and Councils

Karyn Higa-Smith, Research Program Manager

IAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2

From Hyogo to Sendai. Anoja Seneviratne Disaster Management Centre

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

NGI and Rap Back Focus Group Briefing

ACCI Recommendations on Long Term Cyberinfrastructure Issues: Building Future Development

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Building an Assurance Foundation for 21 st Century Information Systems and Networks

The National Network of Fusion Center: Where We Have Been and Where We are Going

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release September 23, 2014 EXECUTIVE ORDER

Federal Bureau of Investigation CJIS Division Next Generation Identification

CONCLUSIONS AND RECOMMENDATIONS

General Framework for Secure IoT Systems

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE

STRATEGIC PLAN. USF Emergency Management

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Preparatory process of the second High-level United Nations Conference on South-South Cooperation

Media Kit. California Cybersecurity Institute

Regional Resilience: Prerequisite for Defense Industry Base Resilience

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Legal and Regulatory Developments for Privacy and Security

March 21, 2016 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES. Building National Capabilities for Long-Term Drought Resilience

NCSF Foundation Certification

Organization of Scientific Area Committees for Forensic Science (OSAC)

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

The UNISDR Private Sector Alliance for Disaster Resilient Societies

ISAO SO Product Outline

Legal, Ethical, and Professional Issues in Information Security

ISSUE BRIEF SC DMV ELECTRONIC TICKET TRANSMISSION MANDATE (November, 2017)

NIST Tests Supporting Biometric Identification Applications

EXPERT GROUP MEETING ON CYBERCRIME

Caribbean Private Sector Network meeting 24 August 2017, Ministry of Trade, Port-of-Spain, Trinidad and Tobago

Implementing Executive Order and Presidential Policy Directive 21

The U.S. Manufacturing Extension Partnership - MEP

Big Data Value cppp Big Data Value Association Big Data Value ecosystem

Moving Data through Early Planning into Design and Operations

Smart Policing and Technology Applications

TERMS OF REFERENCE. Scaling-up Renewable Energy Program (SREP) Joint Mission. Lesotho

DHS Cybersecurity: Services for State and Local Officials. February 2017

Statement for the Record

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017

United States Government Cloud Standards Perspectives

mhealth: a Global Perspective OECD Expert Consultation on Mobile Technology-Based Services for Global Health & Wellness

Risk-based security in practice Turning information into smart screening. October 2014

The President s Spectrum Policy Initiative

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

Mapping to the National Broadband Plan

Transcription:

The National Biometrics Challenge 2011 Update James Loudermilk Federal Bureau of Investigation Larry Hornak National Science Foundation Update Co-Chairs

About the National Science and Technology Council

The National Science and Technology Council (NSTC) was established by Executive Order on Nov. 23, 1993. This Cabinet-level Council is the principal means by which the executive branch coordinates science and technology policy across the diverse entities that make up the Federal research and development enterprise. Chaired by the President, the Vice President, the Director of the Office of Science and Technology Policy, Cabinet Secretaries, Agency heads with significant science and technology responsibilities, and other White House officials One of NSTC s primary objectives is to establish clear national goals for Federal science and technology investments in a broad array of areas spanning virtually all the mission areas of the executive branch. NSTC prepares research and development strategies that are coordinated across Federal agencies to form investment packages aimed at accomplishing multiple national goals.

The NSTC Subcommittee on Biometrics prepared and published the original National Biometrics Challenge in August 2006. That report identified key challenges in advancing biometrics development. It The National Biometrics Challenge The National Science and Technology Council Subcommittee on Biometrics August 2006 was based upon analysis of the unique attributes of biometrics, the market forces and societal issues driving implementation of biometrics and the advances required for next-generation capabilities. A further prioritization was done within the Subcommittee, and the top third of priorities received about 83 percent of federal funding.

The National Biometrics Challenge, August 2006, identified four driving forces: National Security Homeland Security and Law Enforcement Enterprise and e-government services Personal information and business transactions

Four preeminent challenges were identified in the 2006 document: Improve collection devices Develop more efficient & effective capabilities Establish standards Enable informed debate on how and when biometrics are used

The 2006 document also laid out challenges and several research focus areas: Biometrics Sensors Biometrics Systems Biometrics Systems Interoperability Communications and Privacy

During the last five years, evolving mission needs, coupled with advances in technology, have necessitated a new look at research, development, test and evaluation (RDT&E) priorities. This 2011 update to the Challenge examines the many advances made as government, academia and the private sector responded to the challenge issued in 2006. It further delineates some of the complex issues that, five years later, have yet to be fully addressed. It acknowledges that the understanding of requirements has increased with experience while the advance of technology raises capabilities and expectations.

The 2011 Challenge Document Update looks 5-10 years out and focuses on: Successes since the 2006 Document Operational needs for biometrics, largely in a systems context Expanded scope, addressing the broad needs of citizens, commerce, and government. The fundamental discovery and innovation necessary to support these needs Cross cutting needs and challenges in science, technology, standards, policy and privacy

The challenge document update Considers the current state of the art Focuses on a fresh review of current requirements Identifies challenges to be met to address gaps Update informed in part by The needs of the BIdM Subcommittee Organizations Recent Reports & Workshops (e.g. NAS, NSTIC, NSF) Targeted Meetings and Workshops

Targeted Meetings &Workshops January 2011 Agency Meeting BIdM Subcommittee February 2011 Industry Workshop Hosted by IBIA May 2011 Workshop Invited government, industry and academic participants

The 2011 National Biometrics Challenge reflects the objectives and priorities of the federal government Departments and their Components comprising the Biometrics and Identity Management Subcommittee. These are the federal agencies that operate the major national identification systems and direct the majority of federal RDT&E funding for Biometrics and Identity Management systems. The Subcommittee expects that the majority of federal funding over the next five years will address the priorities expressed in the Challenge.

Advances since 2006 in Response to The National Biometrics Challenge

Interoperability FBI IAFIS/NGI US VISIT - IDENT Interim Data Sharing September 2006 Shared Services October 2008 Visa Applicant Tenprint Checks (via IDENT) 1/2008 Full Interoperability December 2005 Two Finger Matching 2004 Shared Services Checks (via IAFIS) 1/2012 DOD - ABIS DOS - CCD

Technology Basic and Applied Research: Biometric modality performance and robustness; New modalities; Multimodal and large-scale fusion; Quality assessments, enhancing quality; Tools, statistical methods and modeling frameworks; Study of socio-legal and business cases; Assessing vulnerabilities in biometric devices and systems; Fusion with results from related fields. Education: Biometrics short courses on campus, on site, web based; IEEE Certified Biometrics Professional program; University Associate and Bachelor level course offerings; An engineering based Biometrics B.S. program; Doctoral and Master of Science training in Biometrics. Fingerprint and Palmprint: Dramatic algorithm improvements to TMR 99% at FMR 10-3 ; Mobile capture devices for point-of-encounter identification; Latent background noise removal algorithm; low-quality ridge recognition algorithm; Open Source NFIQ 2.0 publication; FBI Appendix F extension to 1,000 PPI; Personal Identity Verification program and PIV-071006 specification.

Technology (continued) Face: Measured error rate dropping by half every two years; Faces in a crowd recognition; 3D face recognition; Video-to-video matching; Still-face-to-video matching; Proof-of-concept 100m face recognition with up to 10m/s motion; ANSI/NIST-ITL 1-2000 updated and replaced by ANSI/NIST-ITL 1-2011 Iris: Numerous algorithm providers, and algorithm advances, since circa 2005 patent expirations; Increased camera availability, lower failure to capture rates, faster capture time, lower cost; ANSI/NIST-ITL 1-2011 standardization Voice: Advanced algorithms address cross-channel effects and speaker variants; Fast query and weighting algorithms that enable fusion; Devices specialized for clear capture while cancelling ambient background noise; Type 11 ANSI/NIST-ITL record DNA Accepted as a Biometric Mobile Multimodal Biometrics

Notable Successes Secure Communities: ICE biometric information sharing with FBI, State and Local Law Enforcement; More than 150,000 previously convicted criminal aliens identified; More than 77,000 criminal aliens removed from the United States. DOD Battlefield Biometrics: Thousands of handheld multimodal biometrics devices deployed to Iraq and Afghanistan; More than 150,000 non-us persons with suspicious records identified; More than 160,000 latent fingerprints of interest collected. US Coast Guard Mona Pass Biometrics: Since 11/2006 2,828 migrants biometrics collected, 711 IDENT matches, 362 prosecutions; Mona Pass migrant interdictions down 93%. FBI Next Generation Identification: Initial operating capability February 25, 2011; Search reliability 99% against 100 million person repository with 0.00106 FMR. FBI Face Mask : Pilot program with North Carolina DMV; More than 700 investigative leads; Federal and State fugitive apprehensions; Missing person resolution; Identification, arrest, and conviction of fugitive wanted for murder.

2011 Biometric Environment Primary Biometrics Uses Remain Law Enforcement, Border Control, and National Security: Increased workload, accuracy, repository sizes with faster response times; Commodity hardware and SOA allowed more flexible architecture & new capabilities; Investment, policy changes and standardization produced greater interoperability; Handheld, lower cost, capture devices permit point of interaction identification; Impact of sample quality upon performance now widely understood and taken into account; Very effective interagency coordination and partnering in place. Need comprehensive architecture, standards, testing frameworks to exploit technology; Potential of iris not fully realized pending CONOPS and methods for forensic analysis; Potential of face recognition not fully realized pending PIE and aging algorithm advances; Need better tools for non-ideal, non-cooperative, uncooperative presentation and acquisition; Significant potential increases in volume and repository size may challenge systems.

2011 Biometric Environment Limited Biometrics Adoption by Private Enterprise and for e-government Services: HSPD-12/FIPS 201 resulted in federal identity proofing and biometric credentialing; Other countries, especially Japan and South Korea, widely adopting biometrics commercially; Biometrically enabled Smartphone's are likely breakthrough technology for e- commerce; UIDAI holds out potential to be transformational, driving policy and low cost. Framework for e-commerce identity proofing absent and an adoption barrier; FIPS 201 potential not fully realized at federal level, not realized outside government; Cost effective biometric capture devices at point-of-service absent for e- commerce; Framework for processing credential, authenticating identity, tying to transaction absent; Cost of replacing legacy identification processes, and uncertain cost/benefit a barrier; Issues of privacy and anonymity remain to be addressed.

User-Centric Biometrics Approach Perhaps for the first time in the post-industrial, technology driven, information age, societies are not just reacting to technologies but shaping them on a global level. Personalized mobile information appliances Global Cloud Wearable and Biomimetic Systems Customer Convenience and Value Global Social Networks Individual, Societal Behavior Mobile apps requiring multifactor authentication are expected to become commonplace

User-Centric Biometrics Approach This commercial technological wave is expected to drive development and acceptance of biometric systems in commercial sector over the next 10 years Rapidly increasing wireless connectivity and bandwidth coupled with cloud computing paradigms will render mobile devices as the preferred means to access services and interact with private and government entities.... this technological wave will inexorably raise civil and military users expectations of government-sector biometric systems...

Research Agenda 2012-2021 Fundamental Underpinnings: The fundamental understanding of biometrics must be solidified to obtain biometric measures on a more scientific basis, address various operational and environmental conditions, and model and scale human-machine systems with predictable performance. Biometric Capture: The ability to capture biometric data quickly and accurately must continue to improve across a range of challenging environments, from unhabituated users in a commercial application to noncooperative and uncooperative users in the battlefield environment. Extraction and Representation: Extract and represent biometric data to maintain individuality and efficiently achieve automated retrieval, recognition and interoperability across devices and systems. Trusted Systems: Design for acceptance through understanding the socio-technical basis of user expectations, securing data and systems effectively against vulnerabilities, establishing a chain of trust for biometric data and enabling its revocation when necessary. Privacy: Advance technology and policy to enable robust and sustainable solutions that empower organizations and individuals to benefit from the unique advantages biometrics offer while limiting the associated risks to privacy and civil liberties. Standards and Testing: Address challenges in order to provide the proper focus to continue the advances made during the previous challenge period. Research focus areas were identified based upon two National Research Council (NRC) reports: Biometric Recognition Challenges and Opportunities, 2010 Strengthening Forensic Science in the United States, 2009 The National Science Foundation (NSF) Workshop on Fundamental Research Challenges for Trustworthy Biometrics, NOV 2010; and two workshops conducted specifically to support the Challenge update.

Building Sustainable Academic Ecosystems for Biometrics Whether at the scale of a single faculty lab or a multi-university center, sustained funding for strong research partnerships between academia, industry and government holds faculty interest, enables university investment, and creates sustained outcomes. Outcomes Inputs After The Engineering Research Center (ERC) System, ERC Program, EEC Division, NSF.

Conclusion The 2006 Challenge outlined the RDT&E priorities needed to meet the Nation s most pressing national security and public safety challenges. Federal agencies, partnering with private industry and academia, followed the RDT&E path laid out in the Challenge, which enabled significant advances in operational capabilities. There are still capability gaps that must be addressed. The research needs identified here are the priorities for the next several years. Agency attention and funding are going to focus on these priorities. The next few years will see reductions in agency budgets in many areas. Recognizing this budgetary reality, Federal agencies with major biometric activities are coordinating their efforts and are often including partner agencies in making acquisition decisions, and they will make every effort to prevent duplication of effort. As before, partnership between the U.S. government, the private sector and academia is absolutely necessary for the challenges to be met.