-
BiometricsDHS awards $58.9 million biometric support contract to Ideal Innovations, Inc.
Arlington, Virginia-based Ideal Innovations, Inc. (I3) has been awarded a contract by the Department of Homeland Security (DHS)’s Office of Biometric Identity Management (OBIM) to provide specialized fingerprint analysis in support of OBIM’s Biometric Support Center (BSC). The BSC provides fingerprint identification services when the automated matching capabilities of DHS’s central repository cannot determine whether two sets of fingerprints match.
-
-
BiomtericsBiometric technologies have failed to guarantee integrity of elections in Africa
As Nigerians voted this past weekend in the 2015 presidential elections, there were many reports of technical problems with electronic fingerprint readers, intended to verify voters’ identities before they cast their ballots.At least twenty-five African countrieshave held elections with voters using some sort of electronic voting system. Many of these efforts have failed. Experts say that African governments should not divert public funds to expensive electronic voting systems, and use these funds instead on ways to eliminate voter intimidation, post-election violence, and ballot fraud — all of which are attributes of current election periods regardless of how votes are submitted.
-
-
CybersecurityBiometric security could do away with passwords
With hackers and cyber thieves running rampant online, efforts to create stronger online identity protection are leading major tech firms to invest in biometric security methods. Analysts predict that 15 percent of mobile devices will be accessed with biometrics in 2015, and the number will grow to 50 percent by 2020.
-
-
Real IDIllinois scrambles to meet Real ID deadline
State officials in Illinois are working to make driver’s licenses and identification cards comply with the Real ID Act of 2005before commercial air travel restrictions are implemented in 2016. Illinois identification cards do not meet minimum standards mandated by Congress in 2005. The Real ID Act requires states to verify personal information of applicants including birth certificates. The information is then electronically scanned and stored in a federal database, and data can be shared among states and the federal government.
-
-
BiometricsFBI’s biometric data center key to identifying Jihadi John
The FBI is unlikely to release details of how, working with allies in the United Kingdom, it managed to accomplish the task of identifying “Jihadi John” with only video footage of the suspect’s hidden face and a voice with a British accent. Identifying Mohammed Emwazi, a Kuwaiti-born, British-educated man in his mid-20s, was likely done at the FBI’s Criminal Justice Information Services Division(CJIS), which houses the bureau’s Biometric Center of Excellence(BCE). At BCE, the FBI uses the $1.2 billion dollar Next Generation Identification(NGI) software to scan photos, aliases, physical traits, fingerprints, and voiceprints. The software is interoperable with the Pentagon’s Automated Biometric Identification System(ABIS) and DHS’s Automated Biometric Identification System(IDENT).
-
-
CrimeHair dye “CSI” could help police solve crimes
Criminals with a penchant for dyeing their hair could soon pay for their vanity, as scientists have found a way to analyze hair samples at crime scenes to rapidly determine whether it was colored and what brand of dye was used. Researchers showed that surface-enhanced Raman spectroscopy (SERS) could be used rapidly to confirm whether hair samples, even microscopic ones, were dyed and what brand of colorant was used.
-
-
CybersecurityGrants competition to improve security, privacy of online identity verification systems
The National Institute of Standards and Technology (NIST) is launching a competition for a fourth round of grants to pilot online identity verification systems that help improve the privacy, security, and convenience of online transactions. The pilot grants support the National Strategy for Trusted Identities in Cyberspace (NSTIC), a White House initiative launched in 2011. NSTIC’s goal is to improve trust online through the creation of a vibrant “Identity Ecosystem,” in which individuals and organizations are able to better trust one another because they follow agreed-upon standards and processes for secure, privacy-enhancing and interoperable identity solutions online.
-
-
ForensicsA crime-fighting “magic” marker pen picks up hidden fingerprints
A crime-fighting “magic” marker pen that can identify the hidden properties of receipts containing fingerprint deposits within a matter of seconds will be demonstrated at the Knowledge Transfer Network’s (KTN) Applications of Forensic Science Research and Development Technology Showcase 2014 event today (8 October) in London.
-
-
CrimeExperts urge caution in relying upon eyewitness identifications in criminal cases
A new report from the National Research Council recommends best practices that law enforcement agencies and courts should follow to improve the likelihood that eyewitness identifications used in criminal cases will be accurate. Science has provided an increasingly clear picture of the inherent limits in human visual perception and memory that can lead to errors, as well as the ways unintentional cues during law enforcement processes can compromise eyewitness identifications, the report says.
-
-
CybersecurityIs Facelock the password alternative we’ve been waiting for?
One of the problems with using passwords to prove identity is that passwords that are easy to remember are also easy for an attacker to guess, and vice versa. Nevertheless, passwords are cheap to implement and well understood, so despite the mounting evidence that they are often not very secure, until something better comes along they are likely to remain the main mechanism for proving identity. But maybe something better has come along. Researchers propose a new system based on the psychology of face recognition called Facelock. But how does it stack up against existing authentication systems? The idea certainly sounds interesting and the technical challenges in implementing such a system do not seem great. But there are difficult questions regarding cost, selection and security of images that need to be answered before it becomes a practical alternative to passwords.
-
-
AviationTSA expands PreCheck screening program to international airlines
The TSA is expanding its PreCheckscreening program to passengers on international airlines. Air Canada is the first international carrier to join the list of PreCheck carriers, which already includes several U.S. airlines.Some international airlines are reluctant to join the PreCheck carrier list because it entails upgrading their computer systems to print a PreCheck logo and embed PreCheck data in their boarding pass barcodes. With Air Canada joining the list, the TSA believes other foreign carriers with a large U.S. passenger base would benefit if they offered PreCheck status to their customers.
-
-
BiometricsForensic DNA technology could help identify abducted Nigerian girls
Forensic DNA technology developed in the aftermath of the 9/11 attacks could be used to identify and reunite more than 200 Nigerian girls who were kidnapped by Islamist militants, scientists said. The software, Mass Fatality Identification System (M-FISys), has been used worldwide — in Mexico, Guatemala, El Salvador, Honduras, Perú, Sri Lanka, the Philippines, Thailand, Malaysia, among several other countries — to identify and return more than 700 children who were abducted by criminals for child trafficking.
-
-
BiometricsUsing biometrics to protect India’s one billion people raises security, privacy concerns
The cutting edge of biometric identification — using fingerprints or eye scans to confirm a person’s identity – is not at the FBI or the Department of Homeland Security. It is in India. India’s Aadhaar program, operated by the Unique Identification Authority of India (UIDAI) and created to confirm the identities of citizens who collect government benefits, has amassed fingerprint and iris data on 500 million people. It is the biggest biometric database in the world, twice as big as that of the FBI. It can verify one million identities per hour, each one taking about thirty seconds. The program unnerves some privacy advocates with its Orwellian overtones.
-
-
Fake passportsThe global passport security loophole: how serious is it?
More than one billion people are estimated to have travelled internationally in 2013, according to the UN’s World Tourism Organization. The International Civil Aviation Organization (ICAO), a United Nations body that regulates air transport worldwide, reported that around 3.1 billion people travelled by airplane in 2013. The numbers are immense. As a result, so too are the security challenges for airlines, immigration, and airport security agencies. The ICAO expects all of its 192 member countries to introduce machine-readable passports by 2015, but there is still no international deadline for the introduction of biometric passports. This means some people could be using old-fashioned passports until 2025. Even then, there is no absolute guarantee biometric passports are any more tamper-proof than a host of other computer-based security measures which apply to credit cards and customer databases.
-
-
Border securityPassports of millions of travelers to U.K. not thoroughly checked
The use of false passports by two passengers on Malaysia Airlines flight MH370 which disappeared a couple of days ago have highlighted the fact that in the United Kingdom, the passport details of more than twenty million people entering and leaving the United Kingdom every year are not being properly checked. The Home Office’s most recent figures show that data is still not being collected and examined for about 10 percent of the 200 million people flying in and out of the United Kingdom every year.
-