100 likes | 280 Views
E N D
1. National Defense Industrial AssociationBiometrics Conference Roadmap to Tomorrow23 February 2011 Dr. Thomas Killion
2. Identify the individual, denying anonymity
Enable DoD missions across warfighting, intelligence and business mission areas
Protect friendly forces, essential capabilities and resources by reducing vulnerabilitiesIdentify the individual, denying anonymity
Enable DoD missions across warfighting, intelligence and business mission areas
Protect friendly forces, essential capabilities and resources by reducing vulnerabilities
5. BIMA works with other stakeholders in the identity management community to ensure that biometrics capabilities are available to the DoD identity management framework.
DoD captures biometrics and uses that information to support the various military and business functions.
Here are several operational applications that biometrics is currently supporting:
Populace Management (Population Control)
Force Management
Access
Surveillance
Monitoring
Combat ID.
BIMA works with other stakeholders in the identity management community to ensure that biometrics capabilities are available to the DoD identity management framework.
DoD captures biometrics and uses that information to support the various military and business functions.
Here are several operational applications that biometrics is currently supporting:
Populace Management (Population Control)
Force Management
Access
Surveillance
Monitoring
Combat ID.
6. DoD ABIS Overview
7. Multi-Modal Biometric Fusion
8. The Desired End State depicts the Biometrics “Triad” and the population sets stored by each database. The Triad further illustrates interoperability between the DoD authoritative biometrics database, ABIS, US-VISIT IDENT, and DOJ IAFIS. This relationship will enable greater sharing between interagency biometrics community members and deny our enemies anonymity on foreign battlefields, at border crossings and transit points, and within the United States.
Current shared services include the ability for DoD to search the IAFIS database. The only searches approved for shared services are the DHS customers/operations (ICE/BITMAP and USCG/LNG missions) that are using the Joint Quick Capture Platform (JQCP) devices. Although possible, CJIS has not received approval from DHS to pass any DoD searches to IDENT via shared services.
The Desired End State depicts the Biometrics “Triad” and the population sets stored by each database. The Triad further illustrates interoperability between the DoD authoritative biometrics database, ABIS, US-VISIT IDENT, and DOJ IAFIS. This relationship will enable greater sharing between interagency biometrics community members and deny our enemies anonymity on foreign battlefields, at border crossings and transit points, and within the United States.
Current shared services include the ability for DoD to search the IAFIS database. The only searches approved for shared services are the DHS customers/operations (ICE/BITMAP and USCG/LNG missions) that are using the Joint Quick Capture Platform (JQCP) devices. Although possible, CJIS has not received approval from DHS to pass any DoD searches to IDENT via shared services.
9. Even after the completion of Overseas Contingency Operations, Biometrics will remain an enduring capability that enables DoD Stakeholders to execute their missions.
Facial Image Based Meta-data
Data extracted from the image itself
Stored next to the biometric template when searching
Used to alter facial searches at runtime
Logically separate from the biometric template
Can be easily updated, added, removed
Examples:
Gender
Race
Age
Facial Hair
Skin tone
Head dress
How to digitally sign forensic images with point of capture or other traceable information
Does not affect forensic usage
Can act as a trail to track point of capture
How to digitally sign a complete biometric capture device to ensure it is not tampered with?
This is not anti-virus related
It is operational integrity related to the functions it is supposed to do as defined by the manufacturer
Even after the completion of Overseas Contingency Operations, Biometrics will remain an enduring capability that enables DoD Stakeholders to execute their missions.
Facial Image Based Meta-data
Data extracted from the image itself
Stored next to the biometric template when searching
Used to alter facial searches at runtime
Logically separate from the biometric template
Can be easily updated, added, removed
Examples:
Gender
Race
Age
Facial Hair
Skin tone
Head dress
How to digitally sign forensic images with point of capture or other traceable information
Does not affect forensic usage
Can act as a trail to track point of capture
How to digitally sign a complete biometric capture device to ensure it is not tampered with?
This is not anti-virus related
It is operational integrity related to the functions it is supposed to do as defined by the manufacturer
10. 9