1 / 10

National Defense Industrial Association Biometrics Conference Roadmap to Tomorrow 23 February 2011

frayne
Download Presentation

National Defense Industrial Association Biometrics Conference Roadmap to Tomorrow 23 February 2011

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. National Defense Industrial Association Biometrics Conference Roadmap to Tomorrow 23 February 2011 Dr. Thomas Killion

    2. Identify the individual, denying anonymity   Enable DoD missions across warfighting, intelligence and business mission areas   Protect friendly forces, essential capabilities and resources by reducing vulnerabilitiesIdentify the individual, denying anonymity   Enable DoD missions across warfighting, intelligence and business mission areas   Protect friendly forces, essential capabilities and resources by reducing vulnerabilities

    5. BIMA works with other stakeholders in the identity management community to ensure that biometrics capabilities are available to the DoD identity management framework. DoD captures biometrics and uses that information to support the various military and business functions. Here are several operational applications that biometrics is currently supporting: Populace Management (Population Control) Force Management Access Surveillance Monitoring Combat ID. BIMA works with other stakeholders in the identity management community to ensure that biometrics capabilities are available to the DoD identity management framework. DoD captures biometrics and uses that information to support the various military and business functions. Here are several operational applications that biometrics is currently supporting: Populace Management (Population Control) Force Management Access Surveillance Monitoring Combat ID.

    6. DoD ABIS Overview

    7. Multi-Modal Biometric Fusion

    8. The Desired End State depicts the Biometrics “Triad” and the population sets stored by each database. The Triad further illustrates interoperability between the DoD authoritative biometrics database, ABIS, US-VISIT IDENT, and DOJ IAFIS. This relationship will enable greater sharing between interagency biometrics community members and deny our enemies anonymity on foreign battlefields, at border crossings and transit points, and within the United States. Current shared services include the ability for DoD to search the IAFIS database. The only searches approved for shared services are the DHS customers/operations (ICE/BITMAP and USCG/LNG missions) that are using the Joint Quick Capture Platform (JQCP) devices. Although possible, CJIS has not received approval from DHS to pass any DoD searches to IDENT via shared services. The Desired End State depicts the Biometrics “Triad” and the population sets stored by each database. The Triad further illustrates interoperability between the DoD authoritative biometrics database, ABIS, US-VISIT IDENT, and DOJ IAFIS. This relationship will enable greater sharing between interagency biometrics community members and deny our enemies anonymity on foreign battlefields, at border crossings and transit points, and within the United States. Current shared services include the ability for DoD to search the IAFIS database. The only searches approved for shared services are the DHS customers/operations (ICE/BITMAP and USCG/LNG missions) that are using the Joint Quick Capture Platform (JQCP) devices. Although possible, CJIS has not received approval from DHS to pass any DoD searches to IDENT via shared services.

    9. Even after the completion of Overseas Contingency Operations, Biometrics will remain an enduring capability that enables DoD Stakeholders to execute their missions. Facial Image Based Meta-data Data extracted from the image itself Stored next to the biometric template when searching Used to alter facial searches at runtime Logically separate from the biometric template Can be easily updated, added, removed Examples: Gender Race Age Facial Hair Skin tone Head dress   How to digitally sign forensic images with point of capture or other traceable information Does not affect forensic usage Can act as a trail to track point of capture   How to digitally sign a complete biometric capture device to ensure it is not tampered with? This is not anti-virus related It is operational integrity related to the functions it is supposed to do as defined by the manufacturer   Even after the completion of Overseas Contingency Operations, Biometrics will remain an enduring capability that enables DoD Stakeholders to execute their missions. Facial Image Based Meta-data Data extracted from the image itself Stored next to the biometric template when searching Used to alter facial searches at runtime Logically separate from the biometric template Can be easily updated, added, removed Examples: Gender Race Age Facial Hair Skin tone Head dress   How to digitally sign forensic images with point of capture or other traceable information Does not affect forensic usage Can act as a trail to track point of capture   How to digitally sign a complete biometric capture device to ensure it is not tampered with? This is not anti-virus related It is operational integrity related to the functions it is supposed to do as defined by the manufacturer  

    10. 9

More Related