• TerrorismU.K. to destroy biometric information of 45 terror suspects due to botched paperwork

    British security agencies will have to destroy fingerprints and DNA of forty-five terror suspects because the police retained the biometric samples longer than the law allows. The law does allow the police to keep biometric information of terrorism suspects indefinitely, but certain paperwork must be completed within a certain period of time to allow that, and if the paperwork is not completed, the samples must be destroyed. A new report reveals that Britain holds biometric information and materials on nearly 8,000 suspects.

  • AuthenticationSelfies could replace security passwords – but only with an upgrade

    By Ian McLoughlin

    The next time you do some online shopping or call your bank, you may find you no longer have to scrabble around to remember your security password. Banks are increasingly turning to voice recognition technology as their preferred way of ensuring customers are who they say they are when they use telephone banking services. But does this kind of technology really mean that you’ll soon be able to just forget your passwords? The short answer right now is “no.”

  • view counter
  • ForensicsForensics close in on footwear analysis

    First it was your fingerprint that gave the game away and then DNA analysis transformed forensic science. But “watch your step” because experts have developed a new technique which could lead to a step change in forensic footwear imaging. The experts have been able to extract additional information and create a digital picture of the personal footprint we leave behind when we stand or walk on a hard surface.

  • Facial recognitionFaster airport lines with facial recognition

    More and more people are travelling by plane, so automating airport security checks makes sense. The use of biometric features is a way to identify people at airports. New technology detects and tracks you from the second you arrive at the airport until you’re out of the arrivals hall at your destination.

  • BiometricsSenior Russian security officials exhibit “gunslinger gait”: Experts

    Experts have discovered a new gait pattern among several top Russian officials, including President Vladimir Putin and Prime Minister Dmitry Medvedev. The researchers term this “gunslinger’s gait” because it may be triggered by KGB or other forms of weaponry training. The gait features a consistently reduced right-sided arm swing, highlighted in video material of the individuals studied.

  • RefugeesNew biometric measures to identify, track refugees

    Refugees applying to come to the United States go through several different security measures aiming to make sure that they who they say they are, and that they are involved with terror organizations or criminal gangs. The security screening includes detailed interviews, three levels of background checks, three fingerprint screenings, contagious disease screening, and cultural orientation. The United States has plans in the works for additional biometric measures, including iris scanning and rapid-turnaround DNA testing.

  • view counter
  • Border securityCBP begins biometric entry/exit testing at Otay Mesa port of entry

    U.S. Customs and Border Protection (CBP) will begin testing new biometric technology at the Otay Mesa pedestrian crossing this week to enhance identification of certain non-U.S. citizens entering and exiting the United States. CBP says its Entry/Exit strategy includes three core pillars: identify and close the biographic gaps and enhance the entry-exit system; perform targeted biometric operations; and transform the entry/exit process through the use of emerging biometric technologies.

  • SurveillanceLarge-scale face-search technology helps in fighting crime, terrorism

    The rapid growth in surveillance cameras is resulting in millions of face images and videos captured every day. The ability quickly and accurately to search all these images to assist in identifying criminal and terrorism suspects is an important and complex task that can contribute to making communities safer. To help in this effort, MSU has licensed its large-scale, automatic face-search system to NEC Corp.

  • ForensicsNew technique can tell whether a fingerprint belongs to a male or female

    Culprits beware: researchers are taking crime scene fingerprint identification to a new level. They have discovered a straightforward concept for identifying whether a culprit is male or female. It is based on the content in fingerprints — specifically amino acids. Amino acid levels in the sweat of females are about twice as high as in males. There is also a slightly different distribution, due mostly to hormonal differences. The same is true for amino acids left behind in fingerprints.

  • ForensicsDNA identification may not be as reliable as previously thought

    Increasingly important to criminal investigations, DNA analysis once required substantial samples of blood or other bodily fluids, but advances in the field now make it possible to produce a complete genetic profile of a suspect from just a few cells left behind — so-called “touch DNA.” A new study shows that secondary transfer of human DNA through intermediary contact is far more common than previously thought, a finding that could have serious repercussions for medical science and the criminal justice system.

  • FingerprintsGlowing fingerprints help fight crime

    Fingerprint identification has been used as a key method by law enforcement and forensic experts for over 100 years. Researchers say that by adding a drop of liquid containing crystals to surfaces, investigators using a UV light are able to see invisible fingerprints “glow” in about thirty seconds. The strong luminescent effect creates greater contrast between the latent print and surface enabling higher resolution images to be taken for easier and more precise analyses.

  • BiometricsInternal fingerprint sensor enables more accurate ID

    In the 1971 film “Diamonds are Forever,” British secret agent James Bond uses fake fingerprints as part of a ploy to assume the identity of a diamond smuggler. At the time, sham prints were purely a futuristic bit of Bond gadgetry, but technology has since caught up. Quickly detecting “internal fingerprints” and sweat pores could make fingerprint sensors more reliable and less likely to be tricked by fake fingerprints.

  • BiometricsExpert passport officers better than face recognition technology in detecting fraud

    Face-matching experts at the Australian Passport Office are 20 percent more accurate than average people at detecting fraud using automatic face recognition software, new research shows. The study is the first to test how well people perform on this difficult but common operational task carried out by passport officers. “Our research shows that accuracy can be significantly improved by recruiting staff who are naturally good at face recognition - the so-called “super-recognizers” — and then giving them in-depth training in the use of the software,” said the study lead author.

  • Forensics Forensic facial examiners can be near perfect

    In what might be the first face-off of its kind, trained forensics examiners from the FBI and law enforcement agencies worldwide were far more accurate in identifying faces in photographs than nonexperts and even computers. The new assessment provides “the first strong evidence that facial forensic examiners are better at face recognition than the rest of us,” says a face recognition researcher.

  • Voice recognitionAutomated voice imitation can defeat voice-recognition security

    Voice biometrics is based on the assumption that each person has a unique voice that depends not only on his or her physiological features of vocal cords but also on his or her entire body shape, and on the way sound is formed and articulated. Researchers have found that automated and human verification for voice-based user authentication systems are vulnerable to voice impersonation attacks. Using an off-the-shelf voice-morphing tool, the researchers developed a voice impersonation attack to attempt to penetrate automated and human verification systems.