Biometric technologies

  • BiomtericsBiometric technologies have failed to guarantee integrity of elections in Africa

    As Nigerians voted this past weekend in the 2015 presidential elections, there were many reports of technical problems with electronic fingerprint readers, intended to verify voters’ identities before they cast their ballots.At least twenty-five African countrieshave held elections with voters using some sort of electronic voting system. Many of these efforts have failed. Experts say that African governments should not divert public funds to expensive electronic voting systems, and use these funds instead on ways to eliminate voter intimidation, post-election violence, and ballot fraud — all of which are attributes of current election periods regardless of how votes are submitted.

  • CybersecurityBiometric security could do away with passwords

    With hackers and cyber thieves running rampant online, efforts to create stronger online identity protection are leading major tech firms to invest in biometric security methods. Analysts predict that 15 percent of mobile devices will be accessed with biometrics in 2015, and the number will grow to 50 percent by 2020.

  • BiometricsFBI’s biometric data center key to identifying Jihadi John

    The FBI is unlikely to release details of how, working with allies in the United Kingdom, it managed to accomplish the task of identifying “Jihadi John” with only video footage of the suspect’s hidden face and a voice with a British accent. Identifying Mohammed Emwazi, a Kuwaiti-born, British-educated man in his mid-20s, was likely done at the FBI’s Criminal Justice Information Services Division(CJIS), which houses the bureau’s Biometric Center of Excellence(BCE). At BCE, the FBI uses the $1.2 billion dollar Next Generation Identification(NGI) software to scan photos, aliases, physical traits, fingerprints, and voiceprints. The software is interoperable with the Pentagon’s Automated Biometric Identification System(ABIS) and DHS’s Automated Biometric Identification System(IDENT).

  • AuthenticationSmart keyboard can tell who you are – and also powers and cleans itself

    In a novel twist in cybersecurity, scientists have developed a self-cleaning, self-powered smart keyboard that can identify computer users by the way they type. The smart keyboard can sense typing patterns — including the pressure applied to keys and speed — that can accurately distinguish one individual user from another.

  • view counter
  • Law-enforcement technologyMobile biometric device expedites identity matching

    The Stockton (California) Police Department (SPD) has been quietly testing a state-of-the-art Mobile Biometric Device (MBD) technology for the past four years. Designed quickly to scan fingerprints, irises, and other biological information while officers and evidence technicians are on the field, MBDs can communicate with remote fingerprint databases and confirm matches in as little as three minutes.

  • Real IDMost states are complying with Real ID, but a few lag behind

    Forty U.S. states and some territories have adopted the Real ID Actrequirements for state driver’s licenses and identification cards, mandated by the federal government. Alaska, American Samoa, Arizona, Kentucky, Louisiana, Maine, Massachusetts, Minnesota, Montana, New York, Oklahoma, and Washington are still considered noncompliant as of October 2014. DHS announced a phased enforcement of the Real ID Act in 2013, and residents of non-complying states are already facing restrictions – such as having to present a passport or birth certificate in order to enter restricted areas in federal facilities or nuclear power plants. These restrictions will only tighten between now and January 2016.

  • view counter
  • TechnologyBuilding a better lie detector

    The Intelligence Advanced Research Projects Activity (IARPA), within the Office of the Director of National Intelligence (ODNI), announced the other day the winner of its first public challenge contest, Investigating Novel Statistical Techniques to Identify Neurophysiological Correlates of Trustworthiness (INSTINCT). The winning solution, JEDI MIND — Joint Estimation of Deception Intent via Multisource Integration of Neuropsychological Discriminators — uses a combination of innovative statistical techniques to improve predictions approximately 15 percent over the baseline analysis.

  • ForensicsNanoparticles will allow detecting previously undetectable fingermarks

    A group of researchers from Switzerland has thrown light on the precise mechanisms responsible for the impressive ability of nanoparticles to detect fingermarks left at crime scenes. The researchers have provided evidence contesting the commonly accepted theory that nanoparticles are attracted to fingermarks electrostatically. The attraction, they claim, is in fact chemical and is caused by compounds on the surface of nanoparticles bonding with a complex cocktail of compounds present in fingermark residue.

  • ForensicsInvestigative genetics technology helps nab criminals

    Every year, investigators collect tens of thousands of biological samples from crime scenes that may hold valuable clues to solving criminal cases. Unlocking those clues now is easier thanks to a new software solution unveiled last week by Battelle researchers who have applied advanced bioinformatics to next-generation sequencing data. ExactID analyzes biomarkers that can predict physical appearance, ancestry, clinical traits, and familial relationships among people. This information can be invaluable to forensic analyses and case work.

  • Airport securityJapan to adopt automated airport gates equipped with facial recognition technology

    More than eleven million people visited Japan last year, the highest on record, and the government is anticipating close to twenty million foreigners in 2020, the year Tokyo will host the Summer Olympics and Paralympics. Japan plans to adopt automated airport immigration gates supported by facial recognition technology, because while the number of foreign visitors continues to increase, the number of immigration officers remains limited, or even shrinks. A general concern with using facial recognition technology at immigration gates is that passports can be valid for a decade, while a person’s appearance may change within that timeframe. Another concern with the proposed system is how facial data image collected will be stored or erased.

  • BiometricsPhoto-ID security checks flawed: Study

    Passport issuing officers are no better at identifying whether someone is holding a fake passport photo than the average person, new research has revealed. A pioneering study of Australian passport office staff revealed a 15 percent error rate in matching the person to the passport photo they were displaying. In real life this degree of inaccuracy would correspond to the admittance of several thousand travelers bearing fake passports.

  • BiometricsA first: Armed robber convicted based on Chicago’s facial recognition technology

    Pierre Martin became the first person in Chicago to receive a prison sentence after being convicted based on evidence from the city’s facial recognition technology, NeoFace. Martin was sentenced Monday to twenty-two years for two armed robberies carried out on the Chicago Transit Authority(CTA) train system in January and February 2013. A few weeks after the incidents, Chicago Police Department officials announced that Marin was identified using facial recognition software.

  • BiometricsImproved performance of facial recognition software

    Who is that stranger in your social media photo? A click on the face reveals the name in seconds, almost as soon as you can identify your best friend. While that handy app is not quite ready for your smart phone, researchers are racing to develop reliable methods to match one person’s photo from millions of images for a variety of applications.

  • SurveillanceNSA, other agencies, collect millions of images for large facial recognition databases

    The NSA, through its global surveillance operations, has been accumulating millions of images from communication interceptions for use in high-level facial recognition programs, according to classified 2011 documents leaked by Edward Snowden. The documents do not reveal how many people have been targeted with facial recognition programs, but given the NSA’s foreign intelligence mission, a bulk of the imagery collected would involve foreign nationals.

  • BiometricsForensic DNA technology could help identify abducted Nigerian girls

    Forensic DNA technology developed in the aftermath of the 9/11 attacks could be used to identify and reunite more than 200 Nigerian girls who were kidnapped by Islamist militants, scientists said. The software, Mass Fatality Identification System (M-FISys), has been used worldwide — in Mexico, Guatemala, El Salvador, Honduras, Perú, Sri Lanka, the Philippines, Thailand, Malaysia, among several other countries — to identify and return more than 700 children who were abducted by criminals for child trafficking.