Biometric technologies | Homeland Security Newswire

  • BiometricsImproving speed, accuracy of biometric scanning at security checkpoints

    Balancing speed and security at checkpoints, like airports, is essential to ensuring safe, reliable travel. Many of these checkpoints are increasingly using biometric technology to improve speed and reliability. While recent improvements in biometrics have lowered failure to match rates, many systems fail to quickly acquire biometric information in the first place. DHS S&T is working on designing a standard security checkpoint process to test the ability of biometric identity systems to acquire and match images from a diverse volunteer population within a realistic time constraint.

  • ForensicsBuilding statistical foundation for next-gen forensic DNA profiling

    DNA is often considered the most reliable form of forensic evidence, and this reputation is based on the way DNA experts use statistics. When they compare the DNA left at a crime scene with the DNA of a suspect, experts generate statistics that describe how closely those DNA samples match. A jury can then take those match statistics into account when deciding guilt or innocence. These match statistics are reliable because they’re based on rigorous scientific research. However, that research only applies to DNA fingerprints, also called DNA profiles, that have been generated using current technology. Now, scientists have laid the statistical foundation for calculating match statistics when using Next Generation Sequencing, or NGS, which produces DNA profiles that can be more useful in solving some crimes.

  • Law enforcementFBI wish list: An app that can recognize the meaning of your tattoos

    By Dave Maass

    We’ve long known that the FBI is heavily invested in developing face recognition technology as a key component in its criminal investigations. But new records, obtained by the Electronic Frontier Foundation (EFF) through a Freedom of Information Act (FOIA) lawsuit, show that’s not the only biometric marker the agency has its eyes on. The FBI’s wish list also includes image recognition technology and mobile devices to attempt to use tattoos to map out people’s relationships and identify their beliefs.

  • Face recognitionFace recognition experts perform better with AI as partner

    Experts at recognizing faces often play a crucial role in criminal cases. A photo from a security camera can mean prison or freedom for a defendant—and testimony from highly trained forensic face examiners informs the jury whether that image actually depicts the accused. Just how good are facial recognition experts? Would artificial intelligence help?

  • FingerprintsImproving fingerprinting technology

    Fingerprint capture technology has advanced to the point where high-quality rolled prints soon might be obtained without the manual assistance of a trained device operator. These advancements could help law enforcement collect information-rich prints more rapidly and economically.

  • ForensicsUsing sweat to distinguish individuals at crime scene

    An average square inch of skin contains 650 sweat glands. That means our bodies leave small amounts of sweat on everything we touch—whether we’re making a phone call, eating supper or committing a crime. Researchers believe investigators can use these tiny, often invisible skin secretions to their advantage.

  • ForensicsTrust worthiness of forensic handwriting in court questioned

    Forensic handwriting specialists are often called on to testify in court about the origins of a few lines of writing, or to determine whether a specific person has written a sentence. A new study indicates that experts are not 100 percent adept at assessing how often specific handwriting features occur in the general population.

  • IDsProposed EU ID cards to include fingerprints

    The EU Commission on Tuesday will propose a law aims at increasing security within the bloc’s borders, including fingerprinting in ID cards. The Commission said that compulsory fingerprinting in ID cards are necessary to countering terrorism in Europe. Fingerprints are already required for EU passports, along with biometric pictures.

  • PrivacyUse of face recognition systems threatens civil liberties: EFF report

    Face recognition—fast becoming law enforcement’s surveillance tool of choice—is being implemented with little oversight or privacy protections, leading to faulty systems that will disproportionately impact people of color and may implicate innocent people for crimes they didn’t commit, says an Electronic Frontier Foundation (EFF) report. Independent oversight, privacy protections are needed.

  • Biometric exit program DHS’s airport biometric exit program faces budgetary, legal, technical, and privacy questions

    DHS has installed experimental face-recognition system in nine U.S. airports. If DHS’s current plans are executed, every traveler flying overseas, American and foreign national alike, will soon be subject to a face recognition scan as part of this “biometric exit” program. A new report notes that neither Congress nor DHS has ever justified the need for the program. Congress never provided a rationale for it. Congress never provided a rationale for it while DHS has repeatedly questioned “the additional value biometric air exit would provide.” The biometric exit program also stands on shaky legal ground, and to make matters worse, the face scanning technology used by DHS may make frequent mistakes. “The privacy concerns implicated by biometric exit are at least as troubling as the system’s legal and technical problems,” the report notes.

  • Biosecurity“Cyberbiosecurity” and the protection of the life sciences

    Biology and biotechnology have entered a digital age, but security policies around such activities have not kept pace. New research outlines how the evolving nature of biotechnology should sound alarm bells for new ways to keep life sciences assets safe. This could be from accidental cyber-physical breaches, or more nefarious threats.

  • Airport securityBiometric solutions to bolster security at U.S. airports

    World events over the last decade—and even in the last year—have shown that airports are an attractive target to terrorists. At the same time, the number of international air travelers is increasing. More than 119 million international travelers arrived in fiscal year (FY) 2016, an almost six percent increase from FY 2015 and over a 35 percent increase since FY 2009. It is estimated that international arrivals will continue to grow at more than four percent annually. In this changing security landscape, finding effective and scalable solutions to increase security and efficiently process travelers is imperative. The need is critical and will only grow as many airports are already operating at or near capacity.

  • Identity authenticationSoftware verifies someone’s identity by their DNA in minutes

    In the science-fiction movie “Gattaca,” visitors only clear security if a blood test and readout of their genetic profile matches the sample on file. Now, cheap DNA sequencers and custom software could make real-time DNA-authentication a reality. Researchers have developed a method to quickly and accurately identify people and cell lines from their DNA. The technology could have multiple applications, from identifying victims in a mass disaster to analyzing crime scenes.

  • BiometricsA better way to identify gait differences

    Biometric-based person recognition methods have been extensively explored for various applications, such as access control, surveillance, and forensics. Gait is a practical trait for video-based surveillance and forensics because it can be captured at a distance on video. In fact, gait recognition has been already used in practical cases in criminal investigations. However, gait recognition is susceptible to intra-subject variations, such as view angle, clothing, walking speed, shoes, and carrying status. Such hindering factors have prompted many researchers to explore new approaches with regard to these variations.

  • CybersecurityThe challenge of authenticating real humans in a digital world

    By Jungwoo Ryoo

    There are three main ways of proving an identity. One involves something you know – like a password or your mother’s maiden name. A second method of authentication is with something you have – such as a key to your home’s front door or a smart card to swipe at work. A third way is by digitally authenticating the individual human being – who you are – with some aspect of your biology. This increasing dependence on digital authentication may actually result in less security. While cameras, sensors and other devices can make authentication easier for people to accomplish, they carry their own weaknesses. It may be more convenient, and even more secure, than a magnetic strip on a plastic card in your wallet. But the potential dangers will require much higher security for private information, particularly biometric data. A real identity still comes down to flesh and blood.