Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Biometric technologies

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Faking a fingerprint

    A tech blogger argues there is no such thing as fingerprint reader that cannot be fooled; as proof, he offers several videos showing different techniques for faking readers

    • Read more
  • Identica Holdings Corporation

    Identica champions one of the newest biometric technologies: Vascular pattern recognition, also referred to as vein pattern authentication; the technology offers several advantages over current biometric measures

    • Read more
  • U.K. identity card scheme will not mandate fingerprint readers

    A proliferation of different fingerprint reading machines will be used in government programs, including the proposed biometric national identity card

    • Read more
  • Warning: ID cards face fingerprint errors

    Independent research groups warns that the U.K. biometric national ID scheme’s preference for fingerprint and facial recognition technologies makes the system susceptible to errors in identification

    • Read more
  • Hospital system relies on palm reading for identity authentication

    Palm-reading system used to safeguard patient records at the third largest U.S. public health provider; company says method offers greater accuracy than fingerprinting

    • Read more
  • TSA issues TWIC card readers standards

    The Transportation Worker Identification Credential (TWIC) aims to register about 1.2 million employees in U.S. ports and those who have regular access to these ports; the agency issues standard for readers which will read the information off TWIC cards

    • Read more
  • A case for RFID and biometric security solutions

    Greater reliability and convenience make a case for RFID and biometric security solutions

    • Read more
  • VCG offers back-office voice biometrics

    New voice activated payments are in the pipeline; voice recognition will be used for both front-end and back-room applications

    • Read more
  • New biometric measures: Birth marks, scars, and tatoos

    Michigan State researcher develops a system that could allow police to identify individuals by matching marks on their body with those stored in a computer database

    • Read more
  • Biometrics market to reach $7.1 billion by 2012

    Biometrics market shows a compound annual growth rate (CAGR) of 21.3 percent; fingerprint biometrics still leads the pack, with face recognition following

    • Read more
  • Better gait recognition biometrics developed

    Indian researchers say they have developed gait recognition biometrics which could help security personnel identify suspected individuals from a distance

    • Read more
  • Team developing NGI defines roles and responsibilities

    Lockheed Martin is the prime contractor for the FBI’s ambitious Next Generation Identification System; team members define their contributions to the project

    • Read more
  • Growing interest in voice biometrics

    U.K. financial institutions seriously consider voice recognition technology as a way to combat ID fraud; about 20 million Britons are expected to register for some form of voice ID by the end of next year

    • Read more
  • Millenium Technology Prizes awarded

    Prestigious technology innovation prize awarded to five recipients; amng the winners: new DNA fingerprinting technology which has revolutionized forensic science, helping identify criminals and free innocent parties worldwide

    • Read more
  • State Department: Robust security for U.S. e-passport

    Popular misconception notwithstanding, the new U.S. e-passprt are safe, says the State Department. One example: The card’s photograph cannot be removed with solvent; a laser engraving process embeds the photograph into the polycarbonate card stock, meaning that attempts to remove your picture will visibly mar the card

    • Read more
  • « first
  • ‹ previous
  • …
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • next ›
  • last »

More headlines

  • Real ID will change flying within the U.S.
  • Withdraw of REAL ID Act requirements for driving licences temporarily as mDLs accelerate
  • Alumni of Human Identification Lab Attest to Its Influence
  • Congress rejects funding increase for DHS biometric system, directs independent review
  • Texas sues Google over biometric recognition features
  • CBP, Princess Cruise Line Introduces Facial Biometrics at Port of San Francisco
  • Israeli firm develops body cams with facial recognition
  • DHS wants AI forces working more as a department-wide team
  • Report Sheds light on extensive federal use of facial recognition technology
  • Who in America is standing up to privacy-bothering facial-recognition tech? Maine is right now leading the pack
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

No stories

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies