• Biometric access control secures U.K. construction sites

    Large, sprawling construction sites need to be secured; two U.K. companies join forces to offer an all-in-one biometric site access system for construction sites; the solution uses hand geometry or iris scanning technology to record access to a construction site

  • U.K. universities chafe under burden of monitoring foreign students, academics

    As of 31 March 2009, all U.K. universities have been required to monitor foreign students and academics; for instance, university staff must check international student attendance, and if a student fails to attend 10 “expected interactions” (seminars, lectures, tutor meetings, etc.), the professor is obliged to report them to the U.K. Border Agency; professor say this is too much

  • New Hampshire considering banning biometrics in ID cards

    The New Hampshire legislature is considering a bill which would ban biometric data, including fingerprints, retinal scans, DNA, palm prints, facial feature patterns, handwritten signature characteristics, voice data, iris recognition, keystroke dynamics, and hand characteristics from being used in state or privately issued ID cards, except for employee ID cards

  • New facial authentication system installed at Israel Discount Bank

    A bank installs an advanced facial recognition system to verify the identity of employees and customers who want to go into the vault; the system can identify people in difficult conditions such as dim light; changes, such as sunglasses, beards, moustaches, different hairdos, or a hat do not affect its ability

  • TSA's proposal for tougher general-aviation security to be scaled back

    TSA wanted to apply tougher security rules to the 15,000 or so private planes — aka “general aviation” — but operators and owners of such planes, and also DHS IG, said the risk such planes posed to U.S. security was not great; TSA is now planning to scale down general aviation security measures

  • Sorting the bad guys from the good

    Israel’s WeCu claims a 95 percent success rate for its new terrorist detection system that monitors reactions to visual stimuli at airports and checkpoints; the company’s device flashes stimuli, such as photos, a symbol, or a code word, relating to the information authorities are most interested in (whether it is terrorism, drug smuggling, or other crimes), to passengers as they pass through terminal checkpoints; hidden biometric sensors then detect the subjects’ physical reactions and subtle behavioral changes remotely or during random contact

  • IBM filed patents for airport security profiling technology

    IBM has filed a dozen patent applications which define a sophisticated scheme for airport terminal and perimeter protection, incorporating potential support for computer implementation of passenger behavioral profiling to detect security threats

  • E-Verify urged for Baltimore County

    Federal program aims to keep illegal immigrants off job sites; a coalition of labor unions wants Baltimore County Council members to adopt a new requirement that contractors working for the county verify the immigration status of their employees or risk losing county business; the hourly pay rate of members of the Ironworkers Union – a pay which includes health and retirement benefits — is about $40; workers in the United States illegally often get $12 an hour with no benefits

  • Polish priest installs fingerprint reader to check for mass attendance

    A Polish priest installs a biometric fingerprint reader at his church to monitor schoolchildren’s attendance at mass; the pupils will mark their fingerprints every time they go to church over three years, and if they attend 200 masses they will be freed from the obligation of having to pass an exam prior to their confirmation

  • Japanese biometric border fooled by tape

    Two South Korean women have managed to fool Japan’s expensive biometric border-control system by using special tapes on their fingers; the invisible tape carries the finger prints of another person, and the South Korean broker who supplied the tape also provided false passports to go with it; this is the third known case of South Korean women using the fingerprint-altering tape to enter Japan; in all three cases, the women managed to fool the biometric screening, but were later caught because they over-stayed their visas

  • E-passports vulnerable to traceability attacks, allowing real-time tracking of passport holders

    The electronic passports issued by the United States, the United Kingdom, and some fifty other countries are vulnerable to “traceability attacks”: hackers can remotely track an e-passport holder in real time without first knowing the cryptographic keys that protect the personal information embedded in the e-passport

  • L-1 Identity Solutions’ Daugman-based iris algorithm passes test

    Rigorous tests by the U.S. National Institute of Standards and Technology (NIST) find that the accuracy of L-1’s iris recognition technology as markedly higher than prior results, and that improvements came without sacrificing speed; the evaluation also showed that L-1’s accuracy did not come at the expense of template size

  • U.S. boarding pass system easy to circumvent

    Unbelievable but true: If a terrorist obtains someone else’s credit card, he (the terrorist) could then follow instructions on the Internet to doctor a boarding pass; the terrorist could then show the fake boarding pass with his own name instead of the cardholder’s, along with his own ID, to pass through security, where the boarding pass is not scanned into the system; then at the gate, where the terrorist is not asked to show his ID again, he can simply hand in the real boarding pass with the cardholder’s name and be let onto the plane

  • Potential security breach in German airports workers' IDs

    A German TV news program and members of a computer club demonstrated how they managed remotely to access data stored on key cards used by airport employees; terrorists could use such a breach to gain admittance to restricted areas of the airport

  • Applying FIPS 201 to aviation security and counter-terrorism information sharing

    Would implementation of PIV based access control help improve the performance of the intelligence community? One expert wonders whether the fundamental ability of PIV and PIV-I to improve creation, distribution, and access to information is fully appreciated by the U.S. intelligence community and DHS