• “Cardiac password” project uses the wave of the heart motion for authentication

    One of the unique features for the upcoming iPhone X is facial recognition security, where users can simply unlock their phones by holding it up to their face and allowing the phone’s security measures to identify the correct user. However, it seems just as soon as new means of authentication are developed and put into use, hackers find a way around them, from hacking passwords to faking fingerprints to fool biometric security systems. But there may be one authentication method that cannot be hacked: Cardiac password.

  • Voice forensics to help Coast Guard nab hoax callers

    The U.S. Coast Guard receives more than 200 false distress calls a year over its Very High Frequency (VHF) radio channel 16—the mariner’s “911”—and the number is growing. These false calls are not simply a nuisance: Every distress call the Coast Guard receives compels the federal agency to launch an expensive search-and-rescue effort. In December 2014, DHS S&T connected the Coast Guard with Dr. Rita Singh of Carnegie Mellon University to see whether a voice forensic technology could be developed which would glean information from the caller’s audio signal — because this was the only evidence the Coast Guard had in cases of false distress calls.

  • Forget login, fingerprint, or retinal scan: Your heart is the new identifier.

    Forget fingerprint computer identification or retinal scanning. Researchers have developed a computer security system using the dimensions of your heart as your identifier. The system uses low-level Doppler radar to measure your heart, and then continually monitors your heart to make sure no one else has stepped in to run your computer. This new non-contact, remote biometric tool could be the next advance in computer security.

  • How does your cellphone know whether your finger is real or a fake?

    Do you know how safe it is to use your finger as a security login? And have you wondered how your cell phone knows if your finger is real or a fake? Researchers are working to answer these questions and solve the biggest problems facing fingerprint recognition systems today: how secure they are and how to determine whether the finger being used is actually a human finger.

  • Touch-free fingerprint scanners

    Balancing speed and security at the airport is essential to ensuring safe, reliable travel. DHS S&T and TSA are evaluating new identity verification technology that can reduce the time it takes for travelers to pass through security. The touch-free scanners allow a traveler’s fingerprints to serve as their boarding pass and identity document.

  • Blood vessels prove you are who you say you are

    Biometric screening — using biological characteristics such as fingerprints, iris recognition or facial features — is a high priority for researchers who are working to develop future security solutions. Researchers have found a way to identify people through finger vein recognition. This authentication system shows promise as a more secure passport control method.

  • Better technologies help first responders respond more quickly, safely, and effectively

    When disaster strikes, first responders rush in to provide assistance. In addition to their courage and training, they depend on a panoply of technologies to do their jobs. Pacific Northwest National Laboratory has partnered with emergency management and public safety professionals to define, develop, test and deploy these technologies to improve response and recovery. The Lab also applies its scientific capabilities to assess emergencies as they unfold.

  • Rapid DNA technology verifies relationships after mass casualty events

    Rapid DNA technology developed by DHS S&T has recently been used to identify simulated “victims” in several mass casualty exercises across the United States. The technology greatly expedites the testing of deoxyribonucleic acid (DNA), the only biometric that can accurately verify family relationships.

  • Rapid DNA technology verifies relationships after mass casualty events

    Rapid DNA technology developed by DHS S&T has recently been used to identify simulated “victims” in several mass casualty exercises across the United States. The technology greatly expedites the testing of deoxyribonucleic acid (DNA), the only biometric that can accurately verify family relationships.

  • Germany testing face-recognition software to help police spot terrorists

    Germany will be testing facial recognition software at a Berlin train station this summer to see whether it can assist police identify terror suspects more quickly. Volunteers will help police test the software at Berlin’s Suedkreuz station. If the test is successful, the use of the biometric software would be expanded to other locations, and also used to help police identify criminals, not only people suspected of terrorist activities.

  • New tool spots fake online profiles

    People who use fake profiles online could be more easily identified, thanks to a new tool developed by computer scientists. Researchers have trained computer models to spot social media users who make up information about themselves — known as catfishes. The system is designed to identify users who are dishonest about their age or gender. Scientists believe it could have potential benefits for helping to ensure the safety of social networks.

  • Face Recognition Challenge seeks better face-identification software

    Have you developed software to identity faces in general web photographs? Can your software verify that a face in one photograph is the same as in another? The Intelligence Advanced Research Projects Activity (IARPA) announced the launch of the Face Recognition Prize Challenge (FRPC). The challenge aims to improve biometric face recognition by improving core face recognition accuracy.

  • Thwarting forgery with paper fingerprints

    Designing secure documents that provide high levels of security against forgery is a long-standing problem. Even in today’s digital age, this problem remains important as paper is still the most common form of proving authenticity – such as receipts, contracts, certificates and passports. Fingerprinting official documents could provide a cost-effective way to prevent forgery, new research shows.

  • Eye tracking technology helps in imposter detection training

    Customs and Border Protection (CBP) screens nearly one million people every day and secures and manages 328 ports of entry all over the country, including in remote areas. Verifying the identity of every single person entering the United States is a vital step in halting human trafficking, drug trafficking, and other smuggling attempts at the border. In addition, security screening prevents criminals and terrorists from entering the country. Imposter detection thus crosscuts the entire Homeland Security Enterprise, as well as state, local, and tribal law enforcement and even front line soldiers in our military.

  • Partial fingerprints sufficient to trick biometric security systems on smartphones

    No two people are believed to have identical fingerprints, but researchers have found that partial similarities between prints are common enough that the fingerprint-based security systems used in mobile phones and other electronic devices can be more vulnerable than previously thought.