-
Concerns over TWIC roll-out delays
TWIC aims to provide 1.2 million U.S. port workers with forgery-proof biometric IDs; so far only 500,000 workers have been enrolled, and DHS pushed completion of enrollment from 25 September to 15 April; lawmakers are not happy
-
-
China, INTERPOL celebrate security success during Summer Games
The Summer Games and the Paralympics passed without any major security incident; China says this highlights the success of security efforts for the Games, in particular the collaboration between China and INTERPOL
-
-
Colorado to remove Social Security numbers from public Web sites
Colorado attorney general asks counties to remove documents containing Social Security numbers from public Web sites, saying that the “The availability of this information online increases the possibility of Colorado citizens becoming the victims of identity theft”
-
-
Lumidigm develops whole-hand sensor
Developer of finger-print biometrics will offer a whole-hand sensor; new system designed to read multiple characteristics of the hand through the use of multispectral technology
-
-
New York State offers an enhanced driver's license
New York State leads the nation in the adoption of enhanced license technology, and state residents may now apply for an enhanced driver’s license; they have an incentive to do so, because beginning 1 June 2009 U.S. citizens will have to present either a passport or an enhanced driver’s license when re-entering the U.S. from Canada, Mexico, Bermuda, and the Caribbean
-
-
DHS: Progress and priorities, I
Since its creation more than five years ago, DHS has made significant progress — uneven progress — in protecting the United States from dangerous people and goods, protecting the U.S. critical infrastructure, strengthen emergency response, and unifying department operations
-
-
Growth in software market driven by security, identity protection concerns
Information security concerns propel market for software products, according to a new report by Global Industry Analysts
-
-
How to create the perfect fake identity
If you have the patience and time, you can use “identity farming” to create the perfect fake identity; IT security maven Bruce Schneier writes that the ever more central role data — and data shadow — are playing in our lives now makes it possible
-
-
U.S. funds advanced cryptography effort by European biometric comapnies
EU gives European companies $9 million in U.S. money to develop advanced cryptography for interoperable fingerprint biometric solutions
-
-
CaTS, PerSay collaborate on voice recognition
South African, Israeli companies collaborate on offering voice recognition security solution for e-commerce applications
-
-
Snafu at biometric show
A London biometric show offered visitors the chance to view their biometrics data, and see it expressed as as a unique pretty flower diagram; trouble is, a glitch caused the biometric data of dozens of individuals to be e-mailed in a Thank You note to visitors to the show
-
-
Biometrics edging toward the mainstream
Over the past few years biometric technology has developed from a new technology used in a narrow band of closed environment applications to a useful, practical, fit-for-purpose tool used across a range of industries and in a wide variety of applications
-
-
Taiwan nabs major hacking ring
Criminal ring steals personal data of more than 50 million individuals — including Taiwan’s current and former presidents, and the current Taiwanese chief of police
-
-
Medical identity thefts on the rise
The move from paper to digital patient records opens new opportunities for identity thieves
-
-
New fingerprint analysis technique to be used to identify bomb makers
University of Leicester researchers develop new technique to identify fingerprints on metal; technique can pick up fingerprints on metal even after they have been wiped off
-