Biometrics: Government and Public Safety Opportunities Presented by: FRANCES ZELAZNY DIRECTOR OF CORPORATE COMMUNICATIONS.

Slides:



Advertisements
Similar presentations
For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
Advertisements

International Workshop on Usability and Biometrics: NIST Welcome
© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Course: e-Governance Project Lifecycle Day 1
HIPAA Vendor Conference Greg Moody Executive Assistant for Health and Human Services Office of Ohio Governor Bob Taft.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Government Applications of Biometric Technologies Border & Aviation Security 19 June 2003.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
1 Automatic Border Passage at Amsterdam Airport Schiphol ACM ICPC, November 16th 2002 Art de Blaauw, manager projects.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
02/12/00 E-Business Architecture
Hosted by: June 23-26, 2003 New York City ID Card Projects Large Scale ID Projects Based on Biometrics (Specifically Fingerprint)
Standards for Biometrics Dr. Pushkin Kachroo. Introduction Standards needed for interoperability At all levels of the system –hardware level (using one.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
How to Grow Revenues Through Supply Chain Relationship Management Bill Burke President, CEO ePlains, Inc.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
National Smartcard Project Work Package 8 – Security Issues Report.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
CNRI Handle System and its Applications
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
TBWG Data Workshop June 3 rd, 2008 New Technologies for Data Collection Automated License Plate Recognition.
Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication.
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Overview of IHE IT Infrastructure Patient Synchronized Applications.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
Industrial Control Security & Access Control Facilities Management UNECE International Forum on Trade Facilitation Geneva, Switzerland May
The Biometric Foundation Biometrics – Standards Activities National Defense Industrial Association 19 th Annual Security Symposium Reston, Virginia June.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Information Sharing Challenges, Trends and Opportunities
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Overview of IHE IT Infrastructure Patient Synchronized Applications.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Capture the Movement: Banner 7.0 and Beyond Susan LaCour, Senior Vice President, Solutions Development California Community Colleges Banner Group.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
CommSee - a client service systems development strategy using .NET
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
Internet2 Health Sciences Mary Kratz Internet2 Health Science Manager March Spring Member Meeting International Session.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Network Reliability and Interoperability Council VII NRIC Council Meeting Focus Group 1B Network Architectures for Emergency Communications in 2010 September.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
© DataCard Corporation. All rights reserved. TRENDS IN eGOVERNMENT Drivers, applications and technologies.
ILink Systems, Inc Feb, 2014 Government IT Solutions.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
Update from the Faster Payments Task Force
Unique Identification Number Project
Summary Physical Access & Time and Attendance PC/Network Access
Legal Framework for Civil Registration, Vital Statistics
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Biometrics: Government and Public Safety Opportunities Presented by: FRANCES ZELAZNY DIRECTOR OF CORPORATE COMMUNICATIONS

Agenda The New Climate for Biometrics Prerequisites for Accelerated Adoption Key Legislation Standards Technology Advances Integrated Solutions The role of biometrics

The Decade of Security The New World Networked, Global,…, Challenged!  Terrorism  Border Control  Immigration  Crime  The Internet  Mobile Access  Identity Fraud/Theft A New Framework for Security Is Needed

Security Based on Trust Security Must Go Beyond Fences, Doors & Firewalls to Establishing Trust & Gating Human Actions Trust Biometrics Identification

Government Regulated Industries Commercial (Mass Adoption) Law enforcement Dept. of Defense Financial m-commerce Fortune 2000 e-commerce Access Healthcare Transportation Transactions Federal Agencies Point of Sale Evolution Towards Mainstream National ID Programs

Prerequisites for Accelerated Adoption Clear Value Proposition Mission & Mandate & Political Will Legislation driven Clearing Adoption Barriers: End user resistance: Awareness & Education Privacy concerns: Responsible use & IBIA principles Validation Initiatives Building practical technical architecture RFI/RFP Pilots Standards Technology Advances & Maturation Funding

Pre 9/11 Legislation E-Sign Act Recognized biometrics as a form of digital signatures Health Insurance Portability & Accountability Act (HIPAA) Regulations support use of biometrics as a means to protect privacy of patient records Financial Services Modernization Act Privacy regulations covering information sharing among financial institutions and their affiliates

9/11 Effect By November 2001, 16 Congressional Legislative Initiatives Cited Biometric Implementation Made Increased Deployment in Civil and Government Programs Inevitable Mandated Use in Critical Infrastructure Accelerated Private Sector Adoption Key Legislation: Aviation and Transportation Security Act (2001) USA PATRIOT Act (2001) Enhanced Border Security and Visa Entry Reform Act (2002) Maritime Transportation Security Act (2002) Defense Appropriation 2002, 2003

Clear Political Will “…every foreign visitor desiring entrance into the United States to carry a travel document containing biometric identification -- that would be fingerprints or facial recognition “ President George W. Bush, May 14, 2002 “Fingerprints do not lie” Attorney General, John Aschroft, June 4, 2002 Formation of National Biometric Security Project

Initiatives New Initiatives/Pilots for Testing Solution Architecture & Operational Scenarios: DOD: Common Access Card (CAC) DHS/TSA: Transportation Worker Identification Card (TWIC) DHS: US VISIT (Entry / Exit) GSA: Smart Access / Common ID Continued discussions on Trusted Traveler, Drivers’ License Standard Extensive NIST & DARPA testing programs Expect/Hope for Government to GFE biometrics in their upcoming RFPs

Current Structure Ad-Hoc Group on Biometric Application Profiles Ad-Hoc Group on Biometric Data Interchange Formats Ad-Hoc Group on Biometric Interoperability in Support of the Gov. Smart Card Framework Ad-Hoc Group on Biometric Performance Testing, Quality, and Definitions Standards Activities – M1

Standards Under Development Application Profile Verification & Identification of Transportation Workers Application Profile Personal Identification for Border Crossing Application Profile Biometric Verification in Point-of-Sale Systems Finger Minutiae Format for Data Interchange Finger Pattern-Based Interchange Format Face Recognition Format for Data Interchange Finger Image Interchange Format Iris Image Format for Data Interchange M1 Standard

M1 Standards Incubators

Technology Advances: FRVT 2002 Demonstrated that facial recognition is ready for prime- time in large-scale 1 to many applications Accuracy comparable to finger under controlled environment Top tier technologies demonstrate maturation of industry Need to focus our efforts on supporting large implementations, quite different than a technology race Scalability, Redundancy, Flexibility are Key

Technology Advances: Live Scan A central component of registration and background checking process Capturing the gold standard tenprint New technologies like Moisture Discriminating Optics, Clear Trace Imaging, Dual Beam Illumination make it possible to capture clearer prints for maximum hits, higher throughput with less maintenance issues & lower cost

Technology Advances: Mobile ID Mobile units allow for spot checks along the border using dual biometrics (finger and face) Huge impact on domestic agencies that are already using these types of systems 100% of all hits verified

Technology Advances: Face & Finger Fusion Face & Finger biometrics readily address legacy data issues Int’l Civil Aviation Organization (ICAO) 9303 recommends face methods in travel documents November GAO Report (GAO ) on the use of Biometrics and Border Security very positive towards face & finger January NIST Report (303a) supports the use of face & finger biometrics on border Proven performance improvements through fusion logic

Integrated Solutions: The Role of Biometrics While biometrics are critical for new security framework Must keep in mind they: Are merely an enabling component Must be viewed as subservient to overall security requirements Impose significant constraints on system design Looking at security from biometric end is tantamount to the “tail wagging the dog.”

Biometrics’ Constraints, Why? Imperfect technologies Unfamiliar to end-users Workflow change Difficult to scale Data security issues Integration challenges Complex Architecture remote distributed systems impact both client & server-sides Raise legal & social issues (e.g. privacy) Biometric complexity creates opportunity for a new component that simplifies integration & adoption: “Identity Framework”

Identity Framework Middleware play: That provides identity information & user management to any security application Expected to become largest IT infrastructure play over next 5 yrs Dramatically enhances biometric value proposition Next: Examine traditional vs. Identity Framework- based approaches to holistic security Security Systems Biometrics Identity Framework

Physical Transacti onal Access Logical Background Checking Qualification Trusted Identity Negative Databases Data-Mining Engines Intelligence Identity Processes ID Databases Data Capture (biometric, ID) Enrollment Badging, ID Cards, etc Credential Issuance PKISurveillance Detection On Demand ID

Traditional Security Systems: Stove-Piped Not leveraged: significant redundancies Many loop holes Long term: higher total cost of ownership (more costly to maintain, upgrade, or add new capabilities) System 1 Adding Biometrics System 2System 3 Biometrics System 1 Biometrics System 2System 3

Continuity of Authentication™ Common underlying technical architecture Handle multiple biometrics Handle non-biometric methods Audit all biometric and non-biometric transactions

Using Identity Framework Shared identity-related services with well defined API Ties components from different vendors to create a holistic system Same Identity data served across many different security applications Continuity of Authentication Universal Access System 1 System 2 System 3 Biometrics … Identity Framework

Building Holistic Systems Multiple components invariably required to deliver overall security or identity systems Example: AFIS Live scan, Access control, Information security, Badging, etc. End user may consider procuring total system from single vendor Risks: Single vendor is unlikely to always have “best of breed” offerings for all component Technology vendors not necessarily best system integrators Proprietary total solution may trap end user by eliminating choices down the line

Lowering The Risk Adopt Identity Framework Best of breed identity technologies/biometrics from various vendors System integrator to pull overall system together Advantages: More competitive solution Better solution: Flexible, Scalable, Interoperable, Interchangeable Staged development & deployment Not locked into vendor proprietary offering X

The Last Word Biometric performance should be looked at in context of total systems Biometric systems can meet real world requirements today! Identity Management begins with adopting a framework -- a critical middleware that can enhance biometric value & allow staged adoption of biometrics without violating system design principles Continue to be very upbeat about biometrics & their role in enhancing total security!

For More Information NameFrances Zelazny TitleDirector of Corporate Communications Phone: Fax: Web Site: