Download presentation
Presentation is loading. Please wait.
1
EUCOM Identity Operations:
UNCLASSIFIED EUCOM Identity Operations: Identifying the Threat Network of the Sea UNCLASSIFIED
3
UNCLASSIFIED BIOMETRICS DEFINED: A measurable PHYSIOLOGICAL or BEHAVIORAL characteristic unique to an individual 3 UNCLASSIFIED
4
UNCLASSIFIED UNCLASSIFIED
5
Names Based Databases For Nefarious Actors Are Not Adequate
UNCLASSIFIED Case Study. Tucson Police Department, Arizona 55.5% of suspects had erroneous id information 30% intentional deception 42% various types of unintentional errors ~ Discovering Identity Problems: A Case Study, grant funded by “COPLINK Center: Social Network Analysis and Identity Deception Detection for Law Enforcement and Homeland Security,” # , NSF, Digital Government Program UNCLASSIFIED
6
Joint Operational Environment until 2025
The Threat Network At Sea Is Tied to the Threat Network on Land UNCLASSIFIED Joint Operational Environment until 2025 Some of the world’s most important current migration routes SOURCES: National Public Radio The Economist UNCLASSIFIED
7
Threat Networks Have Many Types Of Members - Aliases
UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED
8
Old Science – New Technology
UNCLASSIFIED UNCLASSIFIED Drawings & Verbal Descriptions Photographs Fingerprint Identification Internet 21st Century 20th Century 17th Century UNCLASSIFIED UNCLASSIFIED 8
9
Identity Operations Around the World
UNCLASSIFIED UNCLASSIFIED United Nations (UN) & European Commission’s Humanitarian Office (ECHO) 4 Million Dollar Biometric data base for refugees. International Security Assistance Force (ISAF) Interpol, Europol, and Local Law Enforcement Private Industry India: Government intends to biometrically enroll everyone, and use it for government services, banking, and welfare benefits. spending reaches the right people, and will allow hundreds of millions of poor Indians to access services like banking for the first time” UNCLASSIFIED UNCLASSIFIED
10
Identity Operations Process
UNCLASSIFIED UNCLASSIFIED Collect Store & Match Analyze Action UNCLASSIFIED UNCLASSIFIED
11
Identity Operations Collection (3 Types)
UNCLASSIFIED UNCLASSIFIED Live Collection Forensic Collection Historical Records / Databases / Sharing Media reference UNCLASS: UNCLASSIFIED UNCLASSIFIED
12
Collecting During MIO UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED
13
Biometric Enabled Watchlist
UNCLASSIFIED Sample WL Tiers / Categories Tier 1 – Detain Tier 2 - Question Tier 3 – Assess Tier 4 – Do not hire / no access Tier 5 – Deny Access Tier 6 - Track
14
Sharing Biometrics Example Data Sources: Foreign Partner Military
UNCLASSIFIED UNCLASSIFIED Example Data Sources: Foreign Partner Military Foreign Law Enforcement US Interagency Europol Interpol EU UN Other UNCLASSIFIED UNCLASSIFIED
15
Authorized Store, Match, Sharing
Caveats to Sharing UNCLASSIFIED UNCLASSIFIED Differing Data Types Shared Example Caveats Distribution constraints Storage Time Constraints Watchlist Authorized Store, Match, Sharing Biometric Data SIG IZ Case Numbers Date of Birth National Number Passport Number Biographic Data UNCLASSIFIED UNCLASSIFIED
16
Success At Sea Insider Threat Prosecution Watchlist Hit
17
Status of NATO Biometrics
UNCLASSIFIED UNCLASSIFIED AGREEMENTS NATO BIOMETRIC PLAN DEVELOPMENT NATO Framework Concept Doctrine Development Contingency Plan Operation Plan Nation SOP / ROE UNCLASSIFIED UNCLASSIFIED
18
Questions ? Points of Contact EUCOM J2S-B Office
UNCLASSIFIED UNCLASSIFIED Questions ? Points of Contact EUCOM J2S-B Office Commercial Tel: UNCLASSIFIED UNCLASSIFIED
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.