Title: Corrections Technology Association CTA
1Corrections Technology Association (CTA)
Dominique Harrington
2Program Manager-West Virginia Operations
- NATIONAL BIOMETRIC SECURITY
- PROJECT(NBSP)
3NBSP MISSION
- The mission of the NBSP is to facilitate the
application of positive human identification
technology for the security of the civil national
infrastructure in direct response to the
international terrorist threat.
- Coalition commitment to the war on terror
- Focused on civil infrastructure security
- Out-source for homeland security at all levels
- Non-profit, non-competitive, unbiased
4(No Transcript)
5NBSP Initiatives
- Publications and guides for biometric
applications in infrastructure security - Definition of requirements for new standards
- Industry and technology surveys and database
development - Technology and product performance assessments
- Privacy and civil liberty impact analysis
- Applied research
- Educational program support
- Training and seminars
6 7Biometrics Defined
- Biometrics is the science and technology of
authentication (i.e. establishing the identity of
an individual) by measuring the person's
physiological or behavioral features.
- In information technology (IT), biometrics
usually refers to technologies for measuring and
analyzing human physiological characteristics
such as fingerprints
8 9Identification and Authentication
- Identification and Authentication
- Has Typically Been Driven By
- Passwords or Physical Devices
10Password Problems?
11The Password Dilemma
Passwords are the most common authenticator Passwo
rds are also the easiest to hack Properly used,
Passwords should be alphanumeric, upper lower
case, and random The dilemma Good passwords are
difficult to recall
12Identification and Authentication
- Something you KNOW
- Passwords
- PINs
- Mothers maiden name
- Something you HAVE
- ATM card
- Smart card
- Driver License
- Something you ARE!
- Biometrics
13Biometrics
- Physiological (Biological) Characteristics of
Biometrics include - Fingerprint
- Face
- Hand Geometry
- Iris
- Vein
- Behavioral Characteristics of Biometrics include
- Signature
- Voice
- Keystroke Dynamics
14Popular Biometric Technologies
- Fingerprint verification
- Iris recognition
- Hand geometry
- Facial recognition
- Voice verification
- Signature verification
- Bleeding edge biometrics
- Gait, DNA, ear, vein geometry, thermal imaging
15Biometric Platforms
- Four general platforms
- Access (Cooperative, known subject)
- Logical Access (Access to computer networks,
systems, or files) - Physical Access (access to physical places or
resources) - Transaction Logging
- Surveillance (Non-cooperative, known subject)
- Forensics (Non-cooperative or unknown subject)
16Time and Attendance
Accu-Time Systems Biometric Readers Fingerprint
or Hand Geometry
17Fingerprint Technology
Saflink Corporation Authentec Fingerprint Sensor
with PIN
18Iris Recognition
LG Electronics Iris Recognition
19Multi-Modal Solutions
20Enterprise Solutions
21Mobile Solutions
22Biometric IndustryAugust 2001
Long evolutionary path (30 years) Fragmented
(120 small companies) Highly competitiveuneven
marketing and focus Hindered by lack of
knowledge and barriers (privacy issue) Ad Hoc
standards, limited in scope Market pull
ambiguous (not enough pain) Proven performance,
reliability, and cost
23The Attacks of September 2001
- Cloaked in anonymity and false identity
- Demonstrated authentication vulnerabilities in
many areas of the national infrastructure
24MARKET REPORT
25The Long Term View
- Biometric systems are not a quick fix
- Substantial commitment in time and resources
- Difficult to reverse course..be right the first
time - Compatibility and interoperability are critical
- Need for standards, training, and education
- Need for fast-track, objective acquisition
process - Respond to homeland security and anti-terrorist
needs - Support all government levels and the private
sector that manages the civil infrastructure
26The Homeland Security Infrastructure Threat
- The Transportation System
- Border security and international travel
- Civil aviation in general
- The Economic System
- The financial network
- Key financial centers and facilities
27The Threat (continued)
- The Social and Support Structure
- Government operations and facilities (all
branches) - Life Services facilities (food, power, water,
gas, oil) - Historical and symbolic structures and
functions - The Communications System
- Voice and data
- Internet availability and function
28Biometric Applications
- Transactions via e-commerce
- Search of digital libraries
- Network Access via Microsoft GUI
- Access to internet and local networks
- Document encryption
- Credit cards, bank cards, and ATM machines
29Biometric Applications (continued)
- Access to office buildings and homes
- Protecting personal property
- Tracking and storing time and attendance
- Law enforcement and prison management
- Access to medical and official records
- Prison visitor systems
- Drivers licenses
30Common Ideas for Future Applications
- Passports with biometric identifiers
- Workstation and network access (NIAP)
- Travel, hospitality and tourism
- Frequent flyer, border control, etc.
- Internet transactions
- Public ID cards (controversial)
- Vehicle Access (automobiles)
31Central Privacy, Sociological, and Legal
Issues/Concerns
- System Design and Implementation must adequately
address these issues to the satisfaction of the
user, the law, and society. - Can medical information be derived from the
biometric data? - Does the biometric system store information
enabling a persons identity to be
reconstructed or stolen? - Is permission received for any third party use of
biometric information?
32Central Privacy, Sociological, and Legal
Issues/Concerns (continued)
- Continued
- What happens to the biometric data after the
intended use is over? - Is the security of the biometric data assured
during transmission and storage? - Contrast process of password loss or theft with
that of a biometric. - How is a theft detected and new biometric
recognized? - Notice of Biometric Use. Is the public aware a
biometric system is being employed?
33Thank You
34Contact Information
- Dominique Harrington
- 150 Clay Street, Suite 350
- Morgantown, WV 26501
- (304)292-8800
- dharrington_at_nationalbiometric.org
35General Biometric Process
36Identification Methods
- Seek to identify an individual within a
population of possible users. - Identity means persons
- Appearance
- Physiological makeup
- Actions
- Belief Systems, Sense of Self, etc.
- We need a manageable engineering definition!
37Automotive Fingerprint
- Automobile fingerprint ID project announced
- By Jack Robertson ESM(02/21/2002 1138 AM EST)
 Fingerprint recognition security got a boost
Thursday when Delphi, a leading supplier of
automotive parts, entered a joint agreement to
develop a vehicle security system based on the
biometric technology. - AuthenTec Inc., Melbourne, Fla., will partner
with Delphi to integrate its fingerprint
identification sensor into its existing reference
design security platform. - The soaring use of fingerprint ID systems was
forecast a week ago at the U.S.
government-sponsored Biometrics Consortium
Conference in Arlington, Va. - Under the new partnership, AuthenTec will provide
the sensor pad as well as control and matching
algorithms and Delphi will develop hardware
architecture and the integration into vehicles.
After a prototype is developed, the two firms
will proceed with application and production
phases of the agreement.
38(No Transcript)