Posted on 03/13/2006 4:14:23 PM PST by SandRat
WASHINGTON, March 13, 2006 A high-tech Defense Department identification system has linked some captured terrorists to previous crimes and prevented their release from overseas detention facilities, senior defense officials said at a Senate Armed Services Committee hearing here March 10.
"I understand that the (defense) department is collecting biometric information from individuals detained in Iraq and for forensic investigations of (improvised explosive device) attacks," Texas Sen. John Cornyn, chairman of the SASC's emerging threats and capabilities subcommittee, said to Paul McHale, assistant secretary of defense for homeland security. "Consistent with applicable law, we are aggressively using biometrics for the purposes that you described, Senator," McHale answered. DoD established standard procedures for collecting biometrics information about a year and a half ago and provided that system to overseas U.S. combatant commands, McHale said. Biometrics is defined as measurable physical or behavioral characteristics that can be used to identify people. Terrorists in Iraq often employ IEDs, or roadside bombs, against U.S., coalition, and Iraqi military forces and civilians. Cornyn also asked McHale if DoD was sharing its detainee biometrics information with the U.S. Departments of Justice, State or Homeland Security, so that detainees who might escape could be prevented from entering the United States to do mischief. McHale responded that DoD's detainee biometrics information databank is collocated with the FBI and is also shared with the Department of Homeland Security and other agencies. The biometrics program used for identifying detainees "is an extraordinary success story," Army Lt. Gen. Joseph R. Inge, deputy commander of U.S. Northern Command and vice commander of North American Aerospace Defense Command's U.S. element, said. In "many instances," the general said, that biometric data has kept dangerous detainees safely under lock and key. "We have linked that data to specific individuals and in specific cases have kept them in custody under circumstances, where but for that biometric data, they might have been released," Inge said. Similar systems are being used to improve force protection at U.S. military bases in Iraq. During a demonstration conducted in the Washington, D.C., area in May 2005, officials showed how biographical data, facial photographs, fingerprints and iris scans can be employed to develop ID cards that can't be counterfeited, ideal for use by Iraqis and other non-U.S. citizens who work on U.S. bases in Iraq. The need for a better way to screen people coming onto U.S. bases in Iraq was illustrated by the Dec. 21, 2004, bombing of a military dining facility in Mosul. That blast killed 22 people, including 14 U.S. soldiers, and wounded at least 50. It was first thought the dining hall had been hit by a rocket attack. Further investigation of the Mosul bombing pointed to the likelihood that a suicide bomber had infiltrated the base - one non-U.S. person killed couldn't be identified - and set off the explosion. |
Anyone want to guess how long it takes the ACLU/AmNasty International to cry; "Your Invading their Right to Privacy and Compelling them to Give Evidence in violation of their rights!!!"??????
This is Applied Digital Solutions. They are the ones that came out with the chips being used for NAIS
More on NAIS:
http://www.freerepublic.com/focus/keyword?k=tagging
http://biometrics.cse.msu.edu/icprareareviewtalk.pdf
Biometrics: A Grand Challenge
Anil K. Jain, Sharath Pankanti, Salil Prabhakar,
Lin Hong, Arun Ross, and James L. Wayman
Michigan State University, IBM T. J. Watson Research Center, DigitalPersona Inc.,
Siemens Corporate Research, West Virginia University, San Jose State University
http://biometrics.cse.msu.edu
Person Identification
Identifying fellow human beings has been crucial
to the fabric of human society
In the early days of civilization, people lived in
small communities and everyone knew each other
With the population growth and increase in
mobility, we started relying on documents and
secrets to establish identity
Person identification is now an integral part of the
infrastructure needed for diverse business sectors
such as banking, border control, law enforcement..
Identification Problems
Security Threats:
We now live in a global society of increasingly desperate
and dangerous people whom we can no longer trust
based on identification documents which may have been
compromised
Senator? Terrorist? A Watch List Stops Kennedy at
Airport:
Senator Edward M. Kennedy, Democrat of Mass., discussed the problems faced by ordinary citizens mistakenly placed on terrorist watch lists. Between March 1 and April 6,
airline agents tried to block Mr. Kennedy from boarding airplanes on five occasions because his name resembled an alias used by a suspected terrorist who had been barred from flying on airlines in the United States.
RACHEL L. SWARNS,NY Times,Aug 20, 2004
Identification Problems
Identity Theft:
Identity thieves steal PIN (e.g., date of
birth) to open credit card accounts, withdraw money from
accounts and take out loans 3.3 million identity thefts in U.S. in 2002; 6.7 million victims of credit card fraud Surrogate representations of identity such as passwords and ID cards no longer suffice
Too Many Passwords to Remember!
Heavy web users have an average of 21 passwords; 81% of users select a common password and 30% write their passwords down or store them in a file.
(2002 NTA Monitor Password Survey)
Biometrics
Automatic recognition of people based on their distinctive
anatomical (e.g., face, fingerprint, iris, retina, hand geometry) and behavioral (e.g., signature, gait) characteristics recognition of a person by their body, then linking that body to an externally established identity, forms a very powerful tool
John Smith
Biometric Functionalities
Positive Identification
Is this person truly known to the system?
Provide log-in access to a valid user
Large Scale Identification
Is this person in the database?
Prevent issuing multiple driver licenses to the same person
Screening
Is this a wanted person?
Airport watch-list
Query image
(Vincent)
Template image
(Vincent)
Vincent
XG
Dennis
Ross
Silviu
Kim
Query image
Only biometrics can provide negative
identification (i.e., I am not he) capability
Biometrics: A Killer P.R. Application
A Challenging Pattern Recognition Problem
Enabling Technology to make our society safer,
reduce fraud and offer user convenience (user-
friendly man-machine interface)
Policy-makers worldwide concede this is one of the
crucial components of reliable person identification
Given its unique capability of identifying persons
based on their intrinsic characteristics, it will emerge
as a pervasive tool for personal identification
Biometrics: A Grand Challenge
A fundamental problem in science and engineering with
broad economic and scientific Impact
Accuracy
Scale
Usability
Unusable
Hard to Use
Easy to Use
Transparent to User
10
1
10
3
10
5
10
7
90%
99%
99.99%
99.999%
The grand challenge is to design a biometric system that
would operate on the extremes of all these three axes
simultaneously
As part of the enhanced procedures, most visitors traveling on visas will have two fingerprints scanned by an inkless device and a digital photograph taken. All of the
data and information is then used to assist the border inspector in determining whether or not to admit the traveler.
These enhanced procedures will add only seconds to the visitors overall processing time.
(DHS US-VISIT web-site)
The electronic fingerprint scanner will allow inspectors to
check identities of visitors against those on terrorist watch lists. (Stephen J. Boitano, AP)
There are 500 million border crossings/year (each way) in the U.S.
Want to Charge It?
Beepcard, a company in California, has designed a
credit card that works only when it recognizes the
voice of its rightful owner
Enclosed in the card is a tiny microphone, a loudspeaker and a speech recognition chip that compares the spoken password with a recorded sample.
Total credit card fraud amounts to billions of dollars every year
Point of sale
Secure multimedia
Biometric Applications
Disney World
Haj pilgrims in Saudi Arabia
URL at your fingertip
Mobile phone
Iris-based ATM
Sharbat Gula in 1985, 1992
Biometrics is Not New!
Bertillon system (1882) took subject's photograph, and recorded height, the length of one foot, an arm and index finger
Galton/Henry system of fingerprint classification adopted by Scotland Yard in 1900
FBI set up a fingerprint identification division in 1924
AFIS installed in 1965 with a database of 810,000 fingerprints
First face recognition paper published in 1971 (Goldstein et al.)
FBI installed IAFIS in 2000 with a database of 47 million 10 prints; average of 50,000 searches per day; 15% of searches are in lights out mode. 2 hour response time for criminal search
Emphasis now is to automatically perform reliable person
identification in unattended mode, often remotely (or at a distance)
Biometric Market Growth
International Biometric Group
Why is Biometrics so Difficult?
Intra-class variability and inter-class similarity
Segmentation
Noisy input & population coverage
System performance (error rate, speed, cost)
Individuality of biometric characteristics
Fusion of multiple biometric attributes
Scalability
Attacks on the biometric system
Privacy Issues
Intra-class and Inter-class Variations
Variability observed in the face image of a single person due to change in pose, expression, lighting and eye glasses
Faces that look similar
R.-L. Hsu, Face Detection and Modeling for Recognition, Ph.D. Thesis, 2002
Recognizing the Smile
Home Office prohibits happy biometric passports
The Home Office says all new passport photographs must be of an unsmiling face with its gob firmly shut because open mouths can confuse facial recognition systems.
The new guidelines state that photographs must have a strong definition between the face and background; be of the full face facing straight at the camera; show no shadows, and that subjects must have "a neutral expression, with your mouth closed".
A Sun report confidently tells its readers that "immigration Service officials will run the passport through scanners which will cross-check them against worldwide crime memory banks" and that "the 'biometric' tests ensure that people cannot use stolen or fake documents".
- Lucy Sherriff, The Register, Aug. 6, 2004
Sensor Interoperability
Sensors used during enrollment and verification may be different
Noisy Images
3
poor quality fingerprint images
Four impressions of a users fingerprint
Segmentation: Face Detection
*Theo Pavlidis, http://home.att.net/t.pavlidis/comphumans/comphuman.htm
State-of-the-art Error Rates
Test
Test
Parameter
False
Reject Rate
False
Accept Rate
Fingerprint
FVC
[2004]
20 years
(average age)
2%
2%
Face
FRVT
[2002]
Varied lighting,
outdoor/indoor
10%
1%
Voice
NIST
[2000]
Text
Independent
10-20%
2-5%
At NY airports, an average of 200,000 passengers pass through daily. If all of these used biometric-authenticated smart cards for identification, there would be 4000 falsely rejected (and inconvenienced) passengers per day for fingerprints, 20,000 for face and 30,000 for voice. Similar
numbers can be computed for false accepts
FVC 2004 Results
Algoritm EER (%)
Avg Enroll
Time (sec)
Avg
Match
Time
(sec)
Avg Model
Size (KB)
Bioscrypt
Inc.
2.07
0.08
1.48
2.07
0.67
0.71
1.19
24
Sonda Ltd
2.10
2.07
1.3
Chinese Academy of Sciences
2.30
0.35
16.4
Gevarius
2.45
0.69
2.0
Jan Lunter
2.90
1.01
3.1
Database:
DB1: optical sensor "V300" by CrossMatch
DB2: optical sensor "U.are.U 4000" by Digital Persona
DB3: thermal sweeping sensor "FingerChip FCD4B14CB" by Atmel
DB4: synthetic fingerprints
Typical Intrinsic Matcher (1:1)
Performance Requirements
Typical Intrinsic Matcher (1:1)
Performance Requirements
Functionality
FNMR %
FMR %
Authentication
0.1
0.1
Large Scale
Identification
10.0
0.0001
Screening
1.0
0.0001
It is assumed that large-scale identification consists of 1 million identities and screening involves 500 identities. FTA and FTE are assumed to be zero. These numbers are based on what the authors believe to be the order of magnitude
estimate of the performance needed for viability of a typical application.
Given an input fingerprint with n minutiae, compute the
probability that it will share q minutiae with any other
template fingerprint containing m minutiae, p(M, m, n, q).
The corresponding minutiae should match in location and
Individuality of Fingerprints orientation.
(C)
(A)
(a) M=52
m=n=q=26
P = 2.40 x 10
-30
(b) M=52
m=n=26, q=10
P = 5.49 x 10
-4
*Pankanti, Prabhakar, Jain, "On the Individuality of Fingerprints", IEEE Transactions on
PAMI, Vol. 24, No. 8, pp. 1010-1025, 2002.
Multibiometrics
Limited discrimination and non-universality of a biometric
Face
Hand
geometry
Fingerprint
Helps improve accuracy and population coverage
Page 29
Fusing Face & Fingerprint Systems
Fusing Face & Fingerprint Systems
Min-Max
Normalization of
matching scores
Sum Rule
1000 Subjects
EER is reduced from 3% for the best individual matcher to <1% for multimodal system
Soft Biometrics
Eye color
Gender, Skin Color, Hair color
Height
http://ology.amnh.org/genetics/longdefinition/index3.html
© American Museum of Natural History, 2001
http://anthro.palomar.edu/adapt/adapt_4.htm
© Corel Corporation, Ottawa, Canada
http://www.altonweb.com/history/wadlow/p2.html
© Alton Museum of History and Art
http://www.laurel-and-hardy.com/
goodies/home6.html © CCA
Weight
Identification at a Distance
Height: 5.9 ft.
Eye color: black
Gender: Male
Ethnicity: Asian
Face: LDA Coefficients
Identity: Unsang
Scalability of Biometric Systems
How does the number of identities in the database affect the
speed and accuracy of the system?
Few published studies on reliable indexing of biometric patterns
Fingerprint Classification
Assign fingerprints into one of pre-specified types (coarse
classification for indexing);
Best 4-class performance is only 95%
Plain Arch
Tented Arch
Right Loop
Left Loop
Plain Whorl
Accidental
Pocket Whorl
Double Loop
Vulnerability of a Biometric System
Like any system, biometric systems can be attacked in different ways
Ratha et al., An Analysis of Minutiae Strength, AVBPA 2001
Fake Biometric
Replay old data
Override feature extractor
Synthesized feature vector
Override matcher
Modify template
Intercept the channel
Override final decision
Liveness detection
Template Protection
Encrypting or watermarking templates in the database
Storing only a transformed and unrecoverable version of a
users template to protect the original template
Cancelable biometric
Jain,Uludag, Hsu, "Hiding a Face in a Fingerprint Image", Proc. of ICPR, Aug., 2002
Ratha, Connell, Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol. 40,
no. 3, 2001, pp. 614-634.
©
Ratha, Connell, Bolle (IBM)
Biometric Enabled Smart Card
Template resides in the personal smart card of a user
Verification takes place via a built-in chip on the card
Template does not leave the card; no centralized biometric
database is required
Siemens Matcher on Card
Version 1.1
Precise Biometrics
5th
Sense from Veridicom
Privacy Concerns
Biometric can help in protecting individual privacy; because biometrics provides stronger identification than password, it can be used to guard personal & sensitive information (Health Information Privacy Protection Act)
Will biometric data be used to track people (secretly) violating their right to privacy?
Functionality creep: Will biometric data be used only for their intended purpose? Will various biometric databases be linked?
Religious/Cultural Objections
© Orlando Sentinel
This is no different than acceptance of some other technologies
Summary
Reliable and automatic person identification is becoming
a necessity; emerging applications include national ID
card, border crossing, access control Internet shopping,
and computer data security
There is no substitute to biometrics for effective person
identification; it is becoming a necessary component of
any ID management system
Biometric sensors are cheap; fingerprint, face and voice
sensors are available in laptops & mobile phones
But, biometric system performance is not meeting the
expectations
Summary
Research is needed in (i) new representations, (ii)
matching algorithms, (iii) database indexing, (iv)
fusion of biometric modalities, (v) liveness detection,
(vi) template protection, (vi) error rate estimation
Need more system testing and evaluation on large
standardized databases
Biometrics has great potential to improve our privacy,
but government regulations are needed
No security system, including biometric system, is
foolproof
Need cost/benefit analysis for the deployment of
biometric systems; quantifying deterrence has proved
extremely difficult
Future Directions
User Adaptation
Observing how the user interacts with the biometric device (e.g., user approaching a hand geometry device)
Soft Biometrics
Utilize soft biometric traits like color of eye, color of hair, gender to reinforce identity
Tracking
Monitor user behavior over an entire session (e.g., not just at login time) in order to validate identity
Applied Digital Solutions new "Verichip" about the size
of a grain of rice, is the first-ever computer ID chip,
that could be embedded beneath a persons skin.
Yahoo! News 27 Feb 02
Verichip
(AP Photo/Applied Digital Solutions)
The animal tagging is being mandated on us from the NGOs.
The CFRs from the NGO grant monies makes everything the monies touch, theirs.
All the data collected from tagging and premise registration goes into the GLOBAL database.
Here is the companies press release.
GLOBAL VERICHIP SUBSCRIBER (GVS) REGISTRY READY FOR FIRST-EVER VERICHIP "CHIPPING" PROCEDURE ON MAY 10TH AND LAUNCH OF VERICHIP INTO U.S. MARKET
Secure database and 24/7 operations center will support VeriChip subscribers, affiliates and authorized centers.
PALM BEACH, FL �May 2, 2002 -- Applied Digital Solutions, Inc. (Nasdaq: ADSX), an advanced technology development company, announced today that its Global VeriChip Subscriber (GVS) Registry service is ready for the first-ever VeriChip "chipping" procedure on May 10, 2002 and VeriChip's official market launch in the United States.
The GVS Registry service, first announced April 9, 2002, supports VeriChip subscribers, authorized VeriChip centers and VeriChip System Affiliates (such as hospitals, EMTs, search and rescue units, and urgent care clinics) by providing immediate access to vital subscriber information in an emergency.
Full-scale marketplace operation of the GVS Registry service will begin with the historic Jacobs family "chipping" procedure on May 10, 2002. The procedure will be followed by a press conference and an invitation-only brunch for business partners and community leaders.
During the press conference and the business brunch, Applied Digital executives will unveil more details about VeriChip's rollout plans.
VeriChip is a miniaturized, implantable, radio frequency identification device (RFID) that can be used in a variety of security, emergency and healthcare applications. About the size of a grain of rice, each VeriChip is composed of FDA-accepted materials and contains a unique verification number that can seamlessly integrate to the GVS Registry via a proprietary VeriChip scanner. Instant access to such vital information as allergies to medications, medical device implants, pre-existing medical conditions and emergency contact numbers could save lives in an emergency and enhance the peace of mind of subscribers and their loved ones.
The new GVS Registry Service is hosted and maintained by Digital Angel Corporation's (Amex: DOC) state-of-the-art, FDA-compliant operations centers in Riverside, California and Owings, Maryland. Complementary, 24/7 call-center services are provided by a physician-supervised staff of support associates in Owings, Maryland.
The GVS Registry service will initially support VeriChip subscribers in South Florida who will be "chipped" during the company's initial product rollout beginning with the Jacobs family on May 10, 2002.
Performed under the supervision of the company's first Authorized VeriChip Center in Palm Beach County, the rollout will feature the use of the first ChipMobile� � a state of the art, medically equipped mobile unit that will deliver VeriChip to initial target markets such as elder care centers, critical care facilities and Generation Y events. The Palm Beach County rollout will last until June 30, 2002, at which time the company expects to move into other geographic markets and initiate nationwide distributor alliance programs.
Commenting on this announcement, Scott R. Silverman, President of Applied Digital Solutions, said: "As promised, the GVS Registry is now fully operational and is prepared to securely house subscriber information so it can be accessed by Authorized VeriChip Affiliates such as hospitals and EMS units. We're confident the GVS Registry's secure software and database will integrate seamlessly with the VeriChip product and proprietary scanners to provide our subscribers with instant access to potentially life-saving, accurate, complete emergency healthcare information stored in the Registry."
About VeriChip� VeriChip, first announced on December 19, 2001, is a miniaturized, implantable, radio frequency identification device (RFID) that can be used in a variety of security, emergency and healthcare applications.
On April 4, 2002, the company announced that it had received written guidance that the U.S. Food and Drug Administration (FDA) does not consider VeriChip's personal verification device to be a regulated medical device, enabling the company to begin sales, marketing and distribution of VeriChip in the United States. About the size of a grain of rice, each VeriChip is composed of FDA-accepted materials and contains a unique verification number. That number is captured by briefly passing a proprietary, external scanner over the VeriChip. A small amount of radio frequency energy passes through the skin energizing the dormant VeriChip, which then emits a radio frequency signal transmitting the verification number. The company believes its first-mover advantage will enable it to gain significant market share in the emergency information and verification market that is estimated to exceed $15 billion. VeriChip Corporation is a wholly owned subsidiary of Applied Digital Solutions.
About Digital Angel Corporation Digital Angel Corporation (Amex: DOC) was formed on March 27, 2002, in a merger between Digital Angel Corporation and Medical Advisory Systems, a global leader in telemedicine that has operated a 24/7, physician-staffed call center in Owings, Maryland, for two decades.
Prior to the merger, Digital Angel Corporation was a wholly owned subsidiary of Applied Digital Solutions. Applied Digital Solutions is the beneficial owner of 19.6 million shares of Digital Angel Corporation. Digital Angel� technology represents the first-ever combination of advanced biosensors and Web-enabled wireless telecommunications linked to the Global Positioning System (GPS). By utilizing advanced biosensor capabilities, Digital Angel will be able to monitor key body functions � such as temperature and pulse � and transmit that data, along with accurate emergency location information, to a ground station or monitoring facility. For more information about Digital Angel, visit www.digitalangel.net.
About Applied Digital Solutions Applied Digital Solutions (Nasdaq: ADSX) is an advanced technology development company that focuses on a range of early warning alert, miniaturized power sources and security monitoring systems combined with the comprehensive data management services required to support them. Through its Advanced Technology Group, the company specializes in security-related data collection, value-added data intelligence and complex data delivery systems for a wide variety of end users including commercial operations, government agencies and consumers.
For more information, visit the company's website at http://www.adsx.com.
Statements about the Company's future expectations, including future revenues and earnings, and all other statements in this press release other than historical facts are "forward-looking statements" within the meaning of Section 27A of the Securities Act of 1933, Section 21E of the Securities Exchange Act of 1934, and as that term is defined in the Private Litigation Reform Act of 1995. Such forward-looking statements involve risks and uncertainties and are subject to change at any time, and the Company's actual results could differ materially from expected results. The Company undertakes no obligation to update forward-looking statements to reflect subsequently occurring events or circumstances.
Investor Contact---------------------------Media Contact Lynn Anderson-------------------------Matthew Cossolotto Phone: 561-805-8007------------------Phone: 914-245-9721
On to the human tagging!
ping
ping
Why are camels called the "Ships of the Desert"????
Because they are full of Iranian Sea men.
They are already cashing in on the Pay to Play contracts at the WTC with this
http://www.freerepublic.com/focus/f-news/1585686/posts
Smart Cameras, Armed Guards to Protect WTC
For the morning mark.
Thanks!
Sometimes the old ways are the best ways.
This scares me! Our security data will be in a Global third party database?
Something ain't right!
BTTT
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.