OT, Anyone here going to the Biometrics Consortium in Miami tomorrow? Please report back if .gov employee or private secror.

greenspun.com : LUSENET : TimeBomb 2000 (Y2000) : One Thread

http://www.aliconferences.com/conferences/biometrics.htm

Highlights Include:

Explore which Biometrics really work--and which are showing the most promise

Achieve cost savings and increase efficiency by implementing Biometric applications

Demonstrate proven results from your Biometrics investment

Learn what consumers really think of Biometrics

Evaluate the performance of a Biometrics system

Integrate Biometrics into existing PIN/card systems

Utilize Biometrics as a tracking and logistics tool

Discover the ethical issues and how to avoid being perceived as "Big Brother"

Develop seamless and total end-to-end business security via system solutions

Uncover what is happening with BioAPI standards

--------------------------------------------------------------------------------

The 2000 Biometrics Summit

Implementing the Practical Applications of Biometrics for the Next Millennium

February 7-9, 2000

Miami Florida

The industry forum featuring best practice examples and case studies from organizations who have successfully implemented Biometric identification systems, including:

Home Shopping Network Biometric Digest State Of Connecticut, Dept. Of Social Services City Of Baltimore Kpmg, Llp Visionics Corporation American Biometric Company Miros, Inc. Polaroid Corporation Nec Technologies Biometric Access Corporation Digital Biometrics Saflink Securcom The Association For Biometrics Sandia National Laboratories Bank United Gerber & Company, Llc I/O Software Bioapi Consortium

And Our Chairperson, Bill Rogers, Editor, Biometric Digest

Supporting Publications:

AVANTI

Access Control & Security Systems Integration

Free BioTrack software to all registered delegates. Over a $750 value!

-- Hokie (Hokie_@hotmail.com), February 06, 2000

Answers

These highlights were listed in the ad for gobernment employees, so I don't know if Monday you will be split in Miami into private sector and gobernment employees, or attend the same sessions. Anyway, I would be most interested in hearing how attendees are instructed to address this highlight : "Discover the ethical issues and how to avoid being perceived as "Big Brother" , so please report back to the forum.

-- Hokie (Hokie_@hotmail.com), February 06, 2000.

Oh, and please attendees report back if they explain to you the "smart card" used to cross-verify the bio data, as well as implants used to maximize security of the smart card chip (http://www.biometrics.org/).

FYI to those not following gobernment implementation of bio data, here is a paste. Also there is a question not addressed here re: genetic blueprint sold when urinalysis is obtained for employment.

http://www.biometrics.org/REPORTS/CTSTG96/

"Government Applications and Operations

---------------------------------------------------------------------- ---------- Joseph P. Campbell, Jr., Lisa A. Alyea, and Jeffrey S. Dunn

Biometric Consortium

R221

9800 Savage Road STE 6516

Fort Me@de, Maryland, USA 20755-6516

bc@alpha.ncsc.mil

http://www.biometrics.org/

Abstract

The information age is quickly revolutionizing the way transactions are completed. Everyday actions are increasingly being handled electronically, instead of with pencil and paper or face to face.

This growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Biometric technology is a way to achieve fast, user-friendly authentication with a high level of accuracy.

This presentation will highlight some of the benefits of using biometrics for authentication.

Emerging applications, both within the Government and industry, will be discussed.

Also presented will be an overview of the US Government Biometric Consortium and how this group is bringing together technologists from Government and industry to work together on improved standards.

Overview

Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Examples of human traits used for biometric recognition include fingerprints, speech, face, retina, iris, handwritten signature, hand geometry, and wrist veins.

Biometric recognition can be used in identification mode, where the biometric system identifies a person from the entire enrolled population by searching a database for a match.

A system also can be used in verification mode, where the biometric system authenticates a person's claimed identity from his/her previously enrolled pattern.Using biometrics for identifying and authenticating human beings offers some unique advantages.

Only biometric authentication bases an identification on an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, physical keys, and so forth, can be lost, stolen, duplicated, or left at home.

Passwords can be forgotten, shared, or observed.While all biometric systems have their own advantages and disadvantages, there are some common characteristics needed to make a biometric system usable.

First, the biometric must be based upon a distinguishable trait. For example, for nearly a century, law enforcement has used fingerprints to identify people.

There is a great deal of scientific data supporting the idea that "no two fingerprints are alike." Newer methods, even those with a great deal of scientific support, such as DNA-based genetic matching, sometimes do not hold up in court. Another key aspect is how user- friendly is the system.

Most people find it acceptable to have their pictures taken by video cameras or to speak into a microphone. In the United States, using a fingerprint sensor does not seem to be much of a problem.

In some other countries, however, there is strong cultural opposition to touching something that has been touched by many other people.

While cost is always a concern, most implementers today are sophisticated enough to understand that it is not only the initial cost of the sensor or the matching software that is involved.

Often, the life-cycle support cost of providing system administration support and an enrollment operator can overtake the initial cost of the hardware. Also of key importance is accuracy.

Some terms that are used to describe the accuracy of biometric systems include false-acceptance rate (percentage of impostors accepted), false-rejection rate (percentage of authorized users rejected), and equal-error rate (when the decision threshold is adjusted so that the false- acceptance rate equals the false- rejection rate).

When discussing the accuracy of a biometric system, it is often beneficial to talk about the equal-error rate or at least to consider the false-acceptance rate and false-rejection rate together.

For many systems, the threshold can be adjusted to ensure that virtually no impostors will be accepted. Unfortunately, this often means an unreasonably high number of authorized users will be rejected. To summarize, a good biometric system is one that is low cost, fast, accurate, and easy to use.

Examples of Biometric Applications

There are many examples of biometrics being used or considered in Federal, State, local, and foreign government projects. One use is to provide robust authentication for access to computer systems containing sensitive information used by the military services, intelligence agencies, and other security-critical Federal organizations.

Physical access control to restricted areas is another key application.

There are many law enforcement applications, mostly for fingerprint recognition, at the Federal, State, and local levels. Other law enforcement applications include home incarceration and physical access control in jails and prisons.Perhaps one of the most extensive applications of biometrics is for entitlements.

Fraud in entitlement programs is estimated by the General Accounting Office at over $10 billion per year. Pilot programs in several States have demonstrated dramatic savings by requiring biometric authentication when someone is applying for entitlement benefits.There are also significant applications for biometrics in the commercial sector.

Some of the biggest potential applications include the use of biometrics for access to Automated Teller Machines (ATMs) or for use with credit or debit cards. Many types of financial transactions are also potential applications; e.g., banking by phone, banking by Internet, and buying and selling securities by telephone or by Internet.

Fraud on cellular telephone systems has increased dramatically and is estimated by some sources at over $1 billion per year. Biometrics are being considered to reduce this fraud. Telephone credit card fraud is also a significant problem that may benefit from the use of biometrics.

There are also commercial applications for computer access control, access to web site servers, access through firewalls, and physical access control to protect sensitive information.

Current Applications

Immigration and Naturalization Service's (INS) Passenger Accelerated Service System (INSPASS)[1,2]

INSPASS was designed as a means to provide prompt admission for frequent travelers to the US by allowing them to bypass the personal interview/inspection part of the entry process. It uses hand geometry to verify the identity of the traveler at an automated inspection station. INSPASS stations have been installed, for example, at John F. Kennedy Airport in New York and Newark International Airport in New Jersey. INSPASS is available for citizens of 23 countries in the US visa waiver program who visit the US at least 3 times per year. These same 23 countries are planning to participate in the Future Automated Screening for Travelers (FAST) project, which would allow travelers to use automated passport inspection stations in countries participating in FAST.

CANPASS[1,2,3]

CANPASS is the Canadian version of INSPASS, except that it uses a fingerprint biometric, rather than hand geometry, for traveler verification. The goal of CANPASS is to ease the transfer of goods and people between the US and Canada. CANPASS is in use at the Vancouver International Airport.

PORTPASS[1,2,4]

PORTPASS is another INS initiative similar to INSPASS except that people in vehicles at borders are being monitored and it uses a voice recognition biometric, instead of hand geometry. PORTPASS is used at a US/Canadian vehicle border crossing and is planned for use at US/Mexican border crossings. One version of PORTPASS (the Automated Permit Port) requires the vehicle to stop. It will also have a Video Inspection Service, allowing a driver to conference with an Inspector should the biometric fail. Another version, known as the Dedicated Commuter Lane, uses a radio frequency tag affixed to the vehicle in order to obtain the biometric as the vehicle is moving.

Federal Bureau of Prisons[4]

The Federal Bureau of Prisons is using hand geometry units to monitor the movements of prisoners, staff, and visitors within certain Federal prisons. A successful trial with the hand geometry units was conducted at the Federal prison in Jesup, Georgia. Visitors must enroll upon arrival and are given a magnetic stripe card containing information that points to his/her identifying information in a central database. This card must be carried with the visitor at all times. Staff and inmates must also enroll. Staff are enrolled to reduce the possibility of mistakenly identifying them as an inmate or for positive identification in the event of a disturbance. Prisoners are enrolled for access control to places such as the cafeteria, recreation lounges, and the hospital. The system also allows for the tracking of prisoners' movements. By the end of 1995, around 30 Federal prisons were to have the hand geometry monitoring system installed.

Automated Fingerprint Image Reporting and Match (AFIRM)[3,4,5,6] In July of 1991, Los Angeles County in California installed the first AFIRM system. AFIRM was needed to reduce fraudulent and duplicate welfare benefits. The fingerprints of new applicants for welfare benefits are checked against a central database of prior claimants. Within the first 6 months of use, the county saved $5.4 million dollars, and the savings have been growing ever since. The system has been so successful that San Francisco, Alameda County, and Contra Costa County have installed AFIRM and check new claimants' fingerprints against existing recipients in these locales. AFIRM is expected to be in statewide operation in California by some time in 1997.

Spanish National Social Security Identification Card (TASS)[1,7,8,9] The TASS program is a smart card initiative employing fingerprint technology to eliminate enrollment duplication and provide secure access to personal information upon retrieval. The program is an ambitious one, in that it will combine pension, unemployment, and health benefits all on one card.

The Colombian Legislature[4,7]

The Colombian Legislature uses hand geometry units to confirm the identity of the members of its two assemblies immediately prior to a vote. The voting has been conducted this way since 1992.Many Federal, State, and local government agencies have purchased biometric systems. The Defense Advanced Research Projects Agency, Drug Enforcement Agency, Department of Defense, Department of Energy, Department of Public Safety, Department of State, Federal Bureau of Investigation, Federal Reserve Bank, Hill Air Force Base, the Pentagon, and the US Mint have approximately 250 biometric devices with 13,000 enrolled users for access control applications.[10]

Planned Applications

California, Colorado, Florida, and Texas Departments of Motor Vehicles [3] Efforts are underway to establish biometric-based screening of drivers. California records thumbprints digitally in its database.* Colorado and Texas record fingerprint images on their drivers' licenses. Florida is considering this idea. The goal is to eliminate the tampering with or faking of licenses by verifying the recorded fingerprint data.

Government Accounting Office's Electronic Benefits Transfer (EBT) Task Force[11]

Plans are underway to disburse many of the Federal Government benefits (e.g., retirement, social security, welfare) electronically through ATMs and point-of-sale terminals. It is estimated that $110 billion in Government benefits could be transferred onto and debited from access cards in this way. Initial plans are to implement fingerprint identification at the benefit enrollment phase. The success of the AFIRM program in Los Angeles County was the inspiration for the EBT plan. Fingerprint identification in the benefit disbursement phase is also under consideration to eliminate what could amount to extensive losses from the abuse of lost or stolen cards.

FBI's Integrated Automated Fingerprint Identification System (IAFIS) [12] IAFIS is designed to electronically replace the horrendously outdated, mostly manual fingerprint identification system that requires paper-based fingerprint cards, postal submissions of the cards, and labor-intensive searches. IAFIS would replace paper-based fingerprints with electronic ones. Submissions of requests could be made electronically and all searches for fingerprints would be conducted electronically. The goal is to reduce response time to a requesting agency from the current 10 weeks to 24 hours.

National Crime Information Center 2000 (NCIC 2000) [13] NCIC 2000 offers new and improved capabilities for the National Crime Information Center. Biometric information, such as that contained in the signature, face, and fingerprint, will be used in an automated system. Patrol cars will have the capability to capture fingerprints and eventually relay the information to local, State, and/or Federal Automated Fingerprint Identification Systems (AFISs). The goal is to have the new and improved system fully operational by the fall of 1999.

Interest

The interest in implementing biometrics for various applications within the Government, industry, and academia is widespread and quite varied. The following examples touch upon a few of the many possible uses of biometrics within the Federal Government.

The Department of State is considering the use of biometrics to aid in their processing of 4 to 5 million passports/visas per year.

The Bureau of Printing and Engraving would like to improve their current security methods with the addition of biometrics in order to prevent any loss of currency.

The Department of Defense is researching biometrics and their implementation for computer network security.

The Federal Aviation Administration is considering biometrics for airport security applications.

US Government Biometric Consortium Charter

The Biometric Consortiumms charter was formally approved on December 7, 1995, by the Facilities Protection Committee, a committee that reports to the Security Policy Board through the Security Policy Forum. The Security Policy Board was established by Presidential Decision Directive/NSC-29 on September 16, 1994, for the coordination, formulation, evaluation, and oversight of US national security policy. The Security Policy Board reports to the Assistant to the President for National Security Affairs. The following is the text of the Biometric Consortiumms charter as approved by the Facilities Protection Committee:

Charter

7 December 1995

The Biometric Consortium (hereafter referred to as the Consortium) is chartered by the National Security Policy Board through the Facilities Protection Committee.

BACKGROUND

Since 1992, a working group known as the Biometric Consortium has been meeting to share information and advice and to serve as the focal point for coordinating and developing advanced biometric processing, testing, and evaluation techniques within the US Government. The Consortium is presently comprised of representatives from six executive departments of the US Government and each of the Military Services. A goal of the Consortium is to develop an independent assessment facility to evaluate and test evolving biometric devices. The National Security Agency initiated the formation of the Consortium as part of its Information Systems Security mission, with a goal to increase the availability of biometric authentication and identification to meet the needs of the Department of Defense and other Federal agencies. Towards that goal, the NSA has invested personnel resources and funds to provide organizational and administrative support to the Consortium. The Consortium has been, and continues to be, the US Governmentms primary source of technical information for biometric considerations. Because of the increasing interest of the Consortium members to apply biometrics to a wide range of Government needs, it has become evident that the Consortium needs to be established by the National Security Policy Board to ensure a consistent, coordinated US Government approach to biometric authentication and identification.

MISSION

The Consortium will serve as a Government focal point for research, development, test, evaluation, and application of biometric-based personal identification/ authentication technology. The Consortium will encourage the use and acceptance of biometric technology in areas of critical need and also concern itself with maximizing performance, minimizing cost, and avoiding duplication of effort within the Government community. The Consortium will coordinate technological concerns and issues of performance and efficiency within the Government in order to serve the best interests of the taxpayer.

The Consortium will meet regularly to

Promote the science and performance of biometrics. Create standardized testing databases, procedures, and protocols for the community and security policy organizations. Provide a forum for information exchange between the Government, private industry, and academia. Establish increased Government and commercial interaction. Facilitate symposia/workshops to include the participation of academia and private industry. Establish a feedback mechanism for issues that are exposed during the actual application of this technology. Address the safety, performance, legal, and ethical issues surrounding this technology. Advise and assist member agencies concerning the selection and application of biometric devices. The Consortium will also Coordinate with the Information Systems Security Committee to foster awareness of biometrics. Establish ad hoc bodies, as required, to address specific areas of need within the Government biometric community. Provide copies of all meeting invitations, agendas, published proceedings, and meeting minutes to the Chairpersons of the Security Policy Board, Facilities Protection Committee, and Information Systems Security Committee. COMPOSITION AND ORGANIZATION

The Facilities Protection Committee appoints the National Security Agency as the executive agent of the Consortium. The NSA will provide the chairperson of the Consortium. The members of the Consortium are Government agencies or organizations and will be represented by designated Government officials. Members of private industry and academia will be invited to the Consortium meetings in an observer capacity.[14] Biometric Consortium National Evaluation Center Real-world performance prediction is a complex problem, but it is of prime concern to Biometric Consortium members. For the most part, the only available information for members to select a biometric device is a sales brochure. The performance claims stated in the sales brochure may not hold true for a given device in a given application. For example, a device that measured 0.3% equal-error rate in a lab was found in the field to have a false-rejection rate of approximately 25% (at an unknown false-acceptance rate). While a change in this device's threshold between the lab and field tests might explain the difference, it is more likely that the 0.3% equal- error rate was measured under unrealistic conditions. Without an unbiased appraisal by an independent evaluation center, Biometric Consortium members may not be getting what they are paying for when they purchase a device. The Consortium hopes the establishment of an evaluation center will bring to biometric testing the maturity, the reliability, and the repeatability that are nearly absent today.Establishment of the Evaluation Center is expected by the end of 1996. Updates on the status of the Evaluation Center will be posted on the Consortium's homepage described below.

Biometric Consortium World Wide Web Homepage

The Biometric Consortium established its own homepage on the World Wide Web in November of 1995. To date, there have been over 6000 visitors. More than 200 hypertext links allow visitors to peruse various sites of biometric interest residing on the Internet. Information about Consortium meetings (including slide presentations), Consortium working groups, Government activities, publications, periodicals, upcoming events, research, databases, examples of biometric systems, and other related sites all can be found on the Biometric Consortiumms World Wide Web homepage. A hard copy version of the homepage is included at the end of this paper. The homepage also contains information about subscribing to the Consortium's electronic mail discussion group (listserv), which is our primary means of communication. The Biometric Consortium can be found at this URL

http://www.biometrics.org/

For more information on the US Government Biometric Consortium, contact Dr. Joseph P. Campbell, Jr., Chairman, or Lisa A. Alyea, Vice Chair, at the following Internet electronic mail address: .

Summary

There is great demand for the fast, accurate authentication that biometric systems can provide. Continued improvements in technology will bring increased performance at a lower cost, fueling the continued growth in operational systems. This growth will place greater demand on both biometric system developers and users to work together in developing testing (as well as infrastructure) standards. Within the Federal Government community, the US Government Biometric Consortium provides a forum for this exchange to take place.

References

[1] Zunkel, Richard. Biometrics and Border Control. Security Technology & Design, May 1996, p 22-27. [2]Hays, Ronald J. INSPASS. Jan 1996. . [13 Sept 1996]. [3]Mintie, David. Biometrics in Human Services User Group Newsletter. Vol 1, No. 1, July 1996. . [13 Sept 1996]. [4] Newham, Emma. The Biometrics Report. SJB Services, 1995. [5] Dunn, Jeffrey S. and Joseph P. Campbell, Jr. Report on Biometrics. ScanTech Conference Proceedings, 1996. [6] Los Angeles County Stops Fraud with Automated Fingerprint Matching System. Hewlett-Packard Company. . [13 Sept 1996]. [7] Miller, Ben. PIN's Top 10 Biometric Applications. The 1997 Advanced Card and Identification Technology Sourcebook, 1997, p 37. [8] Spanish Government Agency Wins Outstanding Smart Card Application Award at CTST '96 Awards Banquet. May 1996. CardFlash. RAM Research Group. . [13 Sept 1996]. [9] Unisys Personal Identification Technology Will Be Used to Give Spaniards Access to Personal Information in Spain's Healthcare Databases. March 1996. UNISYS WORLD Editorial Index. Publications and Communications Inc. . [13 Sept 1996]. [10]Roethenbaugh, Gary (Ed.). US Physical Access Control. Biometric Technology Today. SJB Services. September 1996, p 10-15. [11]US General Accounting Office. Report to the Honorable Kenneth E. Bentsen, Jr., House of Representatives. Electronic Benefits Transfer: Use of Biometrics to Deter Fraud in the Nationwide EBT Program. GAO. Sept 1995. [12] IAFIS: The Real Story. FBI Home Page. . [13 Sept 1996]. [13] What is NCIC 2000? NCIC 2000. Vol 1, No.1. February 1996. Security Management Online. . [13 Sept 1996]. [14] Alyea, Lisa A. and Joseph P. Campbell, Jr. Update on the US Government's Biometric Consortium. CardTech/ SecurTech Conference Proceedings, May 1996, p 401-7.

*Revised 13 November 1997 "



-- Hokie (Hokie_@hotmail.com), February 06, 2000.


Moderation questions? read the FAQ