Format 1 – Sample Bullet Slide

advertisement
Biometric Identification
for
Efficiency and Security
James Jasinski
November 28, 2007
Agenda

Biometrics – Short History
-Eyewitness Identification
-Recidivist Mobility

Technology Evolution
-Alphonse Bertillon
-Bertillonage
-William/Will West Case

Biometric Implementation
-Fingerprint Identification
-Law Enforcement and Mobile Technology
-Civil Uses and Mobile Technology
Biometrics – A Short History
Eyewitness Identification
Until the mid nineteen century primary method of
identification was:
•Eyewitness
•Description
•Documentation
Weaknesses:
•Move to where not known
•Alter his/her appearance – weight, hair, dress
•Change his/her name, date of birth, identity
number
Recidivist Mobility
These Challenges Continue Today:
The United States Terrorist Screening Center Director Leonard Boyle
testified:
•As long as the database uses names, descriptive data or
unsecured documents rather than biometrics to chronicle
suspected terrorists it remains vulnerable to fraudulent
identification.
•Biometrics are the surest way to verify travelers’ identity.
Technology Evolution
Alphonse Bertillon (1853-1914)
•French Criminologist
•Created the first record keeping
system in order to identify
criminals.
Bertillonage
Bertillon
measured the
head, trunk,
shape and
formations of the
ear, eyebrows,
mouth, and eyes.
Bertillonage
Bertillon’s Speaking Portrait gave examiners further instruction
on the different features of identity.
West Case
William West
Bertillon Measurements
177.5: Body Height
188.0: Outstretched Reach of Both Arms
91.3: Trunk Height
19.8: Width of Head
15.9: Length of Head
14.8: Length of Right Ear
6.5: Width of Right Ear
27.5: Length of Left Foot
12.2: Length of Left Middle Finger
9.6: Length of Left Little Finger
1901 - William West received at the Leavenworth
Penitentiary
West Case
Will West
Bertillon Measurements
178.5: Body Height
187.0: Outstretched Reach of Both Arms
91.2: Trunk Height
19.7: Width of Head
15.8: Length of Head
14.8: Length of Right Ear
6.6: Width of Right Ear
28.2: Length of Left Foot
12.3:Lendth of Left Middle Finger
9.7: Length of Left Little Finger
1903 - Will West received at the Leavenworth
Penitentiary.
West Case
According to the Bertillonage System William West and Will West were the same
individual. All categories were within the acceptable variance allowance.
William West
Will West
Measurement
Differences
Body Height
177.5
178.5
.30
Outstretched Reach
of Both Arms
188.0
187.0
1.0
Trunk Height
91.3
91.2
.10
Width of Head
19.8
19.7
.10
Length of Head
15.9
15.8
.10
Length of Right Ear
14.8
14.8
0.0
Width of Right Ear
6.5
6.6
.10
Length of Left Foot
27.5
28.2
.70
Length of Left Middle
Finger
12.2
12.3
.10
Length of Left Little
Finger
9.6
9.7
.10
Biometric Implementation
Fingerprint Identification
•West case ushered in the era
of fingerprint identification.
•Fort Leavenworth Penitentiary
adopts this new technology.
•United States, United Kingdom
and Europe follow suit.
William West’s and Will West’s
Right thumb print
Juan Vucetich (1858-1925)

Head of the Statistical Bureau in
Argentina

Devised his own fingerprint
classification system.
Fingerprint Identification
First criminal ID using fingerprints (1892):
• Francesca Rojas found with injuries
• Her two sons found dead
• Neighbor accused of murder
• Bloody fingerprint found on doorway matching Francesca
Rojas
Fingerprint card
of Francesca Rojas
Fingerprint Identification
Fingerprint Evolution:
•Biometrics for Criminal and Civil Purposes
•Spread Around the World
•Relied on Ink and Paper
•Electronic Prints taken in Static Environments
•Mobile Prints taken in Transient Situations
Biometric Evolution
Three significant challenges for accuracy:
• Scalable modular systems
• Non-biometric based filtering
• Speed
Biometric Evolution
Today:


100% Biometric searching
- Minutia is more accurate than pattern
Real Time Speed
- FBI System – designed for 1 search per second
- US Visit – currently performing 8 searches per second
- Venezuela – conducted 400 searches per second
Biometric Evolution

Fingerprint matching is a symmetrical process
– Match is based upon the database and the search print having
same characteristics

Higher level discrepancies can disqualify a print prematurely

This limits system accuracy

The FBI’s Jeremy Jones/ John Paul Chapman miss

Released when computerized fingerprint check did not turn up a
warrant for more serious crimes

Committed series of crimes after the miss
– 4 known murders after release
Fingerprint Identification
•Biometric technology eliminated the ability to
disguise oneself.
•Mobile technology has caught up with
a criminal’s mobility.
•Real time response times.
Inked Print
Electronic Print
Electronic Mobile
Print
Law Enforcement and Mobile Technology
•Ralph McLean - killed
two police officers in DC.
•May 28th 1995 McLean was
stopped in NC for speeding.
•McLean’s name was
searched against a local
database.
•11 hours later McLean
shot FBI agent
William Christian in
Maryland.
Law Enforcement and Mobile Technology
A Preventable Crime - What could have happened.
Law Enforcement and Mobile Technology
•Ralph McLean - commits
murder in DC.
•May 28th 1995 pulled over in
NC for speeding.
•McLean’s fingerprints are
searched against a
centralized fingerprint
databank.
•Mclean is arrested.
•William Christian is not killed
Law Enforcement and Mobile Technology
LAW ENFORCEMENT EXAMPLES

Parolee Compliance

Warrant Enforcement

Field Citation and Release

Football/Soccer Event Security

Jail Management

Undocumented Aliens

Drunk Driver Enforcement

Gang Violence Suppression Unit

Drug Enforcement

Stolen Vehicles

Violent Crime Reduction

Immigration
Law Enforcement and Mobile Technology
Illegal Entry and Document Identification
Law Enforcement and Mobile Technology
In the first 12 months collected biometric data reduced the flow of
illegal migration by nearly 50% in the waters between Port Rico and
the Dominican Republic.
•Water resistant hand held scanners
•Information sharing between
Homeland Security and US-Visit
•Satellite hook up
•Results available in 2-5 minutes
Law Enforcement and Mobile Technology
Law Enforcement and Mobile Technology
Characteristics of Different Fingerprint
devices:
• COTS PDA Phone
• Bluetooth technology for the
•
•
•
•
•
•
wireless transfers
Submission via GPRS,
GPRS/EDGE
Mugshot acquisition
Compact and Light-weight
Easy-to-use interface
The flexibility to handle NIST
standard transaction over a
wireless network
Iris and Facial Imaging
Law Enforcement and Mobile Technology
Wired
Mobile
Device
TCP/IP
Commercial Laptop with
WebID web client
Wired/Wireless
Mobile
Device
TCP/IP
Commercial PDA with
MobileID host software
WiFi 802.11g
Wireless
AFIS
NIST Standard Transaction
Full WSQ Fingerprint image
E-mail/ FTP delivery /TCP/IP
TDMA, CDMA, GSM,GPRS
Depending on Host model
Mobile Device
Law Enforcement and Mobile Technology
Hooliganism
Law Enforcement and Mobile Technology
2000

Copa João Havelange - fighting between rival supporters caused
a fence to collapse leading to 60 injuries.
2002

Campinas - violence broke out inside a stadium causing a railing
to collapse leading to 30 injuries.

Avellaneda – one fan killed and another seriously wounded when
400 rivals fought outside racing clubs before a match.
2005

Footballer seriously wounded when police tried to stop a riot by
firing rubber bullets.
Law Enforcement and Mobile Technology
Britain’s National Criminal Intelligence Service (NCIS)
said “law enforcement was engaged in a technology
race to keep up with hooligans.”
Hooligans now use sophisticated methods:
•Cell Phones
•Pagers
•Organizing over the Internet
Law Enforcement and Mobile Technology
US Marines in Afghanistan advised the Navy Research Advisory
Committee:
•Collecting and processing at a checkpoint quickly to avoid insurgent
sniper fire
•Biometrics are a quick method to reliably tell “friend from foe,”
•For forensic investigations of IED .
•Deployable labs provide round the clock connectivity.
Civil Uses and Mobile Technology
CIVIL EXAMPLES

Voting

Banks

Welfare

Physical Access

Certificates of Good Conduct

Logical Security

Passport

Biological and Biochemical Detection
Civil Uses and Mobile Technology
Applying algorithms for biological and biochemical detection
applications
•
•
For terrorist or natural disasters, can detect biochemical contaminants in
water supplies
Supports portable field applications as well as long-term 24/7 monitoring of
water sources for biohazards
-Bio-defense detection targets include biological agents such as vaccinia,
ricin, botulinum toxin and B. anthrax spores
Civil Uses and Mobile Technology

Applying algorithms for analysis
of human biological fluids
– Applications include drug discovery,
medicine research and disease
diagnostics

Diagnotic targets include various
cykotines such as Vascular Cell
Adhesion Molecule-1 (VCAM-1),
Interferon-g (IFN-g), Interleukin-6
(IL-6), and Interleukin-10 (IL-10)
in human plasma, blood, urine
and other body fluids.

Support remote diagnosis via the
Internet

Potential applications for
hospitals, laboratories and home
use
Civil Uses and Mobile Technology
Civil Implementations:

A steep increase for criminal history background checks during in
the late 1990s.

Employers waited weeks or months to receive the results of a
request.

Most requests for criminal history background checks were
submitted by mail.

Significant manual effort involved in handling the requests.
Civil Uses and Mobile Technology
Submit Transactions: Fingerprint images and demographics
are encrypted and submitted to the State AFIS and subsequently
to the FBI AFIS (IAFIS)
FBI IAFIS
(1) Using a National WebCheck system,
users submit 10 flat fingerprint
impressions in the form of two slaps and
two thumbs. The System also accepts
entry of all required data elements for
fingerprint-based background checks.
(4) FBI IAFIS is
searched and results
are returned to the
submitting agency.
(2) Only transactions from
authenticated users pass
through the firewall.
WAN
CJIS Router
National WebCheck Systems
National WebCheck Systems include a
livescan fingerprint capture device, a PC
or laptop, and an optional printer
CJIS WAN
Firewall
(5) Transaction Server
provides transaction
results to submitting
National WebCheck
Client Workstations.
Transaction Server
(3) Transaction Server sends a
NIST record including 14 flat
fingerprint impressions in the
form of 10 flat fingerprints, two
slaps and two thumbs as well as
all EFTS 7.0 required data
elements to FBI AFIS (IAFIS).
Civil Uses and Mobile Technology
Current Process for the Certificate of Good Conduct:

Employers subscribe to a webbased fingerprint imaging
service.

Install hardware and software
with a simple set of instructions.

Log onto the service for
enrollment.

Submit requests for criminal
history background checks to
the automated fingerprint
identification system (AFIS).
Civil Uses and Mobile Technology
Benefits of Web-based Fingerprint Imaging System

Inexpensive

Search from Any Location

Ease of Use

Quicker Response Times

Employment Begins After Background Check
Conclusion

Biometrics provide certainty of identification

Technology
– Speed, Accuracy, Electronic

Criminal/Civil/Commercial
– Static or Dynamic
Download