• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Identity Intelligence: From Reactionary Support to Sustained Enabler
 

Identity Intelligence: From Reactionary Support to Sustained Enabler

on

  • 642 views

 

Statistics

Views

Total Views
642
Views on SlideShare
642
Embed Views
0

Actions

Likes
0
Downloads
14
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Identity Intelligence: From Reactionary Support to Sustained Enabler Identity Intelligence: From Reactionary Support to Sustained Enabler Presentation Transcript

    • Identity Intelligence Project Office | I2POIdentity Intelligence: From Reactionary Supportto Sustained EnablerThis briefing is classifiedUNCLASSIFIED21 August 2012DIA Identity Intelligence Project Office (I2PO)Dalton Jones, DIA Senior Expert for BiometricsDuane Blackburn, MITRE
    • Identity Intelligence Project Office | I2POA Look Back at Fielded DoD Biometric Capabilities2Mobile identification technology• Stores and matches fingerprint, iris and face• Matches against an onboard database and/or watchlistPortable enrollment station• Stores and matches fingerprint, iris and face• Access to the Biometric EnterpriseBase Access and CredentialingHIIDE/SEEK/FusionBATBISABIR/AIMS/IIRsExpeditionary (JEFFs, CEXC)Reach-back (AFDIL, USACIL)Intelligence Analysis• Biometric Enabled Intelligence• Biometric Enabled Watchlist DevelopmentForensic Analysis• Forensic analysis of latent biometric samples• Link an individual to an eventReferenceAnalyzeAuthoritative database• Stores and matches adversaries’ fingerprint, iris,face and palmprintVarious communications systems andcomputer networksABISSIPRnetSOCOM PortalStoreMatchShareCollectMatch
    • Identity Intelligence Project Office | I2PO2006 – Creation of the BEWL3
    • Identity Intelligence Project Office | I2PONow: A Changing (Diametric?) Environment Draw down in Iraq and Afghanistan Increase in global operations requiring biometrics Strategic collections Data Sharing: interagency and international4 Advancement of capabilities Improved accuracy and usability User-focused systems Decreases in funding Sharp losses in Supplementals Reduction of Core funding
    • Identity Intelligence Project Office | I2PO5The Identity Intelligence Project Office (I2PO) is theAgency focal point for DoD Identity Intelligence (I2).The office is organized to harmonize and advocatefor DoD I2 requirements and capabilities, as well asensure integration with national-level I2 plans andprograms. Function for this office include Defining Policy Defining the role of I2 in Post-War Security Environment Establishing Data Standards Fostering Interagency and Foreign Partner InformationSharingIdentity Intelligence Project Office (I2PO)
    • Identity Intelligence Project Office | I2PO6COORDINATIONENABLING/ENABLEMENTDefenseAgenciesForeignPartnersCoalitionForcesIndustryCarnegie MellonUniversityUniversity ofVirginiaUniversity ofTexasDARPAInteragency: DOS DOJ DHSJointStaffCOCOMs andJoint ForcesMilitaryServicesExternal Product andService SuppliersPARTNERSHIPCOLLABORATIONDIAI2POExecutiveAgentI2PO Stakeholder Relationships
    • Identity Intelligence Project Office | I2POIdentity Intelligence? Name Matching Biometrics Attribute Information Forensics Data Exploitation Analysis7
    • Identity Intelligence Project Office | I2PO8I2 – What’s it all about? – Individual AttributesToday we train our analysts to fixate on threat groups as a whole - things,intent, and capability Name based identification by most organizations are centered on CounterTerrorist, Drug Traffickers, Human Smugglers and Financiers …but who are theyreally… biometrics provides positive identification and serves as the linchpin forfull exploitation of information Upon determining the Identity of an individual, Identity Intelligence (I2) capturesand analyzes all of the informational attributes associated with the individual tofully illuminate their identity. Attributes include all biographic, digital signatures, familial connections, social networks,and criminal information as well as linkages to other people, places, events, locations,and weapons. While historically used in a tactical environment the associated Identity Intelligenceis becoming of immense strategic value to combat global terrorism, weaponsproliferation and support Homeland Security and International Partners
    • Identity Intelligence Project Office | I2PO9DIAI2POUSD(I) USD(P)DIA AT&LNGIC BIMAODNI NationalSecurityStaffWhiteHouseNationalS&TCouncilWhiteHouse
    • Identity Intelligence Project Office | I2PONear-termActivitiesLong-termStabilizationI2PO StandupCategoricalBEWLBEWLInstitutionalizedas IntelProductBEWL COIIdentity withinQDRDataCollectionStrategyCOCOMEngagementCapabilityGapsDIA DRBriefingNGIC-DIABEWLResponsibilitiesI2PO asProgram ofRecordICD/DCRInteragencyCollaborationEducationStandards andToolsClassifiedBiometricsCapabilityForensics ,Open DataLinkagesNational-levelInfo SharingStrategiesJCIDSInternational -DOD DataSharingStrategyNational-levelS&T andWatchlistingStrategies
    • Identity Intelligence Project Office | I2POWhat Does the Future Hold? “For terrorists, travel documents are as important as weapons.Terrorists must travel clandestinely to meet, train, plan, casetargets, and gain access to attack. To them, international travelpresents great danger, because they must surface to pass throughregulated channels, present themselves to border security officials,or attempt to circumvent inspection points. “ (9-11 Commission) Border control systems based on biometric applications havebecome the solution of choice in identifying potential threats –expected to earn a double digit, Compounded Annual GrowthRate of 17.6% from 2011 to 2019* Border Control Market Assessment, estimates that the market willearn revenues of $8.74 billion by 2019, compared to $1.97 billion in2010*.11*Frost & Sullivan 2012
    • Identity Intelligence Project Office | I2POThis briefing is classifiedUNCLASSIFIED21 August 2012Dalton Jones, DIA Senior Expert for BiometricsDalton.Jones@dodiis.mil; 703-907-0335Duane Blackburn, MITREDBlackburn@mitre.org; 434-964-5023DIA Identity Intelligence Project Office (I2PO)