SlideShare a Scribd company logo
1 of 8
Download to read offline
Who is our enemy; who is our friend – at
home, abroad and on the battlefield?
Are we getting the right government services
to the right people when they need it?
THE POWER
OF IDENTITY
Who is crossing our borders and are
foreign visitors effectively vetted?
PEOPLE. PATTERNS. PREDICTIONS.
Our world is getting smaller and ever more interconnected.
Accurate and fast identification is a critical transaction for both
our government and our citizens – discerning friend from foe on
the battlefield, managing our borders with actionable intelligence,
authorizing federal benefits, and transacting business on a
global scale.
THE CHALLENGES
CHALLENGE/SOLUTION
FACIAL RECOGNITION AS THE SOLUTION
Government organizations are implementing large scale facial
recognition systems now. The Department of Homeland Security
Office of Biometric Identity Management is creating a database
of over 300 million faces to be used for data comparisons.
Additionally, U.S. Customs and Border Protection has sponsored
multiple trials of the technology at airports and border crossings.
THE DEPARTMENT OF HOMELAND
SECURITY OFFICE OF BIOMETRIC
IDENTITY MANAGEMENT IS
CREATING A DATABASE OF OVER
300 MILLION FACES TO BE USED
FOR DATA COMPARISONS
Government and industry are partnering agressively to ensure
identity data is managed responsibly and stored securely.
PRIVACY MATTERS
Facial recognition technology
has matured rapidly and
provides game-changing
results to today’s
identification challenges.
FACIAL RECOGNITION
TECHNOLOGY
ANSWERS THE
CHALLENGE
STANDOFF DATA COLLECTION –
data can be collected from a distance
without need to corral crowds
FACIAL RECOGNITION ANSWERS THE CHALLENGE
UTILIZATION OF POOR AND LOW
QUALITY DATA – highly accurate
matches can be made even from partial
or distorted images leading to higher
success rates of positive identification
MATCHING AGAINST WATCH LISTS – allows
images to be rapidly referenced against watch
lists to prevent known threats from moving freely
through borders and ports of entry
EXISTING DATASETS – Repositories of facial
recognition data exist for law enforcement
use and correctional facility booking systems
FRICTIONLESS
AUTHENTICATION – no
impact to boarding times since
individuals do not need to stop
INTEROPERABLE DATABASES – a singular
digital record can be generated for each citizen
to be accessed across multiple government
organizations for faster and more secure
government transactions
Entry and Exit at United States Borders and
Ports of Entry
Every day, approximately 100,000 flights take off around the globe
with over 3.7 billion passengers projected to fly in 2017. The
U.S. accounts for almost ¼ of that air traffic. Our federal policy,
infrastructure, manpower and technology are currently aligned to
facilitate vetting individuals as they enter the U.S., but the same
alignment is not in place to vet individuals exiting our borders.
This allows foreign nationals to overstay visas and continue to
live in the U.S. illegally. Addressing this exit challenge requires
concerted efforts to align policy (domestic and international), invest
in new border infrastructure, and leverage the best of biometric
technology to ensure accurate, efficient identity vetting.
THE BORDER EXIT CHALLENGE
CHALLENGES
ADDRESSING THIS
EXIT CHALLENGE
REQUIRES CONCERTED
EFFORTS TO ALIGN
POLICY (DOMESTIC
AND INTERNATIONAL)
=
?
$
Facial Recognition Technology at Entry/Exit Ports
Where there are infrastructure challenges at the borders and ports
of entry, facial recognition can be installed with minimal disruption
to traffic patterns or the need for additional queues or checkpoints.
Fast and effective, facial recognition also works at a distance which
will minimize traffic friction at high-traffic areas. Effective policy
that synchronizes data from the Department of State, Department
of Homeland Security, Department of Defense and various federal
law enforcement agencies will create an iron-clad backbone for the
U.S. government to know who is currently on U.S. soil.
SOLUTIONS
CHALLENGES
SOLUTIONS
Facial Recognition Technology to Discern
Friend from Foe
Using facial recognition technology, federal law enforcement and
intelligence agents are able to deploy sophisticated analytics
with images captured from a variety of sources such as security
cameras, video files and social media profiles to run against
government databases. On the battlefield, America’s warfighters
are able to collect facial images, create local databases and utilize
available intelligence to generate positive matches. Collecting
these data points and having the technology to accurately match
them will give the U.S. government the information it needs to
protect the people.
Friend or Foe – at Home and on
the Battlefield
Despite the best efforts of those fighting our wars and protecting
our borders, some enemies manage to thwart even the best
defense - terrorists and bad actors who claim anonymity with
intent to create havoc, break laws and otherwise infringe on the
freedoms and safety of U.S. citizens. Federal law enforcement
and DoD agencies have requirements to track and apprehend
such individuals; the ability to accurately identify these individuals
is critical to mission success. These individuals are often
undocumented, so biometric data is critical to establishing their
identity. In every case, accurate identity matching enables federal
agencies to do their job: protecting the American people from
those who seek to harm our way of life.
... THE ABILITY TO
ACCURATELY IDENTIFY
THESE INDIVIDUALS
IS CRITICAL TO
MISSION SUCCESS.
IDENTIFYING FRIEND FROM FOE
=
?
$
Facial Recognition Technology in
Government Transactions
The growing acceptance of facial recognition – both in
government and private sector applications – makes it ideal for
the government’s use to validate individuals’ identities when
applying for government services. The future of secure government
to consumer transactions can be realized by using the right
technology and developing the right policy to support responsible
data sharing and stewardship.
Providing the Right Services to the Right People When
They Need It
Many government organizations are charged with providing
services to the citizens of the United States, e.g., issuing passports
or visas; providing healthcare or retirement services; conducting
census activities; and distributing education benefits. It is the
government’s responsibility to guarantee secure and accurate
transactions with each individual so that neither the national
security nor the safety and security of the individual’s information
is compromised. Culturally, people are becoming increasingly
comfortable conducting sensitive transactions online. By pushing
into a more digital landscape and relying on the accuracy of
biometric identity confirmation, these government organizations
can increase the efficiency, efficacy and security of their programs.
... RELYING ON
THE ACCURACY OF
BIOMETRIC IDENTITY
CONFIRMATION,
THESE GOVERNMENT
ORGANIZATIONS
CAN INCREASE THE
EFFICIENCY
DELIVERING EFFICIENT GOV’T SERVICES
CHALLENGES
SOLUTIONS
$
NEC’s NeoFace Solutions
Technology Leader
Not all facial recognition technology is created equal. NEC Advanced Recognition
Systems (ARS) has broken new ground in the facial recognition arena creating the
most accurate technology available. NEC has been a leader in the technology
world for over 100 years and in the biometrics game for nearly 40. It is with that
breadth and longevity of experience that the NEC NeoFace Facial Recognition
Suite was developed.
Trusted Partner
Agile response to changing requirements is the trademark of a strong industry
partner. NEC ARS provides small business agility with large business strength and
durability. Our NeoFace Suite offers a full spectrum of front and back end solutions
that provide the most powerful facial recognition technologies on the market. Built
with a standards-based, open architecture, our customers are enabled to integrate
legacy technology or create an entirely new, customizable, end to end solution to
meet any requirement.
Proven Success
The NeoFace matching algorithm is ranked number one by the National Institute of
Standards and Technology (NIST), and the technology has already been tested and
proven in the field. In conjunction with the U.S. Customs and Border Protection and
other industry partners, NeoFace Match technology was tested successfully in New
York City’s JFK and Atlanta’s Hartsfield Airports. “Recent successful tests in high
traffic security screening venues proved the ability of the system to efficiently and
accurately perform one-to-one facial image comparisons,” said Amy Rall, Group
Vice President for the Department of Homeland Security practice at Unisys Federal.
“This solution of NEC facial recognition technology can help make the country safer
without disrupting travel or sacrificing travelers’ privacy.” Additionally, NEC ARS
also deployed NeoFace technology at the Otay Mesa border crossing, which
despite having a very different infrastructure and requirements, was also a
resounding success.
NEC’S NEOFACE SOLUTIONS
“THIS SOLUTION
OF NEC FACIAL
RECOGNITION
TECHNOLOGY
CAN HELP MAKE
THE COUNTRY
SAFER WITHOUT
DISRUPTING TRAVEL
OR SACRIFICING
TRAVELERS’
PRIVACY.”
CONTACT US
NEC Corporation of America
Advanced Recognition Systems
Benji Hutchinson
Senior Director Washington, D.C. Operations
571.777.3668
benji.hutchinson@necam.com
© 2017 NEC Corporation of America. NEC and NeoFace are registered trademarks of NEC Corporation. All rights reserved.
Other product or service marks mentioned are the trademarks of their respective owners.
https://www.necam.com/AdvancedRecognitionSystems/

More Related Content

Similar to The Power of Identity

Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Elizabeth Mixson
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]Lucy Kitchin
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxronak56
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionM2SYS Technology
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca vMike Kuhn
 
Amanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paperAmanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paperamanda Kaster
 
Abstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docxAbstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docxwrite4
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Dr Lendy Spires
 
Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?Robert Bromwich
 
Jones A LWP Final Approved
Jones A LWP Final ApprovedJones A LWP Final Approved
Jones A LWP Final ApprovedAdam Jones, LCC
 

Similar to The Power of Identity (20)

Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration Solution
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
 
Amanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paperAmanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paper
 
Abstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docxAbstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docx
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Csd6059
Csd6059Csd6059
Csd6059
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
 
Branney-Gant Research Paper
Branney-Gant Research PaperBranney-Gant Research Paper
Branney-Gant Research Paper
 
Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?
 
Jones A LWP Final Approved
Jones A LWP Final ApprovedJones A LWP Final Approved
Jones A LWP Final Approved
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 

More from InteractiveNEC

Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)InteractiveNEC
 
Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023InteractiveNEC
 
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...InteractiveNEC
 
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightClear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightInteractiveNEC
 
NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)InteractiveNEC
 
NEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesNEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesInteractiveNEC
 
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...InteractiveNEC
 
Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.InteractiveNEC
 
NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022InteractiveNEC
 
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!InteractiveNEC
 
Creating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid WorkCreating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid WorkInteractiveNEC
 
(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local Governments(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local GovernmentsInteractiveNEC
 
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product BriefEvaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product BriefInteractiveNEC
 
UNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work modelUNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work modelInteractiveNEC
 
9 Ways Your Aging Phone System Is Putting Business Success On Hold
9 Ways Your Aging Phone System Is Putting Business Success On Hold9 Ways Your Aging Phone System Is Putting Business Success On Hold
9 Ways Your Aging Phone System Is Putting Business Success On HoldInteractiveNEC
 
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERNEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERInteractiveNEC
 
Smart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest ExperienceSmart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest ExperienceInteractiveNEC
 
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...InteractiveNEC
 
Preview: Taking Travel to New Heights
Preview: Taking Travel to New HeightsPreview: Taking Travel to New Heights
Preview: Taking Travel to New HeightsInteractiveNEC
 
UNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD BrochureUNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD BrochureInteractiveNEC
 

More from InteractiveNEC (20)

Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)
 
Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023
 
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
 
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightClear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
 
NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)
 
NEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesNEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal Agencies
 
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
 
Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.
 
NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022
 
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
 
Creating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid WorkCreating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid Work
 
(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local Governments(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local Governments
 
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product BriefEvaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
 
UNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work modelUNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work model
 
9 Ways Your Aging Phone System Is Putting Business Success On Hold
9 Ways Your Aging Phone System Is Putting Business Success On Hold9 Ways Your Aging Phone System Is Putting Business Success On Hold
9 Ways Your Aging Phone System Is Putting Business Success On Hold
 
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERNEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
 
Smart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest ExperienceSmart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest Experience
 
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
 
Preview: Taking Travel to New Heights
Preview: Taking Travel to New HeightsPreview: Taking Travel to New Heights
Preview: Taking Travel to New Heights
 
UNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD BrochureUNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

The Power of Identity

  • 1. Who is our enemy; who is our friend – at home, abroad and on the battlefield? Are we getting the right government services to the right people when they need it? THE POWER OF IDENTITY Who is crossing our borders and are foreign visitors effectively vetted? PEOPLE. PATTERNS. PREDICTIONS.
  • 2. Our world is getting smaller and ever more interconnected. Accurate and fast identification is a critical transaction for both our government and our citizens – discerning friend from foe on the battlefield, managing our borders with actionable intelligence, authorizing federal benefits, and transacting business on a global scale. THE CHALLENGES CHALLENGE/SOLUTION FACIAL RECOGNITION AS THE SOLUTION Government organizations are implementing large scale facial recognition systems now. The Department of Homeland Security Office of Biometric Identity Management is creating a database of over 300 million faces to be used for data comparisons. Additionally, U.S. Customs and Border Protection has sponsored multiple trials of the technology at airports and border crossings. THE DEPARTMENT OF HOMELAND SECURITY OFFICE OF BIOMETRIC IDENTITY MANAGEMENT IS CREATING A DATABASE OF OVER 300 MILLION FACES TO BE USED FOR DATA COMPARISONS Government and industry are partnering agressively to ensure identity data is managed responsibly and stored securely. PRIVACY MATTERS
  • 3. Facial recognition technology has matured rapidly and provides game-changing results to today’s identification challenges. FACIAL RECOGNITION TECHNOLOGY ANSWERS THE CHALLENGE STANDOFF DATA COLLECTION – data can be collected from a distance without need to corral crowds FACIAL RECOGNITION ANSWERS THE CHALLENGE UTILIZATION OF POOR AND LOW QUALITY DATA – highly accurate matches can be made even from partial or distorted images leading to higher success rates of positive identification MATCHING AGAINST WATCH LISTS – allows images to be rapidly referenced against watch lists to prevent known threats from moving freely through borders and ports of entry EXISTING DATASETS – Repositories of facial recognition data exist for law enforcement use and correctional facility booking systems FRICTIONLESS AUTHENTICATION – no impact to boarding times since individuals do not need to stop INTEROPERABLE DATABASES – a singular digital record can be generated for each citizen to be accessed across multiple government organizations for faster and more secure government transactions
  • 4. Entry and Exit at United States Borders and Ports of Entry Every day, approximately 100,000 flights take off around the globe with over 3.7 billion passengers projected to fly in 2017. The U.S. accounts for almost ¼ of that air traffic. Our federal policy, infrastructure, manpower and technology are currently aligned to facilitate vetting individuals as they enter the U.S., but the same alignment is not in place to vet individuals exiting our borders. This allows foreign nationals to overstay visas and continue to live in the U.S. illegally. Addressing this exit challenge requires concerted efforts to align policy (domestic and international), invest in new border infrastructure, and leverage the best of biometric technology to ensure accurate, efficient identity vetting. THE BORDER EXIT CHALLENGE CHALLENGES ADDRESSING THIS EXIT CHALLENGE REQUIRES CONCERTED EFFORTS TO ALIGN POLICY (DOMESTIC AND INTERNATIONAL) = ? $ Facial Recognition Technology at Entry/Exit Ports Where there are infrastructure challenges at the borders and ports of entry, facial recognition can be installed with minimal disruption to traffic patterns or the need for additional queues or checkpoints. Fast and effective, facial recognition also works at a distance which will minimize traffic friction at high-traffic areas. Effective policy that synchronizes data from the Department of State, Department of Homeland Security, Department of Defense and various federal law enforcement agencies will create an iron-clad backbone for the U.S. government to know who is currently on U.S. soil. SOLUTIONS
  • 5. CHALLENGES SOLUTIONS Facial Recognition Technology to Discern Friend from Foe Using facial recognition technology, federal law enforcement and intelligence agents are able to deploy sophisticated analytics with images captured from a variety of sources such as security cameras, video files and social media profiles to run against government databases. On the battlefield, America’s warfighters are able to collect facial images, create local databases and utilize available intelligence to generate positive matches. Collecting these data points and having the technology to accurately match them will give the U.S. government the information it needs to protect the people. Friend or Foe – at Home and on the Battlefield Despite the best efforts of those fighting our wars and protecting our borders, some enemies manage to thwart even the best defense - terrorists and bad actors who claim anonymity with intent to create havoc, break laws and otherwise infringe on the freedoms and safety of U.S. citizens. Federal law enforcement and DoD agencies have requirements to track and apprehend such individuals; the ability to accurately identify these individuals is critical to mission success. These individuals are often undocumented, so biometric data is critical to establishing their identity. In every case, accurate identity matching enables federal agencies to do their job: protecting the American people from those who seek to harm our way of life. ... THE ABILITY TO ACCURATELY IDENTIFY THESE INDIVIDUALS IS CRITICAL TO MISSION SUCCESS. IDENTIFYING FRIEND FROM FOE = ? $
  • 6. Facial Recognition Technology in Government Transactions The growing acceptance of facial recognition – both in government and private sector applications – makes it ideal for the government’s use to validate individuals’ identities when applying for government services. The future of secure government to consumer transactions can be realized by using the right technology and developing the right policy to support responsible data sharing and stewardship. Providing the Right Services to the Right People When They Need It Many government organizations are charged with providing services to the citizens of the United States, e.g., issuing passports or visas; providing healthcare or retirement services; conducting census activities; and distributing education benefits. It is the government’s responsibility to guarantee secure and accurate transactions with each individual so that neither the national security nor the safety and security of the individual’s information is compromised. Culturally, people are becoming increasingly comfortable conducting sensitive transactions online. By pushing into a more digital landscape and relying on the accuracy of biometric identity confirmation, these government organizations can increase the efficiency, efficacy and security of their programs. ... RELYING ON THE ACCURACY OF BIOMETRIC IDENTITY CONFIRMATION, THESE GOVERNMENT ORGANIZATIONS CAN INCREASE THE EFFICIENCY DELIVERING EFFICIENT GOV’T SERVICES CHALLENGES SOLUTIONS $
  • 7. NEC’s NeoFace Solutions Technology Leader Not all facial recognition technology is created equal. NEC Advanced Recognition Systems (ARS) has broken new ground in the facial recognition arena creating the most accurate technology available. NEC has been a leader in the technology world for over 100 years and in the biometrics game for nearly 40. It is with that breadth and longevity of experience that the NEC NeoFace Facial Recognition Suite was developed. Trusted Partner Agile response to changing requirements is the trademark of a strong industry partner. NEC ARS provides small business agility with large business strength and durability. Our NeoFace Suite offers a full spectrum of front and back end solutions that provide the most powerful facial recognition technologies on the market. Built with a standards-based, open architecture, our customers are enabled to integrate legacy technology or create an entirely new, customizable, end to end solution to meet any requirement. Proven Success The NeoFace matching algorithm is ranked number one by the National Institute of Standards and Technology (NIST), and the technology has already been tested and proven in the field. In conjunction with the U.S. Customs and Border Protection and other industry partners, NeoFace Match technology was tested successfully in New York City’s JFK and Atlanta’s Hartsfield Airports. “Recent successful tests in high traffic security screening venues proved the ability of the system to efficiently and accurately perform one-to-one facial image comparisons,” said Amy Rall, Group Vice President for the Department of Homeland Security practice at Unisys Federal. “This solution of NEC facial recognition technology can help make the country safer without disrupting travel or sacrificing travelers’ privacy.” Additionally, NEC ARS also deployed NeoFace technology at the Otay Mesa border crossing, which despite having a very different infrastructure and requirements, was also a resounding success. NEC’S NEOFACE SOLUTIONS “THIS SOLUTION OF NEC FACIAL RECOGNITION TECHNOLOGY CAN HELP MAKE THE COUNTRY SAFER WITHOUT DISRUPTING TRAVEL OR SACRIFICING TRAVELERS’ PRIVACY.”
  • 8. CONTACT US NEC Corporation of America Advanced Recognition Systems Benji Hutchinson Senior Director Washington, D.C. Operations 571.777.3668 benji.hutchinson@necam.com © 2017 NEC Corporation of America. NEC and NeoFace are registered trademarks of NEC Corporation. All rights reserved. Other product or service marks mentioned are the trademarks of their respective owners. https://www.necam.com/AdvancedRecognitionSystems/