SlideShare a Scribd company logo
1 of 23
Government Applications
of Biometric Technologies
      Border & Aviation Security

                         19 June 2003
Evolution of Biometric Market

                     Early 1980s
                     Safety and
                      security                11 Sep 2001
                     Physical access
                       Criminal ID




    Intranet &                         E-business
     Internet                           Transaction
    Logical Access                     Authorization



    Late 1990s                            2000
Drivers: 2003
   Legislative requirements
    –   Visa & passport reform: biometrics on all travel documents
    –   Transportation security: worker & traveler identification
    –   Health, Finance & “E-Sign”
   Programmatic initiatives
    –   DoD Common Access Card, GSA Smart Card
    –   DHS US-VISIT: +US$1 billion infrastructure project
    –   TSA airport trials, transport worker identification card
   Awareness & Interest
    –   General understanding of “fit” for biometrics in security
    –   Privacy in perspective
Removing the Last Barriers
   Standardization
    –   National Institute of Standards & Technology & M-1
        Committee
    –   ICAO
    –   IATA Simplifying Passenger Travel Interest Group
   R&D, Large Scale Deployment
    –   National Biometric Security Project (NBSP)
    –   Center for Information Technology Research (Consortium of
        Universities and Companies)
   Government Policy
    –   Defining uses and resolving conflicts: 1:n or 1:1?
Biometrics & Border Control
 November  2002 Report by U.S. General
  Accounting Office (GAO)
 Examined uses for biometrics in two areas:
  –   Document issuance (passport and visa)
        Multipleidentities
        Criminal record

  –   Border clearance
        Linking bearer to issued document
        Expediting clearance
GAO Findings
   Biometrics is a proven technology for border
    control
    –   e.g., INSPASS
   Four technologies found useful:
    –   finger imaging     1:n criminal checks
    –   face recognition   1:n lookout checks
    –   hand geometry      registered travelers
    –   iris recognition   registered travelers
   Security is maintained if information is stored in a
    database
Border Control System
        Pre-Issuance
                                           Lookout Database
          Checks
                                 Other       (finger, face)
          Passport,            Identity?
Visa, or Registered Traveler



       Document
        Issuance                             Border Control
                                                Database
                                            (finger, face, iris,
                                                  hand)
       Entry
     Verification
Practical Applications
   US-VISIT Entry-Exit System (2003-)
    –   All visas
    –   Future U.S. passports
    –   All visa waiver travelers
   Canada-U.S. “Smart Border” Initiative
    –   SENTRI, NEXUS, CANPASS-Air
   Registered Traveler
    –   United Airlines & Transportation Security Administration (TSA)
        trial
United Airlines-TSA Trial
   Current Situation at Airports
     – Staffing and facility limitations = long lines for
       customers
     – Automated processes are used for a very small
       percentage of passengers
     – Baggage retrieval for international flights is
       cumbersome, requires lots of space, and slows
       down flight connections
USACCESS:
United Airlines-TSA Trial

   USACCESS: U.S. Automated Check-in, Clearance and
    Entry Support System
   Biometric-based check-in and border clearance
   New systems architecture concept for interface with
    government systems
   Avoid problems of earlier programs
    –   Simplify enrollment
    –   Make it available to a large group of travelers
    –   Make it easy to use!
USACCESS Goals
 Passenger expedited clearance for Immigration,
  Customs and Agriculture
 Better targeting for security checks
 More efficient airport facilities
 Effective use of Immigration resources
 Automation of current manual tasks
Typical Airport Design
Future Airport Design
Air Carrier Pre-Enrollment

 Scan  passport
 Confirm document against State Department
  information
 Capture biometric data (finger image, face)
 Provide official application
 Instruct traveler on use of new process
Step 1: Activating Record

                     Passport scan
 Please place
 passport face
 down on the
 device below
Step 2: Verifying Identity
                   Face Recognition Comparison

 Welcome
 Mr. Smith!
                             =                 ?
                     Captured      Stored

                      Finger Image Comparison


                             =
                                  0010100011
                                  1101011001
                                  1111000101
                                  1011001100
                                               ?
Step 3: Customs Declaration Form

                                      Electronic declaration
   Take a moment
    to fill out your
    Customs Form
   electronically...
                       Name: JOHN MICHAEL SMITH
                       Address: 123 MAIN ST
                       Passport #: 12345678
                       Nationality: USA
                       From: FRANKFURT, GERMANY
                       To: WASHINGTON DC, USA
                       Flight #: UA945

                       1.) Have you been on a farm?

                             YES
                            YES           NO
                                          NO
Step 4: Data Transfer

   United Airlines
   Pre-enrollment              Biometric information
                                 Data management          INS          Customs
 Traveler    Airline
Biometrics   Data
                                      Trusted                     Govt
                  Data transmittal     Entity Record checks     Databases

                                                          FBI           DEA
       Border
      Clearance        Entry authorization
Step 5: Arrival Process

      Your bags have
        been sent to
      your connecting      Passport scan
       flight. Please      Face & finger biometric checks
         proceed to
          the gate.        Print card showing passenger’s status

           OR


       Please claim
      your bags and
        proceed to
        Customs for
        secondary
         screening.
Step 6: Exit Control

 Cleared passengers exit
  through access control
  gates
 Passengers not cleared to
  go must use manual lines
USACCESS Benefits
   For passengers
    –   Faster processing times
    –   Less chance of random checks
   For government agencies
    –   Improved security (targeting resources at problems)
    –   Improved productivity (de-peaking workload)
    –   Reduced demand for more real estate
   For the industry
    –   More efficient use of facilities
    –   Better allocation of staff
Next Steps for USACCESS

 Implement        pilot project, September 2003
  –   Washington Dulles (IAD)
        Outbound   check-in and arrival clearance
  –   London Heathrow (LHR)
        Inbound   check-in for selected Dulles flights
  –   Evaluate potential uses for domestic traffic
  –   Expand as warranted within air transport system
For Additional Information


             James Puleo
             Vice President
         jpuleo@gtmcorp.com
         Tel. +1 240 506 4363

More Related Content

Similar to Biometric

Electronic Passport Verification System using IOT
Electronic Passport Verification System using IOTElectronic Passport Verification System using IOT
Electronic Passport Verification System using IOTIRJET Journal
 
1 List the benefits of AI devices to travelers 2 List the.pdf
1 List the benefits of AI devices to travelers 2 List the.pdf1 List the benefits of AI devices to travelers 2 List the.pdf
1 List the benefits of AI devices to travelers 2 List the.pdfindiapower2
 
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...ijcisjournal
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMRoy Awais
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE Roy Awais
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometricszia balti
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarEvernym
 
Semlex BNS: Biometric Network system
Semlex BNS: Biometric Network systemSemlex BNS: Biometric Network system
Semlex BNS: Biometric Network systemSemlex Europe
 
Smart Cards In The USA
Smart Cards In The USASmart Cards In The USA
Smart Cards In The USAAgile Set, LLC
 
Transport Security Conference 2011
Transport Security Conference 2011Transport Security Conference 2011
Transport Security Conference 2011augmentiq
 
BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012augmentiq
 

Similar to Biometric (20)

Electronic Passport Verification System using IOT
Electronic Passport Verification System using IOTElectronic Passport Verification System using IOT
Electronic Passport Verification System using IOT
 
1 List the benefits of AI devices to travelers 2 List the.pdf
1 List the benefits of AI devices to travelers 2 List the.pdf1 List the benefits of AI devices to travelers 2 List the.pdf
1 List the benefits of AI devices to travelers 2 List the.pdf
 
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
Safety Measures and Privacy in E-Passport Scheme using Cryptographic Protocol...
 
eGovernance mechanism with BioMetrics Classification and Authentication for D...
eGovernance mechanism with BioMetrics Classification and Authentication for D...eGovernance mechanism with BioMetrics Classification and Authentication for D...
eGovernance mechanism with BioMetrics Classification and Authentication for D...
 
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
ches.ppt
ches.pptches.ppt
ches.ppt
 
BIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEMBIMETRIC ATTENDANCE SYSTEM
BIMETRIC ATTENDANCE SYSTEM
 
BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE BIOMETRIC SOFTWARE FOR ATTENDANCE
BIOMETRIC SOFTWARE FOR ATTENDANCE
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Italian Passport 17 Feb 2012 Ebs Finale
Italian Passport 17 Feb 2012 Ebs FinaleItalian Passport 17 Feb 2012 Ebs Finale
Italian Passport 17 Feb 2012 Ebs Finale
 
Introduction tobiometrics
Introduction tobiometricsIntroduction tobiometrics
Introduction tobiometrics
 
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECTBRIEFING ON THE UAE NATIONAL ID CARD PROJECT
BRIEFING ON THE UAE NATIONAL ID CARD PROJECT
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
Semlex BNS: Biometric Network system
Semlex BNS: Biometric Network systemSemlex BNS: Biometric Network system
Semlex BNS: Biometric Network system
 
Smart Cards In The USA
Smart Cards In The USASmart Cards In The USA
Smart Cards In The USA
 
H.w
H.wH.w
H.w
 
H.w
H.wH.w
H.w
 
Transport Security Conference 2011
Transport Security Conference 2011Transport Security Conference 2011
Transport Security Conference 2011
 
BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012BIOMETRICS 2012 - London 2012
BIOMETRICS 2012 - London 2012
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Biometric

  • 1. Government Applications of Biometric Technologies Border & Aviation Security 19 June 2003
  • 2. Evolution of Biometric Market Early 1980s Safety and security 11 Sep 2001 Physical access Criminal ID Intranet & E-business Internet Transaction Logical Access Authorization Late 1990s 2000
  • 3. Drivers: 2003  Legislative requirements – Visa & passport reform: biometrics on all travel documents – Transportation security: worker & traveler identification – Health, Finance & “E-Sign”  Programmatic initiatives – DoD Common Access Card, GSA Smart Card – DHS US-VISIT: +US$1 billion infrastructure project – TSA airport trials, transport worker identification card  Awareness & Interest – General understanding of “fit” for biometrics in security – Privacy in perspective
  • 4. Removing the Last Barriers  Standardization – National Institute of Standards & Technology & M-1 Committee – ICAO – IATA Simplifying Passenger Travel Interest Group  R&D, Large Scale Deployment – National Biometric Security Project (NBSP) – Center for Information Technology Research (Consortium of Universities and Companies)  Government Policy – Defining uses and resolving conflicts: 1:n or 1:1?
  • 5. Biometrics & Border Control  November 2002 Report by U.S. General Accounting Office (GAO)  Examined uses for biometrics in two areas: – Document issuance (passport and visa)  Multipleidentities  Criminal record – Border clearance  Linking bearer to issued document  Expediting clearance
  • 6. GAO Findings  Biometrics is a proven technology for border control – e.g., INSPASS  Four technologies found useful: – finger imaging 1:n criminal checks – face recognition 1:n lookout checks – hand geometry registered travelers – iris recognition registered travelers  Security is maintained if information is stored in a database
  • 7. Border Control System Pre-Issuance Lookout Database Checks Other (finger, face) Passport, Identity? Visa, or Registered Traveler Document Issuance Border Control Database (finger, face, iris, hand) Entry Verification
  • 8. Practical Applications  US-VISIT Entry-Exit System (2003-) – All visas – Future U.S. passports – All visa waiver travelers  Canada-U.S. “Smart Border” Initiative – SENTRI, NEXUS, CANPASS-Air  Registered Traveler – United Airlines & Transportation Security Administration (TSA) trial
  • 9. United Airlines-TSA Trial  Current Situation at Airports – Staffing and facility limitations = long lines for customers – Automated processes are used for a very small percentage of passengers – Baggage retrieval for international flights is cumbersome, requires lots of space, and slows down flight connections
  • 10. USACCESS: United Airlines-TSA Trial  USACCESS: U.S. Automated Check-in, Clearance and Entry Support System  Biometric-based check-in and border clearance  New systems architecture concept for interface with government systems  Avoid problems of earlier programs – Simplify enrollment – Make it available to a large group of travelers – Make it easy to use!
  • 11. USACCESS Goals  Passenger expedited clearance for Immigration, Customs and Agriculture  Better targeting for security checks  More efficient airport facilities  Effective use of Immigration resources  Automation of current manual tasks
  • 14. Air Carrier Pre-Enrollment  Scan passport  Confirm document against State Department information  Capture biometric data (finger image, face)  Provide official application  Instruct traveler on use of new process
  • 15. Step 1: Activating Record Passport scan Please place passport face down on the device below
  • 16. Step 2: Verifying Identity Face Recognition Comparison Welcome Mr. Smith! = ? Captured Stored Finger Image Comparison = 0010100011 1101011001 1111000101 1011001100 ?
  • 17. Step 3: Customs Declaration Form  Electronic declaration Take a moment to fill out your Customs Form electronically... Name: JOHN MICHAEL SMITH Address: 123 MAIN ST Passport #: 12345678 Nationality: USA From: FRANKFURT, GERMANY To: WASHINGTON DC, USA Flight #: UA945 1.) Have you been on a farm? YES YES NO NO
  • 18. Step 4: Data Transfer United Airlines Pre-enrollment Biometric information Data management INS Customs Traveler Airline Biometrics Data Trusted Govt Data transmittal Entity Record checks Databases FBI DEA Border Clearance Entry authorization
  • 19. Step 5: Arrival Process Your bags have been sent to your connecting  Passport scan flight. Please  Face & finger biometric checks proceed to the gate.  Print card showing passenger’s status OR Please claim your bags and proceed to Customs for secondary screening.
  • 20. Step 6: Exit Control  Cleared passengers exit through access control gates  Passengers not cleared to go must use manual lines
  • 21. USACCESS Benefits  For passengers – Faster processing times – Less chance of random checks  For government agencies – Improved security (targeting resources at problems) – Improved productivity (de-peaking workload) – Reduced demand for more real estate  For the industry – More efficient use of facilities – Better allocation of staff
  • 22. Next Steps for USACCESS  Implement pilot project, September 2003 – Washington Dulles (IAD)  Outbound check-in and arrival clearance – London Heathrow (LHR)  Inbound check-in for selected Dulles flights – Evaluate potential uses for domestic traffic – Expand as warranted within air transport system
  • 23. For Additional Information James Puleo Vice President jpuleo@gtmcorp.com Tel. +1 240 506 4363

Editor's Notes

  1. Biometrics are now considered to be an essential element of any plan to better protect facilities, identify potential terrorists and streamline controls for users. These needs all converge at airports and border checkpoints, where security requirements must be balanced against commercial realities that are vital to the economy. Today I will be talking about some of the drivers that are pushing biometrics into the security marketplace, and programs that signal how they may be deployed to achieve the goal of stronger deterrence and better service.
  2. Biometrics are not new; in fact, many were developed with the support of the Federal Government. Starting over 20 years ago, the Government provided seed funding that stimulated research and development. Initial successes in the access control market led companies to develop logical access (i.e., computer network logon) and e-business applications that have started to come into broader use; but since September 11, the Government has reasserted its interest in biometrics and again begun to fund the development of safety and security platforms that rely on biometrics to replace traditional – and vulnerable – card and PIN/password based access systems.
  3. The Government’s interest in R&D is one driver that is propelling the market for biometrics; legislation is another. Visa and passport reform legislation, transportation security legislation, and pre-September 11 laws in the health and finance areas have pushed the public and private sectors to adopt biometrics to ensure better control over systems, facilities, records and resources (Note: Rebecca Dornbusch will be talking about legislation, so you may want to recognize her and minimize your message here). Major programmatic initiatives such as the DoD common access card, the DHS US-VISIT (aka Entry-Exit) and TSA trials are giving security experts and integrators experience at deploying large scale biometric solutions. And publicity about biometrics has de-mystified the technologies and created a largely positive opinion among the general public.
  4. Paul Collier is here to address the standards efforts now under way that should remove some of the final barriers that could influence the scope and speed with which biometrics are introduced. Briefly, the international standards process has been accelerated, and new institutions created to ensure biometrics can be deployed in virtually any security environment.
  5. There have been many trials that tested the use of biometrics for border controls. The US INSPASS program (note your personal involvement in getting this started in 1993), CANPASS, and a significant test at Ben Gurion Airport have provided clear proof that biometrics are an effective way to clear passengers at airports. But few programs have been expanded to the extent necessary to make a significant difference from either a security or facilitation standpoint. Last year a GAO report provided a clear vision of how biometrics would be used at every step in the process to improve border controls: use them first to screen out criminals and terrorists from obtaining valuable travel documents, and then use them at the border to validate identity and speed up the clearance process.
  6. The report, prepared in consultation with the biometric industry, correctly concluded that biometrics at the border is an idea that is ready for prime time. And unlike less insightful evaluations of the problem, the GAO investigation recognized that one must use different biometrics to solve different problems: there is no such thing as a one-size-fits-all biometric. Some are good at screening applicants, others are better at validating identity in difficult customer service environments. For example, finger imaging and face recognition may be the only ways to screen out document fraud, but hand geometry and iris recognition are highly effective in expediting verification tasks.
  7. This simply describes how biometrics work for border control – on one hand, conducting pre-issuance checks on identity; then registering travelers for verification at the border. Databases that contain a variety of biometric “signatures” and on-document biometrics (courtesy of the recently announced ICAO recommendation to add encrypted face images to passports) will combine to provide a variety of tools for border enforcement officials and services for travelers.
  8. The sharp end of the implementation process will be the US-VISIT program. It calls for all foreign visitors to the US to be identified through the use of biometrics. How this is to be accomplished is yet to be determined, but the first phase of the project is likely to include some combination of face and finger recognition technology. The US and Canada have established a partnership to expand a number of biometric-based inspection programs that are designed to improve flows between the world’s largest trading partners (anecdotally, did you know that commerce across the Ambassador Bridge in Detroit roughly equals that between the US and China). But it may be a new trial involving United Airlines passengers that could provide the best indicator of how biometrics may be used not to identify potential violators, but to expedite large numbers of air travelers who are currently facing significant delays in getting through crowded airports.
  9. The trial in question actually had its origins prior to September 11. In a study conducted by United, biometrics were seen as one of a couple of innovations that could provide better data on travelers and offer the Government the opportunity to make decision based on reliable information rather than random examinations. Such a step was also seen as a way to save resources and minimize impact on expensive airport facilities.
  10. The trial, set to begin later this year for travelers between London Heathrow and Washington Dulles, will use biometrics to automate check-in and border clearance. In addition, it will provide an unprecedented level of detail about the traveler to government authorities, who in turn will grant special access to properly enrolled travelers. The United project is specifically designed to avoid the pitfalls of earlier trials: the enrollment process (i.e., capture of key data and biometric information) will be handled to a large degree by the airline; it will be easy for the average traveler to use; and it is designed to be scalable, to the point where many travelers are clearly identified and trusted to use special biometric clearance channels.
  11. The goals of the project are to expedite border formalities in particular. It is here that the longest waits can occur as travelers queue to go through routine processes that are highly amenable to automation. In short, the objective is to adapt biometrics to redesign processes and facilities that can save money through the use of biometrics, allow border officials to direct their efforts toward potential problems rather than treat all passengers alike.
  12. This floor plan offers an example of the savings that can be achieved by steering a significant number of travelers to automated clearance. Here, eight baggage carousels are used to handle the flow of passengers who must claim their bags before being afforded entry to the US. International travelers are very familiar with this process, which requires all baggage to be presented to Customs at the first point of arrival to the US.
  13. If the process is highly automated – i.e., registered and enrolled travelers are steered to self-service kiosks due to the existence of thorough records checks and biometric identity verification – then the airport footprint drops dramatically and baggage is handled by exception rather than by the rule. Ultimately, the goal of the United project is to enable the direct transfer of 95% of the bags to a connecting flight without need for time-consuming (and often superfluous) checks.
  14. Unlike previous programs that required governments to handle all of the enrollment tasks, the United project relies on airline personnel to gather key information on participants. Passport photos will be compared against State Department databases in real time to ensure the validity of the document, and biometric data captured by airline staff in an effort to balance the workload between all stakeholders. Once enrolled, travelers will be asked to hand in a formal application for participation in the program upon arrival in the U.S. By this time DHS will have run its record checks in advance of arrival, and will only need to verify once that the enrollee matches the biometric information now stored in the USAccess system.
  15. Once a traveler is enrolled, he or she will use a self-service kiosk to trigger the check-in process. The passport will be used as the “token” that points to the database information on the traveler, using standard passport reader technology in conjunction with biometrics and airline reservations systems.
  16. The system will then call for biometric verification against a database record that was created during enrollment. If identity is correctly matched, then a boarding pass is issued at the kiosk.
  17. Next, the traveler will be instructed to fill out an electronic version of the Customs Declaration. No paper copy will be held by the traveler, and the record will be forwarded to the Bureau of Customs and Border Protection (DHS) well in advance of the passenger’s arrival.
  18. After check-in, over 60 data elements pertaining to the traveler and his/her trip will be relayed to border authorities during transit. This way the Government has the information needed to make a sound decision on who gets further attention and who gets channeled to rapid clearance kiosks upon arrival.
  19. Upon arrival, the traveler uses a kiosk identical to the one used at check-in in London. While most travelers will be instantly cleared, some may be referred for further examination if irregularities are detected, watch lists provide a warning, biometric don’t match, goods are being imported, or other flags are raised.
  20. Finally, cleared travelers will be authorized to exit the arrival hall using Metro-style, biometric enabled gates. Those not cleared will use the regular staffed exit points to finish the process.
  21. If the project is successful, this could set the stage for widespread adaptation of the USAccess concept. Other carriers could join United – it is not intended to be for one carrier only – and other countries could replicate the process. With the traveler’s permission, certain data could be shared to seamlessly expand the benefit at foreign ports of arrival. Put in practical terms, everyone wins without requiring a major investment by any single entity. Passengers experience a streamlined clearance system that is measurably better than today’s, and the same type of equipment can be used to validate identity at security checkpoints and boarding gates. Governments have much to gain from a system that automatically locks in identity of a majority of travelers: resources can be directed at problems rather than being distracted by routine tasks. The air transport industry is also a significant beneficiary by being able to steer travelers to automated alternatives to standing in line, and reducing the costs of facilities infrastructure.
  22. USAccess is scheduled for implementation in mid-September. While it is certainly too early to say where the program goes from this modest start, at minimum it will provide a landmark gauge to assess how biometrics perform in complex, general user environments and provide invaluable data for use by researchers who will fine-tune the performance of the equipment. One final, if obvious, benefit: it is an admirable attempt to add an element of service to a process that has otherwise been bogged down by the security processes required in the wake of September 11.
  23. At this point you can welcome questions if that is the format, or wait until the other speakers have finished before fielding inquiries from the audience.