SlideShare a Scribd company logo
Identity Intelligence Project Office | I2PO
Identity Intelligence: From Reactionary Support
to Sustained Enabler
This briefing is classified
UNCLASSIFIED
21 August 2012
DIA Identity Intelligence Project Office (I2PO)
Dalton Jones, DIA Senior Expert for Biometrics
Duane Blackburn, MITRE
Identity Intelligence Project Office | I2PO
A Look Back at Fielded DoD Biometric Capabilities
2
Mobile identification technology
• Stores and matches fingerprint, iris and face
• Matches against an onboard database and/or watchlist
Portable enrollment station
• Stores and matches fingerprint, iris and face
• Access to the Biometric Enterprise
Base Access and Credentialing
HIIDE/SEEK/Fusion
BAT
BISA
BIR/AIMS/IIRs
Expeditionary (JEFFs, CEXC)
Reach-back (AFDIL, USACIL)
Intelligence Analysis
• Biometric Enabled Intelligence
• Biometric Enabled Watchlist Development
Forensic Analysis
• Forensic analysis of latent biometric samples
• Link an individual to an event
Reference
Analyze
Authoritative database
• Stores and matches adversaries’ fingerprint, iris,
face and palmprint
Various communications systems and
computer networks
ABIS
SIPRnet
SOCOM Portal
Store
Match
Share
Collect
Match
Identity Intelligence Project Office | I2PO
2006 – Creation of the BEWL
3
Identity Intelligence Project Office | I2PO
Now: A Changing (Diametric?) Environment
 Draw down in Iraq and Afghanistan
 Increase in global operations requiring biometrics
 Strategic collections
 Data Sharing: interagency and international
4
 Advancement of capabilities
 Improved accuracy and usability
 User-focused systems
 Decreases in funding
 Sharp losses in Supplementals
 Reduction of Core funding
Identity Intelligence Project Office | I2PO
5
The Identity Intelligence Project Office (I2PO) is the
Agency focal point for DoD Identity Intelligence (I2).
The office is organized to harmonize and advocate
for DoD I2 requirements and capabilities, as well as
ensure integration with national-level I2 plans and
programs. Function for this office include
 Defining Policy
 Defining the role of I2 in Post-War Security Environment
 Establishing Data Standards
 Fostering Interagency and Foreign Partner Information
Sharing
Identity Intelligence Project Office (I2PO)
Identity Intelligence Project Office | I2PO
6
COORDINATION
ENABLING/
ENABLEMENT
Defense
Agencies
Foreign
Partners
Coalition
Forces
Industry
Carnegie Mellon
University
University of
Virginia
University of
Texas
DARPA
Interagency: DOS DOJ DHS
Joint
Staff
COCOMs and
Joint Forces
Military
Services
External Product and
Service Suppliers
PARTNERSHIPCOLLABORATION
DIA
I2PO
Executive
Agent
I2PO Stakeholder Relationships
Identity Intelligence Project Office | I2PO
Identity Intelligence?
 Name Matching
 Biometrics
 Attribute Information
 Forensics
 Data Exploitation
 Analysis
7
Identity Intelligence Project Office | I2PO
8
I2 – What’s it all about? – Individual Attributes
Today we train our analysts to fixate on threat groups as a whole - things,
intent, and capability
 Name based identification by most organizations are centered on Counter
Terrorist, Drug Traffickers, Human Smugglers and Financiers …but who are they
really… biometrics provides positive identification and serves as the linchpin for
full exploitation of information
 Upon determining the Identity of an individual, Identity Intelligence (I2) captures
and analyzes all of the informational attributes associated with the individual to
fully illuminate their identity.
 Attributes include all biographic, digital signatures, familial connections, social networks,
and criminal information as well as linkages to other people, places, events, locations,
and weapons.
 While historically used in a tactical environment the associated Identity Intelligence
is becoming of immense strategic value to combat global terrorism, weapons
proliferation and support Homeland Security and International Partners
Identity Intelligence Project Office | I2PO
9
DIA
I2PO
USD(I) USD(P)
DIA AT&L
NGIC BIMA
ODNI National
Security
Staff
White
House
National
S&T
Council
White
House
Identity Intelligence Project Office | I2PO
Near-termActivitiesLong-termStabilization
I2PO Standup
Categorical
BEWL
BEWL
Institutionalized
as Intel
Product
BEWL COI
Identity within
QDR
Data
Collection
Strategy
COCOM
Engagement
Capability
Gaps
DIA DR
Briefing
NGIC-DIA
BEWL
Responsibilities
I2PO as
Program of
Record
ICD/DCR
Interagency
Collaboration
Education
Standards and
Tools
Classified
Biometrics
Capability
Forensics ,
Open Data
Linkages
National-level
Info Sharing
Strategies
JCIDS
International -
DOD Data
Sharing
Strategy
National-level
S&T and
Watchlisting
Strategies
Identity Intelligence Project Office | I2PO
What Does the Future Hold?
 “For terrorists, travel documents are as important as weapons.
Terrorists must travel clandestinely to meet, train, plan, case
targets, and gain access to attack. To them, international travel
presents great danger, because they must surface to pass through
regulated channels, present themselves to border security officials,
or attempt to circumvent inspection points. “ (9-11 Commission)
 Border control systems based on biometric applications have
become the solution of choice in identifying potential threats –
expected to earn a double digit, Compounded Annual Growth
Rate of 17.6% from 2011 to 2019*
 Border Control Market Assessment, estimates that the market will
earn revenues of $8.74 billion by 2019, compared to $1.97 billion in
2010*.
11
*Frost & Sullivan 2012
Identity Intelligence Project Office | I2PO
This briefing is classified
UNCLASSIFIED
21 August 2012
Dalton Jones, DIA Senior Expert for Biometrics
Dalton.Jones@dodiis.mil; 703-907-0335
Duane Blackburn, MITRE
DBlackburn@mitre.org; 434-964-5023
DIA Identity Intelligence Project Office (I2PO)

More Related Content

What's hot

Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Kroll
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.
Matt Lemon
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Anushka Perera
 
Deconstructing the cost of a data breach
Deconstructing the cost of a data breachDeconstructing the cost of a data breach
Deconstructing the cost of a data breach
Patrick Florer
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
Matt Frowert
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
illustro
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
Numaan Huq
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
Joseph White MPA CPM
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
Ian-Edward Stafrace
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
Scott Suhy
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
seadeloitte
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
mihinpr
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
Baltimax
 
Database forensics
Database forensicsDatabase forensics
Database forensics
Denys A. Flores, PhD
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
Lancope, Inc.
 
TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227
Denys A. Flores, PhD
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
Alexander Decker
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
David Cunningham
 
Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013
- Mark - Fullbright
 

What's hot (20)

Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Deconstructing the cost of a data breach
Deconstructing the cost of a data breachDeconstructing the cost of a data breach
Deconstructing the cost of a data breach
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227
 
A foundation for breach data analysis
A foundation for breach data analysisA foundation for breach data analysis
A foundation for breach data analysis
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
 
Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013
 

Viewers also liked

Achieving Mastery Through Gamification
Achieving Mastery Through GamificationAchieving Mastery Through Gamification
Achieving Mastery Through Gamification
Pete Baikins
 
Gambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitGambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visit
Stephen Haggard
 
Ball de gitanes per carnetoltes: recuperem la tradició!
Ball de gitanes per carnetoltes: recuperem la tradició!Ball de gitanes per carnetoltes: recuperem la tradició!
Ball de gitanes per carnetoltes: recuperem la tradició!
gitanesantaeuliaron
 
Week 4 - Trigonometry
Week 4 - TrigonometryWeek 4 - Trigonometry
Week 4 - Trigonometry
Carlos Vázquez
 
RememberItNow Presentation to U.S. Office of eHealth Initiatives
RememberItNow Presentation to U.S. Office of eHealth InitiativesRememberItNow Presentation to U.S. Office of eHealth Initiatives
RememberItNow Presentation to U.S. Office of eHealth Initiatives
Mobile PRM
 
Profitably Introduction for Accountants
Profitably Introduction for AccountantsProfitably Introduction for Accountants
Profitably Introduction for Accountants
Graham Siener
 
Calculus Tutoring 29/09/10
Calculus Tutoring 29/09/10Calculus Tutoring 29/09/10
Calculus Tutoring 29/09/10Carlos Vázquez
 
参与感 01 参与感篇_jason_laipmp
参与感 01 参与感篇_jason_laipmp参与感 01 参与感篇_jason_laipmp
参与感 01 参与感篇_jason_laipmp
賴則先 Jason Che-Hsien LAI, PMP
 
Application problems - Answers
Application problems - AnswersApplication problems - Answers
Application problems - Answers
Carlos Vázquez
 
British Council SIEM presentation December 2015
British Council SIEM presentation December 2015British Council SIEM presentation December 2015
British Council SIEM presentation December 2015
Pete Baikins
 
Newstar Consulting Corporate Presentation
Newstar Consulting Corporate PresentationNewstar Consulting Corporate Presentation
Newstar Consulting Corporate Presentation
Praveen_Annubhukta
 
WIRA brochure 2010
WIRA brochure 2010WIRA brochure 2010
WIRA brochure 2010
Francois Pouilloux
 
Jak nie zwariować z tymi pakietami
Jak nie  zwariować z tymi pakietamiJak nie  zwariować z tymi pakietami
Jak nie zwariować z tymi pakietamiArek Bee.
 
Overview My ecoach Project
Overview My ecoach ProjectOverview My ecoach Project
Overview My ecoach Project
National University
 
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
Lisa Chow
 
Nielson Social Media Business Benchmarking study
Nielson Social Media Business Benchmarking studyNielson Social Media Business Benchmarking study
Nielson Social Media Business Benchmarking study
Heidi Allen
 
Bahan tenaga nuklear
Bahan tenaga nuklearBahan tenaga nuklear
Bahan tenaga nuklear
Yaldaf Lee
 
The Starbucks Experience Principle 4
The Starbucks Experience Principle 4The Starbucks Experience Principle 4
The Starbucks Experience Principle 4
賴則先 Jason Che-Hsien LAI, PMP
 
DiffCalculus: September 12, 2012
DiffCalculus: September 12, 2012DiffCalculus: September 12, 2012
DiffCalculus: September 12, 2012
Carlos Vázquez
 
Star 2013-pdfa-pdfa
Star 2013-pdfa-pdfaStar 2013-pdfa-pdfa
Star 2013-pdfa-pdfa
Dave McAllister
 

Viewers also liked (20)

Achieving Mastery Through Gamification
Achieving Mastery Through GamificationAchieving Mastery Through Gamification
Achieving Mastery Through Gamification
 
Gambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visitGambia 2015 rural development and education discovery visit
Gambia 2015 rural development and education discovery visit
 
Ball de gitanes per carnetoltes: recuperem la tradició!
Ball de gitanes per carnetoltes: recuperem la tradició!Ball de gitanes per carnetoltes: recuperem la tradició!
Ball de gitanes per carnetoltes: recuperem la tradició!
 
Week 4 - Trigonometry
Week 4 - TrigonometryWeek 4 - Trigonometry
Week 4 - Trigonometry
 
RememberItNow Presentation to U.S. Office of eHealth Initiatives
RememberItNow Presentation to U.S. Office of eHealth InitiativesRememberItNow Presentation to U.S. Office of eHealth Initiatives
RememberItNow Presentation to U.S. Office of eHealth Initiatives
 
Profitably Introduction for Accountants
Profitably Introduction for AccountantsProfitably Introduction for Accountants
Profitably Introduction for Accountants
 
Calculus Tutoring 29/09/10
Calculus Tutoring 29/09/10Calculus Tutoring 29/09/10
Calculus Tutoring 29/09/10
 
参与感 01 参与感篇_jason_laipmp
参与感 01 参与感篇_jason_laipmp参与感 01 参与感篇_jason_laipmp
参与感 01 参与感篇_jason_laipmp
 
Application problems - Answers
Application problems - AnswersApplication problems - Answers
Application problems - Answers
 
British Council SIEM presentation December 2015
British Council SIEM presentation December 2015British Council SIEM presentation December 2015
British Council SIEM presentation December 2015
 
Newstar Consulting Corporate Presentation
Newstar Consulting Corporate PresentationNewstar Consulting Corporate Presentation
Newstar Consulting Corporate Presentation
 
WIRA brochure 2010
WIRA brochure 2010WIRA brochure 2010
WIRA brochure 2010
 
Jak nie zwariować z tymi pakietami
Jak nie  zwariować z tymi pakietamiJak nie  zwariować z tymi pakietami
Jak nie zwariować z tymi pakietami
 
Overview My ecoach Project
Overview My ecoach ProjectOverview My ecoach Project
Overview My ecoach Project
 
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
 
Nielson Social Media Business Benchmarking study
Nielson Social Media Business Benchmarking studyNielson Social Media Business Benchmarking study
Nielson Social Media Business Benchmarking study
 
Bahan tenaga nuklear
Bahan tenaga nuklearBahan tenaga nuklear
Bahan tenaga nuklear
 
The Starbucks Experience Principle 4
The Starbucks Experience Principle 4The Starbucks Experience Principle 4
The Starbucks Experience Principle 4
 
DiffCalculus: September 12, 2012
DiffCalculus: September 12, 2012DiffCalculus: September 12, 2012
DiffCalculus: September 12, 2012
 
Star 2013-pdfa-pdfa
Star 2013-pdfa-pdfaStar 2013-pdfa-pdfa
Star 2013-pdfa-pdfa
 

Similar to Identity Intelligence: From Reactionary Support to Sustained Enabler

CSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdfCSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdf
SaraJayneTerp
 
CanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfCanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdf
SaraJayneTerp
 
How Intelligence Skills Transfer Between Government and Business
How Intelligence Skills Transfer Between Government and BusinessHow Intelligence Skills Transfer Between Government and Business
How Intelligence Skills Transfer Between Government and Business
IntelCollab.com
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
Andreas Sfakianakis
 
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Michael Torres
 
Trustwave 2012 Global Güvenlik Raporu
Trustwave 2012 Global Güvenlik RaporuTrustwave 2012 Global Güvenlik Raporu
Trustwave 2012 Global Güvenlik Raporu
Erol Dizdar
 
Delivering data governance with a Yes
Delivering data governance with a YesDelivering data governance with a Yes
Delivering data governance with a Yes
Jean-Michel Franco
 
Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”
Jean-Michel Franco
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
IBM Government
 
Learning from History
Learning from HistoryLearning from History
Learning from History
Brian Honan
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
BigID Inc
 
Webinar: The Future of Data-driven Storytelling
Webinar: The Future of Data-driven StorytellingWebinar: The Future of Data-driven Storytelling
Webinar: The Future of Data-driven Storytelling
LEWIS Global Communications
 
Ht t17
Ht t17Ht t17
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity Forum
David Crozier
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
Dr Lendy Spires
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020
ZIGRAM
 
Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15
DSCI_Connect
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
Future Agenda
 
Aon-Ponemon-2022-Intangible-Assets-Financial-Statement-Impact-Comparison-Repo...
Aon-Ponemon-2022-Intangible-Assets-Financial-Statement-Impact-Comparison-Repo...Aon-Ponemon-2022-Intangible-Assets-Financial-Statement-Impact-Comparison-Repo...
Aon-Ponemon-2022-Intangible-Assets-Financial-Statement-Impact-Comparison-Repo...
zulaazulaa56
 
GI2010 symposium-ws1.2 longhorn (checklist questionaire)
GI2010 symposium-ws1.2 longhorn (checklist questionaire)GI2010 symposium-ws1.2 longhorn (checklist questionaire)
GI2010 symposium-ws1.2 longhorn (checklist questionaire)
IGN Vorstand
 

Similar to Identity Intelligence: From Reactionary Support to Sustained Enabler (20)

CSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdfCSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdf
 
CanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfCanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdf
 
How Intelligence Skills Transfer Between Government and Business
How Intelligence Skills Transfer Between Government and BusinessHow Intelligence Skills Transfer Between Government and Business
How Intelligence Skills Transfer Between Government and Business
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
 
Trustwave 2012 Global Güvenlik Raporu
Trustwave 2012 Global Güvenlik RaporuTrustwave 2012 Global Güvenlik Raporu
Trustwave 2012 Global Güvenlik Raporu
 
Delivering data governance with a Yes
Delivering data governance with a YesDelivering data governance with a Yes
Delivering data governance with a Yes
 
Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”Deliver Data Governance with a “Yes”
Deliver Data Governance with a “Yes”
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
Learning from History
Learning from HistoryLearning from History
Learning from History
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
 
Webinar: The Future of Data-driven Storytelling
Webinar: The Future of Data-driven StorytellingWebinar: The Future of Data-driven Storytelling
Webinar: The Future of Data-driven Storytelling
 
Ht t17
Ht t17Ht t17
Ht t17
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity Forum
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020
 
Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
Aon-Ponemon-2022-Intangible-Assets-Financial-Statement-Impact-Comparison-Repo...
Aon-Ponemon-2022-Intangible-Assets-Financial-Statement-Impact-Comparison-Repo...Aon-Ponemon-2022-Intangible-Assets-Financial-Statement-Impact-Comparison-Repo...
Aon-Ponemon-2022-Intangible-Assets-Financial-Statement-Impact-Comparison-Repo...
 
GI2010 symposium-ws1.2 longhorn (checklist questionaire)
GI2010 symposium-ws1.2 longhorn (checklist questionaire)GI2010 symposium-ws1.2 longhorn (checklist questionaire)
GI2010 symposium-ws1.2 longhorn (checklist questionaire)
 

More from Duane Blackburn

Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
Duane Blackburn
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
Duane Blackburn
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity Management
Duane Blackburn
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Duane Blackburn
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)
Duane Blackburn
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&E
Duane Blackburn
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?
Duane Blackburn
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
Duane Blackburn
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Duane Blackburn
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
Duane Blackburn
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report
Duane Blackburn
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Duane Blackburn
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
Duane Blackburn
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
Duane Blackburn
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)
Duane Blackburn
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)
Duane Blackburn
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process Overview
Duane Blackburn
 
BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
Duane Blackburn
 
BCC 2008 - NSTC
BCC 2008 - NSTCBCC 2008 - NSTC
BCC 2008 - NSTC
Duane Blackburn
 
BCC 2007 - NSTC
BCC 2007 - NSTCBCC 2007 - NSTC
BCC 2007 - NSTC
Duane Blackburn
 

More from Duane Blackburn (20)

Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity Management
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&E
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process Overview
 
BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
 
BCC 2008 - NSTC
BCC 2008 - NSTCBCC 2008 - NSTC
BCC 2008 - NSTC
 
BCC 2007 - NSTC
BCC 2007 - NSTCBCC 2007 - NSTC
BCC 2007 - NSTC
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 

Identity Intelligence: From Reactionary Support to Sustained Enabler

  • 1. Identity Intelligence Project Office | I2PO Identity Intelligence: From Reactionary Support to Sustained Enabler This briefing is classified UNCLASSIFIED 21 August 2012 DIA Identity Intelligence Project Office (I2PO) Dalton Jones, DIA Senior Expert for Biometrics Duane Blackburn, MITRE
  • 2. Identity Intelligence Project Office | I2PO A Look Back at Fielded DoD Biometric Capabilities 2 Mobile identification technology • Stores and matches fingerprint, iris and face • Matches against an onboard database and/or watchlist Portable enrollment station • Stores and matches fingerprint, iris and face • Access to the Biometric Enterprise Base Access and Credentialing HIIDE/SEEK/Fusion BAT BISA BIR/AIMS/IIRs Expeditionary (JEFFs, CEXC) Reach-back (AFDIL, USACIL) Intelligence Analysis • Biometric Enabled Intelligence • Biometric Enabled Watchlist Development Forensic Analysis • Forensic analysis of latent biometric samples • Link an individual to an event Reference Analyze Authoritative database • Stores and matches adversaries’ fingerprint, iris, face and palmprint Various communications systems and computer networks ABIS SIPRnet SOCOM Portal Store Match Share Collect Match
  • 3. Identity Intelligence Project Office | I2PO 2006 – Creation of the BEWL 3
  • 4. Identity Intelligence Project Office | I2PO Now: A Changing (Diametric?) Environment  Draw down in Iraq and Afghanistan  Increase in global operations requiring biometrics  Strategic collections  Data Sharing: interagency and international 4  Advancement of capabilities  Improved accuracy and usability  User-focused systems  Decreases in funding  Sharp losses in Supplementals  Reduction of Core funding
  • 5. Identity Intelligence Project Office | I2PO 5 The Identity Intelligence Project Office (I2PO) is the Agency focal point for DoD Identity Intelligence (I2). The office is organized to harmonize and advocate for DoD I2 requirements and capabilities, as well as ensure integration with national-level I2 plans and programs. Function for this office include  Defining Policy  Defining the role of I2 in Post-War Security Environment  Establishing Data Standards  Fostering Interagency and Foreign Partner Information Sharing Identity Intelligence Project Office (I2PO)
  • 6. Identity Intelligence Project Office | I2PO 6 COORDINATION ENABLING/ ENABLEMENT Defense Agencies Foreign Partners Coalition Forces Industry Carnegie Mellon University University of Virginia University of Texas DARPA Interagency: DOS DOJ DHS Joint Staff COCOMs and Joint Forces Military Services External Product and Service Suppliers PARTNERSHIPCOLLABORATION DIA I2PO Executive Agent I2PO Stakeholder Relationships
  • 7. Identity Intelligence Project Office | I2PO Identity Intelligence?  Name Matching  Biometrics  Attribute Information  Forensics  Data Exploitation  Analysis 7
  • 8. Identity Intelligence Project Office | I2PO 8 I2 – What’s it all about? – Individual Attributes Today we train our analysts to fixate on threat groups as a whole - things, intent, and capability  Name based identification by most organizations are centered on Counter Terrorist, Drug Traffickers, Human Smugglers and Financiers …but who are they really… biometrics provides positive identification and serves as the linchpin for full exploitation of information  Upon determining the Identity of an individual, Identity Intelligence (I2) captures and analyzes all of the informational attributes associated with the individual to fully illuminate their identity.  Attributes include all biographic, digital signatures, familial connections, social networks, and criminal information as well as linkages to other people, places, events, locations, and weapons.  While historically used in a tactical environment the associated Identity Intelligence is becoming of immense strategic value to combat global terrorism, weapons proliferation and support Homeland Security and International Partners
  • 9. Identity Intelligence Project Office | I2PO 9 DIA I2PO USD(I) USD(P) DIA AT&L NGIC BIMA ODNI National Security Staff White House National S&T Council White House
  • 10. Identity Intelligence Project Office | I2PO Near-termActivitiesLong-termStabilization I2PO Standup Categorical BEWL BEWL Institutionalized as Intel Product BEWL COI Identity within QDR Data Collection Strategy COCOM Engagement Capability Gaps DIA DR Briefing NGIC-DIA BEWL Responsibilities I2PO as Program of Record ICD/DCR Interagency Collaboration Education Standards and Tools Classified Biometrics Capability Forensics , Open Data Linkages National-level Info Sharing Strategies JCIDS International - DOD Data Sharing Strategy National-level S&T and Watchlisting Strategies
  • 11. Identity Intelligence Project Office | I2PO What Does the Future Hold?  “For terrorists, travel documents are as important as weapons. Terrorists must travel clandestinely to meet, train, plan, case targets, and gain access to attack. To them, international travel presents great danger, because they must surface to pass through regulated channels, present themselves to border security officials, or attempt to circumvent inspection points. “ (9-11 Commission)  Border control systems based on biometric applications have become the solution of choice in identifying potential threats – expected to earn a double digit, Compounded Annual Growth Rate of 17.6% from 2011 to 2019*  Border Control Market Assessment, estimates that the market will earn revenues of $8.74 billion by 2019, compared to $1.97 billion in 2010*. 11 *Frost & Sullivan 2012
  • 12. Identity Intelligence Project Office | I2PO This briefing is classified UNCLASSIFIED 21 August 2012 Dalton Jones, DIA Senior Expert for Biometrics Dalton.Jones@dodiis.mil; 703-907-0335 Duane Blackburn, MITRE DBlackburn@mitre.org; 434-964-5023 DIA Identity Intelligence Project Office (I2PO)