Explore Ebooks
Categories
Explore Audiobooks
Categories
Explore Magazines
Categories
Explore Documents
Categories
Border Security
Research Methodology
Biometrics Research Group, Inc. uses a combination of primary and secondary research
methodologies to compile the necessary information for its research projections.
Primary Research
Secondary Research
Biometrics Research Group, Inc. conducts interviews with technology providers, clients, and
other organizations, as well as stakeholders in
each of the technology segments, standards
organizations, privacy commissions, and other
inuential agencies. To provide balance to these
interviews, industry thought leaders who track
the implementation of the biometric technologies are also interviewed to get their perspec-
biometricupdate.com | 2
Report Synopsis
Since the United States has stringent visa requirements on its inbound international visitors, which has been estimated as 88.3 million
in number and growing, we expect continued
growth of biometrics usage for border security
by the U.S. government. The ongoing effects of
Biometrics Research Group, Inc. denes biometrics as measurable physical and behavioral
characteristics that enable the establishment
and verication of an individuals identity.
Biometrics is the process by which a persons
unique physical and other traits are detected
and recorded by an electronic device or system
as a means of conrming identity. The term
biometrics derives from the word biometry, which refers to the statistical analysis of
biological observations and phenomena. Since
biometric identiers are unique to individuals,
they are more reliable in verifying identity than
token and knowledge-based methods, such as
identity cards and passwords.
biometricupdate.com | 3
recognition, mouse use characteristics, signature analysis and cognitive biometrics. Biometric technologies are systems or applications
that are designed to employ biometric data
derived from biometric identiers or modalities.
A biometric system is an automated process
that: i) collects or captures biometric data via
a biometric identication device, such as an
image scanner for ngerprints or palm vein patterns or a camera to collect facial and iris scans,
ii) extracts the data from the actual submitted
sample, iii) compares the scanned data from
those captured for reference, iv) matches the
submitted sample with templates and v) determines or veries whether the identity of the
biometric data holder is authentic.
The use of the ngerprint identier is an important tool for U.S. national security, because
ngerprints taken are compared with similarly
collected ngerprints at U.S. ports-of-entry.
This helps verify identity to reduce use of stolen
and counterfeit visas, and protect against possible use by terrorists or others who might represent a security risk to the United States.
These two important programs (collecting ngerprints for visa issuance and verifying travelers ngerprints when they enter the United
States) arguably makes travel to the United
States safer for legitimate travelers, and also
improves safety and national security. The
10-print system enables the State Department
and the Department of Homeland Security to
more effectively process visa applicant ngerprints.
biometricupdate.com | 4
The U.S. Department of State makes data available in accordance with the law governing the
use of visa records, to U.S. law enforcement
agencies that require the information for law
enforcement purposes. Visa records are, by law,
condential. Requests for access to visa records
by law enforcement are subject to statutory,
regulatory and other legal restrictions.
biometricupdate.com | 5
Since the United States has stringent visa requirements on its inbound international visitors, which has been estimated as 88.3 million
in number and growing, we expect continued
growth of biometrics usage for border security
by the U.S. government. The ongoing effects of
these requirements are that other countries will
also require enhanced travel documents that
encapsulate biometrics.
biometricupdate.com | 6
By March 2016, Canada is expected to implement the Electronic Travel Authorization (eTA)
program and to begin connecting airlines to the
complementary Interactive Advance Passenger
Information (IAPI) System that will allow for
the enforcement of the eTA. The measures will
allow Canada to pre-screen travelers who are
exempt from the Canadian visa requirement,
except U.S. citizens, and to issue board or noboard messages to airlines about passengers
intending to y to Canada. These will mirror, to
the greatest extent possible, the Electronic System for Travel Authorization (ESTA) program
and the Advance Passenger Information System
(APIS) already in place in the United States
since 2008.
The number of refugees and migrants crossing the Mediterranean to reach Europe has
surpassed 300,000 this year. The large majority of people undertaking these arduous and
dangerous journeys are refugees eeing from
Syria, Libya, Iraq and Afghanistan. Sixty million
people around the world have been displaced
due to conict, according to UNHCR. This is resulting in an acute inux of refugees. However,
conservative politicians throughout Europe and
the West are beginning to react to the potential
threat posed by mass migration. While German
authorities do not believe terrorists have inltrated the incoming stream of refugees from
Syria and other war-torn nations, politicians
in the United States, such as Rep. John Katko
(R-NY), noted in public statements that there
is a high risk that terrorists could enter Europe
during the current crisis.
biometricupdate.com | 7
An example of Europes refugee identity challenge has been illustrated in the following
Crossmatch case study that examines the use
of biometrics in Germany.
Known for Willkommenskultur, their welcoming culture, Germany struggles with balancing
securing its borders and protecting its citizens,
while still enabling the legitimate movement
of people. With plans to accept 1.3 million refugees for humanitarian reasons and to counterbalance a low birth rate and an aging workforce, the ow of those seeking asylum has
been overwhelming. In December 2015 alone,
approximately 1 million asylum seeker claims
were led in Europe, with Germany receiving
the most migrants.
biometricupdate.com | 8
These images are captured at the time of application and linked to a valid government agency
credential. Compared to paper travel documents, biometrics provides a faster and stronger level of identity management and tie the
individual to the trusted credential.
After a competitive tendering process, Accenture secured the three-year contract in which
UNHCR will deploy Accentures biometric identity management system (BIMS) across UNHCR
global operations.
Homeland Security
Government Reorganization
The term homeland security arose following a reorganization of many U.S. Government
agencies in 2003 to form the United States
Department of Homeland Security after the
September 11 attacks, and may be used to refer
to the actions of that department, the United
States Senate Committee on Homeland Security and Governmental Affairs, or the United
States House of Representatives Committee on
Homeland Security.
biometricupdate.com | 9
agencies and entities. Homeland security includes 187 federal agencies and departments,
including the United States National Guard, the
Federal Emergency Management Agency, the
United States Coast Guard, Customs and Border Protection, U.S. Immigration and Customs
Enforcement, United States Citizenship and
Immigration Services, the United States Secret
Service, the Transportation Security Administration, the 14 agencies that constitute the U.S.
intelligence community and Civil Air Patrol.
Although many businesses now operate in the
area of homeland security, it is overwhelmingly
a government function.
Former President George W. Bush consolidated many of these activities under the United
States Department of Homeland Security
(DHS), a new cabinet department established
as a result of the Homeland Security Act of
2002. However, much of the nations homeland
security activity remains outside of DHS; for example, the U.S Federal Bureau of Investigation
(FBI) and the Central Intelligence Agency (CIA)
are not part of the Department, and other executive departments such as the Department of
Defense and Department of Health and Human
Services play a signicant role in certain aspects of homeland security. Homeland security
is ultimately coordinated at the White House by
the Homeland Security Council.
biometricupdate.com | 10
Homeland security spending is incredibly difficult to quantify because funding ows through
literally dozens of federal agencies and not just
through the Department of Homeland Security
(DHS). For example, of the US$71.6 billion requested for homeland security in scal year
2012, only US$37 billion was funded through
DHS. A substantial portion was funded through
the Department of Defense $18.1 billion in scal year 2012 and other departments, including Health and Human Services (US$4.6 billion)
and the Department of Justice (US$4.1 billion).
biometricupdate.com | 11
eral years due to increased air travel and globalized business. The United States, through its
Department of Homeland Security, offers multiple programs: which include NEXUS, SENTRI,
Global Entry and Pre.
NEXUS
NEXUS is a joint program with the Canada Border Services Agency that allows pre-screened,
approved travelers faster processing. NEXUS
was established in 2002 as part of the Shared
Border Accord, a partnership between the United States and Canada that creates open channels of dialogue and working groups committed
to the mutual goals of securing our shared border, while promoting the legitimate trade and
travel that is vital to both economies.
NEXUS is an integrated program with one application and fee submission providing expedited passage in the air, land and marine modes
of travel. Each approved member will receive
a radio frequency identication card. However,
individuals who are interested in air travel must
undergo an iris capture to have their membership accepted at airports.
biometricupdate.com | 12
During the application process, if a person indicates they have a disability that affects their
vision which may make it difficult to take a
clear photo of the iris, the information is added to their prole. When the person arrives at
the airport, instead of using a kiosk, as a NEXUS member they can use a special services
counter where they would answer standard
customs and immigration questions. In these
situations, a non-iris capture sticker is placed
on their membership card at time of enrollment,
which allows them to enjoy expedited passage
using the special services counter.
biometricupdate.com | 13
or the United States for the term of their NEXUS membership and who pass various criminal
history and law enforcement checks by both
countries.
SENTRI
Secure Electronic Network for Travelers Rapid
Inspection (SENTRI) is a program similar to
NEXUS that provides expedited entry into the
both the United States and Mexico. SENTRI
provides expedited processing for pre-approved, low-risk travelers. Applicants must
voluntarily undergo a thorough biographical
background check against criminal, law enforcement, customs, immigration, and terrorist
indices; a 10-ngerprint law enforcement check;
and a personal interview with a U.S. Customs
and Border Protection (CBP) Officer.
Global Entry
Global Entry is a CBP program that allows expedited clearance for pre-approved, low-risk
U.S. citizens and permanent residents upon
arrival in the United States. At specic U.S. airports, program participants proceed to Global
Entry kiosks, present their machine-readable
passport or U.S. permanent resident card, place
biometricupdate.com | 14
International Airport (SAT); San Diego International Airport (SAN); San Francisco International Airport (SFO); San Juan-Luis Muoz Marin
International Airport (SJU); Seattle-Tacoma
International Airport-SeaTac (SEA); Shannon
Airport (SNN); Tampa International Airport
(TPA); Toronto Pearson International Airport
(YYZ); Vancouver International Airport (YVR);
Washington-Dulles International Airport (IAD);
and Winnipeg James Armstrong Richardson
International Airport (YWG).
Over 650,000 people have registered for NEXUS cards, and the majority are satised with the
service benets. By being able to pass through
automated passport control, many travelers can
spend less than a minute to enter or re-enter
the United States. Besides expedited arrival into
the U.S. for immigration and customs, those in
trusted traveler programs often get expedited
security screening at many airports.
TSA Pre
The Department of Homeland Security also
runs Pre, administered by the Transportation
Security Administration (TSA). The TSA Pre
pre-screening initiative allows eligible passengers to volunteer information about themselves
to expedite their screening experience. Eligible passengers enter a separate security lane
where they will undergo expedited screening,
and may pass through screening technology
without removing shoes, light outerwear, belts,
or laptops or 3-1-1 compliant liquids/gels from
their carry-on. To be eligible, participants must
be U.S. citizens traveling through one of the
25 participating U.S. airports and members of
CBP Trusted Traveler programs or select fre-
biometricupdate.com | 15
With the goal of improving biometric data interoperability capabilities between countries,
Accenture was awarded a nine-month contract
from the Department of Homeland Security to
The contract is worth $30 million and according to the company, work under the contract
will support sharing between the United States,
United Kingdom, New Zealand, Canada and
Australia.
Accenture is also set to expand the use of secure Web services for all stakeholders, facilitating access of this data. The company says that
since the development of reusable services,
the time it takes for new users to access the
system has decreased from nine months to
three weeks.
biometricupdate.com | 16
U.S. Immigration and Customs Enforcement receives information from OBIM to identify those
who may have overstayed terms of their admission. OBIM matches entry and exit records and
provides this information to ICE. This enhanced
information sharing process provides an increased capability to identify and apprehend
overstaysa critical tool with which to manage
the immigration and border system. Before
OBIM, international travelers who overstayed
their authorized period of admission were only
identied as a consequence of some other encounter with law enforcement.
One of the manufacturers supplying mobile collection devices to DHS is Cross Match Technologies. The rms SEEK Avenger mobile handheld
unit is aimed at immigration, customs, border
control, law enforcement and security communities. The SEEK Avenger weighs just over 3
lbs. and according to the company, is the only
multi-biometric handheld capable of capturing
stand-off dual iris (SAP 40) and ngerprint
(FAP 45) images in direct sunlight.
The CBP therefore uses ngerprint identication to monitor travelers. Fingerprint identication is one of the most well-known and publicized biometrics. Because of their uniqueness
and consistency over time, ngerprints have
been used for identication for over a century, more recently becoming automated (i.e. a
biometric) due to advancements in computing
capabilities. Fingerprint identication is popular because of the inherent ease in acquisition,
biometricupdate.com | 17
The two main categories of ngerprint matching techniques are minutiae-based matching
and pattern matching. Pattern matching simply compares two images to see how similar
they are. Pattern matching is usually used in
ngerprint systems to detect duplicates. The
most widely used recognition technique, minutiae-based matching, relies on the minutiae
points, specically the location and direction of
each point.
The U.S. Department of Defense and the Intelligence Community use biometric information
about known or suspected terrorists on watch
lists. OBIM is working across the federal government to promote intelligence efforts in identifying high-risk persons.
OBIM biometric services also facilitate identication of terrorists by matching against latent
ngerprints collected from terrorist safe houses
and ongoing criminal investigations conducted
around the world. The move to a 10 ngerprint
collection standard expands this capability by
providing additional ngerprints against which
to match latent ngerprints.
biometricupdate.com | 18
A crucial step in making IDENT and IAFIS interoperable is the transition from a two- to a
10-ngerprint collection standard for the OBIM
and BioVisa programs.
DHS also provides logistical control of hazardous materials. In July 2013, MorphoTrust, a division of SAFRAN, announced it had enrolled a
total of 1.5 million commercial drivers at 135 enrollment centers for the TSAs Hazardous Materials Endorsement Threat Assessment Program.
Conclusion
While the government will still seek to utilize
high-end, high technology solutions to protect
homeland security, Biometrics Research Group,
Inc. notes that future growth in biometrics
through government spending will not be exponential due to budgetary restraints.
biometricupdate.com | 19
government implementation have been catalysts for the use of advanced technology.
If any potential for faster government spending on homeland security can be encouraged,
Biometrics Research Group projects that it will
come through immigration reform. Previously
proposed bipartisan Senate frameworks would
have potentially introduced biometrics to Social
Security identication cards and would also require the Department of Homeland Security to
complete a system to collect biographic data.
Republican Senators have also attempted to
establish a biometric exit system which would
collect the ngerprints of foreigners departing
the United States. While initially rejected, such
a system, if ever implemented, would cost several billion dollars. The outcome of the 2016 U.S.
Presidential Election will also be a major inuence on that countrys approach to homeland
security.