Defense Biometrics

Total Page:16

File Type:pdf, Size:1020Kb

Defense Biometrics Report of the Defense Science Board Task Force on Defense Biometrics March 2007 Office of the Under Secretary of Defense For Acquisition, Technology, and Logistics Washington, D.C. 20301-3140 This report is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions, conclusions, and recommendations in this report do not necessarily represent the official position of the Department of Defense. The DSB Task Force on Defense Biometrics completed its information gathering in September 2006. This report is UNCLASSIFIED and releasable to the public. ______________________________________________________________ TABLE OF CONTENTS TABLE OF CONTENTS EXECUTIVE SUMMARY .........................................................................................................................................1 INTRODUCTION—IDENTITY MANAGEMENT AND BIOMETRICS ............................................................7 IDENTITY VS. “COLLATERAL DATA” .........................................................................................................................9 IDENTITY ASSURANCE.............................................................................................................................................10 AN IDENTITY MANAGEMENT “SYSTEM” .................................................................................................................10 IDENTITY PROCESSES ..............................................................................................................................................14 THE “ROOT” IDENTITY ............................................................................................................................................14 THE ROLE OF BIOMETRICS.......................................................................................................................................15 THE IDENTIFICATION TRINITY .................................................................................................................................15 Something You Know .........................................................................................................................................15 Something You Have ..........................................................................................................................................16 Something You “Are”—Biometric Indices.........................................................................................................17 BIOMETRIC AUTHENTICATION MODEL ....................................................................................................................18 DATA MANAGEMENT ISSUES............................................................................................................................19 THE POWER OF ID-SENSITIVE APPLICATIONS ...........................................................................................21 THE “BACK OFFICE” PROCESS.........................................................................................................................23 BIOMETRIC INDICES............................................................................................................................................25 FACIAL RECOGNITION .............................................................................................................................................25 FINGERPRINTS .........................................................................................................................................................28 IRIS RECOGNITION...................................................................................................................................................28 VASCULAR RECOGNITION .......................................................................................................................................30 DNA........................................................................................................................................................................30 BIOMETRIC “RESIDUE”—FORENSICS ............................................................................................................33 PROCESSING THE BIOMETRIC .........................................................................................................................35 COMPRESSION LOSSES.............................................................................................................................................35 ANOTHER “COMPRESSION” DANGER.......................................................................................................................36 HITS AND FALSE ALARMS—COSTS AND BENEFITS...................................................................................37 BIOMETRICS GOES TO WAR..............................................................................................................................39 SCENARIOS (“USE CASES”).................................................................................................................................41 IDENTIFICATION VS. VERIFICATION VS. RECOGNITION ............................................................................................41 SCENARIOS AND VIGNETTES....................................................................................................................................42 RESEARCH, DEVELOPMENT, TESTING & EVALUATION: NEEDS, OPPORTUNITIES AND CAPABILITIES ........................................................................................................................................................45 MULTI-MODALITY—THE POWER OF TWO OR MORE...............................................................................................48 SPOOFING ................................................................................................................................................................49 STANDOFF ...............................................................................................................................................................50 COVERTNESS ...........................................................................................................................................................51 NEW MEASURES AND APPLICATIONS ......................................................................................................................51 SPEED OF RESPONSE, ETC. .......................................................................................................................................52 ENVIRONMENTAL EFFECTS......................................................................................................................................53 RACE, ETHNICITY AND GENDER EFFECTS................................................................................................................53 RESIDUAL INDICES OTHER THAN FINGERPRINTS AND DNA.....................................................................................53 MEASUREMENT, STATISTICS, TESTING, AND EVALUATION.....................................................................................54 TECHNOLOGY INSERTION STRATEGY ......................................................................................................................54 BIOMETRIC PRODUCT ASSURANCE ..........................................................................................................................54 DEFENSE BIOMETRICS____________________________________________________________________i TABLE OF CONTENTS______________________________________________________________ MODELING RETURN ON INVESTMENT (ROI)............................................................................................................55 SCALABILITY...........................................................................................................................................................55 DOD ORGANIZATIONAL ISSUES.......................................................................................................................57 POLICY AND DOCTRINE WITHIN AND BEYOND DOD................................................................................59 DOD PARTICIPATION IN THE BIOMETRICS INTERAGENCY PROCESS:........................................................................59 POLICY & GOVERNANCE: ........................................................................................................................................60 TECHNICAL STANDARDS .........................................................................................................................................61 PRIVILEGE MANAGEMENT .......................................................................................................................................63 DATA SHARING .......................................................................................................................................................64 Sharing Identity-Related Information ................................................................................................................65 MANPOWER AND TRAINING REQUIREMENTS............................................................................................67 SECURING IDENTITIES........................................................................................................................................69 PRIVACY..................................................................................................................................................................70
Recommended publications
  • Digital Identity Roadmap Guide
    Digital Identity Roadmap Guide International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland ISBN: 978-92-61-27821-2 9 7 8 9 2 6 1 2 7 8 2 1 2 Published in Switzerland Geneva, 2018 Digital Identity Roadmap Guide Some Rights Reserved This work is a publication of the International Telecommunication Union (ITU). The findings, interpre- tations and conclusions expressed in this work do not necessarily reflect the views of the International Telecommunication Union or its governing bodies. The International Telecommunication Union does not guarantee the accuracy of the data included in this work. The boundaries, colours, denominations, and other information shown on any map in this work do not imply any judgment on the part of the International Telecommunication Union concerning the legal status of any territory or the endorse- ment or acceptance of such boundaries. Nothing herein shall constitute or be considered to be a limitation upon or waiver of the privileges and immunities of the International Telecommunication Union, all of which are specifically reserved. Rights & Permission This work is available under the Creative Commons Attribution 3.0 IGO license (CC BY 3.0 IGO) http:/ / creativecommons .org/ licenses/by/ 3 .0/ igo. Under the Creative Commons Attribution license, you are free to copy, distribute, transmit, and adapt this work, including for commercial purposes, under the following conditions: Attribution — Please cite the work as follows: International Telecommunication Union, Digital Identity Roadmap Guide. Creative Commons Attribution 3.0 IGO (CC BY 3.0 IGO). Translations — If you create a translation of this work, please add the following disclaimer along with the attribution: This translation was not created by the International Telecommunication Union (ITU) and should not be considered an official translation.
    [Show full text]
  • Identity Management: State Health IT Modular Functions for Value-Based Payment
    Identity Management STATE HEALTH IT MODULAR FUNCTIONS FOR VALUE-BASED PAYMENT STRATEGIC IMPLEMENTATION GUIDE ONC-SIM Health IT Resource Center Version 1.1 December 6, 2017 Acknowledgements This report was created by the Office of National Coordinator for Health Information Technology (ONC) State Innovation Model (SIM) Resource Center staff and contractors. ONC Office of Care Transformation Health IT Resource Center Contributors: • Robert Cothren, PhD – Contractor, ONC Resource Center (Lead Contributor) • Kelly Cronin – Director, ONC Office of Care Transformation • John Rancourt – Deputy Director, ONC Office of Care Transformation • Terry Bequette – Contractor, ONC Resource Center • David Kendrick, MD, MPH, FACP, ABPM-CI1 – Contractor, ONC Resource Center Office of the National Coordinator for Health Information Technology U.S. Department of Health and Human Services 300 C Street SW Washington, DC 20201 This document is effective as of the date of publication. Please refer to the underlying regulations and statutes to the extent these materials may be superseded in the future. 1 University of Oklahoma School of Community Medicine State Strategic Implementation Guide: Identity Management ii Executive Summary Identity management includes all activities related to establishing and verifying the identity of providers, patients, caregivers, and other stakeholders in order to: 1. Control access to health-related information and meet regulatory requirements 2. Link health information with the correct individual 3. Link health outcomes with providers, organizations, and care teams A learning health system depends on robust identities and linkages, not just security and access control. When coordinated across participating organizations, such as payers and providers in a State Innovation Model, identity management also enables proper care coordination, service delivery, value-based payment, and performance measurement.
    [Show full text]
  • Using Mobile Device Biometrics for Authenticating First Responders
    1 Draft NISTIR 8334 2 Using Mobile Device Biometrics for 3 Authenticating First Responders 4 5 William Fisher 6 Don Faatz 7 Mark Russell* 8 Christopher Brown 9 Sanjeev Sharma 10 Sudhi Umarji 11 Karen Scarfone 12 13 * Former employee; all work for this 14 publication was done while at employer. 15 16 17 18 19 This publication is available free of charge from: 20 https://doi.org/10.6028/NIST.IR.8334-draft 21 22 23 24 Draft NISTIR 8334 25 Using Mobile Device Biometrics for 26 Authenticating First Responders 27 28 William Fisher 29 Applied Cybersecurity Division 30 Information Technology Laboratory 31 32 Don Faatz 33 Mark Russell* 34 Christopher Brown 35 Sanjeev Sharma 36 Sudhi Umarji 37 The MITRE Corporation 38 McLean, VA 39 40 Karen Scarfone 41 Scarfone Cybersecurity 42 Clifton, VA 43 44 * Former employee; all work for this 45 publication was done while at employer. 46 47 This publication is available free of charge from: 48 https://doi.org/10.6028/NIST.IR.8334-draft 49 50 June 2021 51 52 53 54 U.S. Department of Commerce 55 Gina M. Raimondo, Secretary 56 57 National Institute of Standards and Technology 58 James K. Olthoff, Performing the Non-Exclusive Functions and Duties of the Under Secretary of Commerce 59 for Standards and Technology & Director, National Institute of Standards and Technology 60 National Institute of Standards and Technology Interagency or Internal Report 8334 61 34 pages (June 2021) 62 This publication is available free of charge from: 63 https://doi.org/10.6028/NIST.IR.8334-draft 64 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an 65 experimental procedure or concept adequately.
    [Show full text]
  • Digital Identity Identity Is the Fabric of the Digital Economy
    Digital Identity Identity is the fabric of the digital economy Digital transformation is reshaping identity management. Digital Identity is a broad suite of managed identity When corporate networks had discernable perimeters, an services delivered via best-of-breed technologies to organization conferred trust on a circle of known individuals by help manage organizations’ identity governance and issuing user names and passwords. With that badge of trust, provisioning, identity management, privileged access sitting in front of a desktop or laptop, the individual “user” could access resources. management, single-sign-on, and risk-based multi- factor authentication. With licensing and hosting terms Fast-forward to today. Consumers and employees alike expect built in to the service, organizations can focus on their seamless connectivity to data and services, whether those core business rather than managing large complex resources are neatly tucked behind corporate walls, sitting in Identity and Access Management environments. the cloud, or—more likely—traversing multiple entities. They use devices of their choosing and have little patience for Digital Identity is designed to help you solve your identity lumbering authentication. Whether they’re working from an challenges and can help reduce the potential boundaries to airport, filing medical claims, ordering food, sharing photos, or adoption by establishing a platform for identity innovation that remotely managing their home alarm system, they expect their helps your organization achieve its vision and frees your information to be secure. Organizations are increasingly reliant on the data they share and on their willingness to engage people to focus on what’s core to your mission. digitally.
    [Show full text]
  • Insta-Identity : the Construction of Identity Through Instagram an Extended Literature Review
    Portland State University PDXScholar University Honors Theses University Honors College 5-23-2019 Insta-Identity : the Construction of Identity through Instagram an Extended Literature Review Bailey Seibel Portland State University Follow this and additional works at: https://pdxscholar.library.pdx.edu/honorstheses Let us know how access to this document benefits ou.y Recommended Citation Seibel, Bailey, "Insta-Identity : the Construction of Identity through Instagram an Extended Literature Review" (2019). University Honors Theses. Paper 747. https://doi.org/10.15760/honors.764 This Thesis is brought to you for free and open access. It has been accepted for inclusion in University Honors Theses by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. 1 Running head: INSTA-IDENTITY Insta-Identity: The Construction of Identity Through Instagram An Extended Literature Review by Bailey Seibel An undergraduate honors thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Arts in University Honors and Communication Thesis Adviser Erin Spottswood, Ph.D Portland State University 2019 2 INSTA-IDENTITY As a technology-centered society, we consume and make use of communication technology affordances daily. A person’s ability to curate, communicate, and perceive their identity through the exploration and sharing of selfhood has never been easier thanks to social media applications that promote user-generated content and encourage self-promotion through computer-mediated communication within a social network. This paper will analyze the role Instagram has in the construction of identity by reviewing existing literature on identity theories, with a focus on communication theory of identity (Hecht, 1993), as well as the methodologies behind representing self to see how they apply to the features and frameworks of Instagram.
    [Show full text]
  • Digital Identity
    Digital Identity APPENDIX A: Description of a Basic Digital Identity System and its participants Citing reference: FATF (2020), “Appendix A” in Guidance on Digital Identity, FATF, Paris, www.fatf-gafi.org/publications/documents/digital-identity-guidance.html For more information about the FATF, please visit www.fatf-gafi.org This document and/or any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. © 2020 FATF/OECD. All rights reserved. No reproduction or translation of this publication may be made without prior written permission. Applications for such permission, for all or part of this publication, should be made to the FATF Secretariat, 2 rue André Pascal 75775 Paris Cedex 16, France (fax: +33 1 44 30 61 37 or e-mail: [email protected]) Photocredits coverphoto ©Getty Images GUIDANCE ON DIGITAL IDENTITY | 59 APPENDIX A: DESCRIPTION OF A BASIC DIGITAL IDENTITY SYSTEM AND ITS PARTICIPANTS This Appendix provides a more detailed explanation of the basic components of a generic digital ID system, expanding on the brief summary set out in Section II. The description is presented at a high level of generality. It provides some examples of technology or process that may be applied for the purposes of illustration for the reader only – it does not encourage or approve the use of any particular identity technology, architecture, or processes, such as biometrics or mobile phone technology. Thus, it applies to a broad range of digital ID systems.
    [Show full text]
  • Identity in a Digital World a New Chapter in the Social Contract
    Insight Report Identity in a Digital World A new chapter in the social contract September 2018 Our identity is precious; any digital identity program must be based on enabling meaningful trust, control and accountability. Yet even agreeing these principles are proving hard - implementing them will be even more so because of a confluence of political, economic, technological, cultural, legal and social factors. Amanda Long, Director-General, Consumers International Each individual is unique. There are many factors that define us and our health, ranging from our genes and the way we manage our own health, to the environment and social context in which we each live. It is vital to create a secure information infrastructure where our Digital Identity can enable research to find new cures and optimized care pathways, as well access to quality care. Jeroen Tas, Chief Innovation and Strategy Officer, Royal Philips If designed well, digital identities can foster inclusion in almost all aspects of lives in transformational ways. For small holder farmers, they hold the potential to help overcome the pervasive issues of social, economic and geographic isolation, and fragmentation which are at the root of poverty. And do so at an unprecedented scale. Ishmael Sunga, Chief Executive Officer, South African Confederation of Agricultural Unions (SACAU) We must finally learn that there are no technological solutions to complex socio-economic problems. We should pause and understand the reasons why identity is a barrier to so much, and remove unnecessary barriers instead of resorting to complex identity systems. We also need to safeguard against political and financial wills that build identity systems for efficiency and targeting, instead of the well-being of individuals.
    [Show full text]
  • Online Identity: Who, Me?
    10 October 2016 Online Identity: Who, Me? An Introduction Steve Olshansky, Trust & Identity Program Lead Online Identity: Who, Me? An Introduction 2 Introduction As the Internet has become more central in our day-to-day lives, issues relating to our online identities have become more important, and the potential impacts on our lives more significant in both positive and negative ways. We as individuals interact with a number of online sites and services which require an account (username and password) to access. This can be something as simple as news sites which restrict the number of articles you can read anonymously in a certain time period, to your personal financial or healthcare or similar online services which want to know with certainty that you are definitely YOU before granting access to private information. And of course, we WANT them to be certain about who we are before granting access to this kind of very sensitive information, which could be used to harm us in various ways if it were to fall into the wrong hands. This brief document is the first of a series which is intended to serve as a useful reference for online identity-related topics, and will include links to a number of resources produced by the Internet Society that you will find useful. You and Your Information You, as the subject of your personal information, have the ultimate right and responsibility to control who has access to certain pieces of it, and when, and to protect it from abuse to the best of your ability. There are many pieces of information about you, ranging from publicly available to very private, and it is good to be aware of who is asking for it, why they want it, and how it is and will be used and protected.
    [Show full text]
  • Digital Identity
    DIGITAL IDENTITY MARCH 2020 The Financial Action Task Force (FATF) is an independent inter-governmental body that develops and promotes policies to protect the global financial system against money laundering, terrorist financing and the financing of proliferation of weapons of mass destruction. The FATF Recommendations are recognised as the global anti-money laundering (AML) and counter-terrorist financing (CFT) standard. For more information about the FATF, please visit www.fatf-gafi.org This document and/or any map included herein are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. Citing reference: FATF (2020), Guidance on Digital Identity, FATF, Paris, www.fatf-gafi.org/publications/documents/digital-identity-guidance.html © 2020 FATF/OECD. All rights reserved. No reproduction or translation of this publication may be made without prior written permission. Applications for such permission, for all or part of this publication, should be made to the FATF Secretariat, 2 rue André Pascal 75775 Paris Cedex 16, France (fax: +33 1 44 30 61 37 or e-mail: [email protected]) Photocredits coverphoto ©Getty Images GUIDANCE ON DIGITAL IDENTITY 1 Table of Contents ACRONYMS ......................................................................................................................................................... 3 EXECUTIVE SUMMARY ..................................................................................................................................
    [Show full text]
  • Personal Brand: Your Digital Identity
    PERSONAL BRAND: YOUR DIGITAL IDENTITY CAREER PLANNING CENTER Aloysius P. Kelley, S.J. Center (203) 254-4081 [email protected] www.fairfield.edu/cpc Everyone knows what a brand is… It’s Starbucks, Google, McDonalds, Coca-Cola , and even Fairfield University. Just looking at these logos elicits something about the company; consistent coffee, reliable search engine, or marquee education. The feelings and concepts attached to these logos have been carefully crafted and maintained by the organization to do just that. Organizations are not the only ones utilizing the concept of branding, individuals also have the ability to craft their own brand. Personal branding is the process by which we create our own brand and market ourselves to others. As a brand, we can leverage the same strategies that make these corporate brands appeal to others. Your personal brand is seen in a number of ways: - Through the way you dress - Through the way you carry yourself - In your professional resume - Through your DIGITAL IDENTITY With the surge of social media, you not only have the ability, but you now have the responsibility to manage your own personal brand, both online and in real life. Your digital identity is defined by any and all online information that exists about you, whether you personally created it or not. Social networking sites, including Facebook, Twitter, and LinkedIn are all a part of your digital identity. The material you post and the things you write on these sites can influence your personal brand and thus impact an employer's or graduate school’s impression of you, for better or for worse.
    [Show full text]
  • Digital Identity: the Current State of Affairs Ana I
    No. 18/01 WORKING PAPER Digital Identity: the current state of affairs Ana I. Segovia Domingo / Álvaro Martín Enríquez Digital Identity: bthe current state of affairs Ana I. Segovia Domingo / Álvaro Martín Enríquez Abstract In a world where the rise in the use of the Internet is increasing exponentially, the ability to prove your identity is crucial for the economic, financial and social development. Individuals and companies need identity solutions valid across different services, markets, standards and technologies. New technologies like blockchain, biometrics and AI can help to deliver secure identity services, in particular by governments and financial institutions, and solutions should meet both the objectives of ensuring secure identity and improving user experience. As public identities have been created by different authorities, and since a global public or private identity is not a realistic option in the short term, interoperability and the collaboration between different entities to offer complete solutions is decisive. In the long run, to become a trusted identity provider across different industries could represent a big business opportunity for financial institutions. Key words: Digital identity, Digital Regulation, Blockchain, Cybersecurity, Biometrics. JEL classification: F6 (Economic Impacts of Globalization), K24 (Cyber Law), O33 (Technological Change: Choices and Consequences, D18 (Consumer Protection) Digital Identity: the current state of affairs / 18-01 2 Index 1. Introduction 4 2. Digital Identity: Definition and Management 5 3. Identity Providers 13 4. Identity Drivers. Trends that are driving the need for digital identity systems 18 5. The role of banks in digital identity 22 6. Regulation of Identity 25 7. Challenges 31 8.
    [Show full text]