SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
Remarks of Duane Blackburn
            Assistant Director, Identity Management and Homeland Security
                         Office of Science and Technology Policy
                            Executive Office of the President

                                              at the

                              Biometric Consortium Conference
                                    September 27, 2011




“We have some planes.”

Try to imagine the thoughts of the Boston Air Traffic Controller upon hearing this transmission
on the morning of September 11, 2001:
    • “Who is that?”
    • “Who should I share this information with?”
    • “What else do we know that should be linked with this information?”

   -- Questions asked by a solitary Federal official in the fog of a war that he didn’t yet know
   was taking place.
   -- Questions asked by Federal identity professionals in the fog of technology, policies, and
   bureaucracy every day since.

9/11 was a day that had started with remarkable clarity and calmness, but quickly devolved to
confusion and nervousness as citizens throughout the Nation watched the response and
recovery activities at the World Trade Center and the Pentagon. Citizens then took action,
forcing the terrorists on the fourth hijacked airliner to abandon their plans to attack yet another
national symbol. Just as it took some time for Flight 93 passengers to learn what was taking
place and to decide how to take action, the U.S. Government also took some time before it
initiated military action overseas while simultaneously implementing numerous new security
capabilities at home. Biometrics was to play a key role in both theaters because of the
criticality of identification in operational activities – a tool that had been exploited by the
terrorists themselves, as all but one of the 19 obtained and used U.S. identification documents.

This is the eighth and final time that I have the privilege of participating in a Biometric
Consortium Conference in my role of coordinating Federal biometric activities out of the White
House’s Office of Science and Technology Policy. The amount of progress that this community
has made over this period is truly astonishing, and the impact that you have had in securing our
country has been considerable. Our progress and impact has been enabled through
collaboration – collaboration within the Federal government, collaboration across the private

                                                -1-
sector, and numerous public-private partnerships. Our activities, and the manner in which we
pursued them, has been followed, supported, and praised by two separate presidential
administrations. Each group of individuals within this community deserves praise:
    • Biometric Consortium. The Consortium was a bit unstable on 9/11 as the policy-level
        oversight entity that it reported to had been recently terminated. It stabilized and
        evolved into what you see today: the preeminent worldwide gathering place to discuss
        biometrics. Jeff, Fernando, and Dick deserve a thank you from each of us for their
        commitment to this conference.
    • Educational Professionals. In the days following 9/11, we quickly realized that
        individuals with adequate educational background and practical biometrics experience
        were in short supply. Today we have biometrics and identity management courses,
        degrees and professional certifications that provide the training necessary for our
        community to function.
    • Researchers and standards organizations. Your advancements have been absolutely
        stunning! The core capabilities of today’s technologies are orders of magnitude better
        than they were on 9/11. The availability and use of standards, long an indicator of a
        technology’s maturity, has enabled our system of identity systems to function.
    • Biometric companies. After a rough start, biometric providers responded to provide
        vastly improved products that continually perform as we expect and need them to. You
        are the backbone of our current capabilities, and our future success depends on your
        stability and ingenuity.
    • System Integrators. Biometric technologies are but one piece of a functioning
        operational system. Fortunately, there are dozens of competent system integrators
        with experience developing complex systems for federal government and private sector
        applications that have done a wonderful job of incorporating biometric technologies.
    • Privacy professionals. There wasn’t a single departmental privacy official on 9/11, but
        the first one brought aboard immediately dove into identity issues. Many of the lessons
        learned in our initial work were applied to other technology issues as well, making this
        young field of biometrics a graybeard in the application of privacy theory within the
        federal government. We now have a cadre of privacy and civil liberties professionals
        throughout the federal government that are successfully integrating their principles
        throughout a biometric system’s lifecycle.
    • Intel Analysts. The newest entrant into the biometrics community is intelligence
        analysts. While it may be difficult enough to recognize someone with a biometric
        system, it is even more difficult to figure out what to do about the hit. It is this “so
        what” question that intel analysts answer. They have quickly gained knowledge on
        biometric systems, and what the hits mean, and seamlessly incorporated this new bit of
        information into their analyses. Working out of sight, and usually unknown to the
        world, these are the individuals who transform our technical capabilities into
        operational successes.
    • Finally, Federal program managers and policy officials. This is the group that I have
        worked the closest with over the past eight years, and they have inspired me every day.
        It is impossible to comprehend how difficult it is to collaborate across stovepipes inside

                                               -2-
the federal government without living in it firsthand. Oversight structures, the budget
       process, and even personnel evaluations seemingly conspire to convince them that
       collaboration is too risky or just plain not worth their time. Federal officials leading
       biometric activities have consistently overcome these hurdles and redoubled their
       efforts to collaborate with, and provide free assistance to, their partners throughout the
       federal service. I have worked on and led collaborative endeavors on a variety of other
       topics within the White House, but none of them have embraced the necessity and
       benefits of working together as much as your Federal biometrics leadership has. This
       has often been a thankless task for them, until now. Thank you all.

While we celebrate the progress and impact enabled by the biometrics community throughout
this week, we cannot relax and sit back contently. Threats to our homeland and national
security remain, and our adversaries are constantly studying our defensive postures -- they are
certainly looking for holes in our layers of identity protections. Because of this, we must also
move forward and continue to advance this technology so that we can provide even better
operational capabilities in the future. To that end, the NSTC Subcommittee on Biometrics and
Identity Management is releasing a 2011 update to The National Biometrics Challenge. This
new report provides an overview of current challenges related to strengthening the scientific
foundation of biometrics and improving identity management system capabilities. It clarifies
biometrics-related priorities for Federal agencies and provides context for non-governmental
entities considering collaborations with agencies as private-sector partners.

This community rose to the challenge issued in 2006, and I ask that you do so again today. Use
this conference to learn what we are currently capable of, to discover groundbreaking
opportunities for improvement, to foster collaboration, and to re-enlist in your community for
the next ten years.




                    The National Biometrics Challenge, as well as the
                       BCC 2011 Opening Video, are available for
                          download at www.biometrics.gov.




                                               -3-

Más contenido relacionado

Destacado

Folkia Bizkit Presentation 090401
Folkia Bizkit Presentation 090401Folkia Bizkit Presentation 090401
Folkia Bizkit Presentation 090401
Björn Karlström
 
Naco Projects
Naco ProjectsNaco Projects
Naco Projects
maipily
 
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and SkillsSLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
Lisa Chow
 
Christmas Newsletter
Christmas NewsletterChristmas Newsletter
Christmas Newsletter
andy biggin
 

Destacado (18)

The Copywriter's Handbook 文案创作完全手册 Chap1
The Copywriter's Handbook 文案创作完全手册 Chap1The Copywriter's Handbook 文案创作完全手册 Chap1
The Copywriter's Handbook 文案创作完全手册 Chap1
 
Teach,Tutor, Assess ISTE 2012
Teach,Tutor, Assess ISTE 2012Teach,Tutor, Assess ISTE 2012
Teach,Tutor, Assess ISTE 2012
 
Delårspresentation Q1 09
Delårspresentation Q1 09Delårspresentation Q1 09
Delårspresentation Q1 09
 
Star 2013-pdfa-pdfa
Star 2013-pdfa-pdfaStar 2013-pdfa-pdfa
Star 2013-pdfa-pdfa
 
What’s new on f15
What’s new on f15What’s new on f15
What’s new on f15
 
Guión para la Eucaristía
Guión para la EucaristíaGuión para la Eucaristía
Guión para la Eucaristía
 
Folkia Bizkit Presentation 090401
Folkia Bizkit Presentation 090401Folkia Bizkit Presentation 090401
Folkia Bizkit Presentation 090401
 
First Partial Review
First Partial ReviewFirst Partial Review
First Partial Review
 
BlendingDigitalinTeacherEducation
BlendingDigitalinTeacherEducationBlendingDigitalinTeacherEducation
BlendingDigitalinTeacherEducation
 
Naco Projects
Naco ProjectsNaco Projects
Naco Projects
 
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
 
Calculul drumului scurt
Calculul drumului scurtCalculul drumului scurt
Calculul drumului scurt
 
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and SkillsSLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
 
State Building Role Play
State Building Role PlayState Building Role Play
State Building Role Play
 
"5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee...
"5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee..."5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee...
"5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee...
 
DiffCalculus August 9, 2012
DiffCalculus August 9, 2012DiffCalculus August 9, 2012
DiffCalculus August 9, 2012
 
Christmas Newsletter
Christmas NewsletterChristmas Newsletter
Christmas Newsletter
 
Democratizacion
DemocratizacionDemocratizacion
Democratizacion
 

Más de Duane Blackburn

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-Approved
Duane Blackburn
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
Duane Blackburn
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
Duane Blackburn
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Duane Blackburn
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
Duane Blackburn
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
Duane Blackburn
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
Duane Blackburn
 

Más de Duane Blackburn (20)

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-Approved
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity Management
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&E
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process Overview
 
BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

BCC 2011: Blackburn Opening Address Transcripts

  • 1. Remarks of Duane Blackburn Assistant Director, Identity Management and Homeland Security Office of Science and Technology Policy Executive Office of the President at the Biometric Consortium Conference September 27, 2011 “We have some planes.” Try to imagine the thoughts of the Boston Air Traffic Controller upon hearing this transmission on the morning of September 11, 2001: • “Who is that?” • “Who should I share this information with?” • “What else do we know that should be linked with this information?” -- Questions asked by a solitary Federal official in the fog of a war that he didn’t yet know was taking place. -- Questions asked by Federal identity professionals in the fog of technology, policies, and bureaucracy every day since. 9/11 was a day that had started with remarkable clarity and calmness, but quickly devolved to confusion and nervousness as citizens throughout the Nation watched the response and recovery activities at the World Trade Center and the Pentagon. Citizens then took action, forcing the terrorists on the fourth hijacked airliner to abandon their plans to attack yet another national symbol. Just as it took some time for Flight 93 passengers to learn what was taking place and to decide how to take action, the U.S. Government also took some time before it initiated military action overseas while simultaneously implementing numerous new security capabilities at home. Biometrics was to play a key role in both theaters because of the criticality of identification in operational activities – a tool that had been exploited by the terrorists themselves, as all but one of the 19 obtained and used U.S. identification documents. This is the eighth and final time that I have the privilege of participating in a Biometric Consortium Conference in my role of coordinating Federal biometric activities out of the White House’s Office of Science and Technology Policy. The amount of progress that this community has made over this period is truly astonishing, and the impact that you have had in securing our country has been considerable. Our progress and impact has been enabled through collaboration – collaboration within the Federal government, collaboration across the private -1-
  • 2. sector, and numerous public-private partnerships. Our activities, and the manner in which we pursued them, has been followed, supported, and praised by two separate presidential administrations. Each group of individuals within this community deserves praise: • Biometric Consortium. The Consortium was a bit unstable on 9/11 as the policy-level oversight entity that it reported to had been recently terminated. It stabilized and evolved into what you see today: the preeminent worldwide gathering place to discuss biometrics. Jeff, Fernando, and Dick deserve a thank you from each of us for their commitment to this conference. • Educational Professionals. In the days following 9/11, we quickly realized that individuals with adequate educational background and practical biometrics experience were in short supply. Today we have biometrics and identity management courses, degrees and professional certifications that provide the training necessary for our community to function. • Researchers and standards organizations. Your advancements have been absolutely stunning! The core capabilities of today’s technologies are orders of magnitude better than they were on 9/11. The availability and use of standards, long an indicator of a technology’s maturity, has enabled our system of identity systems to function. • Biometric companies. After a rough start, biometric providers responded to provide vastly improved products that continually perform as we expect and need them to. You are the backbone of our current capabilities, and our future success depends on your stability and ingenuity. • System Integrators. Biometric technologies are but one piece of a functioning operational system. Fortunately, there are dozens of competent system integrators with experience developing complex systems for federal government and private sector applications that have done a wonderful job of incorporating biometric technologies. • Privacy professionals. There wasn’t a single departmental privacy official on 9/11, but the first one brought aboard immediately dove into identity issues. Many of the lessons learned in our initial work were applied to other technology issues as well, making this young field of biometrics a graybeard in the application of privacy theory within the federal government. We now have a cadre of privacy and civil liberties professionals throughout the federal government that are successfully integrating their principles throughout a biometric system’s lifecycle. • Intel Analysts. The newest entrant into the biometrics community is intelligence analysts. While it may be difficult enough to recognize someone with a biometric system, it is even more difficult to figure out what to do about the hit. It is this “so what” question that intel analysts answer. They have quickly gained knowledge on biometric systems, and what the hits mean, and seamlessly incorporated this new bit of information into their analyses. Working out of sight, and usually unknown to the world, these are the individuals who transform our technical capabilities into operational successes. • Finally, Federal program managers and policy officials. This is the group that I have worked the closest with over the past eight years, and they have inspired me every day. It is impossible to comprehend how difficult it is to collaborate across stovepipes inside -2-
  • 3. the federal government without living in it firsthand. Oversight structures, the budget process, and even personnel evaluations seemingly conspire to convince them that collaboration is too risky or just plain not worth their time. Federal officials leading biometric activities have consistently overcome these hurdles and redoubled their efforts to collaborate with, and provide free assistance to, their partners throughout the federal service. I have worked on and led collaborative endeavors on a variety of other topics within the White House, but none of them have embraced the necessity and benefits of working together as much as your Federal biometrics leadership has. This has often been a thankless task for them, until now. Thank you all. While we celebrate the progress and impact enabled by the biometrics community throughout this week, we cannot relax and sit back contently. Threats to our homeland and national security remain, and our adversaries are constantly studying our defensive postures -- they are certainly looking for holes in our layers of identity protections. Because of this, we must also move forward and continue to advance this technology so that we can provide even better operational capabilities in the future. To that end, the NSTC Subcommittee on Biometrics and Identity Management is releasing a 2011 update to The National Biometrics Challenge. This new report provides an overview of current challenges related to strengthening the scientific foundation of biometrics and improving identity management system capabilities. It clarifies biometrics-related priorities for Federal agencies and provides context for non-governmental entities considering collaborations with agencies as private-sector partners. This community rose to the challenge issued in 2006, and I ask that you do so again today. Use this conference to learn what we are currently capable of, to discover groundbreaking opportunities for improvement, to foster collaboration, and to re-enlist in your community for the next ten years. The National Biometrics Challenge, as well as the BCC 2011 Opening Video, are available for download at www.biometrics.gov. -3-