SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
1
Biometric Automated Toolset (BAT) and
Handheld Interagency Identity
Detection Equipment (HIIDE)
Overview for NIST XML & Mobile ID Workshop
Biometrics Task Force
19 September, 2007
2
BAT Enrollment Station
Digital
Camera Fingerprint
Reader
Optional
Equipment:
CF-73/74
Toughbook
Iris
Scanner
500GB
Hard Drive
Badge
Printer
Bar Code
Scanner
• Function: BAT collects fingerprints, iris scans, facial photos and
biographical information of persons of interest into a searchable data base.
• Scope: Over 2,000 systems deployed; 560,000+ biometrics enrollments
• Mission Threads: Tactical Operations, Force Protection, Detainee
Operations, Population Control, Base Access, IED Forensics Operations,
Special Operations, and Local Hire Screening / Intelligence
Biometrics Automated
Toolset (BAT)
3
Digital Face CameraFingerprint Sensor
Iris Camera
Touch Screen
Data Interface
8”
5”
Flash
IR Bar
• Function: HIIDE collects and matches fingerprints, iris images, facial photos and
biographical contextual data of Persons of Interest against an internal database
• Scope: Planned total fielding of 6,664 devices to OIF, OEF, USMC, ISAF, and SOF;
Future improvements include wireless, watchlist expansion, rolled print, improved
search capabilities
• Mission Threads: Tactical Operations, Force Protection, Detainee Operations, Access
Control, Special Operations, and Intelligence Operations
HIIDE Characteristics:
• Lightweight (2lbs, 3 oz)
• Multimodal collection and
matching device
• Interoperable with BAT for
biometrics data exchange back to
DoD biometrics Data Repository
Handheld Interagency Identity
Detection Equipment (HIIDE)
4
Requirements of
Special Operations Community
Physical Design of Device
• Future mobile identification devices must be smaller, lighter, and faster
• Need to determine value of multimodal devices versus current reliance on
fingerprints
• If fingerprints are the best modality, are 4 prints sufficient?
• What is the most effective platen size to achieve superior sample quality?
Performance
• Focused on identification of targets, not verification
• Matches must be quick and accurate
• Perform matches against entire authoritative database not just a watchlist
• Current systems architecture contains a web portal for managing matches
5
DoD Efforts to Fulfill Mobile ID
Requirements
• DoD Mobile ID Requirements documentation being developed
– JCIDS documentation (BAT CPD, SOID CDD, and Navy IDS)
– Enterprise JUONS
– JROCM Last Tactical Mile task
• Ongoing Architectural efforts will define Mobile ID capability in FOB,
AOR/Corps/JFLCC, and Enterprise
• Development of system-level and operational metrics define
success
– System-level metrics: How are the systems performing in the field?
– Operational metrics: Effectiveness of biometrics in meeting national
strategic objectives
• Systems acquisition in progress:
– Spiral Development of BAT and HIIDE Systems is ongoing
– Potential development of PM Biometrics Family of Systems
6
Lessons Learned
• Current fielded mobile devices are working well and the
Warfigher is pleased
• Need to define requirements upfront:
– Purpose for the device (enroll vs. verify)
– Level that mobile ID devices will be employed (individual, squad,
company)
– CONOPs are important to define use cases
• Small form factor system limitations:
– Hardware, templates, and image quality affect the ability to
populate and match within an internal database (watchlist)
– Difficulty in synchronizing all mobile devices in an AOR
• Logistics/Lifecycle management
• Manage user expectations of the device
• Leaders must understand capability Portfolio
Management to synchronize enterprise
7
Recommendations for Workshop
• Allow use of various sensor technologies to support
Mobile ID requirements
• Standards/Profiles should be based on
operational/performance capabilities
• Investigate interoperability/data sharing issues
introduced with multiple “standards” for data collection
• Utilize use cases to identify and examine interoperability
issues
• Provide a forum for all interested parties to demonstrate
current state of technology & products
8
Contact Information
www.biometrics.dod.mil
Mr. Arun Vemury
Biometrics Task Force
Booz Allen Hamilton
703-602-7541
arun.vemury@hqda.army.mil
MAJ Avi Isaacson
Biometrics Task Force
703-602-7309
avram.isaacson@hqda.army.mil
9
BACK UP SLIDES
10
Improving Operational Capability
• Next Generation Enterprise Automated Biometric Identification System
– Increases capacity and improves scalability
– Decreases response time to user
– Incorporates multi-modal biometrics capability for more accurate searches
/ matches
• Family of Systems development
– Ruggedized, tactical biometrics systems and devices tailored for various
mission sets
– Fully interoperable with enterprise database and other systems
• DoD biometrics-enabled watchlist
– Provides list of high-threat persons of interest available for searching on
handheld devices, as well as from enterprise level
– Interfaces with national watchlists
11
Biometrics Impacts
Significant Operational Statistics
• 1.5M+ Automated Biometric
Identification System entries
• 240,764 Matches
• 167 IED Latent Matches
• 193 Non-IED related latent
matches
Significant Intelligence Statistics
• 9,527 Terrorists on DoD Biometrics
Watchlist
- 1,153 Tier 1 (Detain if Encountered)
• Latent Prints Developed
18,036 – Iraq
4,169 – Afghanistan
• 9,001 Biometrics Intelligence Reports
produced
• 1070 Insurgents put on Security Hold
“Taking away the enemy’s anonymity is one of the
most powerful joint force capabilities for the Long
War.”
Admiral E. P. Giambastiani, VCJCS, 28 MAR 07
12
Optimize
What We
Have
Build Future
Capability
Improve the
Existing
Architecture
Support and sustain legacy
systems; increase capacity
DoD Biometrics Strategy
Field and Sustain “family of
systems”
Support immediate needs while building for the future
Objective:
Meet Immediate
Warfighter Needs
Objective:
All Systems are
Interoperable and
Compatible
Systems Programs of Record,
Biometrics Policy, Data
Sharing, POM build
Objective:
Establish
Future Enterprise
Q4Q3Q2Q1Q4Q3Q2Q1Q4Q3Q2Q1Q4Q3Q2Q1
FY 10FY 09FY 08FY 07

Más contenido relacionado

Destacado

Magnussen wierzy w powrót do ścigania
Magnussen wierzy w powrót do ściganiaMagnussen wierzy w powrót do ścigania
Magnussen wierzy w powrót do ściganiaimpartialfever482
 
лермонтов (биография)
лермонтов (биография)лермонтов (биография)
лермонтов (биография)olegkorobko
 
исследовательская деятельность школьников
исследовательская деятельность школьниковисследовательская деятельность школьников
исследовательская деятельность школьниковolegkorobko
 
компетентностный подход в образовании
компетентностный подход в образованиикомпетентностный подход в образовании
компетентностный подход в образованииolegkorobko
 
достижение результатов
достижение результатовдостижение результатов
достижение результатовolegkorobko
 
15 pillars of business success - Jane-Michele Clark
15 pillars of business success - Jane-Michele Clark15 pillars of business success - Jane-Michele Clark
15 pillars of business success - Jane-Michele ClarkJane-Michele Clark
 
Atbalsti tiešo pirkšanu
Atbalsti tiešo pirkšanuAtbalsti tiešo pirkšanu
Atbalsti tiešo pirkšanuZane Ruģēna
 
convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03Kevin Parrish
 
Travelers
TravelersTravelers
Travelersebmt4
 
Rigid object problem
Rigid object problemRigid object problem
Rigid object problemNateSlides
 
Research into Analytics Access for Comms and Content Designers
Research into Analytics Access for Comms and Content DesignersResearch into Analytics Access for Comms and Content Designers
Research into Analytics Access for Comms and Content DesignersWilliam Roissetter
 
требования к уроку
требования к урокутребования к уроку
требования к урокуolegkorobko
 
Honza v paříži – honza in paris
Honza v paříži – honza in parisHonza v paříži – honza in paris
Honza v paříži – honza in pariskunovska
 
Pan hlaing river (wwd 2015)final
Pan hlaing river (wwd 2015)finalPan hlaing river (wwd 2015)final
Pan hlaing river (wwd 2015)finalAung Thura Hein
 

Destacado (20)

Magnussen wierzy w powrót do ścigania
Magnussen wierzy w powrót do ściganiaMagnussen wierzy w powrót do ścigania
Magnussen wierzy w powrót do ścigania
 
mengelola sumber data
mengelola sumber datamengelola sumber data
mengelola sumber data
 
лермонтов (биография)
лермонтов (биография)лермонтов (биография)
лермонтов (биография)
 
ALI POURZANGBAR
ALI POURZANGBARALI POURZANGBAR
ALI POURZANGBAR
 
исследовательская деятельность школьников
исследовательская деятельность школьниковисследовательская деятельность школьников
исследовательская деятельность школьников
 
компетентностный подход в образовании
компетентностный подход в образованиикомпетентностный подход в образовании
компетентностный подход в образовании
 
достижение результатов
достижение результатовдостижение результатов
достижение результатов
 
15 pillars of business success - Jane-Michele Clark
15 pillars of business success - Jane-Michele Clark15 pillars of business success - Jane-Michele Clark
15 pillars of business success - Jane-Michele Clark
 
Atbalsti tiešo pirkšanu
Atbalsti tiešo pirkšanuAtbalsti tiešo pirkšanu
Atbalsti tiešo pirkšanu
 
1108 ted risk_assessment_methodology_guidance
1108 ted risk_assessment_methodology_guidance1108 ted risk_assessment_methodology_guidance
1108 ted risk_assessment_methodology_guidance
 
Zahir Shah updated
Zahir Shah updatedZahir Shah updated
Zahir Shah updated
 
convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03
 
EL NADAL
EL NADAL EL NADAL
EL NADAL
 
Travelers
TravelersTravelers
Travelers
 
Rigid object problem
Rigid object problemRigid object problem
Rigid object problem
 
Research into Analytics Access for Comms and Content Designers
Research into Analytics Access for Comms and Content DesignersResearch into Analytics Access for Comms and Content Designers
Research into Analytics Access for Comms and Content Designers
 
требования к уроку
требования к урокутребования к уроку
требования к уроку
 
Honza v paříži – honza in paris
Honza v paříži – honza in parisHonza v paříži – honza in paris
Honza v paříži – honza in paris
 
adp3_90
adp3_90adp3_90
adp3_90
 
Pan hlaing river (wwd 2015)final
Pan hlaing river (wwd 2015)finalPan hlaing river (wwd 2015)final
Pan hlaing river (wwd 2015)final
 

Similar a Vermury-BAT-HIIDE

Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceBit Stew Systems
 
Li charles emerging biometrics identity services in the cloud 02122015b - ...
Li charles    emerging biometrics identity services in the cloud 02122015b - ...Li charles    emerging biometrics identity services in the cloud 02122015b - ...
Li charles emerging biometrics identity services in the cloud 02122015b - ...Charles Li
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...John Gilligan
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_SolutionSteve Lim
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesDavid Shepherd
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...Redis Labs
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
Identity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudIdentity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudCharles Li
 
Infor on the Road 2013 ERP LX
Infor on the Road 2013 ERP LXInfor on the Road 2013 ERP LX
Infor on the Road 2013 ERP LXInforsystemi
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in ISISACA Riyadh
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 

Similar a Vermury-BAT-HIIDE (20)

Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine Intelligence
 
Li charles emerging biometrics identity services in the cloud 02122015b - ...
Li charles    emerging biometrics identity services in the cloud 02122015b - ...Li charles    emerging biometrics identity services in the cloud 02122015b - ...
Li charles emerging biometrics identity services in the cloud 02122015b - ...
 
BCC 2006 - NSTC
BCC 2006 - NSTCBCC 2006 - NSTC
BCC 2006 - NSTC
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
AI in the Enterprise at Scale
AI in the Enterprise at ScaleAI in the Enterprise at Scale
AI in the Enterprise at Scale
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...
RedisDay London 2018 - Redis & BioCatch Catching the Bad Guys in Action with ...
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Identity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudIdentity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the Cloud
 
Infor on the Road 2013 ERP LX
Infor on the Road 2013 ERP LXInfor on the Road 2013 ERP LX
Infor on the Road 2013 ERP LX
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in IS
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 

Más de Kevin Parrish

Más de Kevin Parrish (20)

intel_interrrogation_sept-1992
intel_interrrogation_sept-1992intel_interrrogation_sept-1992
intel_interrrogation_sept-1992
 
jp2-01-3
jp2-01-3jp2-01-3
jp2-01-3
 
jp2_0
jp2_0jp2_0
jp2_0
 
MCRP 4-20.102J z
MCRP 4-20.102J zMCRP 4-20.102J z
MCRP 4-20.102J z
 
fm3-21-38_2006
fm3-21-38_2006fm3-21-38_2006
fm3-21-38_2006
 
fm4-20-197
fm4-20-197fm4-20-197
fm4-20-197
 
killblane
killblanekillblane
killblane
 
ANA 4-01.45 Convoy OPNS TTP
ANA 4-01.45 Convoy OPNS TTPANA 4-01.45 Convoy OPNS TTP
ANA 4-01.45 Convoy OPNS TTP
 
Tactical_Convoy_Handbook2002
Tactical_Convoy_Handbook2002Tactical_Convoy_Handbook2002
Tactical_Convoy_Handbook2002
 
CONVOY EVALUATION OTHER THAN IED
CONVOY EVALUATION OTHER THAN IEDCONVOY EVALUATION OTHER THAN IED
CONVOY EVALUATION OTHER THAN IED
 
ADA524970
ADA524970ADA524970
ADA524970
 
fm4-01.45(05)
fm4-01.45(05)fm4-01.45(05)
fm4-01.45(05)
 
MCWP 3-15.3
MCWP 3-15.3MCWP 3-15.3
MCWP 3-15.3
 
fmfm_1-3b_sniping_u.s._marine_corps
fmfm_1-3b_sniping_u.s._marine_corpsfmfm_1-3b_sniping_u.s._marine_corps
fmfm_1-3b_sniping_u.s._marine_corps
 
FM 5-0 - Army Planning & Orders Production
FM 5-0 - Army Planning & Orders ProductionFM 5-0 - Army Planning & Orders Production
FM 5-0 - Army Planning & Orders Production
 
jopes
jopesjopes
jopes
 
DHS-HomemadeExplosivesGuide
DHS-HomemadeExplosivesGuideDHS-HomemadeExplosivesGuide
DHS-HomemadeExplosivesGuide
 
TM-9-1370-208-10
TM-9-1370-208-10TM-9-1370-208-10
TM-9-1370-208-10
 
MICLIC
MICLICMICLIC
MICLIC
 
014884
014884014884
014884
 

Vermury-BAT-HIIDE

  • 1. 1 Biometric Automated Toolset (BAT) and Handheld Interagency Identity Detection Equipment (HIIDE) Overview for NIST XML & Mobile ID Workshop Biometrics Task Force 19 September, 2007
  • 2. 2 BAT Enrollment Station Digital Camera Fingerprint Reader Optional Equipment: CF-73/74 Toughbook Iris Scanner 500GB Hard Drive Badge Printer Bar Code Scanner • Function: BAT collects fingerprints, iris scans, facial photos and biographical information of persons of interest into a searchable data base. • Scope: Over 2,000 systems deployed; 560,000+ biometrics enrollments • Mission Threads: Tactical Operations, Force Protection, Detainee Operations, Population Control, Base Access, IED Forensics Operations, Special Operations, and Local Hire Screening / Intelligence Biometrics Automated Toolset (BAT)
  • 3. 3 Digital Face CameraFingerprint Sensor Iris Camera Touch Screen Data Interface 8” 5” Flash IR Bar • Function: HIIDE collects and matches fingerprints, iris images, facial photos and biographical contextual data of Persons of Interest against an internal database • Scope: Planned total fielding of 6,664 devices to OIF, OEF, USMC, ISAF, and SOF; Future improvements include wireless, watchlist expansion, rolled print, improved search capabilities • Mission Threads: Tactical Operations, Force Protection, Detainee Operations, Access Control, Special Operations, and Intelligence Operations HIIDE Characteristics: • Lightweight (2lbs, 3 oz) • Multimodal collection and matching device • Interoperable with BAT for biometrics data exchange back to DoD biometrics Data Repository Handheld Interagency Identity Detection Equipment (HIIDE)
  • 4. 4 Requirements of Special Operations Community Physical Design of Device • Future mobile identification devices must be smaller, lighter, and faster • Need to determine value of multimodal devices versus current reliance on fingerprints • If fingerprints are the best modality, are 4 prints sufficient? • What is the most effective platen size to achieve superior sample quality? Performance • Focused on identification of targets, not verification • Matches must be quick and accurate • Perform matches against entire authoritative database not just a watchlist • Current systems architecture contains a web portal for managing matches
  • 5. 5 DoD Efforts to Fulfill Mobile ID Requirements • DoD Mobile ID Requirements documentation being developed – JCIDS documentation (BAT CPD, SOID CDD, and Navy IDS) – Enterprise JUONS – JROCM Last Tactical Mile task • Ongoing Architectural efforts will define Mobile ID capability in FOB, AOR/Corps/JFLCC, and Enterprise • Development of system-level and operational metrics define success – System-level metrics: How are the systems performing in the field? – Operational metrics: Effectiveness of biometrics in meeting national strategic objectives • Systems acquisition in progress: – Spiral Development of BAT and HIIDE Systems is ongoing – Potential development of PM Biometrics Family of Systems
  • 6. 6 Lessons Learned • Current fielded mobile devices are working well and the Warfigher is pleased • Need to define requirements upfront: – Purpose for the device (enroll vs. verify) – Level that mobile ID devices will be employed (individual, squad, company) – CONOPs are important to define use cases • Small form factor system limitations: – Hardware, templates, and image quality affect the ability to populate and match within an internal database (watchlist) – Difficulty in synchronizing all mobile devices in an AOR • Logistics/Lifecycle management • Manage user expectations of the device • Leaders must understand capability Portfolio Management to synchronize enterprise
  • 7. 7 Recommendations for Workshop • Allow use of various sensor technologies to support Mobile ID requirements • Standards/Profiles should be based on operational/performance capabilities • Investigate interoperability/data sharing issues introduced with multiple “standards” for data collection • Utilize use cases to identify and examine interoperability issues • Provide a forum for all interested parties to demonstrate current state of technology & products
  • 8. 8 Contact Information www.biometrics.dod.mil Mr. Arun Vemury Biometrics Task Force Booz Allen Hamilton 703-602-7541 arun.vemury@hqda.army.mil MAJ Avi Isaacson Biometrics Task Force 703-602-7309 avram.isaacson@hqda.army.mil
  • 10. 10 Improving Operational Capability • Next Generation Enterprise Automated Biometric Identification System – Increases capacity and improves scalability – Decreases response time to user – Incorporates multi-modal biometrics capability for more accurate searches / matches • Family of Systems development – Ruggedized, tactical biometrics systems and devices tailored for various mission sets – Fully interoperable with enterprise database and other systems • DoD biometrics-enabled watchlist – Provides list of high-threat persons of interest available for searching on handheld devices, as well as from enterprise level – Interfaces with national watchlists
  • 11. 11 Biometrics Impacts Significant Operational Statistics • 1.5M+ Automated Biometric Identification System entries • 240,764 Matches • 167 IED Latent Matches • 193 Non-IED related latent matches Significant Intelligence Statistics • 9,527 Terrorists on DoD Biometrics Watchlist - 1,153 Tier 1 (Detain if Encountered) • Latent Prints Developed 18,036 – Iraq 4,169 – Afghanistan • 9,001 Biometrics Intelligence Reports produced • 1070 Insurgents put on Security Hold “Taking away the enemy’s anonymity is one of the most powerful joint force capabilities for the Long War.” Admiral E. P. Giambastiani, VCJCS, 28 MAR 07
  • 12. 12 Optimize What We Have Build Future Capability Improve the Existing Architecture Support and sustain legacy systems; increase capacity DoD Biometrics Strategy Field and Sustain “family of systems” Support immediate needs while building for the future Objective: Meet Immediate Warfighter Needs Objective: All Systems are Interoperable and Compatible Systems Programs of Record, Biometrics Policy, Data Sharing, POM build Objective: Establish Future Enterprise Q4Q3Q2Q1Q4Q3Q2Q1Q4Q3Q2Q1Q4Q3Q2Q1 FY 10FY 09FY 08FY 07