Biometrics and identity on the international stage

Access & Identity Management Handbook 2011 Access Control & Identity Management

At the recent Citizen ID conference held in Sandton, industry experts presented to stakeholders on current use and implementation of biometrics as a tool for security and identification. One such speaker was SN Tisane from the Ministry of Labour and Home Affairs in Botswana, who was there to discuss the nation’s National Identification System and the associated challenges.

21st century border crossings

Botswana’s current system is based on an obsolete system of more than 10 years of age and a replacement system is currently being implemented. The system will tie in with passport and border control to enable a far-flung border post in the remotest part of the country to have the latest and most up-to-date citizen information, the same as at the main border posts and Home Affairs offices in Gaborone. This database info is due to be globally connected, ie, every embassy will have the same digital information as the aforementioned border posts and offices. Additionally, an electronic passport booklet, similar to those becoming commonplace across the developed world, is also being rolled out.

Fingerprints from Interpol

The above example is one of many systems pertaining to global security solutions. But global solutions do not end purely with identification by passport, as any episode of CSI will teach you – fingerprinting is really where it is (perceived to be) at, and with this in mind, a presentation from Mark Branchflower, head of the fingerprint division of Interpol, proved very enlightening.

According to Branchflower, Interpol is looking to use more than just fingerprints in the future – while the agency has a number of differing databases, fingerprinting is currently the most widely-used and established system of identifying flagged individuals. Interpol has stated that to enable it to really make the impact it is meant to, the institution would like its 188 member countries to provide it with far more data regarding both foreign nationals arrested in other countries and nationals suspected of trans-national crimes.

In 2008, 80% of the fingerprints information came from Europe, but by 2009 that figure had dropped to 66%. It is important to realise that this does not mean that less fingerprint sets are coming in from Europe, but rather that the rest of the world has started to cotton on to the idea and has thus upped the amount of fingerprint information being sent through to Interpol.

The problem the agency is running into is that the current database is far too manual. Each search is controlled by a fingerprint technician, and the database has a limit of a mere 200 000 fingerprints and 5000 latent prints. Crime scene marks are currently also unable to be stored. There is however a new database in the pipeline, the new Automated Fingerprint Identification System (AFIS). This system will:

* Increase the daily throughput from 100 to 1000 ANSI/NIST files.

* Increase the amount of data stored from 1 000 000 sets of 10 fingerprints.

* Support palm prints.

Additionally, the new AFIS gateway will:

* Support the same throughput of the new AFIS system.

* Make automated replies to fingerprint searches from member countries, with a response time of 10 minutes rather than the current 24 hours. In addition, a No Hit will be validated by the AFIS system and AFIS examiners will focus on hit validation.

* Have an open and vendor-independent interface between remote end users and AFIS sub-systems.

* Support different IT or user interfaces (e-mail, Web services or user forms).

MIND/FIND

Another concept from Interpol is called MIND/FIND: providing law enforcement with instant worldwide access to Interpol databases. According to Interpol’s website, “To help countries connect easily, Interpol has developed two integrated solutions using either fixed or mobile integrated network databases, known as FIND and MIND. Both can integrate into the existing computer-assisted verification system in a country. In addition, MIND can be used in a country without an existing system.”

Facial vs. iris scanning

On other biometric topics discussed at the conference, one query that cropped up was that of facial vs. iris scanning as a means of identification. A distinction was made between the uses of the two in that facial identification is a handy tool in law enforcement where items such as CCTV footage are used. An iris scan, on the other hand, is only useful when a scanner, such as to provide access through a secured door, is provided. The usage distinction was summarised as follows: we do not leave our iris scans lying around, but we do leave a record of our face wherever there is a camera.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...