Biometrics redefining the phrase 'don't shoot until you see the whites of their eyes'

Size: px
Start display at page:

Download "Biometrics redefining the phrase 'don't shoot until you see the whites of their eyes'"

Transcription

1 Army Technology Market & Customer Insight Log In Request Demo About Market & Customer Insight Biometrics redefining the phrase 'don't shoot until you see the whites of their eyes' 11 January 2012 Dr Gareth Evans Accurate identification of targets, even in the most remote locations, is now critical to military operations. Dr Gareth Evans reports on how the ability to accurately identify friend from foe has, in as little as five years, gone from an unconventional and clunky add-on to an integral part of mission equipment and perhaps the precursor to an entirely new form of enemy surveillance. Little more than five years ago, biometric technology still largely represented a new and somewhat unconventional item in the military toolkit - an "add-on to the mission," in the words of Myra S Gray, director of the US Army's Biometrics Identity Management Agency (BIMA). Today, with estimates suggesting that information about 2.2 million Iraqis and 1.5 million Afghans - said to roughly equate to a quarter and one in six of all the men of fighting age in their respective populations - is held on Nato and local national databases, that perception has undoubtedly changed. While conventional photographs and fingerprints have been widely relied upon to establish individual IDs for decades, the principal advantage biometrics brings is the ability to search millions of files in seconds. This, coupled with its ability to provide accurate identification at even the most remote of locations via portable, hand-held devices, as well as swiftly scan databases held by a range of different agencies as appropriate, has cemented the technology's position as an integral part of modern military operations. That proven value has helped fuel the kind of interest that has seen the global biometric market tipped to achieve a compound annual growth rate of around 23% over , according to market research consultants RNCOS. Establishing ID Given the nature of conflicts facing the modern soldier, speed and certainty are essential when it comes to distinguishing friend from foe, and in this context, iris recognition is one of the most widely familiar biometric tools - and the one which has probably enjoyed the most attention to date. Combining computer imaging, recognition algorithms and statistical inference to mathematically analyse the complex, unique patterns of an individual's eyes - typically comparing 200 or more sample points - this "For the moment at least, away from the battlefield, the military applications of biometrics appear set on a

2 technology is said to be at least as accurate as a single fingerprint and can provide certain real-time identification in the field. "That value has helped fuel the kind of interest which saw the global biometric market tipped to achieve CAGR of around 23% over " less contentious course." The key to it lies in the fact that iris structure is set during early development, while it remains remarkably stable throughout life. The upshot of this is that in the absence of a person suffering significant eye damage, a 'one-off', single digitised image can provide a lifetime of unambiguous ID - largely regardless of any interference from spectacles or contact lenses. DNA too offers identification on an unchangeable basis, but despite its renowned forensic value, it is often less appropriate for many in-theatre military applications. As consultant biochemist Dr Clare Miles explains time can be a serious limiting factor. "Although it allows you to get an ID with unprecedented accuracy, and even though the technology has improved enormously over recent years, it's still not what you'd exactly call a five-minute job." Real-time biometric identification by means of DNA analysis has, however, recently come a step closer with the announcement at the end of 2011 of a contract for Northrop Grumman Corporation and teammate IntegenX Inc to supply the latter's RapidHIT 200 human DNA identification system to the US Army's BIMA. This system - the first ever, fully automated approach, capable of producing standardised DNA profiles from routine cheek swabs and other samples in less than 90 minutes - means analysis can now take place at the point of collection, avoiding the usual delays as samples are transported to distant laboratories for processing. It may still not quite be a 'five-minute job', but it undeniably raises the bar on actionable DNA biometrics. Successes and limitations There have already been some notable successes - perhaps most significantly with the role biometric profiling played in April 2011 in helping to recapture 35 escapees within days of a Taliban devised break out from Kandahar's Sarposa Prison. With their iris scans, fingerprints and facial data recorded on the US Automated Biometric Information System database, many were caught at routine checkpoints, while one was arrested at a recruiting station attempting to infiltrate Afghan security forces. Nevertheless, current technology has its limitations. In the aftermath of the Sarposa jail-break, for instance, many hand-held devices were found to be suffering from what were officially described as functioning 'issues' in the heat. There are other factors too, as even the most robust of screens can break if dropped, and more widely, the roll out of all forms of biometric identification for unsupervised applications, such as entry points, is hampered by the obvious need to ensure the body part presented is still attached to its rightful owner. Clearly there are challenges for the future, but the technologies are fast evolving to meet them. New directions One of the potentially most game-changing applications mooted, one which

3 is currently in development, would see military personnel able to capture iris and facial scans of individuals from a distance - effectively forming the logical convergence of surveillance with biometrics. While this obviously removes the need to expose a soldier to possible danger to collect data, there is the further advantage that such covertly gathered biometrics allows a suspect to be entered on a database without that subject's knowledge - which could represent a significant potential edge in the cat-and-mouse game of counter-insurgency. Honeywell's prototype Combined Face and Iris Recognition System (CFAIRS), for instance, is intended to be able capture biometric information and track an individual on the basis of it, from up to four metres. Although currently only in the testing phase, reports suggest it is capable of achieving around 95% accuracy. Similar research is underway too at Carnegie-Mellon University, where a BIMA-funded programme is developing a vehicle-mounted camera system to capture scans automatically at a distance of 12 metres. Add to this some of the newly-emerging techniques of 'soft-biometrics' to identify ethnicity from iris texture, which it is claimed is up to 90% accurate, and researchers believe practical military applications of these systems will not be far in the future. Automating future conflicts In the longer term, it could also open up the way for what has become known as 'tactical non-cooperative biometrics' - using biometric data as a means to target the enemy. The move towards increasing automation is already apparent, and with many of the world's defence budgets squeezed, the appeal of collecting biometrics via surveillance and drones, which can then be used to fight some kind of highly-robotic future war is clear - despite its distinctly sci-fi overtones. However, as Major Mark Swiatek of the US Air Force Academy pointed out at September's Biometric Consortium Conference in Florida, the idea of allowing "boxes" to "do all the dirty work" raises a whole host of difficult questions, ethically, politically and practically. Automated systems need programming, and that requires intent. "Today, with estimates suggesting information about 2.2 million Iraqis and 1.5 million Afghans is held on Nato and local national databases, that perception has changed." For the moment at least, away from the battlefield, the military applications of biometrics appear set on a less contentious course. According to Gray, "the next big step forward in biometrics is definitely going to be in the business process arena", where she suggests it can help the US Army improve efficiency and reduce fraud. In the month that President Obama announced arguably the most significant defence review in American military history, with a 15% reduction to the US Army and Marine Corps on the cards, that seems to be a good direction in which to be headed.

4 An Iraqi recruit is processed through the Biometric Automated Tool Set System. A US soldier using handheld identification detection during Operation Helmand Spider. Northrop Grumman's BioTRAC. An Afghanistan National Police officer has biometrics entered onto ID detection equipment.

5 IntegenX's RapidHIT 200 human DNA identification system.

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

THE NATO C3 AGENCY SUPPORT TO THE IED FIGHT: A COMPREHENSIVE APPROACH

THE NATO C3 AGENCY SUPPORT TO THE IED FIGHT: A COMPREHENSIVE APPROACH I&S THE NATO C3 AGENCY SUPPORT TO THE IED FIGHT: A COMPREHENSIVE APPROACH Franco FIORE Abstract: This paper briefly addresses the activities the NATO C3 Agency is performing in support to the Counter Improvised

More information

WINSTON-SALEM POLICE DEPARTMENT. Remote Lineup Application

WINSTON-SALEM POLICE DEPARTMENT. Remote Lineup Application WINSTON-SALEM POLICE DEPARTMENT Remote Lineup Application Project Description Since their inception, photographic lineups have been a major component of criminal investigations for law enforcement agencies.

More information

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh Biometrics in Law Enforcement and Corrections Presenters: Orlando Martinez & Lt. Pat McCosh Presentation Overview Introduction Orlando Martinez VP Global Sales, L1 Identity Solutions Biometrics Division

More information

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

Safety and Security. Pieter van Gelder. KIVI Jaarccongres 30 November 2016

Safety and Security. Pieter van Gelder. KIVI Jaarccongres 30 November 2016 Safety and Security Pieter van Gelder Professor of Safety Science and TU Safety and Security Institute KIVI Jaarccongres 30 November 2016 1/50 Outline The setting Innovations in monitoring of, and dealing

More information

Technologies that will make a difference for Canadian Law Enforcement

Technologies that will make a difference for Canadian Law Enforcement The Future Of Public Safety In Smart Cities Technologies that will make a difference for Canadian Law Enforcement The car is several meters away, with only the passenger s side visible to the naked eye,

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

Unmanned Ground Military and Construction Systems Technology Gaps Exploration

Unmanned Ground Military and Construction Systems Technology Gaps Exploration Unmanned Ground Military and Construction Systems Technology Gaps Exploration Eugeniusz Budny a, Piotr Szynkarczyk a and Józef Wrona b a Industrial Research Institute for Automation and Measurements Al.

More information

FUTURE WAR WAR OF THE ROBOTS?

FUTURE WAR WAR OF THE ROBOTS? Review of the Air Force Academy No.1 (33)/2017 FUTURE WAR WAR OF THE ROBOTS? Milan SOPÓCI, Marek WALANCIK Academy of Business in Dabrowa Górnicza DOI: 10.19062/1842-9238.2017.15.1.1 Abstract: The article

More information

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview Challenging the Situational Awareness on the Sea from Sensors to Analytics New technologies for data gathering, dissemination, sharing and analytics in the Mediterranean theatre Programme Overview The

More information

Policing in the 21 st Century. Response from the Royal Academy of Engineering to the Home Affairs Select Committee

Policing in the 21 st Century. Response from the Royal Academy of Engineering to the Home Affairs Select Committee Policing in the 21 st Century Response from the Royal Academy of Engineering to the Home Affairs Select Committee February 2008 Introduction The Royal Academy of Engineering is pleased to contribute to

More information

MSPO 2017: POLISH RADAR CAPABILITIES

MSPO 2017: POLISH RADAR CAPABILITIES aut. Maksymilian Dura 08.09.2017 MSPO 2017: POLISH RADAR CAPABILITIES MSPO International Defence Industry Exhibition organized in Kielce is yet another occasion for the PIT-RADWAR company to show that

More information

Abyei - UNOSAT analysis update: Retur nee areas and infrastructure development

Abyei - UNOSAT analysis update: Retur nee areas and infrastructure development Abyei - UNOSAT analysis update: Retur nee areas and infrastructure development ANALYSIS SUMARY: This analysis shows the town of Abyei in South Sudan. The analyzed very high resolution satellite imagery

More information

Advanced Technologies Group programs aim to improve security

Advanced Technologies Group programs aim to improve security Advanced Technologies Group programs aim to improve security Dr. Brian Lemoff The Robert H. Mollohan Research Center, located in Fairmont's I 79 Technology Park, is home to the WVHTC Foundation's Advanced

More information

AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira

AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS Nuno Sousa Eugénio Oliveira Faculdade de Egenharia da Universidade do Porto, Portugal Abstract: This paper describes a platform that enables

More information

HFSC Creates Group Dedicated to Lean Six Sigma, Leadership Building

HFSC Creates Group Dedicated to Lean Six Sigma, Leadership Building HOUSTON FORENSIC SCIENCE CENTER. JANUARY 2018 INSIDE THIS EDITION HFSC Creates Group Dedicated to Lean Six Sigma, Leadership Building 2 4 5 6 Dr. Peter Stout addresses the importance of a new LIMS HFSC

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

CPE/CSC 580: Intelligent Agents

CPE/CSC 580: Intelligent Agents CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent

More information

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS

More information

National Policing Improvement Agency. National Policing Improvement Agency Meeting the challenges of 21 st century crime and criminality

National Policing Improvement Agency. National Policing Improvement Agency Meeting the challenges of 21 st century crime and criminality National Policing Improvement Agency Meeting the challenges of 21 st century crime and criminality Michael Hallowes Detective Chief Superintendent Head of Strategic Operations National Policing Improvement

More information

Objectives. You will understand: Fingerprints Fingerprints

Objectives. You will understand: Fingerprints Fingerprints Fingerprints Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal identification easier.

More information

Justice Sub-Committee on Policing. Police Scotland s digital data and ICT strategy. Written submission from Police Scotland

Justice Sub-Committee on Policing. Police Scotland s digital data and ICT strategy. Written submission from Police Scotland Justice Sub-Committee on Policing Police Scotland s digital data and ICT strategy Written submission from Police Scotland The following information is provided for information of the Justice Sub-Committee.

More information

Forensic Sketch Recognition: Matching Forensic Sketches to Mugshot Images

Forensic Sketch Recognition: Matching Forensic Sketches to Mugshot Images Forensic Sketch Recognition: Matching Forensic Sketches to Mugshot Images Presented by: Brendan Klare With: Anil Jain, and Zhifeng Li Forensic sketchesare drawn by a police artist based on verbal description

More information

Little Fingers. Big Challenges.

Little Fingers. Big Challenges. Little Fingers. Big Challenges. How Image Quality and Sensor Technology Are Key for Fast, Accurate Mobile Fingerprint Recognition for Children The Challenge of Children s Identity While automated fingerprint

More information

The Center for Identification Technology Research (CITeR)

The Center for Identification Technology Research (CITeR) The Center for Identification Technology Research () Presented by Dr. Stephanie Schuckers February 24, 2011 Status Report is an NSF Industry/University Cooperative Research Center (IUCRC) The importance

More information

INTERACTIVE EVOLUTIONARY GENERATION OF FACIAL COMPOSITES FOR LOCATING SUSPECTS IN CRIMINAL INVESTIGATIONS/

INTERACTIVE EVOLUTIONARY GENERATION OF FACIAL COMPOSITES FOR LOCATING SUSPECTS IN CRIMINAL INVESTIGATIONS/ The UK s European university INTERACTIVE EVOLUTIONARY GENERATION OF FACIAL COMPOSITES FOR LOCATING SUSPECTS IN CRIMINAL INVESTIGATIONS/ Dr Stuart Gibson (speaker) & Dr Chris Solomon School of Physical

More information

Promising technologies to meet tomorrow s security challenges

Promising technologies to meet tomorrow s security challenges Kevin M. Panneton Professor Stephen Saravara Security Management 44.312.201 25 November 2009 Panneton 1 Promising technologies to meet tomorrow s security challenges Within the field of industrial and

More information

ENGINEERING A TRAITOR

ENGINEERING A TRAITOR ENGINEERING A TRAITOR Written by Brian David Johnson Creative Direction: Sandy Winkelman Illustration: Steve Buccellato Brought to you by the Army Cyber Institute at West Point BUILDING A BETTER, STRONGER

More information

Non-Contact Vein Recognition Biometrics

Non-Contact Vein Recognition Biometrics Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization

More information

Dream Jobs: Secret agent

Dream Jobs: Secret agent Dream Jobs: Secret agent By Harry Ferguson, as told to The Guardian on 10.28.16 Word Count 1,123 An agent with MI6 which is part of Britain's secret service, with businesspeople in the background. Getty

More information

Digital Identity: Realising Smart Cities

Digital Identity: Realising Smart Cities Digital Identity: Realising Smart Cities Copyright 2018 GSM Association About the GSMA The GSMA represents the interests of mobile operators worldwide, uniting nearly 800 operators with more than 250 companies

More information

REMOTE SENSING AND PRIVACY ISSUES. Lynn Brien Geography 4810G 11/29/07

REMOTE SENSING AND PRIVACY ISSUES. Lynn Brien Geography 4810G 11/29/07 REMOTE SENSING AND PRIVACY ISSUES Lynn Brien Geography 4810G 11/29/07 High Resolution Unresolved (Graham, 1996) Concepts of Privacy Concepts of privacy are viewed differently by different cultures. Concepts

More information

Fingerprint Analysis. Bud & Patti Bertino

Fingerprint Analysis. Bud & Patti Bertino Fingerprint Analysis Bud & Patti Bertino Fingerprints Formation Skin produce secretions oil, salts Dirt combines with secretions Secretions stick to unique ridge patterns on skin Did You Know? Fingerprints

More information

Accurate Automation Corporation. developing emerging technologies

Accurate Automation Corporation. developing emerging technologies Accurate Automation Corporation developing emerging technologies Unmanned Systems for the Maritime Applications Accurate Automation Corporation (AAC) serves as a showcase for the Small Business Innovation

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) Exhibit R-2 0602308A Advanced Concepts and Simulation ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) FY 2005 FY 2006 FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 Total Program Element (PE) Cost 22710 27416

More information

Astronomy Project Assignment #4: Journal Entry

Astronomy Project Assignment #4: Journal Entry Assignment #4 notes Students need to imagine that they are a member of the space colony and to write a journal entry about a typical day. Once again, the main purpose of this assignment is to keep students

More information

Technology Needs Assessment

Technology Needs Assessment Technology Needs Assessment CII Research Summary 173-1 Executive Summary The Technology Needs Assessment Research Team was initiated to take a snapshot of current industry technology needs. As a result,

More information

Conference panels considered the implications of robotics on ethical, legal, operational, institutional, and force generation functioning of the Army

Conference panels considered the implications of robotics on ethical, legal, operational, institutional, and force generation functioning of the Army INTRODUCTION Queen s University hosted the 10th annual Kingston Conference on International Security (KCIS) at the Marriott Residence Inn, Kingston Waters Edge, in Kingston, Ontario, from May 11-13, 2015.

More information

2018 HSS Development

2018 HSS Development Communications Intelligence - Mobile Collection - Situational Awareness - Tracking Identities Electronic Warfare - RF Jamming - Programmable Applications Prison Solutions - Managed Access - Denial of Service

More information

GUIDE TO SPEAKING POINTS:

GUIDE TO SPEAKING POINTS: GUIDE TO SPEAKING POINTS: The following presentation includes a set of speaking points that directly follow the text in the slide. The deck and speaking points can be used in two ways. As a learning tool

More information

ARCHIVED REPORT. Falcon II Tactical Radio - Archived 10/07

ARCHIVED REPORT. Falcon II Tactical Radio - Archived 10/07 C 4 I Forecast ARCHIVED REPORT For data and forecasts on current programs please visit www.forecastinternational.com or call +1 203.426.0800 - Archived 10/07 Outlook With the high costs and delays of the

More information

S&T Stakeholders Conference - West January 14-17, 2008

S&T Stakeholders Conference - West January 14-17, 2008 S&T Stakeholders Conference - West January 14-17, 2008 Human Factors Division: Human-Systems Research and Engineering/Biometrics Sharla Rausch, Ph.D., Division Head Christopher Miles, Program Manager,

More information

The robots are coming, but the humans aren't leaving

The robots are coming, but the humans aren't leaving The robots are coming, but the humans aren't leaving Fernando Aguirre de Oliveira Júnior Partner Services, Outsourcing & Automation Advisory May, 2017 Call it what you want, digital labor is no longer

More information

MILITARY RADAR TRENDS AND ANALYSIS REPORT

MILITARY RADAR TRENDS AND ANALYSIS REPORT MILITARY RADAR TRENDS AND ANALYSIS REPORT 2016 CONTENTS About the research 3 Analysis of factors driving innovation and demand 4 Overview of challenges for R&D and implementation of new radar 7 Analysis

More information

ENGLISH TEXT SUMMARY NOTES Dear America- Letters Home from Vietnam

ENGLISH TEXT SUMMARY NOTES Dear America- Letters Home from Vietnam ENGLISH TEXT SUMMARY NOTES Dear America- Letters Home from Vietnam Text guide by: Hannah Young Dear America Letters Home from Vietnam 2 Copyright TSSM 2010 TSSM ACN 099 422 670 ABN 54 099 422 670 A: Level

More information

Senior Design Projects: Sample Ethical Analyses

Senior Design Projects: Sample Ethical Analyses Senior Design Projects: Sample Ethical Analyses EE 441/442 Spring 2005 Introduction What follows are three sample ethical analyses to help you in the preparation of your senior design project report. Please

More information

FJ Photography. The photography and writing of aviation photojournalist Steve Davies. Page 1.

FJ Photography. The photography and writing of aviation photojournalist Steve Davies.   Page 1. Page 1 FJ Photography The photography and writing of aviation photojournalist Steve Davies Page 2 Con t e n t s Int r o d u c t i o n 3 Pho t o g r a p h y 4 Boo k s 6 Ma g a z i n e & Jo u r n a l Wo

More information

A SPACE STATUS REPORT. John M. Logsdon Space Policy Institute Elliott School of International Affairs George Washington University

A SPACE STATUS REPORT. John M. Logsdon Space Policy Institute Elliott School of International Affairs George Washington University A SPACE STATUS REPORT John M. Logsdon Space Policy Institute Elliott School of International Affairs George Washington University TWO TYPES OF U.S. SPACE PROGRAMS One focused on science and exploration

More information

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society

UNIT 2 TOPICS IN COMPUTER SCIENCE. Emerging Technologies and Society UNIT 2 TOPICS IN COMPUTER SCIENCE Emerging Technologies and Society EMERGING TECHNOLOGIES Technology has become perhaps the greatest agent of change in the modern world. While never without risk, positive

More information

UK OFFICIAL. Crown copyright Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO

UK OFFICIAL. Crown copyright Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO Crown copyright 2015. Published with the permission of the Defence Science and Technology Laboratory on behalf of the Controller of HMSO Introduction Purpose: to make you think about what underlies the

More information

CymbIoT Visual Analytics

CymbIoT Visual Analytics CymbIoT Visual Analytics CymbIoT Analytics Module VISUALI AUDIOI DATA The CymbIoT Analytics Module offers a series of integral analytics packages- comprising the world s leading visual content analysis

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

F. Tip and M. Weintraub REQUIREMENTS

F. Tip and M. Weintraub REQUIREMENTS F. Tip and M. Weintraub REQUIREMENTS UNIT OBJECTIVE Understand what requirements are Understand how to acquire, express, validate and manage requirements Thanks go to Martin Schedlbauer and to Andreas

More information

Texture characterization in DIRSIG

Texture characterization in DIRSIG Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2001 Texture characterization in DIRSIG Christy Burtner Follow this and additional works at: http://scholarworks.rit.edu/theses

More information

International Humanitarian Law and New Weapon Technologies

International Humanitarian Law and New Weapon Technologies International Humanitarian Law and New Weapon Technologies Statement GENEVA, 08 SEPTEMBER 2011. 34th Round Table on Current Issues of International Humanitarian Law, San Remo, 8-10 September 2011. Keynote

More information

Phantom Dome - Advanced Drone Detection and jamming system

Phantom Dome - Advanced Drone Detection and jamming system Phantom Dome - Advanced Drone Detection and jamming system *Picture for illustration only 1 1. The emanating threat of drones In recent years the threat of drones has become increasingly vivid to many

More information

Machine Trait Scales for Evaluating Mechanistic Mental Models. of Robots and Computer-Based Machines. Sara Kiesler and Jennifer Goetz, HCII,CMU

Machine Trait Scales for Evaluating Mechanistic Mental Models. of Robots and Computer-Based Machines. Sara Kiesler and Jennifer Goetz, HCII,CMU Machine Trait Scales for Evaluating Mechanistic Mental Models of Robots and Computer-Based Machines Sara Kiesler and Jennifer Goetz, HCII,CMU April 18, 2002 In previous work, we and others have used the

More information

Why Record War Casualties?

Why Record War Casualties? Why Record War Casualties? Michael Spagat Royal Holloway, University of London Talk given at the conference: The Role of Computer Science in Civilian Casualty Recording and Estimation Carnegie Mellon University

More information

Visual Analysis of Social Networks in a Counter-Insurgency Context

Visual Analysis of Social Networks in a Counter-Insurgency Context Visual Analysis of Social Networks in a Counter-Insurgency Context Régine Lecocq Defence R&D Canada Valcartier Intelligence & Information Section June 22, 2011 Background Changes in military operations

More information

ENHANCING THE USABILITY OF THE HUMAN MACHINE INTERFACE ON THE HANDHELD INTERAGENCY IDENTITY DETECTION EQUIPMENT (HIIDE)

ENHANCING THE USABILITY OF THE HUMAN MACHINE INTERFACE ON THE HANDHELD INTERAGENCY IDENTITY DETECTION EQUIPMENT (HIIDE) ENHANCING THE USABILITY OF THE HUMAN MACHINE INTERFACE ON THE HANDHELD INTERAGENCY IDENTITY DETECTION EQUIPMENT (HIIDE) Kelly N. Faddis, Southern Methodist University John J. Howard, Southern Methodist

More information

IRIS BIOMETRICS FROM SEGMENTATION TO TEMPLATE SECURITY ADVANCES IN INFORMATION SECURITY

IRIS BIOMETRICS FROM SEGMENTATION TO TEMPLATE SECURITY ADVANCES IN INFORMATION SECURITY IRIS BIOMETRICS FROM SEGMENTATION TO TEMPLATE SECURITY ADVANCES IN INFORMATION SECURITY page 1 / 5 page 2 / 5 iris biometrics from segmentation pdf Iris recognition is an automated method of biometric

More information

A Different Kind of Scientific Revolution

A Different Kind of Scientific Revolution The Integrity of Science III A Different Kind of Scientific Revolution The troubling litany is by now familiar: Failures of replication. Inadequate peer review. Fraud. Publication bias. Conflicts of interest.

More information

TxDOT Project : Evaluation of Pavement Rutting and Distress Measurements

TxDOT Project : Evaluation of Pavement Rutting and Distress Measurements 0-6663-P2 RECOMMENDATIONS FOR SELECTION OF AUTOMATED DISTRESS MEASURING EQUIPMENT Pedro Serigos Maria Burton Andre Smit Jorge Prozzi MooYeon Kim Mike Murphy TxDOT Project 0-6663: Evaluation of Pavement

More information

PYBOSSA Technology. What is PYBOSSA?

PYBOSSA Technology. What is PYBOSSA? PYBOSSA Technology What is PYBOSSA? PYBOSSA is our technology, used for the development of platforms and data collection within collaborative environments, analysis and data enrichment scifabric.com 1

More information

Advances in Technology to Support Battlefield Acoustic Sensing

Advances in Technology to Support Battlefield Acoustic Sensing Dr. Henry E. Bass National Centre for Physical Acoustics University of Mississippi 1, Coliseum Drive University, MS 38677 United States pabass@olemiss.edu Note- The Opinions expressed in this paper are

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

The Mismatch Between Probable Cause and Partial Matching

The Mismatch Between Probable Cause and Partial Matching natalie ram The Mismatch Between Probable Cause and Partial Matching In mid-december, as one of the outgoing Bush Administration s last minute regulations, the Department of Justice radically expanded

More information

Tools for Iris Recognition Engines. Martin George CEO Smart Sensors Limited (UK)

Tools for Iris Recognition Engines. Martin George CEO Smart Sensors Limited (UK) Tools for Iris Recognition Engines Martin George CEO Smart Sensors Limited (UK) About Smart Sensors Limited Owns and develops Intellectual Property for image recognition, identification and analytics applications

More information

Computers and Society

Computers and Society Computers and Society A dangerous Gift? 1 A Gift of Fire Just like fire, computers are a very powerful tool. It provides: Convenience Efficiency Options Also, just like fire, computers carry significant

More information

Instrumentation, Controls, and Automation - Program 68

Instrumentation, Controls, and Automation - Program 68 Instrumentation, Controls, and Automation - Program 68 Program Description Program Overview Utilities need to improve the capability to detect damage to plant equipment while preserving the focus of skilled

More information

Multiple Choice Questions Collecting, Storing & Sharing Information

Multiple Choice Questions Collecting, Storing & Sharing Information Multiple Choice Questions Collecting, Storing & Sharing Information 1. Why do we collect information? a. To use, store, retrieve, inform and share. b. To help us make decisions. c. To help us make money.

More information

Design and Technology

Design and Technology 2006 HIGHER SCHOOL CERTIFICATE EXAMINATION Design and Technology Total marks 40 Section I Pages 2 4 General Instructions Reading time 5 minutes Working time 1 1 2 hours Write using black or blue pen Write

More information

1 Publishable summary

1 Publishable summary 1 Publishable summary 1.1 Introduction The DIRHA (Distant-speech Interaction for Robust Home Applications) project was launched as STREP project FP7-288121 in the Commission s Seventh Framework Programme

More information

Ground Robotics Market Analysis

Ground Robotics Market Analysis IHS AEROSPACE DEFENSE & SECURITY (AD&S) Presentation PUBLIC PERCEPTION Ground Robotics Market Analysis AUTONOMY 4 December 2014 ihs.com Derrick Maple, Principal Analyst, +44 (0)1834 814543, derrick.maple@ihs.com

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK NC-FACE DATABASE FOR FACE AND FACIAL EXPRESSION RECOGNITION DINESH N. SATANGE Department

More information

I. INTRODUCTION A. CAPITALIZING ON BASIC RESEARCH

I. INTRODUCTION A. CAPITALIZING ON BASIC RESEARCH I. INTRODUCTION For more than 50 years, the Department of Defense (DoD) has relied on its Basic Research Program to maintain U.S. military technological superiority. This objective has been realized primarily

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

Research and Innovation. Roadmap

Research and Innovation. Roadmap Research and Innovation Roadmap 2017-2020 About NIFS The National Institute of Forensic Science (NIFS) is a directorate within the Australia New Zealand Policing Advisory Agency (ANZPAA). Our strategic

More information

The use of armed drones must comply with laws

The use of armed drones must comply with laws The use of armed drones must comply with laws Interview 10 MAY 2013. The use of drones in armed conflicts has increased significantly in recent years, raising humanitarian, legal and other concerns. Peter

More information

The All Birds Barcoding Initiative (ABBI) aims to establish a public archive of DNA barcodes for all birds, approximately 10,000 species, by 2010.

The All Birds Barcoding Initiative (ABBI) aims to establish a public archive of DNA barcodes for all birds, approximately 10,000 species, by 2010. The All Birds Barcoding Initiative (ABBI) aims to establish a public archive of DNA barcodes for all birds, approximately 10,000 species, by 2010. Beginning with Darwin s finches, avian study has led to

More information

Instantaneous Loop. Ideal Phase Locked Loop. Gain ICs

Instantaneous Loop. Ideal Phase Locked Loop. Gain ICs Instantaneous Loop Ideal Phase Locked Loop Gain ICs PHASE COORDINATING An exciting breakthrough in phase tracking, phase coordinating, has been developed by Instantaneous Technologies. Instantaneous Technologies

More information

'Smart' cameras are watching you

'Smart' cameras are watching you < Back Home 'Smart' cameras are watching you New surveillance camera being developed by Ohio State engineers will try to recognize suspicious or lost people By: Pam Frost Gorder, OSU Research Communications

More information

EIE 528 Power System Operation & Control(2 Units)

EIE 528 Power System Operation & Control(2 Units) EIE 528 Power System Operation & Control(2 Units) Department of Electrical and Information Engineering Covenant University 1. EIE528 1.1. EIE 528 Power System Operation & Control(2 Units) Overview of power

More information

Army Acoustics Needs

Army Acoustics Needs Army Acoustics Needs DARPA Air-Coupled Acoustic Micro Sensors Workshop by Nino Srour Aug 25, 1999 US Attn: AMSRL-SE-SA 2800 Powder Mill Road Adelphi, MD 20783-1197 Tel: (301) 394-2623 Email: nsrour@arl.mil

More information

Francis Stafford and the March 1, 2011 Opening of the Hong Kong Special Exhibition to Commemorate the Centenary of China s 1911 Revolution

Francis Stafford and the March 1, 2011 Opening of the Hong Kong Special Exhibition to Commemorate the Centenary of China s 1911 Revolution Francis Stafford and the March 1, 2011 Opening of the Hong Kong Special Exhibition to Commemorate the Centenary of China s 1911 Revolution Ron Anderson 3/3/11 This is the third exhibition where the photographs

More information

Laser Surface Authentication TM : biometrics for documents and goods

Laser Surface Authentication TM : biometrics for documents and goods Laser Surface Authentication TM : biometrics for documents and goods Professor Russell Cowburn Professor of Nanotechnology, Department of Physics, Imperial College London, UK. Chief Technical Officer,

More information

INESCTEC Marine Robotics Experience

INESCTEC Marine Robotics Experience From Knowledge Generation To Science-based Innovation INESCTEC Marine Robotics Experience Aníbal Matos Robotics@ INESC TEC Universidade do Porto SEAS-ERA Workshop, Lisboa Sep 17-18, 2013 Research and Technological

More information

System of Systems Software Assurance

System of Systems Software Assurance System of Systems Software Assurance Introduction Under DoD sponsorship, the Software Engineering Institute has initiated a research project on system of systems (SoS) software assurance. The project s

More information

Questions for the public consultation Europeana next steps

Questions for the public consultation Europeana next steps Questions for the public consultation Europeana next steps November 13, 2009 The International Federation of Film Distributors Associations gathers the national organisations of film distribution companies.

More information

3 I, Kent Gibson, state the following, of which I have personal knowledge:

3 I, Kent Gibson, state the following, of which I have personal knowledge: 1 Regarding an antique Tintype Photograph Thought to contain the image of JESSE JAMES. FORENSIC DECLARATION of Photographic Authenticity Via Face Recognition 2 Analysis requested by: Justin Whiting DECLARATION

More information

Topic: Birth registration as an opportunity to integrate civil registration and identity management systems

Topic: Birth registration as an opportunity to integrate civil registration and identity management systems Fourth Conference of African Ministers Responsible for Civil Registration 4-8 December 2017 Nouakchott AUC/CRMC4/2017/14 Topic: Birth registration as an opportunity to integrate civil registration and

More information

THREAT ANALYSIS FOR THE TRANSPORT OF RADIOACTIVE MATERIAL USING MORPHOLOGICAL ANALYSIS

THREAT ANALYSIS FOR THE TRANSPORT OF RADIOACTIVE MATERIAL USING MORPHOLOGICAL ANALYSIS Proceedings of the 15th International Symposium on the Packaging and Transportation of Radioactive Materials PATRAM 2007 October 21-26, 2007, Miami, Florida, USA THREAT ANALYSIS FOR THE TRANSPORT OF RADIOACTIVE

More information

MorphoTrust TM Iris Recognition

MorphoTrust TM Iris Recognition WHITE PAPER Iris Recognition The state of the art in Algorithms, Fast Identification Solutions and Forensic Applications Kirsten R. Nobel, PhD Principal Solution Engineer Contents 2 table OF CONTENTS 3

More information

This article first appeared in the April 2001 issue of Monitoring Times. MOTOROLA TYPE II TRUNKING

This article first appeared in the April 2001 issue of Monitoring Times. MOTOROLA TYPE II TRUNKING 1 of 6 6/18/2007 14:11 This article first appeared in the April 2001 issue of Monitoring Times. MOTOROLA TYPE II TRUNKING With all of the various trunk-tracking scanners and software out there it is sometimes

More information

DMTC Guideline - Technology Readiness Levels

DMTC Guideline - Technology Readiness Levels DMTC Guideline - Technology Readiness Levels Technology Readiness Levels (TRLs) are a numerical classification on the status of the development of a technology. TRLs provide a common language whereby the

More information