LEADER 10399nam 2200625 a 450 001 9910962644603321 005 20251117075347.0 010 $a1-61324-213-1 035 $a(CKB)2670000000099640 035 $a(EBL)3019439 035 $a(SSID)ssj0000521174 035 $a(PQKBManifestationID)12251501 035 $a(PQKBTitleCode)TC0000521174 035 $a(PQKBWorkID)10517333 035 $a(PQKB)10669300 035 $a(MiAaPQ)EBC3019439 035 $a(Au-PeEL)EBL3019439 035 $a(CaPaEBR)ebr10671004 035 $a(OCoLC)739713607 035 $a(BIP)28841166 035 $a(EXLCZ)992670000000099640 100 $a20100505d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aBiometrics, privacy, progress and government /$fRachel B. Jefferson, editor 205 $a1st ed. 210 $aNew York $cNova Science Publishers$dc2010 215 $a1 online resource (174 p.) 225 1 $aComputer science, technology and applications 300 $aDescription based upon print version of record. 311 08$a1-60741-098-2 320 $aIncludes bibliographical references and index. 327 $aIntro -- BIOMETRICS, PRIVACY, PROGRESS AND GOVERNMENT -- BIOMETRICS, PRIVACY, PROGRESS AND GOVERNMENT -- CONTENTS -- PREFACE -- Chapter 1 DEFENSE MANAGEMENT - DOD CAN ESTABLISH MORE GUIDANCE FOR BIOMETRICS COLLECTION AND EXPLORE BROADER DATA SHARING -- WHY GAO DID THIS STUDY -- WHAT GAO RECOMMENDS -- WHAT GAO FOUND -- ABBREVIATIONS -- RESULTS IN BRIEF -- BACKGROUND -- Governmentwide Policies Regarding Biometrics Data Are Evolving -- DOD Collection, Matching, and Sharing of Biometrics Data -- DOD HAS ISSUED LIMITED GUIDANCE FOR COLLECTING BIOMETRICS DATA -- DOD SHARES DATA ON NON-U.S. PERSONS THROUGH INTERAGENCY AGREEMENTS, BUT SOME GAPS IN DATA MAY REMAIN -- CONCLUSION -- RECOMMENDATIONS FOR EXECUTIVE ACTION -- AGENCY COMMENTS AND OUR EVALUATION -- APPENDIX I. SCOPE AND METHODOLOGY -- Scope -- Methodology -- APPENDIX II. COMMENTS FROM THE DEPARTMENT OF DEFENSE -- End Notes -- Chapter 2 BIOMETRICS IN GOVERNMENT POST-9/11: ADVANCING SCIENCE, ENHANCING OPERATIONS -- INTRODUCTION -- Initial Reactions -- General Timeline of Federal Government Biometric Activities -- ADVANCING THE SCIENCE OF BIOMETRICS -- 1. Research, Development, Test & -- Evaluation (RDT& -- E) -- a. Face Recognition -- b. Fingerprint Identification and Verification -- Slap Fingerprint -- Segmentation -- c. Iris Recognition -- d. Multimodal Biometric Identification -- e. Biometric Quality -- f. Biometrics Usability -- 2. Development of Biometric Standards -- OPERATIONAL ACTIVITIES -- 1. Department of Defense (DoD) (Law Enforcement/Intelligence/Access Control) -- a. History of DoD Biometrics-Formalizing, Centralizing, Funding, Access Control -- b. DoD Biometrics Post 9/11-Identifying Terrorists, Storing, Analyzing Biometric Data -- c. Today's DoD Biometrics Structure-Operating and Synchronizing Technologies and Capabilities -- 2. Department of Homeland Security. 327 $aa. US-VISIT (Immigration and Border Management/Law Enforcement/ Intelligence) -- Challenge -- Solution -- Program overview -- Privacy policy -- Authorizing Legislation and Funding -- b. Transportation Worker Identification Credential (TWIC) (Access Control) -- Challenge -- Solution -- Program overview -- Privacy policy -- Authorizing legislation -- c. Global Entry (Immigration and Border Management) -- Challenge -- Solution -- Privacy policy -- Authorizing legislation -- 3. Department of Justice (Law Enforcement and Intelligence) -- Challenge -- Solution -- Program overview -- The next generation identification (NGI) program -- Advanced fingerprint identification technology -- Evaluating the Effectiveness of Multimodal Biometrics -- The Biometric Center of Excellence -- Interim Data sharing Model (idsm) -- Immigration violator file -- Privacy policy -- Summary -- 4. Department of State (Immigration and Border Management and Intelligence) -- a. Biometric Visa Program -- b. Border Crossing Card Program -- c. BioVisa and US-VISIT as Partner Programs -- d. Biometric Identity Verification at Ports of Entry -- e. Issued Visa Records Viewed at Ports of Entry -- f. DOS Facial Recognition System Screens Photos of Visa Applicants -- g. BioVisa Program Transition from Two to Ten Fingerprints -- h. Ten Prints Screened Against KST Latents in IDENT -- i. BioVisa 10 Prints Advance IDENT-IAFIS Interoperability -- j. 10 Print Screening Against IAFIS -- k. BioVisa Program Essential for Border Security -- 5. Personal Identity Verification Credential (access control) -- ADVANCING AND UTILIZING PRIVACY THEORY -- 1. Building a Conceptual Foundation -- 2. Privacy Impact Assessments -- 3. Privacy Technology Implementation Guide -- 4. International Privacy Workshops -- COMMUNICATIONS -- 1. Communications Group -- 2. Biometric Consortium Conference -- 3. Foundation Documents. 327 $a4. Web sites -- 5. International Meeting of Biometrics Experts -- GOVERNMENT-WIDE COORDINATION, STRATEGIES AND POLICIES -- 1. Coordination -- 2. Strategies -- a. The National Strategy for Maritime Security, September 2005, Executive Office of the President -- b. National Infrastructure Protection Plan, January 2006, DHS -- c. National Strategy for Information Sharing, October 2007, Executive Office of the President -- d. National Strategy for Homeland Security, October 2007, Executive Office of the President, Homeland Security Council -- 3. Policies -- a. Budget Guidance Memorandum -- b. Presidential Directives -- CONCLUSION -- APPENDIX A. EXPANDED RDT& -- E DISCUSSION -- a. HumanID -- b. Face -- i. Face Recognition Vendor Tests -- ii. Face Recognition Grand Challenge -- c. Finger -- iii. FpVTE -- iv. Proprietary Fingerprint Template (PFT) testing -- v. Slap fingerprint segmentation evaluation -- vi. Fast fingerprint slap capture -- vii. Fast rolled-equivalent fingerprint capture -- viii. Latent fingerprint testing -- ix. Fingerprint minutiae interoperability testing -- Minex 04 -- Ongoing MINEX -- Minex II -- d. Iris -- Ice -- e. Biometric Quality -- Standards -- Tools -- Guidance -- Workshops -- f. Multimodal -- i. MBGC -- ii. MBARK -- g. CITeR -- h. Biometrics Usability -- i. Standards -- APPENDIX B. ABOUT THE NSTC SUBCOMMITTEE ON BIOMETRICS AND IDENTITY MANAGEMENT -- End Notes -- Chapter 3 THE NATIONAL BIOMETRICS CHALLENGE -- ABOUT THE NATIONAL SCIENCE AND TECHNOLOGY COUNCIL -- ABOUT THIS REPORT -- EXECUTIVE OVERVIEW -- THE NATIONAL BIOMETRICS CHALLENGE -- 1. Introduction -- 2. Why Biometrics -- 3. The Primary Driving Forces -- 3.1. National Security -- 3.1.1. Mission -- 3.1.2. Needs -- 3.1.3. Applications -- 3.2. Homeland Security and Law Enforcement -- 3.2.1. Mission -- 3.2.2. Needs -- 3.2.3. Applications. 327 $a3.3. Enterprise and E-Government (Electronic Government) Services -- 3.3.1. Mission -- 3.3.2. Needs -- 3.3.3. Applications -- 3.4. Personal Information and Business Transactions -- 3.4.1. Mission -- 3.4.2. Needs -- 3.4.3. Applications -- 4. Communications and Privacy -- 5. BIOMETRICS CHALLENGES, RESEARCH FOCUS AND BENEFIT -- 5.1. Biometrics Sensors -- 5.2. Biometrics Systems -- 5.3. Biometrics Systems Interoperability -- 5.4. Communications and Privacy -- 6. The Federal Government's Role in Biometrics Advancement -- 7. Summary -- ABOUT THE NSTC SUBCOMMITTEE ON BIOMETRICS -- SUBCOMMITTEE ON BIOMETRICS -- Department Leads -- Biometrics Research Agenda Interagency Coordination Plan (ICP) Team -- SPECIAL ACKNOWLEDGEMENTS -- End Notes -- Chapter 4 PRIVACY & -- BIOMETRICS: BUILDING A CONCEPTUAL FOUNDATION -- I. INTRODUCTION -- II. BIOMETRICS -- A. Biometrics Overview -- B. Terminology -- 1. Enrollment -- 2. Biometric Template -- 3. Recognition -- 4. Verification -- 5. Identification -- 6. Verification Et Identification -- C. Biometric Modalities -- 1. Fingerprint Recognition -- 2. Face Recognition -- 3. Iris Recognition -- 4. Hand/Finger Geometry -- 5. Other Biometric Identification Systems -- a) Speaker recognition -- b) Dynamic Signature -- c) Vascular Pattern Recognition -- 6. Summary -- D. Functional Architecture -- III. PRIVACY -- A. Introduction -- B. Concepts of Privacy -- C. Sources of Information Privacy -- 1. The Article: "The Right to Privacy -- 2. The US Constitution -- 3. Individual Privacy Claims -- 4. US State Privacy Laws -- 5. International Privacy Frameworks -- 6. Summary -- D. Information Privacy -- 1. Personal Information -- 2. Appropriate Use -- 3. Special Categories -- 4. Summary -- E. Functional Architecture -- 1. Current Status -- 2. Data (Personal Information) -- 3. Purpose & -- Success -- 4. Function (Use) -- 5. Technology. 327 $a6. Audit, Control & -- Access -- 7. Documentation -- IV. APPLICATION OF PRIVACY TO BIOMETRIC TECHNOLOGY -- A. Collection -- 1. Documentation -- 2. Purpose & -- Success -- 3. Data (Personal Information) -- 4. Technology -- 5. Audit, Control & -- Access -- B. Conversion -- C. Storage -- D. Comparison -- E. Decision -- V. THE VALUE OF PRIVACY PROTECTIVE BIOMETRIC SYSTEMS -- A. Public Concerns -- B. Privacy Protective Biometric System Design -- VI. ABOUT THE NATIONAL SCIENCE AND TECHNOLOGY COUNCIL -- VII. ABOUT THE SUBCOMMITTEE ON BIOMETRICS -- A. Subcommittee on Biometrics -- B. Department Leads -- C. Social/Legal/Privacy ICP Team -- VIII. SPECIAL ACKNOWLEDGEMENTS -- End Notes -- CHAPTER SOURCES -- INDEX -- Blank Page. 330 $aGovernment and industry have a common challenge in today's global society to provide more robust identity management tools, and identity governance principles on how to deploy these tools intelligently to meet national and international needs. This book focuses on biometrics, which are the most definitive, and real-time identity management tools. 410 0$aComputer science, technology and applications. 606 $aBiometric identification$xGovernment policy$zUnited States 606 $aPrivacy, Right of 615 0$aBiometric identification$xGovernment policy 615 0$aPrivacy, Right of. 676 $a323.44/830973 701 $aJefferson$b Rachel B$01861621 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910962644603321 996 $aBiometrics, privacy, progress and government$94467763 997 $aUNINA