Terrorism and New Biometrics Technologies

Gray, Myra
November 2008
Security: Solutions for Enterprise Security Leaders;Nov2008, Vol. 45 Issue 11, p80
Trade Publication
The article provides information on the use of biometrics technologies in helping protect the nation against terrorism. A laptop-based system deployed as the Biometric Automated Toolset (BAT), and the Handheld Interagency Identity Detection Equipment (HIIDE) are among the biometrics-based technologies that capture fingerprint, iris and facial data. Biometric technologies are making a difference in the current fight against terrorism by protecting warfighter and the homeland.


Related Articles

  • BIOMETRICS ON PASSPORTS: BEST BET FOR TIGHT SECURITY. David, Mark // Electronic Design;8/23/2004, Vol. 52 Issue 18, p15 

    The September 11, 2001 terrorist attacks Commission Report offers myriad recommendations on how to tighten homeland security, but the finding that offers the greatest impact is one being addressed by electronic designers. The Commission recommend that the government should target terrorist...

  • Biometrics: the body's keys. McHale, John // Military & Aerospace Electronics;Dec2003, Vol. 14 Issue 12, p17 

    Focuses on the use of biometrics to enhance secure access control in the U.S. Applications of biometrics in the global war against terrorism; Types of biometrics and their applications in security; Lack of government funding for biometrics research and its implications for efforts to develop...

  • Defending The Gate: Biometrics And Border Security. Besse, Luke; Keenen, Ryan // Journal of Counterterrorism & Homeland Security International;Fall2015, Vol. 21 Issue 3, p18 

    The article examines the use of biometrics to ensure border security in the U.S. as of October 2015. It states that border security is crucial to prevent terrorists from entering the country through advanced sensors and by making travel documents more secure. Other topics include the...

  • US Fingerprinting System and Border Control Evaluated. Siskind, Gregory // Venulex Legal Summaries;2004 Q4, p1 

    The article presents information on the U.S. fingerprinting and border security system called the US-VISIT program. The program uses databases, fingerprinting and other biometric indicators to create a virtual border for foreigners entering the country. The Homeland Security claims that the move...

  • Fuzzy Fingerprint Vault using Multiple Polynomials. Daesung Moon; Woo-Yong Choi; Kiyoung Moon // World Academy of Science, Engineering & Technology;Nov2009, Issue 35, p109 

    Fuzzy fingerprint vault is a recently developed cryptographic construct based on the polynomial reconstruction problem to secure critical data with the fingerprint data. However, the previous researches are not applicable to the fingerprint having a few minutiae since they use a fixed degree of...

  • Getting the 411 on Biometrics.  // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p48 

    Provides information on biometrics technology, the reading of a unique human physical attribute as data which is then applied to actuating a system. Passwords and personal identification numbers; Fingerprinting; Retinal scans; Capabilities of the BioMetric Fingerprint BLP-100 Pressure Sensitive...

  • TRENDS in Fingerprint Recognition Systems. Klein, Kevin // Security: Solutions for Enterprise Security Leaders;Apr2003, Vol. 40 Issue 4, p30 

    Focuses on the use of biometrics-based devices for fingerprint recognition systems. Process of determining fingerprint; Advantages of the biometric identification; Estimation of the growth of biometrics revenue.

  • Facing the future. Saccomano, Ann // Journal of Commerce (1542-3867);5/26/2003, Vol. 4 Issue 21, p33 

    Deals with the obstacles to the implementation of biometric identification. Absence of international standard for biometric identification; Technological barriers in fingerprinting; Cultural concerns on the use of biometric identification. INSET: How some countries view biometrics.

  • Sesam öffne dich. Scharf, Armin // werk, bauen + wohnen;Jun2007, Issue 6, p22 

    Will keys soon be obsolete, leaving doors, gates and access channels that can be opened only by fingerprint? At the entrance to the zoo in Hanover cameras compare real faces with data stored on the season tickets, the aim being to prevent these cards being used by persons other than those they...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics