. Military Space News .
Networking Fingerprints Of Terrorists

The biggest issues for the military to deal with, when it comes to networked, biometric security, are gaining the cooperation of the job applicant, overcoming cultural differences and dealing with any questions of privacy rights.
by Gene Koprowski
Chicago IL (UPI) Feb 27, 2006
A Muslim terrorist places a bomb inside a mosque in Iraq. The bomb detonates, obliterating most of the building. But American military personnel, sifting through the debris, just moments later, find a doorknob with the scoundrel's fingerprints on it, from a door he opened to enter the facility. The prints are collected with digital technology, and sent via a wireless network, locally, in Iraq, and then across the globe via satellite to the Army's Biometric Fusion Center.

There, Army agents, working with FBI counterparts, scan the prints, and compare them with a database of known terrorists, looking to determine if the killer was behind other bombings in Iraq, Afghanistan, or elsewhere in the world, experts tell United Press International's Networking.

"The benefits of biometrics are phenomenal," said Daniel Munyan, chief scientist at CSC's global security services identity labs, which has worked with several government agencies on biometric projects, and is headquartered in El Segundo, Calif.

Once the data is in hand, the military uses it for a number of apps. Just over a year ago, in December, 2004, terrorists struck a U.S. base in Mosul, Iraq, killing 14 soldiers. The attack was apparently perpetrated by a suicide bomber who came onto the base in the guise of an Iraqi civilian contractor for the Pentagon.

To stop that kind of offensive, the Department of Defense is making foreigners who apply for jobs as contractors in Iraq submit to a biometric security scan. Their fingerprints are checked against the government's databases of known terrorists -- before they are allowed to come on board.

Then, they are issued a biometric smart card for ID. Every time they try to enter an American base, the card, which includes images of their fingerprints, is scanned against a database, and against their actual fingerprints, taken again, at that time, experts tell Networking.

"Certain forms are virtually impossible to fake," said Munyan.

The biggest issues for the military to deal with, when it comes to networked, biometric security, are gaining the cooperation of the job applicant, overcoming cultural differences and dealing with any questions of privacy rights, Munyan said.

There are other obstacles for the government, however, when it comes to catching terrorists in the field. "Fingerprinting and biometric tools might allow an intelligence agency to build a database of suspected terrorists, but the challenge of linking fingerprints to names and faces and building a model of the network would remain," said Bret Johnson, director of the homeland security and entrepreneurship center at Northwestern University, Evanston, Ill.

Some technology developers are working on that and related problems now, however. The developer, Identix Inc., is using a mobile identification system, which employs both fingerprint and facial identification technology. The system uses a patented, hand-held, wireless device. It can be used in the field by military personnel who capture terrorists in the field, scan their fingerprints and snap a picture of their faces, and "know who they are dealing with on a real-time basis," said Frances Zelazny, director of corporate communications at Identix, based in Minnetonka, Minn.

The thorniest problem for that system is the availability of reliable, in-theater wireless communications networks. So local database storage is relied on if there is a wireless network shut-down, she said.

FBI personnel have been using computing technology in Afghanistan and at Guantanamo Bay, Cuba, as well as in Iraq, though at the beginning of the war on terror, early in the Bush administration, they were relying on old-fashioned paper and ink fingerprinting when processing terrorist suspects, according to the developer Cross Match, based in Palm Beach Gardens, Fla.

Now, if a terrorist posing as a job applicant comes calling, he will be nabbed if his fingerprints were found on exploded bombs, or at the sites of terrorist atrocities around the world.

Source: United Press International

Related Links
-

US Army Enlists Raytheon For TOW Weapon System Support
Tucson AZ (SPX) Feb 28, 2006
Raytheon has received a contract with five one-year options that has a total potential value of $122 million to provide engineering services for the TOW (Tube- launched, Optically tracked, Wire-Guided) weapon system family of missiles and TOW fire control systems including: ITAS (Improved Target Acquisition System), IBAS (Improved Bradley Acquisition Subsystem), T2SS (TOW 2 Subsystem), and M220 Ground TOW.







  • Walker's World: India's Scientists Revolt
  • India-US Can Have Deal
  • Walker's World: Which India Will Bush See?
  • India To Fight US Nuclear Deal

  • Iran Must Act Before IAEA Meeting
  • Outside View: Russia May Cooperate On Iran
  • Policy Watch: Iran's Aversion To Russia
  • US Dusts Off Old Plans For Iran

  • LockMart Contracted For MK 41 Vertical Launch System Support Services Modification
  • Operational Raptors Fire First Missiles In Evaluation Program
  • Pakistan Tests Hatf Again
  • World Missile Market Valued at $103bn

  • Boeing GMD Team Launches Target, Tests Upgraded Radar
  • BMD Focus: Canada Takes First Step On BMD
  • Raytheon Awarded Project Hercules Contract for Next-Gen BMD Tech
  • Japan, US Plan March ABM Test

  • French Plant To Cash In On Aircraft Recycling Boom
  • Boeing Completes P-8A Weapons Separation Wind Tunnel Tests
  • ST And Adams Partner For Very Light Jet And Piston Aircraft
  • Lockheed Martin F-35 Takes Shape, Readies For First Flight

  • Total Force In Action With Predator Operations
  • GA-ASI and GD Canada Sign Agreement to Meet Canadian Surveillance Needs
  • UK Awards Lockheed Martin Contract to Enhance Desert Hawk
  • New Modeling Technique Could Quiet Aircraft

  • Benchmarks: Iraqi People Targeted
  • Paying The Price Of Democracy
  • Iraq On The Brink
  • Iraq's Pandora's Box

  • Networking: Fingerprints Of Terrorists
  • US Army Enlists Raytheon For TOW Weapon System Support
  • Armor Holdings: New 'Flexible Armor' Tech
  • Biotechnology Research In Developing Countries Must Be Fostered

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2006 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA PortalReports are copyright European Space Agency. All NASA sourced material is public domain. Additionalcopyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement