Showing posts with label Biometrics. Show all posts
Showing posts with label Biometrics. Show all posts

April 25, 2018

Obsolesce Of Nuclear Weapons


This is one incredible video. 

It shows the killing power of micro killer drones. 

With a host of cameras and other sensors including facial recognition and GPS, plus a small amount of explosives, these drones can target individuals or critical infrastructure and take them out!

The drones can work alone or in swarms to get into and kill or destroy anything. 

No VIP (very important person) or CIP (critical infrastructure protected) is safe. 

We can wipe out entire cities or the nuclear infrastructure of our enemies. 

Despite the warning about artificial intelligence at the end of this video, rest assured these killer microdrones are coming. 

Big is the new small, and small is the new big. 

In fact, big things come in small packages--exactly!  

Iran and North Korea are chasing obsolete technology to harm the U.S. and Israel, and within a short time, they will see the error of their malevolent ways 

G-d foretells us all in the Bible and like David and Goliath--a slingshot to the forehead and the fight with the evil is over. ;-)

(Thank you to Itzchak for sharing this video with me). 
Share/Save/Bookmark

April 13, 2016

2016 Technology Advances - Doing Well Sir

In just the last few days and weeks, I have been astonished at the progress already being made towards the important technology advancements mentioned in Technology Forecast 2016

On the front for medical technology to fight cancer, just today it was announced that the foundation from Sean Parker (of Napster and Facebook) is providing a $250 million grant for a new cancer institute to advance the field of immunotherapy to boost the body's natural defenses (i.e. immune system) to fight the cancer.

In terms of space technology, famed astrophysicist, Stephen Hawking and venture capitalist, Yuri Milner are teaming up with a $100 million for research to develop "Starchips" (a nanocraft robot on a chip) for a voyage to another solar system 25 trillion miles away. 

Finally, there are advances for counter-terrorism technology on display with the U.S. Customs and Border Protection announcing in February a pilot of new biometric technology kiosks to capture and compare facial and iris biometrics for travelers exiting the U.S. to compare with their entry data and ensure an end-to-end visitor entry/exit solution.  

I am pleased at the commitment and progress we are making in these critical technology areas, and sincerely hope that these efforts will flourish for us all in the not too distant future. ;-)

(Source Photo: Andy Blumenthal)

Share/Save/Bookmark

April 30, 2014

Crooked x 2

First, some beautiful flowers from Washington, D.C. 

Thought these were awesome, even though the gardner did a little bit of a crooked job here. 

And when it comes to crooked, I overheard a funny story in the locker room the other day.

These school students were talking about getting caught stealing something in a local store.

One says that he got spotted on the surveillance cameras and that they even have facial recognition now, but he's okay on that because he was wearing a cap. 

Another kid in the group says "why didn't you just tell them you didn't know you couldn't take it!" 

Some very sophisticated crooks we got here. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

September 12, 2013

Apple Is Giving Us The Finger

As I always say, I love Apple--and they still have the best darn Smartphone on the market--but they continue to disappoint with anything new.

This week, with the introduction of the iPhone 5S, Apple had the opportunity to introduce something new and exciting, but instead what did we get?

- A faster processor and Touch ID fingerprint reader. 

In nutshell, since Steve Jobs untimely passing, Siri was a bombshell, actually just a big consumer product bomb.

And now with the fingerprint reader as the big newcomer add-on to the iPhone, it's as if (sorry to say), Apple is giving us all the proverbial finger. 

While the fingerprint reader is cute and a faster logon, it is really not a must-have or a game-changer.  

The only thing less exciting than Touch ID is the new Yahoo logo.

In the last two years, Apple has taken a mighty innovation lead and squandered it. 

Still, no one can touch their highly integrated iPhone product.

However, if much more time goes by without something meaningfully new and innovative, they will be in trouble. 

Rumors of an iPhablet (iPhone/tablet) with a significantly larger screen (ranging from 4.8 to 6 inches) will be more like the Samsung Galaxy S4 with 5-inch screen rather than than iPhone 5S 4-inch screen, and would have attraction for people who like to read or watch on a larger, better display. 

Of course a significantly better camera would be helpful too--need I say more?

Some interaction with wearable technology, like a Google Glass with augmented reality would also be a winner. 

And a fully ruggedized smartphone, similar in concept to a Panasonic Toughbook--and up to military grade specs--that withstands drops, spills, dust, and lots of everyday field use punishment, would be way cool for the action-adventurer in all of us--and maybe then we wouldn't need all the silly looking cases.

In the meantime, put your index finger on the home bottom, while Apple puts their middle finger up at you, the consumer.

Steve Jobs, where the heck are you? ;-)

(Source Photo: here with attribution to CNET)
Share/Save/Bookmark

August 25, 2012

Choke Points to Checkpoints


This is some promising biometric technology from AOptix

Enrolling in the system is the first step and means just seconds of standing in the capture field of the slender tower, and the device scans both iris and face of the person. 

The scanning captures images within seconds and the software converts the images into binary code. 

It then subsequently scans and matches the person's biometrics against the database for positive identification. 

The beauty of this system is that it is simple and fast and can be used for passenger screening, immigration, or any other access control for entry/egress for a building, location, or even to a computer computer system and it's information.

According to Bloomberg Businessweek, the Insight Duo Towers sells for $40,000 each.

Eighty of these are currently in use at all air, land, and sea borders in Qatar.  Further, Dubai International Airport has been piloting this at a terminal that handles 40 million people per year, and it has cut immigration waiting times from 49 minutes to 22 seconds. 

This technology has obvious important applications for military, law enforcement, and homeland security, as well as even more generalized security use in the private sector.

And while very impressive, here are some concerns about it that should be addressed:

1) Enrollment of Biometrics and Personal Identification--registering for the system may only take a few seconds for the actual scan, but then verifying who you are (i.e. who those biometrics really belong to) is another step in the process not shown.  How do we know that those iris and face prints belong to Joe Schmo the average citizen who should be allowed through the eGate and not to a known terrorist on the watch list?  The biometrics need to be associated with a name, address, social security, date of birth and other personal information.

2) Rights versus Recognitions--rights to access and recognition are two different things. Just because there is iris and facial recognition, doesn't mean that this is someone who should be given access rights to a place, system or organization.  So the devil is in the details of implementation in specifying who should have access and who should not. 

3) Faking Out The System--no system is perfect and when something is advertised as accurate, the question to me is how accurate and where are the system vulnerabilities. For example, can the system be hacked and false biometrics or personal identification information changed?  Can a terrorist cell, criminal syndicate, or nations state create really good fake iris and facial masks for impersonating an enrollee and fooling the system into thinking that a bad good is really a good guy. 

4) Privacy of Personally Identifiable Information (PII)--not specific to AOptix, but to this biometric solutions overall--how do we ensure privacy of the data, so it is not stolen or misused such as for identity theft.  I understand that AOptix has PKI encryption, but how strong is the encryption,who long does it take to break, and what are the policies and procedures within organizations to safeguard this privacy data.

5) Big Brother Society--biometrics recognition may provide for opportunities for safe and secure access and transit, but what are the larger implications for this to become a "big brother" society where people are identified and tracked wherever they go and whatever they do. Where are the safeguards for democracy and human rights.

Even with these said, I believe that this is the wave of the future for access control--as AOptix's says, for changing choke points to checkpoints--we need a simple, fast, secure, and cost-effective way to identify friends and foe and this is it, for the masses, in the near-term.

Share/Save/Bookmark

October 13, 2011

Increase Security On Your Google Account

After reading the article Hacked! in The Atlantic (November 2011), I looked into Google's new security feature called 2-Step Verification (a.k.a. Two Factor Authentication).

This new extra layer of security--adding "something you have" to "something you know"--to your sign in credentials helps to better protect you and your information in Google (i.e. in the Google cloud), including your emails, documents, and applications.

While a little extra work to login to Google--you have to type in a verification code that Google sends or calls to your phone (this is the something you have), it provides an extra layer of defense against hackers, criminals, and identity thieves.

To protect your Smartphone, Google provides "Application-specific passwords" that you generate from the 2-Step Verification screen and then you enter those into the specific iPhone, Droid, or Blackberry device.

You can sign up for 2-Step Verification from your Google Account Settings page and help protect yourself, your information, and your privacy.

In the future, I hope that Google (and other cloud vendors) will improve on this and use biometrics, to add "something you are," to the authentication process and make this even sleeker and more secure yet.

Stay safe out there! ;-)

Share/Save/Bookmark

June 4, 2011

Armored Skin


(Source Photo: CrunchGear)

Not just for super heroes in comic books anymore, ArmStar has invented a new non-lethal weapon called the BodyGuard.

It was invented by David Brown, a cameraman, editor, and producer, and supposed friend of Kevin Costner.

The idea of the encased ballistic nylon arm glove is that if you are wearing the weapon, you won't drop it or easily be disarmed by your opponent.

According to CrunchGear (31 May 2011), "The BodyGuard is an armored gauntlet with a 500,000-volt stunner protruding from the back of the hand, with room for any number of other weapons of self defense."

Aside from the stun gun, current prototypes come equipped with video camera, laser pointer, and flashlight; and future versions are envisioned to have chemical sensors, GPS, biometric readers, translators, and more.

I would imagine, you could also install things like mace or smoke that can be dispensed into action at the push of a button (with safety).

This is why the BodyGuard is seen not only as a weapon, but also as a weapons platform, with an actuator pressure pad in the palm of the hand controlling the release of the weapons.

The menacing display of voltage between the electrodes on the wrist, the green laser target on one's chest, as well as knowing that you may be videotaped (along with the possibility of other embedded weapons) can make the BodyGuard a useful tool for law enforcement to help prevent and defuse confrontations, deter criminals, and save lives.

The BodyGuard won a Popular Science 2011 Invention Award and according to their magazine "the first demo unit will be released to the Los Angeles sheriff's department later this year."
While I think the non-lethal version is promising for law enforcement, a lethal version for our military seems like a another market and next step in delivering ergonomic and flexible battle gear to our war fighters.

I think there is also potential here for non-weaponized versions, for commercial and personal use--where ever and whenever body protection and quick access to tools and gadgets are needed--construction, manufacturing, even mountain climbing!

Finally, while having this is nice on one arm, I think this could be expanded for modules for both arms, legs, and so forth.

This has a lot of potential and I wish I had one of these when riding the IRT subway late in the evenings in NYC as a kid...it would have been nice to hit the pressure button and watch the volts arc and the bad guys just run the other way.

Share/Save/Bookmark

February 18, 2011

You Can Run From MORIS, But You Can't Hide

There is a promising new mobile biometric recognition device for law enforcement called the MORIS (Mobile Offender Recognition and Identification System) by Biometric Identification and Intelligence Technologies.

MORIS units are a 2.5 ounce hardware attachment and software app for the iPhone that cost about $3000 each and turns the device into a crime-fighting tool.

The devices are able to take fingerprint, facial, and Iris identification and access criminal justice data wirelessly from anywhere using a common iPhone to match against existing criminal records.

Police are able to identify suspects on the fly in seconds.

Popular Science has named MORIS one of the BEST INNOVATIONS of 2010.

As of November 22, 2010, 25 Massachusetts Police Departments have been the lucky recipients of these futuristic crime fighting technology devices.

Say cheese! :-)

Share/Save/Bookmark

April 4, 2010

Advanced Biometrics for Law Enforcement

Homeland Security Today Magazine (March 2010) has an interesting article called “Biometrics on the Battlefield" about how the American military has had significant success in Afghanistan taking biometrics and in using it for “vetting, tracking, and identification.”

Here’s how it’s done:

The biometrics system uses HIIDE (Handheld Interagency Identity Detection System) devices, which is “similar in size to a large camera, [that] connects directly to the BATS [Biometrics Automated Tool Set] database and matches inputs against a biometrics watch list of 10,000 individuals.”

The database “BATS uses a combination of fingerprints, photographs and iris scans, in addition to an in-depth background examination” to “screen potential local employees, identify detainees, and differentiate friendly individuals from insurgents and terrorists.”

How successful has the use of biometrics been?

“The use of biometrics has clearly thwarted security breaches and helped prevent unwanted activities by the enemy. Additionally, in 2008 alone, hundreds of HVTs (high value targets) were identified through the use of this biometrics technology.”

The article suggests the application of this biometric system for domestic law enforcement use.

Currently, fingerprint cards or stationary scanners are common, but with the proposed military biometrics system, there is the technology potential to use mobile scanning devices quickly and easily in the field.

The article gives the example: “if an officer came into contact with an individual under suspect conditions, a simple scan of the iris would ascertain that person’s status as a convicted felon, convicted violent felon, convicted sex offender or someone on whom an alert has been placed.”

In this scenario, quicker and more accurate identification of suspects could not only aid in dealing with dangerous offenders and benefit the officers in terms of their personal safety, but also contribute to ensuring community safety and security through enhanced enforcement capabilities.

Of course, using such a system for law enforcement would have to pass legal muster including applicable privacy concerns, but as the author, Godfrey Garner, a retired special forces officer, states “hopefully, this valuable technology will be recognized and properly utilized to protect law enforcement officer in the United States. I know that I’ve seen it protect our sons and daughters on the battlefields of Afghanistan.”

We are living in an amazing time of technology advances, and the potential to save lives and increase public safety and security through lawful use of biometrics is a hopeful advancement for all.


Share/Save/Bookmark

July 6, 2008

Biometrics and Enterprise Architecture

Biometrics is “the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.” (Wikipedia)

Biometrics is crucial for identifying and taking out of play enemy combatants, terrorists, and criminals or for providing access to trusted employees or partners in public or private sector organizations, like the intelligence community, defense, security, and various sensitive industries like financial, telecommunications, transportation, energy, and so forth.

National Defense Magazine, November 2007 has an article on the significant advances being made in biometric technologies and their applications to our organizations.

According to “’The National Biometrics Challenge,’ a report produced by the Office of the President’s National Science and Technology Council…’a tipping point in the maturation of the technology has been reached.’

Both the FBI’s Information Services Division and The Department of Defense Biometric Fusion Center are leading the way in this field.

Currently, identity is established based on the trinity: “something you know (such as a password), something you have (like an identity card), or something you are, which is where biometrics comes in.”

Biometrics includes technologies for recognizing fingerprints, facial features, irises, veins, voices, and ears, and even gait.

But these are technologies identification means are not fool-proof: remembering multiple complex passwords can be dizzying and identity cards can be lost, stolen, or forged. So biometrics becomes the cornerstone for identity management.

However, even biometrics can be spoofed. For example, fake rubber fingers have been used in lieu of a real fingerprint (although now there are ways with living flesh sensors to protect against this). So therefore, biometrics is evolving toward “multi-modial” collection and authentication. This could involve using 10 fingerprints versus one or combing fingerprint, iris scans, and digital mugshots (called the “13 biometrics template” and used to gain access in U.S. managed detention centers in Iraq) or some other combination thereof.

Biometrics has advanced so much so that an Iris scan system from Sarnoff Corp. of Princeton NJ “can scan and process 20 people per minute from distances of about 10 feet away, even those who are wearing glasses.”

The keys to further enterprise application of these technologies in our enterprises are the following:

  1. Lowering the cost (especially to make it available to local law enforcement agencies)
  2. Making it rugged enough for extreme environments for the military
  3. Making it portable so that it can be used for a variety of law enforcement and defense operations
  4. Reengineering business processes so that measurements are captured, stored, accessible, and readily available for making a match and generating a decision on someone’s identity in real-time
  5. Developing policies that “effectively govern the proper use of the data” and ensure adequate protection for civil liberties and privacy.

Overall, biometrics has moved from emerging technology to applied technology and needs to be planned into your identity management architectures.


Share/Save/Bookmark