2 Comments

Close this window Jump to comment form
Blogger Living Well Zell said...

I am a research analyst for Bio-authentication, Enrollment and Verification. I have become entrenched in legislature and CONOPS that pertain to the building of the "Transformation Program” and the building of the new Mega Computer Information Sharing Environment.

It is CRITICAL to Identify Correctly who someone is upon Entry or Exit into borders of air, land, sea and VIRTUALLY in CYBERSPACE. The thought of corporate spies’ keystrokes away from critical computer systems that wage attacks on Fortune 500 Companies, Financial markets and even Governments is a frightening thought.

With the pandemic Money laundering and identity theft the Financial Action task force estimates nearly 5% of global GDP which equates to 1.5 Trillion dollars USD is lost yearly. http://www.fatf-gafi.org/dataoecd/44/11/37101744.pdf

1.How do we bio authenticate in CYBER SPACE?
2.What are the enemies stealing and destroying within the cyber borders?
3.How are they siphoning money out of our backs and credit card companies?
4. What are the banks doing to protect their assets?

Under Section 326 of the Patriot Act (Verification of Identification) along with the IRTPA SEC. 7208. The solution was biometrics.

The GOALS simply have not been met and they are as follows; .
BIOMETRIC ENTRY AND EXIT DATA SYSTEM. ENTRY-EXIT SYSTEM GOALS. —The Department of Homeland Security shall operate the biometric entry and exit system so that it—
(1) serves as a vital counterterrorism tool;
(2) screens travelers efficiently and in a welcoming manner;
(3) provides inspectors and related personnel with adequate real-time information;
(4) ensures flexibility of training and security protocols to most effectively comply with security mandates;
(5) integrates relevant databases and plans for database modifications to address volume increase and database usage; .
(6) Improves database search capacities by utilizing language algorithms to detect alternate names.

The Last goal has been over looked.

How are a thumb print from IDENT or a retinal scan from IRIS know the dialect and ONE VOICE of each unique person?

If we can't touch or feel them or see them hiding behind binary 000001010111101010101010000101010101001010101010101010010110101001010100000101
Perhaps we can hear them better with cell phone networks having four Billion people dialed in soon...Voice Biometrics could very well be the non evasive non intrusive easy way to have people enroll, authenticate and verify remotely by listening to their Voice Identity Print or VIP.

I wish the American people strength during these trying times.
Be well & live well,
Zell.

October 1, 2008 7:20 PM

Blogger kevin.manson@gmail.com said...

I am a retired Department of Homeland Security Senior Instructor at the Federal Law Enforcement Training Center http://www.fletc.gov

and coined the term 'Cybercop' in the late 80's. Nine years ago Dr Fred Cohen (who did the seminal research on computer viruses in the early 80's) and I published a short document on the Net which was used as a handout to Federal and State and Local Cybercops at a training session conducted by the US Treasury Department at Sandia National Labs in Livermore, California. That document was titled:

"50 Ways to Protect Your Information Assets When Cruising the Internet"

The document is still quite relevant to the issue of online security and is found on Dr Cohen's web site at:

http://all.net/journal/50/cybercop.html

Kevin Manson

"Red Tape Will Not Defeat Terrorism"
Co-Founder, Cybercop Portal, a DHS Endorsed Secure Online Information Sharing System with a DARPA pedigree for over 12,000 Law Enforcement First Responder and and Industry Professionals
kevin.manson@gmail.com

October 1, 2008 8:38 PM