• Home
  • About
  • My Account
  • Blog
  • Success Stories
  • Contact
Bayometric Bayometric Bayometric Bayometric
  • Live Scan
    • Print to FD-258 Card – Background Check
    • SWFT Applicant System
    • FBI Fingerprinting – Live Scan
    • NFA Fingerprinting – Live Scan
    • FINRA EFS
    • FDLE Live Scan
    • Fingerprint Background Check
    • SWFT+ Compatible Devices
  • Fingerprint SDK
    • Touch N Go
    • Griaule Fingerprint SDK
  • Single Sign-On
  • Fingerprint Scanner
    • USB Scanners
      • SecuGen Hamster Pro
      • SecuGen Hamster Plus (HSDU03P)
      • Nitgen Fingkey Hamster DX
      • Lumidigm M301 (M30x)
      • Lumidigm M311 (M31x)
      • Lumidigm V302 (V30x)
      • Lumidigm V311 (V31x)
      • Nitgen Fingkey Hamster II
      • Nitgen Fingkey Hamster III
      • Verifi P5100
      • IB Curve
    • FBI Certified Readers
      • SecuGen Hamster Pro 10
      • SecuGen Hamster Pro 20 (HU20)
      • SecuGen Hamster IV (HSDU04P)
      • Unity 20 Bluetooth
      • Integrated Biometrics Watson Mini
      • Integrated Biometrics Columbo
      • Suprema BioMini Plus 2
      • Suprema RealScan-G1
      • Suprema BioMini Slim 2
      • Suprema BioMini Slim 2S
    • Ten Print Scanners
      • Integrated Biometrics Kojak
      • Suprema RealScan G10
      • Integrated Biometrics FIVE-0
    • Dual / Two Print Scanners
      • Suprema RealScan-D
      • Integrated Biometrics Sherlock
      • Integrated Biometrics Watson Mini
      • Nitgen eNBioScan-D Plus
    • Scanners + Card Readers
      • SecuGen iD-Serial
      • SecuGen iD-USB SC/PIV
      • SecuGen ID USB SC
      • Hamster Pro Duo CL
      • Hamster Pro Duo SC/PIV
      • Suprema BioMini Combo
    • OEM Modules
      • SecuGen SDU03P
      • SecuGen SDU04P
      • Lumidigm M300 (M30x)
      • Lumidigm M310 (M31x)
      • Lumidigm V300 (V30x)
      • Lumidigm V310 (V31x)
  • NFA Fingerprinting
Bayometric Bayometric
  • Live Scan
    • Print to FD-258 Card – Background Check
    • SWFT Applicant System
    • FBI Fingerprinting – Live Scan
    • NFA Fingerprinting – Live Scan
    • FINRA EFS
    • FDLE Live Scan
    • Fingerprint Background Check
    • SWFT+ Compatible Devices
  • Fingerprint SDK
    • Touch N Go
    • Griaule Fingerprint SDK
  • Single Sign-On
  • Fingerprint Scanner
    • USB Scanners
      • SecuGen Hamster Pro
      • SecuGen Hamster Plus (HSDU03P)
      • Nitgen Fingkey Hamster DX
      • Lumidigm M301 (M30x)
      • Lumidigm M311 (M31x)
      • Lumidigm V302 (V30x)
      • Lumidigm V311 (V31x)
      • Nitgen Fingkey Hamster II
      • Nitgen Fingkey Hamster III
      • Verifi P5100
      • IB Curve
    • FBI Certified Readers
      • SecuGen Hamster Pro 10
      • SecuGen Hamster Pro 20 (HU20)
      • SecuGen Hamster IV (HSDU04P)
      • Unity 20 Bluetooth
      • Integrated Biometrics Watson Mini
      • Integrated Biometrics Columbo
      • Suprema BioMini Plus 2
      • Suprema RealScan-G1
      • Suprema BioMini Slim 2
      • Suprema BioMini Slim 2S
    • Ten Print Scanners
      • Integrated Biometrics Kojak
      • Suprema RealScan G10
      • Integrated Biometrics FIVE-0
    • Dual / Two Print Scanners
      • Suprema RealScan-D
      • Integrated Biometrics Sherlock
      • Integrated Biometrics Watson Mini
      • Nitgen eNBioScan-D Plus
    • Scanners + Card Readers
      • SecuGen iD-Serial
      • SecuGen iD-USB SC/PIV
      • SecuGen ID USB SC
      • Hamster Pro Duo CL
      • Hamster Pro Duo SC/PIV
      • Suprema BioMini Combo
    • OEM Modules
      • SecuGen SDU03P
      • SecuGen SDU04P
      • Lumidigm M300 (M30x)
      • Lumidigm M310 (M31x)
      • Lumidigm V300 (V30x)
      • Lumidigm V310 (V31x)
  • NFA Fingerprinting
Jan 08

How International Biometric Data Sharing Can Improve National Security?

  • Danny Thakkar
  • Biometric Security, Law Enforcement, Public Safety

Threats to national security have been a major concern among nations in recent years. Increasing cyber threats, terrorist incidents and cross border incidents around the globe have proven that current national security countermeasures are not adequate and needs to be strengthened. Civil war in Iraq and Syria has made people leave homes and seek asylum as refugees throughout the world. It has given terrorists a chance to enter target countries to carry out deadly incidents. Cyber security, securing borders and neutralizing terrorist incidents have become priorities that require continuous efforts. One of the important tasks to achieve national security is collection of information at large and making sense out of it. It is called intelligence gathering and performed using multiple techniques to accumulate information from multiple sources. Intelligence gathering and analysis help security agencies to foresee potential threats and pass this information to law enforcement and other security agencies to take appropriate measures.

National security: the challenge of the hour

September 11 attacks, which are considered to be the deadliest terrorist strike in the history of the United States, is an example how severe a failure in intelligence gathering and sharing can be. These attacks shattered American illusion of security. Till September 11, 2001, there seemed no immediate threat to daily lives of American citizens and personal security was nowhere there in priority list for most citizens. These attacks did not take place all of sudden. Post-incident analysis revealed that the intelligence agencies did have bits and pieces of information, but there were unable to leverage it to take preventive actions, and the worse chapter of terrorism was written on American soil. No one could imagine that it was just around the corner until it happened.

According to a report published in Newsweek:
“The various commissions and internal agency reviews that examined the “intelligence failure” of 9/11 blamed institutional habits and personal rivalries among CIA, FBI and National Security Agency (NSA) officials for preventing them from sharing information. Out of those reviews came the creation of a new directorate of national intelligence, which stripped the CIA of its coordinating authority.”

This incident installed fear in the hearts of the citizens and changed outlook of the United States government towards national security from terrorism. Post 9/11, a number of countermeasures were taken to fix the loopholes and improve the counter terrorism strategy. These countermeasures also affected civil liberties adversely. Since the incident was carried out using airplanes as missiles, it remained no longer easy to board a flight for flying towards or in the United States. People had to go through thorough screening at the airports. Other countries also strengthen their security checks in the wake of incident. If security and law enforcement agencies had made use of the intelligence gathered before the incidents, it could have been prevented.

Despite the importance of intelligence gathering, it is only the initial step towards national security. Information through intelligence gathering is often received in isolated bits and pieces, which does not deliver much sense alone. It only becomes usable when analysed and connected with other pieces of the puzzle. This information will still do nothing if it is not timely shared and taken action on. With world going more and more digital and tech-savvy, Intelligence gathering is also highly dependent on technology and also collects traces left by use of technology wherever possible.

Intelligence gathering: tool to stay ahead of the curve

Amount of information and its correctness can make all the difference in national security. Even in a war, knowing plans of enemies before they touch the ground can decide result of the war before it commences. Since information can be a crucial aspect in ensuring the national security, intelligence gathering as well becomes a crucial job. During last two decades, use of technology in Intelligence gathering has grown exponentially among nations.

One of the most efficient and reputed intelligence agencies in the world, states the following on American Intelligence History page of their website:
“The United States suffered its most costly intelligence disaster when the Japanese bombed Pearl Harbor on December 7, 1941. That intelligence failure – which was the result of analysis misconceptions, collection gaps, bureaucratic confusion, and careful Japanese denial and deception – led to the establishment of a larger and more diversified agency in 1942: the Office of Strategic Services, the forerunner of today’s Central Intelligence Agency.”
Intelligence gathering can be categorized in the following disciplines:
  • Human intelligence (HUMINT): intelligence gathering from a person on the ground
  • Geospatial intelligence (GIOINT): intelligence gathering by aerial photography, satellite, mapping / terrain data
  • Signals intelligence (SIGINT): intelligence gathering by intercepting signals
  • Measurement and signature intelligence (MASINT): measurement and signature intelligence
  • Technical intelligence (TECHINT): gathered by equipments and weapons used
  • Open-source intelligence (OSINT): gathered form open sources
  • Cyber intelligence / digital network intelligence (CYBINT/DNINT): intelligence gathering from cyberspace
  • Financial intelligence (FININT): intelligence gathering by analysing financial transactions.

Technology has made it possible for governments to surveil people and their activities. With the help of technology, governments can collect phone records, emails, online chats, browsing history, etc. and can use it to figure threats to the national security. According to The Washington Post, the NSA (National Security Agency) has been tracking locations of mobile phones from all over the world, which translates to more than 5 billion records of phone locations on a daily basis. Some countries even surveil other countries military activities. Satellites equipped with specialized sensing technology can detect nuclear explosions on earth by sensing characteristic signatures of a nuclear burst. It helps detect if a nation is running any secret nuclear weapon program.

Unfortunately, keeping hold of the top notch technological resources, governments’ hunger for collecting every bit of information is getting out of control. It came to light when an NSA contractor Edward Snowden revealed the U.S. government’s mass surveillance program PRISM to journalists of The Washington Post and The Guardian. Ran by the NSA on government authorization, PRISM had access to the resources of companies like Google, Microsoft and Facebook, and was able to collect and analyse data passing through their network. When this information went public, it outraged people around the world and American Civil Liberties Union filed a lawsuit against the NSA, citing that the PRISM violates Americans’ constitutional rights of free speech, association, and privacy.

Biometric data sharing: sharing is securing

Gone are the days when having powerful military, secure borders, social order and stable economy were enough to ensure national security. With inception of internet and connectivity, it has become imperative to lay virtual borders with actual borders. In modern times, national security is not threatened only by physical intrusions; the internet has made it possible to access resources that can be crucial to national security. Information has become the most vital resource of this era. Technology has proven to be a double edge sword. Knowing who is accessing what has become crucial to safeguard resources from potential misuse. Identity driven security can be the firewall we need to safeguard resources that are crucial to ensure national security.

We are still far away from epoch when intelligent machines will try to take over the government or the military power, till then there will be humans behind every possible non-natural activity. As long as there are humans behind activities, they can be identified with their unique physiological and behavioral characteristics, i.e. the biometrics. Biometrics is advantageous over other methods of personal identification as it uses inherent characteristics of individuals to recognize them. Biometric enrollment of people who can pose threat to the national security can be crucial. These threats can be identified at the borders and risk can be mitigated before any incident take place. Linking biometric identifiers of such people can be further advantageous, for example, if the Security Agency of a country has tentative/partial fingerprints of a terror organizer along with his unconfirmed voice print, they can be put together to positively identify him. Since biometric identifiers cannot be manipulated like passports or ID cards, they become the truest form of personal identification.

Sometimes security agencies use low level threats as bait to reach high level threats, they will let him pass the border so that he can make contacts and they can be hunted down as well. The voice prints of contacts can be taken on record for further investigation. Organizers of the threats to the national security might change names or appearance, they may manipulate their passports or identity documents but it is near impossible for them to change their biometric identifiers. Once their biometric identity is established in the national security records, they stay on radar, forever. Their whereabouts can be tracked and monitored, but it is only possible when these biometric details are shared among national security agencies of countries.

Sharing biometric data can further fix the loopholes still present in current intelligence sharing and improve national security. Biometric data sharing among international security agencies can be achieved via signing an international pact and pledge to keep the data secure on commonly agreed principles. International biometric data sharing can improve national security multifold by addressing a number of threats to it. It can become the answer to internationally organized terrorism, smuggling, cyber security, banking and financial threats, human trafficking, border protection, etc.

Conclusion

National security consists of the elements like ability of a country to defend itself or deter a military aggression, stability of social order, economic security, security of energy and natural resources and cyber security. However, in modern times, threats like terrorist attacks, cyber attacks, and border intrusion prevail over other form of threats to the national security. Increasing terrorist and cyber attacks specially have become more evident than ever. September 11 attacks took away all sense of security throughout the United States. It gave a strong message throughout the world that a country posing as a superpower may not be super secure. This incident changed the counter terrorism strategy of the United States. Sharing intelligence information became more important than securing it.

Increasing dependence on internet and connectivity has opened door for cyber threats. Even security agencies computer networks are the on the hit list of cyber criminals. On the other hand, International terrorism is another threat to the national security of any country, however, terrorist operations at international level are hard to perform without making calls or using the internet, and that is where organizers of terrorism can be tracked down. Mass surveillance programs do breach privacy of people, they, however, make it possible for security agencies to remotely control devices of terror organization or tape their phone calls. However, as Benjamin Franklin, one of the founding fathers of the United States, famously said: “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.”

  • Facebook
  • Twitter
  • Reddit
  • Pinterest
  • Google+
  • LinkedIn
  • E-Mail

About The Author

Mary Clark is Product Manager at Bayometric, one of the leading biometric solution providers in the world. She has been in the Biometric Industry for 10+ years and has extensive experience across public and private sector verticals.

Comments are closed.

Have any questions? We will be happy to answer.

Sidebar Contact

Shop online for high quality fingerprint readers

Hamster Pro 20

hamster pro 20
Buy Online

Unity 20 Bluetooth

unity 20 bluetooth
Buy Online

Hamster Plus

hamster plus
Buy Online

Columbo

columbo
Buy Online

Fingerprint applications we offer

Fingerprint SDK

Simple and Intuitive API, NO biometrics programming experience required. Get sample code in C++, C#, VB, Java etc.
Take a Tour

Live Scan

Live scan fingerprinting allows quick and cost effective background checks of individuals.
Take a Tour

Computer Logon

Logon to Windows, Domain, Websites and Applications using fingerprints & create a ”password free” environment.
Take a Tour

Search the Blog

Categories

  • Access Control
  • Archive
  • Automotive Biometrics
  • Background Check
  • Big Data
  • Biometric ATMs
  • Biometric Authentication
  • Biometric Data Security
  • Biometric Device
  • Biometric Identification
  • Biometric Immigration
  • Biometric National ID
  • Biometric News
  • Biometric Passport
  • Biometric Payment
  • Biometric Research
  • Biometric Screening
  • Biometric Security
  • Biometric Spoofing
  • Biometric System
  • Biometric Technology
  • Biometric Terminology
  • Biometrics as a Service
  • Biometrics Comparison
  • Biometrics Examples
  • Biometrics in Banking
  • Biometrics in Education
  • Biometrics in School
  • Border Control
  • BYOD
  • Cloud Communication
  • Cloud-based Biometrics
  • Covid 19
  • Cyber Security
  • Facial Recognition
  • Finger Vein Recognition
  • Fingerprint Attendance
  • Fingerprint Door Lock
  • Fingerprint Recognition
  • Fingerprint Scanner App
  • Fingerprint scanners
  • Fingerprint SDK
  • Fingerprint with Phone
  • Future of Biometrics
  • Guest Blog
  • Hand Geometry
  • Healthcare Biometrics
  • Home Security
  • Hospitality Industry
  • Integration Guideline
  • Internet of Things
  • Iris Recognition
  • Law Enforcement
  • Live Scan Fingerprinting
  • Mass Surveillance
  • Membership Management
  • Multi-factor Authentication
  • Multimodal Biometrics
  • Network Security
  • NFA Fingerprinting
  • Palm Vein Recognition
  • Patient Identification
  • Privacy
  • Public Safety
  • Retail POS
  • Retinal Scan
  • SecuGen RD Service
  • Secure Data Center
  • Signature Verification
  • Single Sign On
  • Smart Card
  • Time and Attendance
  • Two-factor Authentication
  • Vascular Biometrics
  • Visitor Management
  • Voice Authentication
  • Voter Registration
  • Windows Biometrics
  • Workforce Management

About Bayometric

Bayometric is a leading global provider of biometric security systems offering core fingerprint identification solutions. Learn more

Products We Offer

  • Touch N Go
  • Single Sign-On
  • Biometric Access Control
  • Biometric Security Devices
  • Fingerprint Scanners
  • FBI Certified Readers
  • Live Scan Systems
  • OEM Modules

Contact Us

Footer Contact
Sending

Recent from Blog

  • How Does NFA Obtain Your Criminal History Record? February 4, 2023
  • ATF Final Rule (2021R-08F) – Attached Stabilizing Braces January 30, 2023
  • Can Live Scan Detect Masked Fingerprints? January 5, 2023
© 2007 - 2022 by Bayometric | All Rights Reserved.
  • Best Seller
  • Cart
  • Checkout
  • Policies
  • Industries
  • Knowledge Base
  • Sitemap