The last few years have seen a much wider application of biometric technology to improve access control and security. This article cites several of these uses, which demonstrate the potential of biometric identification. Here are a few of these applications.
Archive for December, 2010
Biometric basics
Biometric identification, as this article describes, is being used more and more for security purposes. Privacy concerns hindered development prior to the Sept. 11 attacks, but some biometric technology such as fingerprinting and DNA identification made inroads. Now, there are a wide variety of biometric technologies available for access control and other security purposes.
Building on HSPD-12
Last month the Office of Management and Budget (OMB) and Department of Homeland Security (DHS) announced that they are working together on two memos regarding federal secure identity management cards. These are cards that were issued in accordance with HSPD-12, which we talked about in our last post. There’s not much info on what these memos will say, but this article offers some speculation about them.
Identifying criteria in HSPD 12
Another post-Sept. 11 security change was Homeland Security Presidential Directive 12 (HSPD 12). This directive created a standard form of identification to gain access to government facilities and mandated adoption of this standard by all government agencies. This Website provides more information on HSPD 12. Though the directive is directed at government agencies, like HSPD 3, the private sector can take some cues from it to enhance its security.
More on the Red Threat Condition
The final level in our look at the Department of Homeland Security’s Threat Advisory System is the final Severe (Red) Threat Condition. This Threat Condition indicates a severe risk of a terrorist attack and suggests a swift response. This response is usually not meant last long but until the severe threat passes. This Website has all the details, but here are a few key points.