SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Who is our enemy; who is our friend – at
home, abroad and on the battlefield?
Are we getting the right government services
to the right people when they need it?
THE POWER
OF IDENTITY
Who is crossing our borders and are
foreign visitors effectively vetted?
PEOPLE. PATTERNS. PREDICTIONS.
Our world is getting smaller and ever more interconnected.
Accurate and fast identification is a critical transaction for both
our government and our citizens – discerning friend from foe on
the battlefield, managing our borders with actionable intelligence,
authorizing federal benefits, and transacting business on a
global scale.
THE CHALLENGES
CHALLENGE/SOLUTION
FACIAL RECOGNITION AS THE SOLUTION
Government organizations are implementing large scale facial
recognition systems now. The Department of Homeland Security
Office of Biometric Identity Management is creating a database
of over 300 million faces to be used for data comparisons.
Additionally, U.S. Customs and Border Protection has sponsored
multiple trials of the technology at airports and border crossings.
THE DEPARTMENT OF HOMELAND
SECURITY OFFICE OF BIOMETRIC
IDENTITY MANAGEMENT IS
CREATING A DATABASE OF OVER
300 MILLION FACES TO BE USED
FOR DATA COMPARISONS
Government and industry are partnering agressively to ensure
identity data is managed responsibly and stored securely.
PRIVACY MATTERS
Facial recognition technology
has matured rapidly and
provides game-changing
results to today’s
identification challenges.
FACIAL RECOGNITION
TECHNOLOGY
ANSWERS THE
CHALLENGE
STANDOFF DATA COLLECTION –
data can be collected from a distance
without need to corral crowds
FACIAL RECOGNITION ANSWERS THE CHALLENGE
UTILIZATION OF POOR AND LOW
QUALITY DATA – highly accurate
matches can be made even from partial
or distorted images leading to higher
success rates of positive identification
MATCHING AGAINST WATCH LISTS – allows
images to be rapidly referenced against watch
lists to prevent known threats from moving freely
through borders and ports of entry
EXISTING DATASETS – Repositories of facial
recognition data exist for law enforcement
use and correctional facility booking systems
FRICTIONLESS
AUTHENTICATION – no
impact to boarding times since
individuals do not need to stop
INTEROPERABLE DATABASES – a singular
digital record can be generated for each citizen
to be accessed across multiple government
organizations for faster and more secure
government transactions
Entry and Exit at United States Borders and
Ports of Entry
Every day, approximately 100,000 flights take off around the globe
with over 3.7 billion passengers projected to fly in 2017. The
U.S. accounts for almost ¼ of that air traffic. Our federal policy,
infrastructure, manpower and technology are currently aligned to
facilitate vetting individuals as they enter the U.S., but the same
alignment is not in place to vet individuals exiting our borders.
This allows foreign nationals to overstay visas and continue to
live in the U.S. illegally. Addressing this exit challenge requires
concerted efforts to align policy (domestic and international), invest
in new border infrastructure, and leverage the best of biometric
technology to ensure accurate, efficient identity vetting.
THE BORDER EXIT CHALLENGE
CHALLENGES
ADDRESSING THIS
EXIT CHALLENGE
REQUIRES CONCERTED
EFFORTS TO ALIGN
POLICY (DOMESTIC
AND INTERNATIONAL)
=
?
$
Facial Recognition Technology at Entry/Exit Ports
Where there are infrastructure challenges at the borders and ports
of entry, facial recognition can be installed with minimal disruption
to traffic patterns or the need for additional queues or checkpoints.
Fast and effective, facial recognition also works at a distance which
will minimize traffic friction at high-traffic areas. Effective policy
that synchronizes data from the Department of State, Department
of Homeland Security, Department of Defense and various federal
law enforcement agencies will create an iron-clad backbone for the
U.S. government to know who is currently on U.S. soil.
SOLUTIONS
CHALLENGES
SOLUTIONS
Facial Recognition Technology to Discern
Friend from Foe
Using facial recognition technology, federal law enforcement and
intelligence agents are able to deploy sophisticated analytics
with images captured from a variety of sources such as security
cameras, video files and social media profiles to run against
government databases. On the battlefield, America’s warfighters
are able to collect facial images, create local databases and utilize
available intelligence to generate positive matches. Collecting
these data points and having the technology to accurately match
them will give the U.S. government the information it needs to
protect the people.
Friend or Foe – at Home and on
the Battlefield
Despite the best efforts of those fighting our wars and protecting
our borders, some enemies manage to thwart even the best
defense - terrorists and bad actors who claim anonymity with
intent to create havoc, break laws and otherwise infringe on the
freedoms and safety of U.S. citizens. Federal law enforcement
and DoD agencies have requirements to track and apprehend
such individuals; the ability to accurately identify these individuals
is critical to mission success. These individuals are often
undocumented, so biometric data is critical to establishing their
identity. In every case, accurate identity matching enables federal
agencies to do their job: protecting the American people from
those who seek to harm our way of life.
... THE ABILITY TO
ACCURATELY IDENTIFY
THESE INDIVIDUALS
IS CRITICAL TO
MISSION SUCCESS.
IDENTIFYING FRIEND FROM FOE
=
?
$
Facial Recognition Technology in
Government Transactions
The growing acceptance of facial recognition – both in
government and private sector applications – makes it ideal for
the government’s use to validate individuals’ identities when
applying for government services. The future of secure government
to consumer transactions can be realized by using the right
technology and developing the right policy to support responsible
data sharing and stewardship.
Providing the Right Services to the Right People When
They Need It
Many government organizations are charged with providing
services to the citizens of the United States, e.g., issuing passports
or visas; providing healthcare or retirement services; conducting
census activities; and distributing education benefits. It is the
government’s responsibility to guarantee secure and accurate
transactions with each individual so that neither the national
security nor the safety and security of the individual’s information
is compromised. Culturally, people are becoming increasingly
comfortable conducting sensitive transactions online. By pushing
into a more digital landscape and relying on the accuracy of
biometric identity confirmation, these government organizations
can increase the efficiency, efficacy and security of their programs.
... RELYING ON
THE ACCURACY OF
BIOMETRIC IDENTITY
CONFIRMATION,
THESE GOVERNMENT
ORGANIZATIONS
CAN INCREASE THE
EFFICIENCY
DELIVERING EFFICIENT GOV’T SERVICES
CHALLENGES
SOLUTIONS
$
NEC’s NeoFace Solutions
Technology Leader
Not all facial recognition technology is created equal. NEC Advanced Recognition
Systems (ARS) has broken new ground in the facial recognition arena creating the
most accurate technology available. NEC has been a leader in the technology
world for over 100 years and in the biometrics game for nearly 40. It is with that
breadth and longevity of experience that the NEC NeoFace Facial Recognition
Suite was developed.
Trusted Partner
Agile response to changing requirements is the trademark of a strong industry
partner. NEC ARS provides small business agility with large business strength and
durability. Our NeoFace Suite offers a full spectrum of front and back end solutions
that provide the most powerful facial recognition technologies on the market. Built
with a standards-based, open architecture, our customers are enabled to integrate
legacy technology or create an entirely new, customizable, end to end solution to
meet any requirement.
Proven Success
The NeoFace matching algorithm is ranked number one by the National Institute of
Standards and Technology (NIST), and the technology has already been tested and
proven in the field. In conjunction with the U.S. Customs and Border Protection and
other industry partners, NeoFace Match technology was tested successfully in New
York City’s JFK and Atlanta’s Hartsfield Airports. “Recent successful tests in high
traffic security screening venues proved the ability of the system to efficiently and
accurately perform one-to-one facial image comparisons,” said Amy Rall, Group
Vice President for the Department of Homeland Security practice at Unisys Federal.
“This solution of NEC facial recognition technology can help make the country safer
without disrupting travel or sacrificing travelers’ privacy.” Additionally, NEC ARS
also deployed NeoFace technology at the Otay Mesa border crossing, which
despite having a very different infrastructure and requirements, was also a
resounding success.
NEC’S NEOFACE SOLUTIONS
“THIS SOLUTION
OF NEC FACIAL
RECOGNITION
TECHNOLOGY
CAN HELP MAKE
THE COUNTRY
SAFER WITHOUT
DISRUPTING TRAVEL
OR SACRIFICING
TRAVELERS’
PRIVACY.”
CONTACT US
NEC Corporation of America
Advanced Recognition Systems
Benji Hutchinson
Senior Director Washington, D.C. Operations
571.777.3668
benji.hutchinson@necam.com
© 2017 NEC Corporation of America. NEC and NeoFace are registered trademarks of NEC Corporation. All rights reserved.
Other product or service marks mentioned are the trademarks of their respective owners.
https://www.necam.com/AdvancedRecognitionSystems/

Weitere ähnliche Inhalte

Ähnlich wie The Power of Identity

CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
Lucy Kitchin
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
ronak56
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
IJCI JOURNAL
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
Mike Kuhn
 
Amanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paperAmanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paper
amanda Kaster
 
Abstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docxAbstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docx
write4
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
duketjoy27252
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
Dr Lendy Spires
 
Jones A LWP Final Approved
Jones A LWP Final ApprovedJones A LWP Final Approved
Jones A LWP Final Approved
Adam Jones, LCC
 

Ähnlich wie The Power of Identity (20)

Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docxReview DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
Review DNI WTAs for 2015 and 2016 (see attached). Compare and con.docx
 
TrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration SolutionTrueVoter™ Biometric Voter Registration Solution
TrueVoter™ Biometric Voter Registration Solution
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
 
Amanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paperAmanda Kaster-audience analysis complete paper
Amanda Kaster-audience analysis complete paper
 
Abstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docxAbstract This is a case study analysis of the 2017.docx
Abstract This is a case study analysis of the 2017.docx
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Csd6059
Csd6059Csd6059
Csd6059
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
 
Branney-Gant Research Paper
Branney-Gant Research PaperBranney-Gant Research Paper
Branney-Gant Research Paper
 
Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?Access Cards and Identity Management - is it worthwhile?
Access Cards and Identity Management - is it worthwhile?
 
Jones A LWP Final Approved
Jones A LWP Final ApprovedJones A LWP Final Approved
Jones A LWP Final Approved
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 

Mehr von InteractiveNEC

Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023
InteractiveNEC
 

Mehr von InteractiveNEC (20)

Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)Investing in Aviation's Identity First Future (preview)
Investing in Aviation's Identity First Future (preview)
 
Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023Smart Enterprise Drivers for 2023
Smart Enterprise Drivers for 2023
 
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
(Preview) Clear the Way to Convenience - With SITA Smart Path Powered by NEC ...
 
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:DelightClear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
Clear the Way to Convenience - With SITA Smart Path Powered by NEC I:Delight
 
NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)
 
NEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesNEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal Agencies
 
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
(Preview) Analyze to Optimize - Connect airport data to refine intertwined op...
 
Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.Analyze to Optimize - Connect airport data to refine intertwined operations.
Analyze to Optimize - Connect airport data to refine intertwined operations.
 
NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022NEC's Top 10 Strategic Smart Enterprise Drivers 2022
NEC's Top 10 Strategic Smart Enterprise Drivers 2022
 
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
UNIVERGE BLUE CONNECT BRIDGE – Your BRIDGE to the Cloud!
 
Creating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid WorkCreating a Communications System Built for Hybrid Work
Creating a Communications System Built for Hybrid Work
 
(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local Governments(Preview) NEC Digital Platform for State and Local Governments
(Preview) NEC Digital Platform for State and Local Governments
 
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product BriefEvaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
Evaluator Group: NEC UNIVERGE BLUE BACKUP & RECOVER Product Brief
 
UNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work modelUNIVERE BLUE CONNECT - How to define your hybrid work model
UNIVERE BLUE CONNECT - How to define your hybrid work model
 
9 Ways Your Aging Phone System Is Putting Business Success On Hold
9 Ways Your Aging Phone System Is Putting Business Success On Hold9 Ways Your Aging Phone System Is Putting Business Success On Hold
9 Ways Your Aging Phone System Is Putting Business Success On Hold
 
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVERNEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
NEC's UNIVERGE BLUE BACKUP and UNIVERGE BLUE RECOVER
 
Smart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest ExperienceSmart Check-In - Transforming the Guest Experience
Smart Check-In - Transforming the Guest Experience
 
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
Preview: Leveraging Technology-Based Safety Initiatives to Thrive in the Next...
 
Preview: Taking Travel to New Heights
Preview: Taking Travel to New HeightsPreview: Taking Travel to New Heights
Preview: Taking Travel to New Heights
 
UNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD BrochureUNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
UNIVERGE BLUE SV9500 PRIVATE CLOUD Brochure
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

The Power of Identity

  • 1. Who is our enemy; who is our friend – at home, abroad and on the battlefield? Are we getting the right government services to the right people when they need it? THE POWER OF IDENTITY Who is crossing our borders and are foreign visitors effectively vetted? PEOPLE. PATTERNS. PREDICTIONS.
  • 2. Our world is getting smaller and ever more interconnected. Accurate and fast identification is a critical transaction for both our government and our citizens – discerning friend from foe on the battlefield, managing our borders with actionable intelligence, authorizing federal benefits, and transacting business on a global scale. THE CHALLENGES CHALLENGE/SOLUTION FACIAL RECOGNITION AS THE SOLUTION Government organizations are implementing large scale facial recognition systems now. The Department of Homeland Security Office of Biometric Identity Management is creating a database of over 300 million faces to be used for data comparisons. Additionally, U.S. Customs and Border Protection has sponsored multiple trials of the technology at airports and border crossings. THE DEPARTMENT OF HOMELAND SECURITY OFFICE OF BIOMETRIC IDENTITY MANAGEMENT IS CREATING A DATABASE OF OVER 300 MILLION FACES TO BE USED FOR DATA COMPARISONS Government and industry are partnering agressively to ensure identity data is managed responsibly and stored securely. PRIVACY MATTERS
  • 3. Facial recognition technology has matured rapidly and provides game-changing results to today’s identification challenges. FACIAL RECOGNITION TECHNOLOGY ANSWERS THE CHALLENGE STANDOFF DATA COLLECTION – data can be collected from a distance without need to corral crowds FACIAL RECOGNITION ANSWERS THE CHALLENGE UTILIZATION OF POOR AND LOW QUALITY DATA – highly accurate matches can be made even from partial or distorted images leading to higher success rates of positive identification MATCHING AGAINST WATCH LISTS – allows images to be rapidly referenced against watch lists to prevent known threats from moving freely through borders and ports of entry EXISTING DATASETS – Repositories of facial recognition data exist for law enforcement use and correctional facility booking systems FRICTIONLESS AUTHENTICATION – no impact to boarding times since individuals do not need to stop INTEROPERABLE DATABASES – a singular digital record can be generated for each citizen to be accessed across multiple government organizations for faster and more secure government transactions
  • 4. Entry and Exit at United States Borders and Ports of Entry Every day, approximately 100,000 flights take off around the globe with over 3.7 billion passengers projected to fly in 2017. The U.S. accounts for almost ¼ of that air traffic. Our federal policy, infrastructure, manpower and technology are currently aligned to facilitate vetting individuals as they enter the U.S., but the same alignment is not in place to vet individuals exiting our borders. This allows foreign nationals to overstay visas and continue to live in the U.S. illegally. Addressing this exit challenge requires concerted efforts to align policy (domestic and international), invest in new border infrastructure, and leverage the best of biometric technology to ensure accurate, efficient identity vetting. THE BORDER EXIT CHALLENGE CHALLENGES ADDRESSING THIS EXIT CHALLENGE REQUIRES CONCERTED EFFORTS TO ALIGN POLICY (DOMESTIC AND INTERNATIONAL) = ? $ Facial Recognition Technology at Entry/Exit Ports Where there are infrastructure challenges at the borders and ports of entry, facial recognition can be installed with minimal disruption to traffic patterns or the need for additional queues or checkpoints. Fast and effective, facial recognition also works at a distance which will minimize traffic friction at high-traffic areas. Effective policy that synchronizes data from the Department of State, Department of Homeland Security, Department of Defense and various federal law enforcement agencies will create an iron-clad backbone for the U.S. government to know who is currently on U.S. soil. SOLUTIONS
  • 5. CHALLENGES SOLUTIONS Facial Recognition Technology to Discern Friend from Foe Using facial recognition technology, federal law enforcement and intelligence agents are able to deploy sophisticated analytics with images captured from a variety of sources such as security cameras, video files and social media profiles to run against government databases. On the battlefield, America’s warfighters are able to collect facial images, create local databases and utilize available intelligence to generate positive matches. Collecting these data points and having the technology to accurately match them will give the U.S. government the information it needs to protect the people. Friend or Foe – at Home and on the Battlefield Despite the best efforts of those fighting our wars and protecting our borders, some enemies manage to thwart even the best defense - terrorists and bad actors who claim anonymity with intent to create havoc, break laws and otherwise infringe on the freedoms and safety of U.S. citizens. Federal law enforcement and DoD agencies have requirements to track and apprehend such individuals; the ability to accurately identify these individuals is critical to mission success. These individuals are often undocumented, so biometric data is critical to establishing their identity. In every case, accurate identity matching enables federal agencies to do their job: protecting the American people from those who seek to harm our way of life. ... THE ABILITY TO ACCURATELY IDENTIFY THESE INDIVIDUALS IS CRITICAL TO MISSION SUCCESS. IDENTIFYING FRIEND FROM FOE = ? $
  • 6. Facial Recognition Technology in Government Transactions The growing acceptance of facial recognition – both in government and private sector applications – makes it ideal for the government’s use to validate individuals’ identities when applying for government services. The future of secure government to consumer transactions can be realized by using the right technology and developing the right policy to support responsible data sharing and stewardship. Providing the Right Services to the Right People When They Need It Many government organizations are charged with providing services to the citizens of the United States, e.g., issuing passports or visas; providing healthcare or retirement services; conducting census activities; and distributing education benefits. It is the government’s responsibility to guarantee secure and accurate transactions with each individual so that neither the national security nor the safety and security of the individual’s information is compromised. Culturally, people are becoming increasingly comfortable conducting sensitive transactions online. By pushing into a more digital landscape and relying on the accuracy of biometric identity confirmation, these government organizations can increase the efficiency, efficacy and security of their programs. ... RELYING ON THE ACCURACY OF BIOMETRIC IDENTITY CONFIRMATION, THESE GOVERNMENT ORGANIZATIONS CAN INCREASE THE EFFICIENCY DELIVERING EFFICIENT GOV’T SERVICES CHALLENGES SOLUTIONS $
  • 7. NEC’s NeoFace Solutions Technology Leader Not all facial recognition technology is created equal. NEC Advanced Recognition Systems (ARS) has broken new ground in the facial recognition arena creating the most accurate technology available. NEC has been a leader in the technology world for over 100 years and in the biometrics game for nearly 40. It is with that breadth and longevity of experience that the NEC NeoFace Facial Recognition Suite was developed. Trusted Partner Agile response to changing requirements is the trademark of a strong industry partner. NEC ARS provides small business agility with large business strength and durability. Our NeoFace Suite offers a full spectrum of front and back end solutions that provide the most powerful facial recognition technologies on the market. Built with a standards-based, open architecture, our customers are enabled to integrate legacy technology or create an entirely new, customizable, end to end solution to meet any requirement. Proven Success The NeoFace matching algorithm is ranked number one by the National Institute of Standards and Technology (NIST), and the technology has already been tested and proven in the field. In conjunction with the U.S. Customs and Border Protection and other industry partners, NeoFace Match technology was tested successfully in New York City’s JFK and Atlanta’s Hartsfield Airports. “Recent successful tests in high traffic security screening venues proved the ability of the system to efficiently and accurately perform one-to-one facial image comparisons,” said Amy Rall, Group Vice President for the Department of Homeland Security practice at Unisys Federal. “This solution of NEC facial recognition technology can help make the country safer without disrupting travel or sacrificing travelers’ privacy.” Additionally, NEC ARS also deployed NeoFace technology at the Otay Mesa border crossing, which despite having a very different infrastructure and requirements, was also a resounding success. NEC’S NEOFACE SOLUTIONS “THIS SOLUTION OF NEC FACIAL RECOGNITION TECHNOLOGY CAN HELP MAKE THE COUNTRY SAFER WITHOUT DISRUPTING TRAVEL OR SACRIFICING TRAVELERS’ PRIVACY.”
  • 8. CONTACT US NEC Corporation of America Advanced Recognition Systems Benji Hutchinson Senior Director Washington, D.C. Operations 571.777.3668 benji.hutchinson@necam.com © 2017 NEC Corporation of America. NEC and NeoFace are registered trademarks of NEC Corporation. All rights reserved. Other product or service marks mentioned are the trademarks of their respective owners. https://www.necam.com/AdvancedRecognitionSystems/