Toggle light / dark theme

Why biometrics will need and form of id to properly perform security checks.


Impersonators in many cases apparently had used synthetic bandages bearing thumb impressions of actual candidates. “Traditionally, fingerprints were used as evidence in court cases and even in high-tech security systems. But revelations by those arrested for impersonation in Bihar are proving to the world of forensic sciences that creating forged, latent fingerprints is relatively easy,” claims Dr Anand Rai, whistle-blower in the MPPEB scam. In the past, Rai had requested STF officials to look into interrogation reports of 140 impersonators arrested by the Bihar police during a constable recruitment exam.

Source: http://timesofindia.indiatimes.com/city/bhopal/MP-scamsters-find-a-way-to-clone-thumbprint-beat-biometric-test/articleshow/53311540.cms

Read more

I do love biometrics for security; however, many know that we will not only leverage biometrics alone for certifying identification given how easy it is for folks to retrieve others DNA information, etc. from commercial DNA sites, etc.


In the world of security, there are many tools at the IT Staff’s disposal which can be used to fight Cybercrimes of all types and levels. Regarding Physical Access Entry, Smart Cards and FOB’s are available to help alleviate the probability of a Social Engineering attack. Regarding Logical Access Entry, Network Intrusion Devices, Firewalls, Routers, etc. are also all ready to be installed and used.

But, there is one problem with all of these tools above: To some degree or another, all of them can be hijacked, stolen, or even spoofed so that a real Cyber hacker can find their way into a corporation very quickly and easily. For instance, a Smart Card can be easily lost or stolen; or even malformed data packets can be sent to a router and tricking it that it is a legitimate employee trying to gain access.

But, there is one Security technology out there which, for the most part, cannot be spoofed or tricked. As a result, it can provide 100% proof positive of the identity of an end user. This technology is known as Biometrics.

Read more

This will definitely make designer wear fashion very collectable and easier for investigators and consumer to detect fakes due to biometric readers. Unfortunately, Coco Chanel and Gianni Versace are not around to participate.


Designer Tina Gorjanc is using Alexander McQueen’s DNA to grow “skin” complete with freckles and tattoos that will be tanned to create jackets and bags.

Read more

Glad Google is doing this because next month could be a real test when China launches its Quantum Satellite.


Today’s encryption is an arms race as digital security experts try to hold off hackers’ attempts to break open user data. But there’s a new tech on the horizon that even the NSA recognizes as crucial to protect against: quantum computing, which is expected to dramatically speed up attempts to crack some commonly-used cryptographic schemes. To get ahead of the game, Google is testing new digital security setups on single-digit populations of Chrome users.

Quantum computing is such a potential threat because it can do many more simultaneous calculations than current computers. Modern binary bits can only be in two states when electric current is run through them: 0 or 1. But the ambiguous nature of the quantum state means its elemental units (known as “qubits”) could be in either state at a time, so two could potentially be in four orientations at one time: 00, 01, 10 or 11. That ambiguity is exponential, so three qubits could be in eight at a time, and so on.

Security experts aren’t just concerned that quantum computers’ higher speed means faster rates of cryptography-cracking: They’re worried that future hacking methods could come back to today’s encrypted data and pry it open. But that’s in the future: as Wired points out, crypto experts say you would need a quantum computer with hundreds of thousands of qubits, and IBM’s only has five.

Read more

You got to luv this one.


The security agency must defend itself in a US appeals court for violating the rights of a convicted bomber by supposedly illegally spying on him.

A US appeals court will weigh a constitutional challenge on Wednesday to a warrantless government surveillance program, brought by an Oregon man found guilty of attempting to detonate a bomb in 2010 during a Christmas tree-lighting ceremony.

The case before a three-judge panel of the 9th US Circuit Court of Appeals is the first of its kind to consider whether a criminal defendant’s constitutional privacy rights are violated under a National Security Agency (NSA) program that allows spying on Americans’ international phone calls and internet communications.

Read more

Glad they are doing something on this because my biggest concern on biometrics and systems storing other people’s DNA/ bio information is criminals hacking in and collecting bio information on people and reselling it on the Dark Web. With this type of information; criminals can do many interesting things especially if they have access to a gene editing kit, or 3D printers, etc. We have seen how easy it is to create gene editing kits and selling them on the net for $129 each. And, how 3D printers can replicate synthetic skin, contacts mimicking eye structures, etc. So, criminals can do some amazing things once they have access to anyone’s biometrics information.


A biometric system to verify travelers exiting the country could be in effect as soon as 2018.

By Kayla Nick-Kearney.

Read more

Biometrics using DNA along with other recognition technology brings additional identity protection; however, is it just me or are others understanding the risk with our DNA and other bio info being online given the existing weak infrastructure and under pinning technology. Without a QC secured internet and infrastructure; I would hesitate having my bio/ DNA information online for hackers and terrorists.

Once your identity with the DNA is online; it will be extremely hard to do a reset button on your identity because things like an id number such as a US Social Security number, etc. can be changed; but DNA identity is not that achievable even with CRISPR.


The official Yili Daily reported that from the first of June, residents of the Yili Kazakh Autonomous Prefecture in China’s far northwest must present the police with DNA samples, fingerprints, voice prints and a “three-dimensional image” when applying for travel documents.

Members of the majorly Muslim Uighur community in Xinjiang complain of discrimination, especially facing denials of passport applications including limits placed on their culture and religion.

Based on the paper, the new policy that came into effect before the commencement of the holy month of Ramadan which started on Monday, refers to applications for and renewals of passports, entry permits to Taiwan and two-way permits to Hong Kong and Macau.

Read more

All is promising for Biometrics and biometric informatics; however, the technologies to date leveraged in IoT and other environments for parsing, analysis (especially predictive analysis), as well as better presented needs to be improved to be of value. We have seen great progress in the collection of the information and for some basic identification capabilities it looks good; however, to truly be effective and of value we need a lot more work done in this space especially when you look at today’s landscape of collecting information in areas of IoT and processing/ analysis with big data.


The global biometrics market is projected to cross US $ 24.8 billion by 2021. Fingerprint recognition biometric systems are the most preferred type of biometric systems used across the globe, owing to their ease of use, low cost, high speed and accurate results.

Biometric systems are used across various public as well as private offices for enhancing the security of data and information, as these systems provide an accurate validation as compared to traditional methods such as ID cards, PINs, passwords, etc. Increasing use of biometrics in e-commerce and cloud computing solutions, coupled with initiatives taken by the government of various countries across the world to adopt biometrics systems for identification and verification purposes are some of the major factors driving demand for biometric solutions, globally.

Moreover, introduction of e-passports and e-visas, use of biometrics in criminal identification, increasing demand for smartphones integrated with biometric technologies and implementation of biometric technology in election administration are anticipated to drive the global biometrics market over the next five years.

Read more

With the element of terrorists in society today; things like video data/ information and biometrics will grow increasingly in demand within the immediate years a key peice that will require improvements in the timely performance and interpretation of the information via the technologies used to collect, analyze, interpret, and present the information to users as well as respecting the privacy of innocent civilians. However, Civilians will also need to do their own part in reasonableness of when and why certain sets of data must be collected.


The Intelligence Advanced Research Projects Activity (IARPA), a division of the Office of the Director of National Intelligence, will host a Proposers’ Day Conference for the Deep Intermodal Video Analytics (DIVA) program on July 12, 2016, in anticipation of the release of a new broad agency announcement (BAA) solicitation.

The purpose of the conference, which will be held in Washington, DC, will be to provide information on DIVA and the research problems the program aims to address, to address questions from potential proposers and to provide a forum for potential proposers to present their capabilities for teaming opportunities.

The DIVA program will be designed to develop robust automated activity detection for a multi-camera streaming video environment. As an essential aspect of DIVA, activities will be enriched by person and object detection, as well as recognition at multiple levels of granularity. DIVA is anticipated to be a three-phase program.

Read more