{"id":3169,"date":"2014-08-21T07:00:16","date_gmt":"2014-08-21T11:00:16","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=3169"},"modified":"2025-04-23T08:02:23","modified_gmt":"2025-04-23T12:02:23","slug":"biometric-identification-management-department-defense","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/","title":{"rendered":"Biometric Identification Management and the Department of Defense"},"content":{"rendered":"<p><strong>The following is a guest post written by Russel Cooke.<\/strong><\/p>\n<p>Observe any human being and the attributes that make us unique. The measurement and analysis of physical characteristics as a means of identification has always been easy to imagine and to some extent, easy to implement \uff0d as long as the user was resigned to the fact that the method of verification was qualitative and not quantitative. Even with this limitation, the technology could be used quite broadly as a way of developing an educated guess as to who someone was. It\u2019s that quantitative measure of certainty that becomes the breakthrough which dramatically advances the technology and makes it indispensable as a tool for security and investigation.<\/p>\n<p>The journey to achieving quantitative and automated biometrics developed into a specialized knowledge base which later became it\u2019s own branch of scientific research. The list of attributes from which biometrics could be measured expanded to include one\u2019s signature, palm, hand geometry, fingerprint, face, vascular pattern, speech, iris,\u00a0and DNA from multiple sources on the body.<\/p>\n<p>It\u2019s the Department of Defense, sometimes working in collaboration with the FBI and other agencies, that made intense and concerted efforts to bring this technology to fruition.<\/p>\n<p><strong>Biometrics Milestones:<\/strong><\/p>\n<p>In 1993 the Department of Defense initiates the Face Recognition Technology program known as FERET. It was sponsored through 1997 by the Defense Advanced Research Products Agency (DARPA) and the DoD Counterdrug Technology Development Program Office in an effort to encourage the development of face recognition algorithms and technology. During that same period, both military and civilian advancements in biometrics were made:<\/p>\n<ul>\n<li>Development of an iris prototype unit begins<\/li>\n<li>FacE REcognition Technology (FERET) program is initiated<\/li>\n<li>First iris recognition algorithm is patented (<strong><a title=\"Iris Recognition Algorithm Patent\" href=\"https:\/\/www.google.com\/patents\/US5291560\" target=\"_blank\" rel=\"noopener noreferrer\">US5291560 A<\/a><\/strong>)<\/li>\n<li>Integrated Automated Fingerprint Identification System (IAFIS) competition is held<\/li>\n<li>Palm System is benchmarked<\/li>\n<li>INSPASS is implemented<\/li>\n<li>Iris prototype becomes available as a commercial product<\/li>\n<li>Hand geometry is implemented at the Olympic Games<\/li>\n<li>NIST begins hosting annual speaker recognition evaluations<\/li>\n<\/ul>\n<p>In 2004, there was a flurry of activity, as many of the advancement made during the 1990\u2019s matured and could be put to use. In that year, the Department of Defense implements the Automated Biometric Identification System (<strong>ABIS<\/strong>).\u00a0 Designed to improve the US Government&#8217;s ability to track and identify national security threats, the system included methods of collecting and storing fingerprint, mug shot, voice, iris, and DNA data from enemy combatants, captured insurgents, and various persons of interest. Also in that year, a presidential directive calls for mandatory identification card for all federal employees and contractors and a palm print database is deployed in the US.<br \/>\nThe implementation of biometrics has been increasingly active, if not especially overt. In the case of facial recognition, the technology is software-based, and can be adapted to cameras that have already been installed.<\/p>\n<p><strong>On the Horizon:<\/strong> Some of the <strong>technologies under development<\/strong> include &#8220;Field-Deployable Rapid DNA Analysis&#8221; and international collaborations for automated biometric <strong>upgrades<\/strong>. Adaptations of (\u201c<strong><a title=\"Soft Biometrics\" href=\"https:\/\/www.newscientist.com\/article\/mg22029455.200-soft-biometrics-is-the-new-way-to-monitor-people.html#.U-tlomPQpM4\" target=\"_blank\" rel=\"noopener noreferrer\">soft biometrics<\/a><\/strong>\u201d) to social media (for example) are also receiving attention as part of the <a href=\"https:\/\/www.tollfreeforwarding.com\/blog\/the-internet-of-things-will-generate-big-data-like-youve-never-seen-before\/\">next generation<\/a> of biometric technologies. This includes <strong><a title=\"Ear Recognition\" href=\"https:\/\/www.newscientist.com\/article\/mg18725095.300-ear-recognition-may-beat-face-biometrics.html\" target=\"_blank\" rel=\"noopener noreferrer\">ear recognition<\/a><\/strong>, which is now being considered by some to be more effective than facial recognition.<\/p>\n<p><strong><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/08\/Russ-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-3178\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/08\/Russ-2-300x200.jpg\" alt=\"biometric identification management and new biometric modalities on the horizon\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/08\/Russ-2-300x200.jpg 300w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/08\/Russ-2.jpg 520w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Russel Cooke<\/strong> is a journalist and business consultant. His fascination with technology often leads him away from his business, and he considers writing about it as a passion. You can follow him on Twitter <strong><a title=\"Russel Cooke on Twitter\" href=\"https:\/\/twitter.com\/RusselCooke2\" target=\"_blank\" rel=\"noopener noreferrer\">@RusselCooke2<\/a><\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following is a guest post written by Russel Cooke. Observe any human being and the attributes that make us<\/p>\n","protected":false},"author":398,"featured_media":16553,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometric identification management","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"The success of biometrics can be partially attributed to it's use by the Department of Defense. What other biometric modalities are on the horizon?","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[39,403,6,481,196,482],"class_list":["post-3169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-biometric","tag-biometric-identification-management","tag-biometrics","tag-department-of-defense","tag-guest-post","tag-russel-cooke"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometric Identification Management and the Department of Defense - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"The success of biometrics can be partially attributed to it&#039;s use by the Department of Defense. What other biometric modalities are on the horizon?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric Identification Management and the Department of Defense - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"The success of biometrics can be partially attributed to it&#039;s use by the Department of Defense. What other biometric modalities are on the horizon?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-21T11:00:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T12:02:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/08\/List-no-33.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\"},\"headline\":\"Biometric Identification Management and the Department of Defense\",\"datePublished\":\"2014-08-21T11:00:16+00:00\",\"dateModified\":\"2025-04-23T12:02:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/\"},\"wordCount\":567,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric\",\"biometric identification management\",\"biometrics\",\"Department of Defense\",\"guest post\",\"Russel Cooke\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/\",\"name\":\"Biometric Identification Management and the Department of Defense - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2014-08-21T11:00:16+00:00\",\"dateModified\":\"2025-04-23T12:02:23+00:00\",\"description\":\"The success of biometrics can be partially attributed to it's use by the Department of Defense. What other biometric modalities are on the horizon?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometric Identification Management and the Department of Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometric Identification Management and the Department of Defense - Digital Transformation of Government Services","description":"The success of biometrics can be partially attributed to it's use by the Department of Defense. What other biometric modalities are on the horizon?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/","og_locale":"en_US","og_type":"article","og_title":"Biometric Identification Management and the Department of Defense - Digital Transformation of Government Services","og_description":"The success of biometrics can be partially attributed to it's use by the Department of Defense. What other biometric modalities are on the horizon?","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2014-08-21T11:00:16+00:00","article_modified_time":"2025-04-23T12:02:23+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/08\/List-no-33.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0"},"headline":"Biometric Identification Management and the Department of Defense","datePublished":"2014-08-21T11:00:16+00:00","dateModified":"2025-04-23T12:02:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/"},"wordCount":567,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric","biometric identification management","biometrics","Department of Defense","guest post","Russel Cooke"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/","name":"Biometric Identification Management and the Department of Defense - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2014-08-21T11:00:16+00:00","dateModified":"2025-04-23T12:02:23+00:00","description":"The success of biometrics can be partially attributed to it's use by the Department of Defense. What other biometric modalities are on the horizon?","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-identification-management-department-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometric Identification Management and the Department of Defense"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Abu Baker Siddique","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3169"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=3169"}],"version-history":[{"count":13,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3169\/revisions"}],"predecessor-version":[{"id":16554,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3169\/revisions\/16554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16553"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=3169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=3169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=3169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}