Presentation is loading. Please wait.

Presentation is loading. Please wait.

EUCOM Identity Operations:

Similar presentations


Presentation on theme: "EUCOM Identity Operations:"— Presentation transcript:

1 EUCOM Identity Operations:
UNCLASSIFIED EUCOM Identity Operations: Identifying the Threat Network of the Sea UNCLASSIFIED

2

3 UNCLASSIFIED BIOMETRICS DEFINED: A measurable PHYSIOLOGICAL or BEHAVIORAL characteristic unique to an individual 3 UNCLASSIFIED

4 UNCLASSIFIED UNCLASSIFIED

5 Names Based Databases For Nefarious Actors Are Not Adequate
UNCLASSIFIED Case Study. Tucson Police Department, Arizona 55.5% of suspects had erroneous id information 30% intentional deception 42% various types of unintentional errors ~ Discovering Identity Problems: A Case Study, grant funded by “COPLINK Center: Social Network Analysis and Identity Deception Detection for Law Enforcement and Homeland Security,” # , NSF, Digital Government Program UNCLASSIFIED

6 Joint Operational Environment until 2025
The Threat Network At Sea Is Tied to the Threat Network on Land UNCLASSIFIED Joint Operational Environment until 2025 Some of the world’s most important current migration routes SOURCES: National Public Radio The Economist UNCLASSIFIED

7 Threat Networks Have Many Types Of Members - Aliases
UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED

8 Old Science – New Technology
UNCLASSIFIED UNCLASSIFIED Drawings & Verbal Descriptions Photographs Fingerprint Identification Internet 21st Century 20th Century 17th Century UNCLASSIFIED UNCLASSIFIED 8

9 Identity Operations Around the World
UNCLASSIFIED UNCLASSIFIED United Nations (UN) & European Commission’s Humanitarian Office (ECHO) 4 Million Dollar Biometric data base for refugees. International Security Assistance Force (ISAF) Interpol, Europol, and Local Law Enforcement Private Industry India: Government intends to biometrically enroll everyone, and use it for government services, banking, and welfare benefits. spending reaches the right people, and will allow hundreds of millions of poor Indians to access services like banking for the first time” UNCLASSIFIED UNCLASSIFIED

10 Identity Operations Process
UNCLASSIFIED UNCLASSIFIED Collect Store & Match Analyze Action UNCLASSIFIED UNCLASSIFIED

11 Identity Operations Collection (3 Types)
UNCLASSIFIED UNCLASSIFIED Live Collection Forensic Collection Historical Records / Databases / Sharing Media reference UNCLASS: UNCLASSIFIED UNCLASSIFIED

12 Collecting During MIO UNCLASSIFIED UNCLASSIFIED UNCLASSIFIED

13 Biometric Enabled Watchlist
UNCLASSIFIED Sample WL Tiers / Categories Tier 1 – Detain Tier 2 - Question Tier 3 – Assess Tier 4 – Do not hire / no access Tier 5 – Deny Access Tier 6 - Track

14 Sharing Biometrics Example Data Sources: Foreign Partner Military
UNCLASSIFIED UNCLASSIFIED Example Data Sources: Foreign Partner Military Foreign Law Enforcement US Interagency Europol Interpol EU UN Other UNCLASSIFIED UNCLASSIFIED

15 Authorized Store, Match, Sharing
Caveats to Sharing UNCLASSIFIED UNCLASSIFIED Differing Data Types Shared Example Caveats Distribution constraints Storage Time Constraints Watchlist Authorized Store, Match, Sharing Biometric Data SIG IZ Case Numbers Date of Birth National Number Passport Number Biographic Data UNCLASSIFIED UNCLASSIFIED

16 Success At Sea Insider Threat Prosecution Watchlist Hit

17 Status of NATO Biometrics
UNCLASSIFIED UNCLASSIFIED AGREEMENTS NATO BIOMETRIC PLAN DEVELOPMENT NATO Framework Concept Doctrine Development Contingency Plan Operation Plan Nation SOP / ROE UNCLASSIFIED UNCLASSIFIED

18 Questions ? Points of Contact EUCOM J2S-B Office
UNCLASSIFIED UNCLASSIFIED Questions ? Points of Contact EUCOM J2S-B Office Commercial Tel: UNCLASSIFIED UNCLASSIFIED


Download ppt "EUCOM Identity Operations:"

Similar presentations


Ads by Google