https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Call Center/Command


Biometrics  fact or science fiction?

Biometrics fact or science fiction?

Merging wireless devices with this technology is creating reliability, legal roadblocks
  • Written by Urgent Communications Administrator
  • 1st May 2007

James Wayman was 30 years old when he accepted a Department of Mathematics faculty position at the U.S. Naval Postgraduate School in 1981. As a faculty member, he mentored students, built algorithms, tested speaker-recognition techniques and theorized about a futuristic field that eventually emerged as biometrics.

Wayman now is the director of biometric identification research at the San Jose, Calif.-based U.S. National Biometric Test Center, which advises the U.S. and U.K. governments on the use of biometric identification devices. He also heads an international delegation focused on developing a single vocabulary for researchers who build large-scale, interoperable, government-sponsored systems. Such systems unite speaker recognition, fingerprinting recognition, hand-geometry recognition and facial recognition.

“These fields are united under the definition that biometrics is the automated recognition of individuals based on their biological and behavioral characteristics,” he said.

Fingerprinting systems that emerged from the forensic community are the most acceptable biometric technologies in terms of court admissibility and standardization. Indeed, fingerprinting is the most commonly used biometrics system by public-safety agencies.

In Harris County, Texas, population 3.7 million, sheriff’s deputies use a wireless, hand-held device to capture fingerprint data, said Pete Schroedter, manager of the Harris County Sheriff’s Department’s automated fingerprint identification system (AFIS). He said 47 hand-helds are deployed currently, and he expects to distribute another 30 to officers who serve warrants, hunt fugitives and gather criminal intelligence data.

A Department of Homeland Security grant worth approximately $1.2 million paid for the system, which includes Motorola’s Printrak Biometric Identification back-end solution, its biometric software package and Datastrip’s hand-held device. The device wirelessly transmits encrypted fingerprints an officer obtains while in the field to a centralized criminal database. The database then uses algorithms to search for a match via a completely computer-automated process. If there is a match, the device displays the suspect’s photo and his or her criminal record. A commercial cellular link supports the data transfer.

Schroedter said the automated system increases the efficiency of fingerprint processing and provides real-time data to officers in the field. However, it’s limited to only one search at a time, which created a jammed pipeline effect on his network. Because the department used its primary network to handle the AFIS system’s approximately 700 daily transactions, responses to mobile devices took anywhere from 3 to 5 minutes.

“I can manage the system by priorities,” Schroedter said. “But at what point do I make the mobile systems a higher priority? And if I do that, than am I going to have a backup of requests at the inmate processing center or from people who are trying to file charges?”

To solve the problem, a separate back-end system now supports mobile devices. The system holds roughly 1.5 million records and touts a 1-minute response time from the point where an officer records a fingerprint to when he or she receives identification.

Fingerprinting is the most mature biometric technology, and more devices are integrating it into its systems, said Nick Orlans, principle engineer of biometrics and identity management for the Information Security Center at MITRE — a not-for-profit organization that manages federally funded research for U.S. government agencies. Orlans’ current work focuses on developing computations that decrease the cost and increase the speed and throughput of large fingerprint systems, such as a billion-person database.

However, it has been tough to find a reasonable price point.

“It’s a dollar per match,” he said.

In addition, fingerprinting devices tested in the lab often do not perform as well in the field, failing the reliability test, Orlans said. In an unconstrained environment, Mother Nature controls how digital prints are captured. For example, when devices are used on a cold morning, a warm finger generates halos around the image and makes it unusable.

Still, public-safety agencies are investing in not only fingerprinting devices but also those devices that can capture a suspect’s image. Dan Gomez, operations officer in charge of the Los Angeles Police Department’s (LAPD) tactical technology unit, said his department is in the beginning stages of procuring wireless, facial-recognition devices. He hopes the process is complete by month’s end so he can deploy at least 300 devices citywide before 2008.

Facial-recognition technology in reality is a far cry from its portrayal in Hollywood movies like “Enemy of the State,” where the characters’ images are captured on a convenience-store surveillance camera and an automated computer system displays their identities — and rap sheets — to National Security Agency agents’ hand-held devices.

“That’s science fiction,” Wayman said.

Instead, the LAPD’s system acts more like an electronic mug shot book. Officers with probable cause would use the device to scan a suspect’s face from within a few feet. The video data is compressed and then transmitted to a centralized database. Possible face matches appear on the hand-held, where the digital photograph and the on-file mug shot display side by side. The officer must decide whether it is truly a match.

“If [officers] confirm the match, the data is stored, the perpetrator processed and an arrest is made,” Gomez said. “If the officer reports it is not a match, all the data is deleted from the system. There is just an electronic copy that states a transaction occurred, but no data was stored related to the picture.”

Researchers are determined to bring facial-recognition to the next level. At the NSA, Wayman developed a technology that taught computers to locate people in scenes. Tracking faces and objects — and deciphering between the two — is the first step to next-generation, automated facial recognition, he said.

Henry Schneiderman, CEO of Pittsburgh Pattern Recognition, began researching ways to improve facial-recognition technology in the mid-1990s. He was a student and then faculty member at Carnegie Mellon University’s Robotics Institute under the advisement of Takeo Kanade. According to Kanade, the officer does all the work in facial detection — as evidenced by the LAPD deployment — but that will change as the technology evolves.

“Imagine you have a camera looking at the parking lot, and it must do what the officer did — take the right picture, of the right person, of the right thing — which is the face — at the right time,” Kanade said. “That’s what I call face tracking.”

Pittsburgh Pattern Recognition now licenses the technology from Carnegie Mellon and primarily sells it to government agencies. Its software development kit finds faces in photographs and, in video surveillance footage, tracks subjects’ movements throughout each frame.

An undisclosed U.S. government agency uses the software kit to record all the daily news broadcasts worldwide, Schneiderman said. Agents don’t have the time to sort through video files to determine whether there is an event of significance — a military uprising or an earthquake. Therefore, the software filters the video and isolates human faces and objects.

“It doesn’t yet identify those faces,” Schneiderman said. “It just says, ‘That’s a human face; it’s moving in that direction.’”

One looming issue is whether data gathered on fingerprint or facial-recognition systems is reliable enough to meet the Daubert criteria. The Daubert criteria stems from the 1993 U.S. Supreme Court case Daubert v. Merrell Dow Pharmaceuticals Inc., which sought to clarify how courts used expert testimony and set evidentiary science standards. The decision instructed judges to examine the underlying scientific method they believe to be relevant and reliable.

“Fingerprinting is admissible as scientific, but … that’s our oldest biometric method, and we are just now getting to the point where [the scientific community] agrees that it is indeed scientific,” Wayman said. “[T]hese other technologies are not even close. We are no way able to meet the Daubert criteria.”

Harris County’s Schroedter sees facial recognition as a tough sell in the courtroom. As a latent print examiner for 27 years, he took fingerprints found at a crime scene and compared them to a plaintiff to prove a biometric match.

“The defendant in court has the right to cross-examine the expert witness,” he said. “If the computer is making the match, how are you going to cross-examine that computer? Then, if that computer messes up one time, everything is for naught. All these other people have cases for appeal.”

Wayman said these are all examples of how far the technology needs to go before it meets scientific reliability and legal standards. More important, the scientific community must realize these systems are more than just algorithms and computations.

“We don’t understand enough about controlling people’s behavior in order to really make these systems work,” he said. “In other words, we try to write all this computer code and forget that the human is more than fifty percent of the equation.”

Tags: Call Center/Command content

Most Recent


  • Public-safety coalition renews efforts to secure federal NG911 funding
    A coalition of public-safety associations today reiterated its support for federal legislation that would provide the funding needed to pay for 911 centers to migrate from legacy technologies to an IP-based next-generation 911 (NG911) platform that is designed to support multimedia communications, as well as traditional voice calls. Representatives of the Public Safety Next Generation […]
  • Biometrics  fact or science fiction?
    Newscan: Cyberattacks on DoE national labs draw lawmaker scrutiny
    Web Roundup Items from other news organizations Cyberattacks on DoE national labs draw lawmaker scrutiny Blinken postpones trip to Beijing after Chinese spy balloon spotted over U.S., officials say To protect satellites, secure your networks, chief of space ops says Ransomware offlines Arizona’s largest school district Mending the fabric: FCC says to file broadband-location challenges […]
  • The shine begins to wear off 5G private wireless
    Verizon had high hopes for private wireless networking. The company had predicted that by now it would be well on its way to making billions of dollars from the sale of custom 4G and 5G networks dedicated exclusively to its enterprise customers. Indeed, during 2021 Verizon execs pegged the total addressable market for private wireless at around […]
  • Phishers trick Microsoft into granting them 'verified' Cloud Partner status
    Late last year, a group of threat actors managed to obtain “verified publisher” status through the Microsoft Cloud Partner Program (MCPP). This allowed them to surpass levels of brand impersonation ordinarily seen in phishing campaigns, as they distributed malicious applications bolstered by a verified blue badge only ever given to trusted vendors and service providers in […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Open-source tools for the IoT ecosystem
  • New Orleans-area 911 center inks multiyear APEX deal with Carbyne to replace call-handling system
  • Biometrics  fact or science fiction?
    Newscan: Feds recover millions from pipeline ransom hackers, hint at U.S. Internet tactic
  • Cyber is the new Cold War, and AI is the arms race

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Public-safety coalition renews efforts to secure federal NG911 funding dlvr.it/ShwGfn

4th February 2023
UrgentComm

Newscan: Cyberattacks on DoE national labs draw lawmaker scrutiny dlvr.it/Shvpw3

3rd February 2023
UrgentComm

The shine begins to wear off 5G private wireless dlvr.it/Shth0P

3rd February 2023
UrgentComm

Phishers trick Microsoft into granting them ‘verified’ Cloud Partner status dlvr.it/Shqngn

2nd February 2023
UrgentComm

Shapeshifting robot can morph from a liquid to a solid dlvr.it/Shqk9K

2nd February 2023
UrgentComm

Automakers against stampede to BEV dominance dlvr.it/ShpX08

2nd February 2023
UrgentComm

FCC nominee Gigi Sohn headed for third Senate hearing dlvr.it/ShpDcZ

1st February 2023
UrgentComm

Sign up to learn how to successfully manage your Motorola ASTRO® 25 System: spr.ly/60143j8fp https://t.co/XcxiUwzN27

1st February 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.