Government not prepared to deploy new security technology, experts say

Reliable biometric technologies that identify people by their unique physical characteristics are on the market today, but federal agencies aren't taking advantage of them on a wide scale yet, according to industry experts and government officials.

To secure U.S. borders and airports as part of an overall homeland security strategy, numerous agencies, including the Immigration and Naturalization Service, the State Department and the Defense Department have expressed interest in buying devices that scan fingerprints, eyes and facial features to match them against records in databases.

The Defense Department has issued an open call to technology companies and inventors to suggest new counterterrorism technologies, even if the products haven't been manufactured yet. But with its plea, the agency has shown its cards, vendors said.

"It…tells me that they don't have anything. They don't have an answer for this problem," said Jon Clements, a national accounts representative at Stromberg LLC, a Lake Mary, Fla., company that sells fingerprint readers for use in employee time clocks.

The role biometrics would play in a domestic security strategy remains unclear, and the value of such devices to prevent terrorism is questionable. Many doubt whether biometrics would have helped prevent the attacks of Sept. 11, for instance. And steps to deploy biometric devices at border crossings have yielded few results.

Paul Collier, executive director of the Biometric Foundation, which sponsors research into the technology, testified before the Senate Judiciary Subcommittee on Technology, Terrorism and Government Information on Oct. 12 that while the INS has issued 5 million border crossing cards encoded with biometric data to Mexican citizens who make regular trips into the United States, they're virtually useless because the agency hasn't installed the systems to read the cards.

Kimberly Weissman, an INS spokeswoman, confirmed that "the card readers have not been deployed to the ports of entry." Weissman said the agency made a fiscal 2001 budget request for the money to buy the readers "but was denied the funding" by OMB. However, some close to the card reader project have been skeptical about the INS' commitment to the project.

"The use of biometrics in the border entry application process would significantly augment security when compared to current lookout list systems," Collier told the Senate subcommittee. But manufacturers emphasized that a biometric identification scheme only works when a person's information has already been entered into a database so it can be verified against his fingerprint or other identifier. "It's only as good as the initial enrollment," said Clements.

Unless someone was already listed in a government database as a suspect or a convicted criminal, biometrics would give no indication that he should be stopped from entering the country or boarding an aircraft. If foreign visitors enter the United States on valid visas, as the State Department has said was the case with 15 of the 19 Sept. 11 terrorists, "you're just going to have a record that they've come through," said Eric Zidenberg, vice president of Orion Scientific Systems, a Newport Beach, Calif., defense contractor that manufactures intelligence-gathering software used with biometric readers.

If a warning were issued to detain a person using a particular name attached to a unique feature such as a fingerprint, the technology could prevent that person from slipping through security, Zidenberg said, because only one name is attached to a single biological record.

However, manufacturers and officials noted that to accomplish that goal, multiple databases must be tied together so that, for example, the FBI's criminal records could be crosschecked against databases of fingerprints maintained by the INS. Today, that capability isn't in place.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.