Biometrics said vital for combat success

The still-evolving technology takes many forms

In this time of unconventional warfare, using biometric technologies is essential to combat operations, according to several experts who spoke today at an event in Washington.

“IDs can be faked and bad guys can lie. You can’t rely on physical attributes to identify bad guys in the field and protect warfighters,” said Army Col. Ted Jennings, biometrics program coordinator for the Defense Department's Program Executive Office–Enterprise Information Systems. The Bethesda, Md., chapter of AFCEA hosted the event. 

Jennings said using biometrics gives the military the ability to identify the “good guys” in the local population of a combat theater so they can work and conduct business. The technology also aids with interrogation, detainee management, base access and identifying persons of interest, he said.

Navy Capt. Gail Bovy, special assistant for antiterrorism at the Navy Department, said the Homeland Security Department’s US-VISIT immigration and border management program serves as a model for real-time biometric identification, tracking and accounting capabilities. She highlighted the need for physical access control.

“We’re in the infancy of biometrics,” Bovy said. “There’s no road map yet.”

As the science continues to evolve, so do the needs and demands for what biometrics can achieve. Army Biometrics Task Force Deputy Director Lisa Swan said that as her agency develops the next generation of a biometric database, it will include the participation of everyone in DOD who's involved with biometrics, including DOD’s numerous sub-organizations that present a challenge for departmentwide coordination.

To achieve the goal, Swan’s office is operating on an enterprise strategy that spans military operations, business functions, institutionalization and unity of effort.

“Data sharing is the future, and that’s where biometrics is going. That’s where it will be most useful,” Swan said.

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group