Biometrics said vital for combat success

The still-evolving technology takes many forms

In this time of unconventional warfare, using biometric technologies is essential to combat operations, according to several experts who spoke today at an event in Washington.

“IDs can be faked and bad guys can lie. You can’t rely on physical attributes to identify bad guys in the field and protect warfighters,” said Army Col. Ted Jennings, biometrics program coordinator for the Defense Department's Program Executive Office–Enterprise Information Systems. The Bethesda, Md., chapter of AFCEA hosted the event. 

Jennings said using biometrics gives the military the ability to identify the “good guys” in the local population of a combat theater so they can work and conduct business. The technology also aids with interrogation, detainee management, base access and identifying persons of interest, he said.

Navy Capt. Gail Bovy, special assistant for antiterrorism at the Navy Department, said the Homeland Security Department’s US-VISIT immigration and border management program serves as a model for real-time biometric identification, tracking and accounting capabilities. She highlighted the need for physical access control.

“We’re in the infancy of biometrics,” Bovy said. “There’s no road map yet.”

As the science continues to evolve, so do the needs and demands for what biometrics can achieve. Army Biometrics Task Force Deputy Director Lisa Swan said that as her agency develops the next generation of a biometric database, it will include the participation of everyone in DOD who's involved with biometrics, including DOD’s numerous sub-organizations that present a challenge for departmentwide coordination.

To achieve the goal, Swan’s office is operating on an enterprise strategy that spans military operations, business functions, institutionalization and unity of effort.

“Data sharing is the future, and that’s where biometrics is going. That’s where it will be most useful,” Swan said.

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Shutterstock image: looking for code.

    How DOD embraced bug bounties -- and how your agency can, too

    Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.

  • Shutterstock image: cyber defense.

    Why PPD-41 is evolutionary, not revolutionary

    Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.

  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group