Biometrics said vital for combat success

The still-evolving technology takes many forms

In this time of unconventional warfare, using biometric technologies is essential to combat operations, according to several experts who spoke today at an event in Washington.

“IDs can be faked and bad guys can lie. You can’t rely on physical attributes to identify bad guys in the field and protect warfighters,” said Army Col. Ted Jennings, biometrics program coordinator for the Defense Department's Program Executive Office–Enterprise Information Systems. The Bethesda, Md., chapter of AFCEA hosted the event. 

Jennings said using biometrics gives the military the ability to identify the “good guys” in the local population of a combat theater so they can work and conduct business. The technology also aids with interrogation, detainee management, base access and identifying persons of interest, he said.

Navy Capt. Gail Bovy, special assistant for antiterrorism at the Navy Department, said the Homeland Security Department’s US-VISIT immigration and border management program serves as a model for real-time biometric identification, tracking and accounting capabilities. She highlighted the need for physical access control.

“We’re in the infancy of biometrics,” Bovy said. “There’s no road map yet.”

As the science continues to evolve, so do the needs and demands for what biometrics can achieve. Army Biometrics Task Force Deputy Director Lisa Swan said that as her agency develops the next generation of a biometric database, it will include the participation of everyone in DOD who's involved with biometrics, including DOD’s numerous sub-organizations that present a challenge for departmentwide coordination.

To achieve the goal, Swan’s office is operating on an enterprise strategy that spans military operations, business functions, institutionalization and unity of effort.

“Data sharing is the future, and that’s where biometrics is going. That’s where it will be most useful,” Swan said.

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Shutterstock image (by wk1003mike): cloud system fracture.

    Does the IRS have a cloud strategy?

    Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

  • Shutterstock image: illuminated connections between devices.

    Who won what in EIS

    The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

  • Wikimedia Image: U.S. Cyber Command logo.

    Trump elevates CyberCom to combatant command status

    The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

  • Photo credit: John Roman Images / Shutterstock.com

    Verizon plans FirstNet rival

    Verizon says it will carve a dedicated network out of its extensive national 4G LTE network for first responders, in competition with FirstNet.

  • AI concept art

    Can AI tools replace feds?

    The Heritage Foundation is recommending that hundreds of thousands of federal jobs be replaced by automation as part of a larger government reorganization strategy.

  • DOD Common Access Cards

    DOD pushes toward CAC replacement

    Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group