Defense

How the Army is advancing facial recognition technology

people and data (Lightspring/Shutterstock.com) 

The Army's latest advancement in facial and voice recognition tech uses a mix of web-based biometrics tools to help vet identities for overseas intelligence officers looking for suspicious actors—and it's been live for a year.

The Army's C5ISR Center has been implementing two face and voice recognition programs— Video Identification, Collection and Exploitation (VICE) and Voice Identity Biometric Exploitation Services (VIBES)—that U.S. Central Command and the Combined Joint Task Force - Operation Inherent Resolve use to identify people who may pose a threat to the DOD's missions.

"The Army employs biometrics systems in operations to support force protection, physical access needs, other operations but largely it's been fingerprint based," Keith Riser, a computer scientist for the Intelligence and Information Warfare Directorate at the C5ISR Center in Aberdeen Proving Grounds, Md., told FCW.

The system uses a modular architecture that is then integrated into a user interface for analysts, who then take data and match that against data from DOD releasable Biometrically-Enabled Watchlists or Automated Biometrics Identification System.

In the past year, VICE has been able to create about 25,000 biometric records, process hundreds of watchlist matches, facially template thousands of individuals, and voice-print hundreds of "unpictured, unvoiced ISIS fighters" and other actors, Riser said.

CENTCOM has been able to spot "a suspicious person of interest at a training event who was filming with their cell phone" and determine that an individual had a previous biometric enrollment and nominated them to be put on a watchlist and denied access to the event, Riser said.

Another example, involved identifying and reporting a senior Iraqi military officer who had been suspected of terrorism. The C5ISR Center and the system operators "don't take any disposition on that but once we make that linkage we're able to have that person be nominated to watchlists and whatever action needs to be taken," Riser said.

Since July 2018, CENTCOM, which operates in North Africa, the Middle East, and Central and South Asia, has been using the tech to wrangle the "growing database" of individuals in areas of operation using publicly available information. Some of that media comes from internet sources, such as publicly facing websites, and "other forensic media that's been collected" he said.

"I don't want to make this sound like we're going out there and scraping the internet because that's a huge problem in its own right. That's not really what we are. We're a face-matching system, providing the analyst a way to match faces against media that they have," Riser said. "For the most part, it's something that they've had and want to be able to say 'who is this person' or they are out there in the field. You might not always be able to [collect] a fingerprint but this way we can check against the face."

But the rise of deep fakes does raise concerns for the Army. "As we're collecting data, the potential for those images that we received to be a deep fake is becoming more and more of a possibility," Riser said. "In some of our analysis, it's something that we've identified that we want to pursue more. Right now, when we have data against the watchlist we have pretty good confidence that it's not."

In the next two years or so, C5ISR wants to make VICE/VIBES a program of record. Decisions that determine whether that will happen will begin to take place in early 2020, Riser said.

The present focus, however, is on improving the Biometric Examination Services workflow that "allows analysts to have a more accurate first pass on facial recognition," he said.

Riser said he personally thinks the systems' "capabilities will be able to persist and grow throughout the DOD and agency" and wants to improve them, clean up data, and make it more shareable with other DOD systems.

"We're just focusing on trying to make sure that any systems in DOD that need access to this information can obtain it," he said.

About the Author

Lauren C. Williams is a staff writer at FCW covering defense and cybersecurity.

Prior to joining FCW, Williams was the tech reporter for ThinkProgress, where she covered everything from internet culture to national security issues. In past positions, Williams covered health care, politics and crime for various publications, including The Seattle Times.

Williams graduated with a master's in journalism from the University of Maryland, College Park and a bachelor's in dietetics from the University of Delaware. She can be contacted at lwilliams@fcw.com, or follow her on Twitter @lalaurenista.

Click here for previous articles by Wiliams.


Featured

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.