Human Factors/Behavioral Sciences Division



Similar documents
Human Factors/Behavioral Sciences Division

U.S. Coast Guard Biometric Enabled Identity Program. Provide consistent and repeatable maritime safety and security throughout our nation.

Enterprise Biometric Identity Services at DHS: OBIM Update and Plans AFCEA Global Identity Summit 2014 Tampa, Florida September 15-18, 2014

DHS Rapid and Low-cost DNA Biometrics

Department of Homeland Security

Statement for the Record. The Honorable Janet Napolitano. Secretary United States Department of Homeland Security

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

U.S. Department of Homeland Security Federal Program Inventory

Department of Homeland Security

Department of Homeland Security Office of Inspector General

DHS. CMSI Webinar Series

OFFICE OF THE GENERAL COUNSEL HONORS ATTORNEY PROGRAM AND SUMMER LAW INTERN PROGRAM for 2011

El Camino College Homeland Security Spring 2016 Courses

Deception Detection Techniques for Rapid Screening

OFFICE OF INSPECTOR GENERAL DEPARTMENT OF HOMELAND SECURITY

The Leading Provider of Identity Solutions and Services in the U.S.

CyberSkills Management Support Initiative

How To Buy A House At Homeland Security

Office of Inspector General

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C

Evaluation of DHS' Information Security Program for Fiscal Year 2015

Integrated Security Management System (ISMS)

Optical Memory Cards in Federal Government

IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics

Operational and Policy Considerations. Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA

Office of Biometric Identity Management Expenditure Plan

High-Priority Technology Needs. May Version 3.0

SecurityManager. Enterprise Personnel & Physical Security Case Management Solution for Federal Agencies

Software Systems Consultants Inc. IT Solutions & Staffing Services

Missouri Department of Natural Resources Public Drinking Water Branch or (573)

Future Years Homeland Security Program (FYHSP)

NEBRASKA STATE HOMELAND SECURITY STRATEGY

United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)

SECURITY BIOMETRICS PDF

Department of Homeland Security

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Department of Homeland Security Office of Inspector General. DHS' Progress in Disaster Recovery Planning for Information Systems

Rising to the Challenge

May For other information please contact:

Introduction to NICE Cybersecurity Workforce Framework

For Official Use Only (FOUO)

STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

U.S. Department of Homeland Security STATEMENT

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Agency Information Collection Activities: Proposed Collection; Comment Request; AGENCY: Federal Emergency Management Agency, DHS.

Department of Homeland Security Strategic Plan

Automated Biometric Identification System (IDENT)

Threat and Hazard Identification and Risk Assessment

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Merchant Mariner Licensing and Documentation System

Overview of Homeland Security Funding 1999 to Present National Incident Management System Mandates and Training Requirements

Examples of Large Scale Biometrics Systems:

Provide access control with innovative solutions from IBM.

United States Coast Guard Cyber Command. Achieving Cyber Security Together. Homeland Security

Audit of Security Controls for DHS Information Technology Systems at San Francisco International Airport

General Services Administration (GSA) DHS Headquarters Consolidation at St Elizabeths Campus. PROJECT OVERVIEW By: Shapour Ebadi

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Department of Homeland Security

Evaluation of DHS' Information Security Program for Fiscal Year 2014

Performance and Accountability Report

Fact Sheet August 22, 2011

DEPARTMENT OF HOMELAND SECURITY APPROPRIATIONS FOR FISCAL YEAR 2011

Department of Homeland Security

STATEMENT OF J. RICHARD BERMAN ASSISTANT INSPECTOR GENERAL FOR AUDITS OFFICE OF INSPECTOR GENERAL U. S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

NICE Cybersecurity Workforce Framework Tutorial

Accurate Reporting and Oversight Needed to Help Manage DHS' Warehouse Portfolio

GAO HOMELAND SECURITY. Strategic Solution for US-VISIT Program Needs to Be Better Defined, Justified, and Coordinated

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Enforcement Integrated Database (EID)

Alien Criminal Response Information Management System (ACRIMe) April 22, 2010

HOMELAND SECURITY ACQUISITIONS

TSA and the SpOT Program

GAO HOMELAND SECURITY. Contract Management and Oversight for Visitor and Immigrant Status Program Need to Be Strengthened

Biometrics and Cyber Security

MORPHO CRIMINAL JUSTICE SUITE

Homeland Security Major

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

National Training and Simulation Association. Department of Homeland Security. Training 2015

2 Gabi Siboni, 1 Senior Research Fellow and Director,

DHS' Oversight of Its Workforce Training Needs Improvement

Our security philosophy. Our team of experts

CBO. Federal Funding for Homeland Security: An Update. What Is Homeland Security?

SECURITY SOLUTIONS BANKING AND FINANCE

FEDERAL CLOUD COMPUTING SUMMIT

National Incident Management System (NIMS) Communications and Information Management Standards

Department of Homeland Security Office of Inspector General. Stronger Security Controls Needed on Active Directory Systems

How To Write A Book On Risk Management

Reliable, Repeatable, Measurable, Affordable

Product. Opencheck A Comprehensive Check Payments Solution to Meet the Demands of Financial Institutions in Today s Automated Environment

Department of Homeland Security DHS Directives System Directive Number: Revision Number: 00 Issue Date: 07/25/2008 SAFETY AND HEALTH PROGRAMS

W H I T E P A P E R. Hub and Spoke Approach to Computer-Aided Dispatch

Office of Inspector General

Why Nobody Cares: How Investment in Data Visualization and Open Access Can Reinvigorate Dying Programs

Effective Information Sharing and Analysis Process

MEMORANDUM FOR FINANCE COMMITTEE MEMBERS. From: Senate Finance Committee Staff. Date: May 12, Alan Bersin Nomination

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

Transcription:

Human Factors/Behavioral Sciences Division DHS Technology Successes and Initiatives Biometrics Consortium Conference September 21, 2010 Sharla Rausch, Ph.D. Division Director Human Factors/Behavioral Sciences Division Science and Technology Directorate

Human Factors/Behavioral Sciences Division Vision: A safer, more resilient nation that incorporates the human dimension into homeland security analysis, operations and policy development Mission: We will advance national security by developing and applying the social, behavioral, and physical sciences to improve identification and analysis of threats, to enhance societal resilience, and to integrate human capabilities into the development of technology Customers: TSA, US-VISIT, USCIS, ICE, SCO, USSS, FEMA, OI&A, USCG, State & Local, S&T Divisions 2

HFD Thrust Areas & Programs Comprised of 3 primary thrust areas and 7 major programs Social-Behavioral Threat Analysis Motivation and Intent Suspicious Behavior Detection Community Preparedness & Resilience Personal Identification Systems Biometrics Credentialing Human Technology Integration Human Systems Research & Engineering Technology Acceptance & Integration Know our enemies, understand ourselves; put the human in the equation. 3

S&T: Suspicious Behavior Detection Identify Unknown Threats Goal: Improve screening by providing science-based capability to identify unknown threats indicated by deceptive and suspicious behavior Operational Needs Addressed: Real-time, non-invasive detection of deception or hostile-/mal-intent 4

S&T: Suspicious Behavior Detection Identify Unknown Threats Approach: Project Hostile Intent derives, validates, and automates non-invasive detection of indicators of suspicious behavior Predictive Screening derives, validates, and automates the detection of the observable indicators of suicide bombers Future Attribute Screening Technology (FAST) provides semi-automated screening using non-contact sensors to detect behavioral and physiological cues associated with malintent in near-real time Insider Threat develops technologies and methods for identifying insider threats 5

S&T: Personal Identification Systems Identify Known Threats Goal: Improve screening by providing science-based capability to identify known threats through accurate, timely, and easy-to-use biometric identification and credentialing validation tools Operational Needs Addressed: Real-time, robust, highly accurate verification of individual s identity High-speed, high-fidelity ergonomic fingerprint capture device 6

S&T: Personal Identification Systems Identify Known Threats... A Robust Biometric Toolbox Approach: Multi-Modal Biometrics develops technologies, standards, and tools to improve DHS screening processes and accurately identify known individuals Mobile Biometrics develops multi-modal mobile collection system to improve identification accuracy throughout the DHS and First Responder mission space Rapid DNA develops a rapid, low-cost system to prevent fraud in immigration and overseas adoptions Biometric Detector develops technologies for efficient, high-quality, contactless acquisition of fingerprints 7

S&T: Personal Identification Systems Identify Known Threats... In Multiple Operational Settings DHS has unique biometric challenges for screening operations 8

S&T: Personal Identification Systems Identify Known Threats... A Roadmap to Transition 9

S&T: Personal Identification Systems Identify Known Threats... Anywhere Mobile Biometrics Firefighters at hazardous materials situation Customs and Border Protection United States/Canadian Border State & Local Law Enforcement Traffic Stop Immigration and Customs Enforcement - California U.S. Coast Guard - Mona Pass at sea interdiction of Yola FEMA Earthquake Assistance Southern California Customs and Border Protection Pima County, Arizona 10

S&T: Personal Identification Systems Identify Known Threats... Non-Invasively, Accurately, and Safely Higher quality fingerprint collection even with dry, oily, and/or damaged fingerprints Less intrusive fingerprint collection process with reduced risk of communicable disease transfer 12

S&T: Personal Identification Systems Identify Known Threats... Through Kinship Analysis Rapid DNA-based Screening Technology: To verify family relationships for Asylum or immigration Overseas adoption Mass-casualty identification To reduce DNA screening for kinship from Weeks to under an hour $5,000 to $100 per sample External labs to in-house integrated hardware 13

S&T: Human Technology Integration Enhance Human Performance and Public Acceptance Goal: Enhance safety, effectiveness, and usability of technology by systematically incorporating user and pubic input Operational Needs Addressed: Address human performance in the design, development, test and evaluation of DHS systems and technologies Identify potential public acceptance issues 14

S&T: Human Technology Integration Enhance Human Performance and Public Acceptance Approach: Human Systems Research is designed to maximize and feed development of technologies for enhanced human performance Human Systems Engineering optimizes human performance and safety in the field and ensures basic human capabilities and limitations are considered throughout product development lifecycle Community Perceptions of Technology (CPT) Panels provides insight into development and adoption of application specific, publicly acceptable technologies and processes 15