Networking: Fingerprints of terrorists

Feb 27, 2006

A Muslim terrorist places a bomb inside a mosque in Iraq. The bomb detonates, obliterating most of the building. But American military personnel, sifting through the debris, just moments later, find a doorknob with the scoundrel's fingerprints on it, from a door he opened to enter the facility. The prints are collected with digital technology, and sent via a wireless network, locally, in Iraq, and then across the globe via satellite to the Army's Biometric Fusion Center in Clarksburg, W. Va., near Washington, D.C.

There, Army agents, working with FBI counterparts, scan the prints, and compare them with a database of known terrorists, looking to determine if the killer was behind other bombings in Iraq, Afghanistan, or elsewhere in the world, experts tell United Press International's Networking.

"The benefits of biometrics are phenomenal," said Daniel Munyan, chief scientist at CSC's global security services identity labs, which has worked with several government agencies on biometric projects, and is headquartered in El Segundo, Calif.

Once the data is in hand, the military uses it for a number of apps. Just over a year ago, in December, 2004, terrorists struck a U.S. base in Mosul, Iraq, killing 14 soldiers. The attack was apparently perpetrated by a suicide bomber who came onto the base in the guise of an Iraqi civilian contractor for the Pentagon. To stop that kind of offensive, the Department of Defense is making foreigners who apply for jobs as contractors in Iraq submit to a biometric security scan. Their fingerprints are checked against the government's databases of known terrorists -- before they are allowed to come on board. Then, they are issued a biometric smart card for ID. Every time they try to enter an American base, the card, which includes images of their fingerprints, is scanned against a database, and against their actual fingerprints, taken again, at that time, experts tell Networking.

"Certain forms are virtually impossible to fake," said Munyan.

The biggest issues for the military to deal with, when it comes to networked, biometric security, are gaining the cooperation of the job applicant, overcoming cultural differences and dealing with any questions of privacy rights, Munyan said.

There are other obstacles for the government, however, when it comes to catching terrorists in the field. "Fingerprinting and biometric tools might allow an intelligence agency to build a database of suspected terrorists, but the challenge of linking fingerprints to names and faces and building a model of the network would remain," said Bret Johnson, director of the homeland security and entrepreneurship center at Northwestern University, Evanston, Ill.

Some technology developers are working on that and related problems now, however. The developer, Identix Inc., is using a mobile identification system, which employs both fingerprint and facial identification technology. The system uses a patented, hand-held, wireless device. It can be used in the field by military personnel who capture terrorists in the field, scan their fingerprints and snap a picture of their faces, and "know who they are dealing with on a real-time basis," said Frances Zelazny, director of corporate communications at Identix, based in Minnetonka, Minn.

The thorniest problem for that system is the availability of reliable, in-theater wireless communications networks. So local database storage is relied on if there is a wireless network shut-down, she said.

FBI personnel have been using computing technology in Afghanistan and at Guantanamo Bay, Cuba, as well as in Iraq, though at the beginning of the war on terror, early in the Bush administration, they were relying on old-fashioned paper and ink fingerprinting when processing terrorist suspects, according to the developer Cross Match, based in Palm Beach Gardens, Fla.

Now, if a terrorist posing as a job applicant comes calling, he will be nabbed if his fingerprints were found on exploded bombs, or at the sites of terrorist atrocities around the world.

Copyright 2006 by United Press International

Explore further: US official: Auto safety agency under review

add to favorites email to friend print save as pdf

Related Stories

US official: Auto safety agency under review

7 hours ago

Transportation officials are reviewing the "safety culture" of the U.S. agency that oversees auto recalls, a senior Obama administration official said Friday. The National Highway Traffic Safety Administration has been criticized ...

Out-of-patience investors sell off Amazon

8 hours ago

Amazon has long acted like an ideal customer on its own website: a freewheeling big spender with no worries about balancing a checkbook. Investors confident in founder and CEO Jeff Bezos' invest-and-expand ...

Ebola.com domain sold for big payout

8 hours ago

The owners of the website Ebola.com have scored a big payday with the outbreak of the epidemic, selling the domain for more than $200,000 in cash and stock.

Recommended for you

Magic Leap moves beyond older lines of VR

13 hours ago

Two messages from Magic Leap: Most of us know that a world with dragons and unicorns, elves and fairies is just a better world. The other message: Technology can be mindboggingly awesome. When the two ...

Team infuses science into 'Minecraft' modification

14 hours ago

The 3-D world of the popular "Minecraft" video game just became more entertaining, perilous and educational, thanks to a comprehensive code modification kit, "Polycraft World," created by University of Texas at Dallas professors, ...

States ascend into the cloud

14 hours ago

Seven years ago, the state of Delaware started moving computer servers out of closets and from under workers' desks to create a consolidated data center and a virtual computing climate.

User comments : 0