Networking: Fingerprints of terrorists

Feb 27, 2006

A Muslim terrorist places a bomb inside a mosque in Iraq. The bomb detonates, obliterating most of the building. But American military personnel, sifting through the debris, just moments later, find a doorknob with the scoundrel's fingerprints on it, from a door he opened to enter the facility. The prints are collected with digital technology, and sent via a wireless network, locally, in Iraq, and then across the globe via satellite to the Army's Biometric Fusion Center in Clarksburg, W. Va., near Washington, D.C.

There, Army agents, working with FBI counterparts, scan the prints, and compare them with a database of known terrorists, looking to determine if the killer was behind other bombings in Iraq, Afghanistan, or elsewhere in the world, experts tell United Press International's Networking.

"The benefits of biometrics are phenomenal," said Daniel Munyan, chief scientist at CSC's global security services identity labs, which has worked with several government agencies on biometric projects, and is headquartered in El Segundo, Calif.

Once the data is in hand, the military uses it for a number of apps. Just over a year ago, in December, 2004, terrorists struck a U.S. base in Mosul, Iraq, killing 14 soldiers. The attack was apparently perpetrated by a suicide bomber who came onto the base in the guise of an Iraqi civilian contractor for the Pentagon. To stop that kind of offensive, the Department of Defense is making foreigners who apply for jobs as contractors in Iraq submit to a biometric security scan. Their fingerprints are checked against the government's databases of known terrorists -- before they are allowed to come on board. Then, they are issued a biometric smart card for ID. Every time they try to enter an American base, the card, which includes images of their fingerprints, is scanned against a database, and against their actual fingerprints, taken again, at that time, experts tell Networking.

"Certain forms are virtually impossible to fake," said Munyan.

The biggest issues for the military to deal with, when it comes to networked, biometric security, are gaining the cooperation of the job applicant, overcoming cultural differences and dealing with any questions of privacy rights, Munyan said.

There are other obstacles for the government, however, when it comes to catching terrorists in the field. "Fingerprinting and biometric tools might allow an intelligence agency to build a database of suspected terrorists, but the challenge of linking fingerprints to names and faces and building a model of the network would remain," said Bret Johnson, director of the homeland security and entrepreneurship center at Northwestern University, Evanston, Ill.

Some technology developers are working on that and related problems now, however. The developer, Identix Inc., is using a mobile identification system, which employs both fingerprint and facial identification technology. The system uses a patented, hand-held, wireless device. It can be used in the field by military personnel who capture terrorists in the field, scan their fingerprints and snap a picture of their faces, and "know who they are dealing with on a real-time basis," said Frances Zelazny, director of corporate communications at Identix, based in Minnetonka, Minn.

The thorniest problem for that system is the availability of reliable, in-theater wireless communications networks. So local database storage is relied on if there is a wireless network shut-down, she said.

FBI personnel have been using computing technology in Afghanistan and at Guantanamo Bay, Cuba, as well as in Iraq, though at the beginning of the war on terror, early in the Bush administration, they were relying on old-fashioned paper and ink fingerprinting when processing terrorist suspects, according to the developer Cross Match, based in Palm Beach Gardens, Fla.

Now, if a terrorist posing as a job applicant comes calling, he will be nabbed if his fingerprints were found on exploded bombs, or at the sites of terrorist atrocities around the world.

Copyright 2006 by United Press International

Explore further: Colombia transforms old tires into green housing

Related Stories

Civilian 'hacktivists' fighting terrorists online

Sep 17, 2012

Working from a beige house at the end of a dirt road, Jeff Bardin switches on a laptop, boots up a program that obscures his location, and pecks in a passkey to an Internet forum run by an Iraqi branch of al-Qaida.

Experts debate destroying last smallpox viruses

May 13, 2011

(AP) -- Smallpox, one of the world's deadliest diseases, eradicated three decades ago, is kept alive under tight security today in just two places - the United States and Russia.

Euro terror alert spotlights voiceprint technology

Oct 06, 2010

(AP) -- Did their voices betray them? The discovery of an alleged terror plot against Europe owes at least some of its success to "voiceprint" technology that allows law enforcement to electronically match ...

Physicists say there's an urgent need for nuclear detectives

Feb 17, 2008

A terrorist nuclear explosion devastates Manhattan, but no group takes credit. The pressure on the U.S. president to retaliate is intense. Acting on sketchy information, the president orders an attack, but it turns out to ...

Recommended for you

Colombia transforms old tires into green housing

7 hours ago

The highlands around the Colombian capital are scattered with small buildings that look like out-of-place igloos but are in fact innovative houses made from the tires that litter the country's roads.

LifePaint spray is Volvo's safety offer for cyclists

7 hours ago

For cyclists sharing the road at dark with cars and pedestrians, a useful motto is to stay safe by staying seen. Volvo, which continues to build on its brand of safety-first, has come out with LifePaint. ...

Tesla shares jump on Musk 'tease' in tweet

8 hours ago

Tesla Motors shares jumped Monday after co-founder Elon Musk tweeted that the company would unveil as "major" new product line next month, leaving analysts guessing.

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.