Bio Metrics And Saeda_dem_2nd Draft

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Bio Metrics And Saeda_dem_2nd Draft as PDF for free.

More details

  • Words: 4,181
  • Pages: 22
Biometrics and SAEDA Running head: BIOMETRICS AND SAEDA

Biometrics and SAEDA Debra E. Morton Capella University TS5004, Technical Communications Dr. Eggersman November 03, 2009

1

Biometrics and SAEDA

2

Abstract Since September 11, 2001, one of the questions that Americans would ask is how is they being protected. Is there going to be another terrorist attack? One of the ways the government protects its citizens is by using Biometrics and SAEDA (Subversion and Espionage against the Army). Biometrics and SAEDA are used to protect the citizens and its government from foreign and domestic terrorism. The report will discuss the meaning of Biometrics and SAEDA. The government protects its citizens by using the military data.

Paper will discuss the enemies

within our own programs. How, when and why they spied against American and how they were caught. The report will discuss the premise that some American feel they have lost their alienable rights through the use of the cell phones and the internet?

Biometrics and SAEDA

3

Table of Contents Introduction………………………………………………………………………………………5 What is Biometrics…5 What is SAEDA?............................................................................................................................6 The Types of Biometrics………………………………………………………………………..6 a.

Fingerprint………………………………………………………………………………6

b.

Finger Scans, Palm Scans, and Hand Geometry………………………………………..7

c.

Retina Scan……………………………………………………………………………7-8

d.

Signature Dynamics…………………………………………………………………….8

e.

Keyboard Dynamics…………………………………………………………………… 9

f.

Voice Prints…………………………………………………………………………9-10

g.

Facial Scan……………………………………………………………………………10

h.

You-Tube Videos……………………………………………………………………….11

Purpose of SAEDA…………………………………………………………………………11-12 a.

What is Subversion?..…………………………………………………………………...12

b. What is Espionage?............................................................................................................12 c. What is Sabotage………………………………………………………………………...12 d. Terrorist Activity………………………………………………………………………...12 e. Treason/Unauthorized Disclosure………………………………………………………..13 f. Russumsan Poll on American Safety…………………………………………............14-15 Conclusion……………………………………………………………………………………..15 References……………………………………………………………………………………16-17 Appendix A…………………………………………………………………………...............18-20

Biometrics and SAEDA Appendix B………………………………………………………………………………..21-22

4

Biometrics and SAEDA

5

Biometrics and SAEDA Introduction Biometrics is a type of access control mechanism that can be used to verify an individual’s identity with unique personal attribute. Examples of fingerprints, palm scans, retina scans, and voice prints. These kinds of authentication systems gather a lot of information that can be hard to imitate, thus they provide a higher level of protection when compared to other authentication technologies. Biometrics systems are usually more expensive, relative to other approaches, and do not usually have a high acceptance rate by society because they perceived to be intrusive and they obtain personal information. Biometrics is sometimes seen as too Big Brother-ish and an encroachment into our personal privacy through automated means. (Harris, 2002) Biometrics is broken down into two different categories, Physiological Biometrics - features notably identified through the five senses and processed by finite calculable differences: Sight (how a person looks including things like hair & eye color, teeth, or facial features), Sound (the pitch of a person's voice), Smell (a person's odor or scent), Taste (the composition of a person's saliva - or DNA), Touch (such as fingerprints or hand-prints). Behavioral Biometrics - based on the manner in which a person conducts themselves, such as: writing style, walking rhythm, typing speed, etc. In order for any of these characteristics to be used in sustained identification encryption purposes, they must meet the criteria of: reliable, unique, collectable, convenient, longevity, universal, and acceptable.

Biometrics and SAEDA

6

SAEDA is using Subversion and Espionage against the United State. The use of SAEDA with Biometrics is used as a means of protecting Americans from terrorist acts foreign and domestic. Biometrics can be used as a means of access control and SAEDA (Subversion and Espionage Directed against the U. S. Army.) is used as means to protect military information from espionage, subversion, sabotage, and terrorism. SAEDA and Biometrics covers all military and civilians.

In order to use SAEDA and Biometrics properly, the military and civilians must be

educated on how to report information and avoid breaches in our military community. The proposal is to educate the military (Army, Navy, Air Force, Marines, Coast Guards, and civilians on how to use Biometrics and how to report information using SAEDA. The other services and civilians should be trained because they work actively on Army military installations. Types of Biometrics Fingerprint

Fingerprints are used in Biometrics because points and ridges on fingerprints are considered unique.

(Dave, n.d.) Figure 1: Example of Fingerprint Among all the biometric techniques, fingerprint-based identification is the oldest method which has been successfully used in numerous applications. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and

Biometrics and SAEDA

7

furrows as well as the minutiae points. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending. Finger Scan, Palm scans, and Hand geometry

(Wikipedia, n.d.) Figure 2: Example of Finger Scan, Palm scans, and Hand geometry used at Walt Disney theme park. Biometric measurements are taken from the fingers of guest to ensure that the person’s ticket is used by the same person from day to day. Finger scans shows points on the fingerprint that are collected and stored. This is a smaller amount of data compared to fingerprint systems. Palm print shows creases and ridges on the palm and all fingerprint systems. Hand geometry shows that the shape of a person’s hand (length and width and fingers) is stored in computer systems for identifications. (Harris, 2002) Retina scan Retina Scan analyzes blood vessels located in the back of the eyes.

(, n.d.)

(Krotoski, n.d.)

Biometrics and SAEDA

8

Figure 3: Example of Finger Scan, Palm scans, and Hand geometry and how it could be used. The retina biometric analyzes the layer of the blood vessels located at the back of the eye. This technique usually uses a low-intensity light source through an optical coupler and scans the unique patterns of the layer of blood vessels known as the retina. Retina scanning is quite accurate and is very unique to every individual similar to the iris scan; but unlike the iris scan, it typically requires the user to look into a receptacle and focus on a give point for the users’ retina to be scanned. This is not particularly convenient for people who wear glasses or are concerned about close contact with the reading device.

The technique is more intrusive than other

biometric techniques; as a result, retina scanning is not the friendliest process even though the technology itself is very accurate for use in identification, verification and authentication. (BioVericom, n.d.) Signature dynamics Digital signatures are electronic stamps that can be used to identify the sender or the signer of a digital document. Think of digital signatures as the digital equivalent of the signature placed on a contract or a check. Digital signatures use public and private key pairs to ensure the authenticity of an electronic document. The creator of the document will have the private portion of a digital signature scheme which is encoded onto the document when it is signed. Then the recipient of the document would receive the public key of the digital signature scheme. This would allow the recipient of the document to know that the document was authentic and really did come from the sender.

Keeping with a paper document analogy, the purpose of a signature

is to verify that the signer is the originator of the document. Sometimes documents require signatures in person to have a witness to the signature.

Biometrics and SAEDA

9

Keyboard dynamics

The behavioral biometric of Keystroke Dynamics uses the manner and rhythm in which an individual types characters on a keyboard or keypad. The keystroke rhythms of a user are measured to develop a unique biometric template of the users typing pattern for future authentication. Data needed to analyze keystroke dynamics is obtained by keystroke logging. In the simplest case, very simple rules can be used to rule out a possible user. For example, if we know that John types at 20 words per minute, and the person at the keyboard is going at 70 words per minute, it's a pretty safe bet that it's not John. That would be a test based simply on raw speed uncorrected for errors. It's only a one-way test, as it's always possible for people to go slower than normal, but it's unusual or impossible for them to go twice their normal speed. Or, it may be that the mystery user at the keyboard and John both type at 50 words per minute; but John never really learned the numbers, and always has to slow down an extra half-second whenever a number has to be entered. If the mystery user doesn't slow down for numbers, then, again, it's a safe bet this isn't John. (n.d.) Voice Prints Voice biometrics works by digitizing a profile of a person's speech to produce a stored model voice print, or template. Biometric technology reduces each spoken word to segments composed of several dominant frequencies called formants. Each segment has several tones that can be captured in a digital format. The tones collectively identify the speaker's unique voice print. Voice prints are stored in databases in a manner similar to the storing of fingerprints or other biometric data.

Biometrics and SAEDA

10

To ensure a good-quality voice sample, a person usually recites some sort of text or pass phrase, which can be either a verbal phrase or a series of numbers. The phrase may be repeated several times before the sample is analyzed and accepted as a template in the database.

When a

person speaks the assigned pass phrase, certain words are extracted and compared with the stored template for that individual. When a user attempts to gain access to the system, his or her pass phrase is compared with the previously stored voice model. Some voice recognition systems do not rely on a fixed set of enrolled pass phrases to verify a person's identity. Instead, these systems are trained to recognize similarities between the voice patterns of individuals when the persons speak unfamiliar phrases and the stored templates. A person's speech is subject to change depending on health and emotional state. Matching a voice print requires that the person speak in the normal voice that was used when the template was created at enrollment. If the person suffers from a physical ailment, such as a cold, or is unusually excited or depressed, the voice sample submitted may be different from the template and will not match.(Homeland Security [], n.d.) Facial Scan

(Watson, 2008) Figure 4: Examples of a facial scanner that is going to be used at airports instead of paper passports.

In our everyday lives, our face is an important part of who we are and how people

Biometrics and SAEDA

11

identify us. Facial recognition consist two pars; facial detection and face identification. Face detection is the computer ability to be able to detect a portion of the video image as an individual’s face from a complex background. Once the location and area of the within an image is identified. Facial scan emphasizes those sections of the face, which are less susceptible to alterations, such as the upper outlines of the eye sockets, the sides of the mouth, and the areas surrounding one’s cheekbones. (BioVericom, n.d.) Watch Videos on Biometrics: Select open hyperlink to watch videos on Biometrics

(ISAFMEDIA, 2009) Videos

The videos were chosen from You-Tube and the videos are used to give the reader an idea of what Biometrics is and how it works. You-Tube gives vast ideas of how Biometrics is used especially by the military.

Purpose of SAEDA? SAEDA (Subversion and Espionage Directed against the US Army) is a program directed by Army Regulation 381-12 (U). The regulation, published January 15, 1993, has three chapters and two appendices. The SAEDA program was created in order to combat Adversarial Intelligence (ADVINT), Industrial Espionage and Terrorism, during both peace and war. (Wikipedia, 2009)

Biometrics and SAEDA

12

Subversion Advocating, causing, or attempting to cause insubordination, disloyalty, mutiny, or refusal of duty by any member of the armed forces of the United States or by Department of Defense civilian personnel with the intent to interfere with, impair, or influence the loyalty morale or discipline of such Armed Forces. includes:

During time of war, subversion additionally

(l) making or conveying false reports or false statements with the intent to interfere

with the operation or success of the armed forces of the United States or to promote the success of its enemies; and (2) willfully obstructing or attempting to obstruct the recruitment or enlistment service of the United States, to the injury of the United States. (U.S. Army, 1993) Espionage The act of obtaining, delivering, transmitting, communicating, or receiving information in respect to the national defense with an intent or reason to believe that the information may be used to the injury of the United States or to the advantage of any foreign nation.(U.S. Army, 1993) Sabotage An act or acts with intent to injure, interfere with, or obstruct the national defense of a country by willfully injuring or destroying, or attempting to injure or destroy, any national defense or war material, premises or utilities, to include human and natural resources.(U.S. Army, January 1993) Terrorist activity The activity that uses violence or the threat of violence to attain goals, political, religious, or ideological in nature. This is done through intimidation, coercion, or instilling fear. Terrorism Involves a criminal act that is often symbolic in nature and intended to influence an audience

Biometrics and SAEDA

13

beyond the immediate victims. b. Involves killing, causing serious bodily harm kidnapping, or violently destroying property, or an attempt or credible threat to commit such an act. Appears intended to endanger the protected of the Secret Service or the Department of State or to further political, social, or economic goals by intimidating or coercing a civilian population or any segment there of influencing the policy of a government international organization by intimidation or coercion, or obtaining widespread publicity for a group or its causes.(U.S. Army, 1993) Treason Violation of the alliance owed to country. Aiding or attempting to aid the enemy with arms, ammunition, supplies, money, or other things. Without proper authority, knowingly harboring or protecting or giving intelligence to, communicating or corresponding with or holding any intercourse with the enemy, either directly or indirectly. (U.S. Army, 1993) Unauthorized disclosure Unauthorized disclosure is a communication or physical transfer of classified information to an unauthorized recipient.

An unauthorized recipient is someone with no security clearance; one

with a security clearance but no need to know the information; a foreign intelligence and security service; the press; criminal elements; in short, any person or organization who is not authorized access to U.S. classified information and who does not absolutely require that information to accomplish a mission in support of U. S. national security.(U.S. Army, 1993) Does American still feel safe since the terrorist attacks on September 11, 2001? The list of polls taken Rasmussen Reports shows that Americans feel that the United States have changed for the worse and some Americans feel that they feel that we will have another attack on American soil.

Biometrics and SAEDA

14

National Survey of 1,000 Adults Conducted September 7-8, 2009 By Rasmussen Reports 1* We’re just about finished… Many people say that America was changed forever by the attacks on September 11, 2001. Has America changed for better or worse? 16% Better 59% Worse 14% No change 11% Not sure 2* Have many Americans forgotten the impact of the 9/11 terrorist attacks? 49% Yes 39% No 12% Not sure 3* How likely is it that another 9/11 will take place in America in the next 10 years? 36% Very likely 30% Somewhat likely 22% Not very likely 2% Not at all likely 9% Not sure 4* Are security precautions stemming from 9/11, such as increased airline security more hassle than they're worth? 31% Yes 51% No 17% Not sure 5* Do you believe Osama bin Laden is still alive? 71% Yes 8% No 21% Not sure 6* (answered by those who said no in question 36) If Bin laden is killed or captured will the United States be safer? 26% Yes 56% No 19% Not sure 7* Is Al Qaeda stronger today than before the 9/11 attacks, weaker today than before the 9/11 attacks or are they about the same?

Biometrics and SAEDA

15

27% Stronger 25% Weaker 39% About the same 10% Not sure 8* Will the amount of terrorism in the world increase or decrease when the United States leaves Iraq and Afghanistan? 42% Increase 19% Decrease 21% Stay the same 17% Not Sure 9* Would the world be better or worse if other countries became more like the United States? 57% Better 15% Worse 28% Not sure NOTE: Margin of Sampling Error, +/- 3 percentage points with a 95% level of confidence. (Rasmussen Reports, 2009) Conclusion SAEDA is used with a great technology called Biometrics. Biometrics used with SAEDA can make our nation safer. The writer has shown the different techniques used with other military services to enhance the eradication of terrorism. Biometrics and SAEDA can be used at all venues that serve the American people in the United States and Abroad. Some Americans do not know how they are being protected? They are protected at the banks, airports, and the Department of Motor Vehicle. SAEDA is used within the military to protect itself against espionage, subversion, and sabotage. This is how we catch the spies and traitors against our government.

Biometrics and SAEDA

16

References (n.d.). Iraq retina scan. Retrieved Nov 11, 2009, from iraqipages.com/cqi-bin/links/jump.cqi? ID=531 (n.d.). Keystroke Dynamics. Retrieved November 3, 2009, from http://en.wikipedia.org/wiki/Keystroke_dynamics BioVericom (n.d.). Retina Biometrics. Retrieved November 2, 2009, from Conjective Corporation (Copyright 2003-2009). What are Digital Signatures?. Retrieved l November 4, 2009, from http://www.wisegeek.com/what-are-digital-signatures.html Dave, C. (n.d.). Finger Print. Retrieved November 12, 2009, from http://www.dreamstime.com/Cammeraydave_portfolio.pg1 Harris, S. (2002). Mike Meyers’ CISSP Certification Passport. Berkeley, California: McGrawHill/Osborne. Homeland Security (n.d.). Voice Verification. Retrieved November 8, 2009, from http://www.globalsecurity.org/security/systems/biometrics-voice.htm ISAFMEDIA. (2009, August). Soldiers Use Biometric Technology To Hunt Insurgents. [Video file]. Video posted to http://www.youtube.com/watch?v=68SiuMUCGeo&feature=email Krotoski, A. (n.d.). My Retinal Scan. Retrieved November 12, 2009, from www.flicker.com/photos/toastkid/3635782594 Prabhakar, S., & Jain, A. (n.d.). FingerPrint Identification. Retrieved November 3, 2009, from http://biometrics.cse.msu.edu/fingerprint.html Rasmussen Reports (September 7-8, 2009). Toplines, National Survey of 1,000 Adults. Retrieved November 9, 2009, from http://www.rasmussenreports.com/public_content/business/econ_survey_toplines/

Biometrics and SAEDA

17

U.S. Army (January 15, 1993). Subversion and Espionage Directed Against the U.S. Army(SAEDA). Retrieved November 8, 2009, from http://seattletimes.newsource.com/html/nationaworld/2002142936_yeedocs.html Watson, S. (2008). Interpool Details Plan For Global Biometric Facial Scan Database. Retrieved November 12, 2009, from http://www.infowars.com/interpol-details-plans-forglobal-biometrics-facial-scan-database Wikipedia (November 8, 2009). SAEDA. Retrieved November 8, 2009, from http://en.wikipedia.org/w/index.php?title=SAEDA&printable=yes Wikipedia (n.d.). Biometrics. Retrieved November 12, 2009, from http://em.wikipedia.org/wiki/Biometrics

Biometrics and SAEDA

18

Appendix A: Proposal Date: October 17, 2009 To: Dr. Denise Eggersman From: Debra E. Morton Re: Proposal to advocate the use of Biometrics and SAEDA (Subversion and Espionage Directed against the US Army). Summary The use of SAEDA with Biometrics can be used as a means of protecting Americans from terrorist acts foreign and domestic. Biometrics is a type of control access mechanism that can be used to verify an individual’s identity with a unique personal attribute. Examples are fingerprints, palm scans, retina scans, and voice prints (Harris, 2002, p. 32). SAEDA (Subversion and Espionage Directed against the U. S. Army.) is a form of counter-intelligence that is used for the protection of military information involving espionage, subversion, sabotage, and terrorism. Subversion is the attempts by the enemy to compromise our faith, loyalties, and confidence. Espionage is an attempt by the enemy through covert means to hinder our goals and efforts to accomplish our mission. SAEDA and Biometrics covers all military and civilians in America (SAEDA and Security, 2009). In order to use SAEDA and Biometrics properly, America and the Armed Forces must be educated on how to report information and avoid breaches in our military community. The proposal is to educate Americans and the military (Army, Navy, Air Force, Marines, and Coast Guards on how to use Biometrics and how to report information using SAEDA. The other services and Americans should be trained because they work actively on Army military installations. Problem The company must come up with a SAEDA and Biometrics paper that gives Americans and the Military SAEDA/Biometrics training. They will become knowledgeable on how to avoid breaches and how to process and report information. Soldiers and civilians lack the knowledge of SAEDA and Biometrics. Soldiers and civilians give intelligence to the enemy without realizing that they are discussing military maneuvers. A soldier or civilian contractor is stationed in a foreign country and a shop owner asks either of them when are they going to or coming back from a field exercise. The soldier or the contractor tells the shop owner because they don’t see this question as a potential problem. The shop keeper is a terrorist, who plan to use IEDs (Improvised explosive devices) on soldiers on their return to or from a training exercises. This same information can be used to kidnap civilians. They both provided the shop keeper with dates. The soldier and civilian violate policies unknowingly that falls under Biometrics and SAEDA.

Biometrics and SAEDA

19

Solution To solve the issues of how soldiers and civilians use Biometrics and SAEDA, I will write a paper that discusses how Biometrics and SAEDA is used to protect Americans foreign and domestic. The paper should help Americans how to use information to their advantage. The topics that will be included are: •

What is Biometrics?



What are the types of Biometrics?



How is Biometrics used to protect American Citizens?



What is SAEDA?



What is SAEDA briefing?



What is Subversion and Espionage?



What we can learn from the civilians and military personnel that have performed subversion and Espionage.

Timeline for completion The table on the following page provides a timeline for completing the major milestone throughout this project. Task Project Research and Planning Draft Outline Project Proposal Draft Paper Progress Report Initial Edits and Revision Feedback and Peers Finalize Paper (Edit and Revision) Final Submission

Start Date September 13, 2009 September 20, 2009 October 11, 2009 October 18, 2009 October 25, 2009 November 1, 2009 November 8, 2009 November 11, 2009 November 13, 2009

End Date September 20, 2009 September 27, 2009 October 18, 2009 October 25, 2009 November 1, 2009 November 7, 2009 November 10, 2009 November 12, 2009 November 13, 2009

Biometrics and SAEDA

20

Table 1: Timeline

Conclusion In conclusion, this paper will give an infinitive definition of Biometrics and SAEDA. The readers will gain the knowledge of how to protect themselves in a foreign country or right here in the United States. Terrorist and spies have and still do live in the United States. The readers will learn who some of our homegrown enemies were. Learning from our past will help us prepare for the future. Reference: Harris, S., (2002) Mike Meyers’ Certification Passport. Berkley, California, McGrawHill/Osborne. SAEDA and Security, Retrieved net.com/education/mpdsaeda.html.

October

18,

2009,

from

http://www.military

Biometrics and SAEDA

21

Appendix B: Progress Report

Date: November 1, 2009 To: Dr. Eggersman From: Debra E. Morton Subject: Progress Report for research paper on Biometrics and SAEDA. Summary: The purpose of this progress report is to show the progress that Debra Morton has made to complete her research paper on Biometrics and SAEDA. This paper will used tell the reader what is Biometrics and SAEDA. The research paper will show how Biometrics and SAEDA is used to protect the United States and its citizen foreign and domestic. The research paper will debate whether the citizens of the United States are losing their rights by the means of the government protection. The paper will discuss some of the violators that have used subversive acts against the United States. Most of the research information is found and separated. Debra will complete this project by November 13, 2009 or sooner. Problems: The only problems that Debra is having with the completion of the research paper are she is taking a CCNA course and she was working late hours at work. This only left Friday, Saturday, and Sunday to work on the course. On Monday, November 2, 2009, Debra will be moving to the day shift and this will alleviate any problems with working with both courses. This is a courtesy of moving to the travel team. Progress: Task Project Research and Planning Draft Outline Project Proposal Draft Paper Progress Report Initial Edits and Revision Feedback and Peers Finalize Paper (Edit and Revision) Final Submission

Percentage Complete September13, 2009

End Date September 20, 2009

Progress Completed

September 20, 2009 October 11, 2009 October 18, 2009 November 1, 2009 November 1, 2009

September 27, 2009 October 18, 2009 November 3, 2009 November 1, 2009 November 7, 2009

Completed Completed 80% Completed On target

November 8, 2009 November 11, 2009

November 10, 2009 November 12, 2009

On target On target

November 13, 2009

November 13, 2009

On target

Biometrics and SAEDA

22

Conclusion: Going to day shift will change the time that Debra will spend on the Research paper. She will spend more time in the library. Going to the library right after work will put Debra in a place where she can write and prepare here research paper before the deadline.

Related Documents

Bio Metrics
October 2019 25
Bio Metrics
June 2020 15
Bio Metrics
November 2019 19
Bio-metrics
June 2020 11
Bio Metrics
June 2020 11