Uncategorized

January 11, 2013

Intelligence center develops Biometrically Enabled Intelligence to support warfighter

Tags:
Paul Moruza

By scanning a person’s iris and taking fingerprints, deployed Soldiers are able to identify whether or not an individual is recorded as having participated in insurgent activities.

CHARLOTTESVILLE, Va. — It has been said that eyes are the windows to a person’s soul. Additionally though, they are also the gateway to a person’s identity.
Many Soldiers who have deployed to Iraq or Afghanistan are familiar with biometrics — which is the collection of iris scans, fingerprints and facial images used to identify an individual.

In fact, forensic science has been around for nearly 100 years, with fingerprints used as a primary means of identification. Today, fingerprints, iris scans, DNA and other biometric traits are used to identify and apprehend persons of interest.

“Many in the military, to include Army intelligence analysts, are unfamiliar with how those collections are planned, exploited, analyzed and turned into a valuable source of information used to protect friendly forces, identify persons of interest for questioning or targeting, provide security to local populations, and protect our homeland,” said Gregory Sieminski, chief, Identity Intelligence Division, National Ground Intelligence Center, known as NGIC.

This activity is known as Biometrically Enabled Intelligence, or BEI, and it “is here to stay as a critical tool for Army intelligence analysts,” Sieminski said.

“BEI has saved countless lives in Iraq and Afghanistan and helped our forces achieve identity dominance in demanding insurgency environments,” Sieminski said.
“Even with these successes, we have realized only a fraction of the potential this capability brings to ‘people-focused’ analysis, regardless of mission, geographic location or operating environment.”

In this digital age, many believe the global proliferation of biometric technology and the ubiquity of identity information present a huge and growing intelligence opportunity for today’s generation of Army analysts.

“Biometrically Enabled Intelligence provides an analytical baseline by resolving identities through high-confidence biometric matching and fusion with other sources of intelligence to positively identify the person in question,” said Cathy Moore, senior intelligence analyst, Biometrics Division, NGIC.

“The Biometric Enabled Watchlist — a Defense Department-wide service managed by NGIC — is the tool that gets the critical conclusions about threat identities from BEI out to the field,” Moore said.

“It places biometric intelligence at the fingertips of our Soldier-sensors by providing the ‘so what’ for the operator at the point of encounter,” Moore said.

For example, during a biometric screening, a watchlist “hit” might reveal that a local national has ties to an insurgent network, leading to denial of his employment at a U.S. military installation overseas. An Army all-source analyst, while conducting intelligence preparation of the battlefield, develops geospatial plots of biometric and other data that reveal the operational patterns of an insurgent improvised explosive device network operating in his unit’s area of operations. A brigade combat team security officer plans focused biometric enrollment operations in conjunction with routine patrolling.

How are these events related? They are a few of the ways biometrics are being integrated into Army all-source intelligence analysis, where it enables warfighters to deny anonymity to adversaries.

Thanks to its proven success in both Iraq and Afghanistan, this capability has grown well beyond its wartime roots. Biometric technology, and its fusion with all-source intelligence, is proving highly relevant to enduring and emerging 21st century threats where individuals seek to conceal their identity.

From Somali pirates to weapons of mass destruction proliferators, human identification is a critical enabler to the full range of military operation.

“As BEI tradecraft is spread beyond its current wartime origins, more and more Army intelligence analysts are learning the power of fusing biometrics data with other, more traditional sources of intelligence,” said Spc. Kama Mountz, of the 500th MI Brigade. “My training has been invaluable in identifying persons of interest in the U.S. Pacific Command area of operation. As in the combat theaters, these individuals seek to conceal their nefarious activities by remaining anonymous.”

Like analysts across the U.S. Army Intelligence and Security Command force, Mountz has learned that BEI can deny foes that advantage.

“The work we do is not in isolation but rather a collaborative effort across DoD and other government agencies,” Mountz said. “It’s a great feeling at the end of the day to know that we’re all doing our part to protect the homeland.”




All of this week's top headlines to your email every Friday.


 
 

 
U.S. Army Photo

Military Intelligence – Moment in MI history

General presides over first USAICS MI Officer Advanced Course graduation U.S. Army Photo Maj. Gen. (later Lt. Gen.) Phillip Davidson, Jr., served as the assistant chief of staff for Intelligence, 1971 – 1972. March 23, 1972 W...
 
 
Courtesy of B Troop

Become member of historic cavalry unit here, learn how this Sunday

Courtesy of B Troop Members of B Troop, 4th Regiment, U.S. Cavalry (Memorial) will be on Brown Parade Field from 1 – 3 p.m. Sunday to recruit for their next riding school, starting in February. They will demonstrate riding sk...
 
 

Community Briefs October 25, 2013

Astronomy Club meets today The Huachuca Astronomy Club will meet at 7 p.m. today in room 1101 of the Science Building, Cochise College, Sierra Vista Campus. The meeting is free and open to the public. The guest speaker will be Jeff Ofstedahl, also known as “Mr. Oh!” the science director at the Center for Academic...
 

 
SSGHARVEYSTUDY224JULRINGOLD

Counselors guide careers, sustain force

Staff Sgt. Jessica Harvey, 40th Expeditionary Signal battalion, studies with her sponsor, Sgt. 1st Class Carlos before the III Corps Non-Divisional Career Counselor of the Year competition board in Fort Hood, Texas, on July 23 ...
 
 

CSLA training center uses adapter, saves money, time, lives

In 2012, Don Meyer, an instructor with the Communications Security Logistics Activity, or CSLA, New Equipment Training team here, created a solution that simplified their In-Line Network Encryptor, or INE, KG-175D training course with a short-term savings to the Army of more than $25,000. Previous to his solution, each student in the course was required...
 
 

Crowd stampedes into Wren Arena for weekend rodeo event

College rodeo competitors and their participating youth partners enjoy rodeo events at Wren Arena during the Exceptional Rodeo Sunday where they share the fun of the Wild West. Exceptional youth participants ‘rode’ a barrel designed to simulate a bull, mounted and ‘rode’ stick horses, and took part in rope-tying events. In what was reported as...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin