recommended reading

FBI and DHS team up to nab border intruders with iris recognition


The FBI is partnering with the Homeland Security Department to identify border trespassers by exchanging digital eye scans of booked offenders, bureau officials said.

Iris recognition -- which matches a digital image of the unique, colored portion of an individual’s eye against archived photos -- quickly ensures authorities have fingered the right crook, advocates say. Critics say iris capture invades privacy and wrongfully pulls immigrants into the deportation system.

“We’re working closely with border control” on iris matching projects, Brian Edgell, unit chief for the FBI’s enhanced biometric system, said during an interview on Thursday. The FBI’s traditional fingerprinting system is transforming into a $1 billion multi-trait repository called the Next Generation Identification program.

By law, the biometric databases at DHS and the FBI must be compatible. Immigration authorities, through a controversial fingerprinting program called Secure Communities, cross-check foreigners’ prints against prints from booked individuals.

Iris recognition is a logical extension of the program, Edgell told Nextgov after speaking at an information-sharing symposium hosted by the IJIS Institute. “Secure Communities is a Homeland Security Department program,” he said.  “I think iris is a way we can begin to build upon what we’re doing.”

The FBI gradually is collecting iris scans from state and local prison wardens who use the technology to track inmates. DHS increasingly is testing iris recognition at border stations to identify suspected illegal aliens, according to department officials.

Immigrant rights groups and privacy activists are not keen on the idea of digitizing and storing various physical characteristics of foreigners, some of whom, they argue, are mistakenly arrested and then extradited.

In addition to iris images, the new FBI biometric system is slated to ingest and search by late 2014 pictures of faces, scars, tattoos and other skin markings.

In June 2012, representatives from the National Day Laborer Organizing Network, the New York State Defenders Association, and the Cardozo Immigration Justice Clinic gathered at a federal advisory board meetingto confront the FBI about its role in what they call a “massive deportation program.”

FBI officials stress that Secure Communities is managed by DHS, and the only irises saved in the bureau’s system are from individuals who have come into contact with law enforcement.  

Iris recognition also has critics in the computer science field, who note eye pattern files can be duplicated by hackers and also degrade over time.

Officials for BI2 Technologies, a company that manages a nationwide database of iris images, say the files are encrypted for protection. “Standing alone, biometric templates cannot be reconstructed, decrypted, reverse-engineered or otherwise manipulated to reveal a person's identity,” states the website for the firm, which has worked with FBI program managers.

(Image via MountainHardcore /

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.