recommended reading

Is a Biometric Immigration Exit System Worth $7 Billion?

Bruce Rolff/Shutterstock.com

The push to stand up biometric checkpoints for foreigners departing the country would not, right now, yield expected benefits, such as quickly spotting people with invalid visas, according to a new report from the Bipartisan Policy Center. 

The advantages of an immigration entry-exit system based on digitized physical markers, like fingerprint images, include timely and accurate identification, say many proponents, including the Homeland Security Department. Other pluses include precise statistics on the number of people who have outstayed their visas. But biographic systems based on names and birthdates offer many of the same benefits and are more robust than the current crop of underdeveloped biometric machines, the center found.

"Any solution implemented in the near- or medium-term would likely to be susceptible to fraud," states the report, which was released on Tuesday. "The value-added calculus shows that while biometric exit is certainly worth pursuing, biographic exit can achieve most of the goals of an entry-exit system."

After the Sept. 11, 2001 terrorist attacks, DHS began testing technology to check the fingerprints and photos of visitors entering and exiting the United States. The exit component of the system still does not exist. Several proposals for comprehensive immigration reform would require biometric entry-exit systems. 

Biometrics would offer no significant gain over biographic information for statistical purposes relative to cost, according to the new research. Immigration reforms approved in the Senate last year would require a computerized biometric exit system that, according to the Los Angeles Times, could cost more than $7 billion. 

As for helping authorities with immigration enforcement in the field, exit data would be of little use, whether biometric or biographic, the center states. Authorities already know the apprehended individual is present in the country, standing in front of them, so exit records would be redundant for this objective.

The advantage of biometrics would be more accurate matches and less fraud. Spelling blunders, multiple identities, and other data errors all make biographic data more susceptible to error, according to the report.  For example, recently it was discovered that Boston Marathon bomber Tamerlan Tsarnaev’s name was misspelled on a manifest list for a flight to Russia, resulting in the FBI missing a lead while investigating his terrorist ties. 

In February, Homeland Security officials announced they are interested in pursuing a biometric exit system based on facial and iris recognition at land border crossings. Officials said their goal is a system that can biometrically identify more than 97 percent of foreigners. 

But biometric matching has yet to prove itself.

DHS pilots have not demonstrated that a high level of accuracy can be attained, the study states. During technology trial runs in 2009, for instance, just 82 percent of biometric exit records were matched to a biometric entry record.

"Until DHS can channel this potential into a proven operable solution, it is not clear whether implementing biometric exit collection would add much value," the report states.

(Image via Bruce Rolff/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.