recommended reading

New Facility Will Rehearse Foreigner Iris and Facial Recognition at Airport Exits


The Department of Homeland Security has created a biometric-testing center to aid rollout of a long-awaited congressionally mandated system for tracking foreigners with invalid visas, DHS officials said Friday.

The goal of the Upper Marlboro, Maryland, facility is to help Customs and Border Protection expedite traveler screening at U.S. entry points and confirm that certain foreigners have departed the country.

DHS science, technology and law enforcement experts will spend the next eight to 12 months trying various approaches to capturing entry and exit data at airports. In late 2015, the department will deploy biometric exit technology at one of the top 10 U.S. airports, CBP officials told Nextgov.

The testing center currently is not looking at technology for pedestrian border crossings. CBP is in the process of determining the best southern port of entry to begin testing iris and face biometrics, agency officials said. They aim to initiate land exit work in 2015.

The center houses two Federal Inspection Stations -- an entry booth and gate departure area -- as well as other airport settings, to simulate real-world operations, DHS officials said.                                       

The advantages of exit technology that taps digitized physical markers -- rather than merely textual biographic data -- are said to include timely and accurate identification and precise statistics on people with invalid visas.

The 25,000 sq.-ft. facility includes office, observation and testing space, officials said. It can accommodate up to 50 test subjects simultaneously.

Presently, there are logistical and technical challenges to setting up a biometric exit system.

Unlike with entry, airports and land crossings were not originally designed or staffed to process people who are departing. The airports, which the federal government does not operate, would need to be modified to accommodate new infrastructure.

“It is not feasible or responsible to install exit equipment in airports without a thorough evaluation of the potential impacts,” CBP officials state in a fact sheet on the new project. And facial and iris recognition tools have only recently matured to the point where they are reliable for widespread use. Fingerprint capture was tested and found to be more time consuming than the other two, less-intrusive biometric technologies.

Post-Sept. 11, 2001, legislation required DHS to create a biometric system for tracking foreigner entries and exits. The exit portion of the system never went into effect.

Republican legislators insist the government enforce border laws already on the books before Congress deals with other elements of immigration reform. 

Inaction on an immigration overhaul currently leaves about 12 million undocumented immigrants in legal limbo. 

On Thursday, House Judiciary Committee Chairman Bob Goodlatte, R-Va., told the Christian Science Monitor, that, in order to move on reforms, President Barack Obama must first, among other things, mandate employer verification of workers' legal status and establish a biometric exit and entry system. 

But for now, biographic systems that use text, such as names and birthdates, offer many of the same benefits and are more developed than the crop of biometric machines available, according to a recent report by the Bipartisan Policy Center

Legislation approved in the Senate last year calls for a computerized biometric exit system that, according to the Los Angeles Times, could cost more than $7 billion. 

(Image via ra2studio/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.