recommended reading

DHS Looks for iPhones and Tablets That Can ID Bomber Fingerprints

Bruce Rolff/Shutterstock.com

The Homeland Security Department wants to aid victims of bombings and other disasters by identifying suspects more quickly on the scene -- using biometric iPhones.

iPads and Windows-based tablets, such as Surface, also are being considered for the technology development project, according to a market survey distributed on Friday. The device would have the capability to capture fingerprints, facial images and written descriptions "from unknown persons and to achieve identification of known persons of interest while in the field," the specifications state.

The office conducting the research, the relatively new Resilient Systems Division, focuses on "societal community resilience as well as physical infrastructure and disaster response and recovery," according to Homeland Security's website. 

The mobile ID initiative is one of several federal efforts to miniaturize biometric technology for civilian surveillance. As of now, no such tools have been acquired for domestic use.  In February, CACI and ID verification firm AOptix announced a deal with the Pentagon to build biometric smartphones for military personnel.

DHS officials say they have in mind a system packaged either as one whole device or as compatible components -- for instance, a brand-name smartphone with a “rugged sleeve and integrated sensors.” Additional features might include card readers and instruments for scanning irises and capturing "latent fingerprints,” or finger impressions accidentally left behind, the technical requirements state. 

Evidence obtained by the tool, which DHS is calling a "mobile electronic biometric/biographic collection device,” would be transmitted wirelessly through a virtual private network. 

Right now, Homeland Security is only at the point of trying to ascertain prices for the technology. Suggested quotes from developers are due by June 14. Then the department will decide whether to solicit proposals for a formal contract. 

In November 2012, the FBI issued a similar call for facts and figures on wireless biometric devices. At the time, the bureau wanted a facial recognition app for handhelds that could collect face images, iris patterns and other biometric indicators to make out suspects in real-time. No further information on the potential acquisition has since been published.

Later that same month, DHS’ Customs and Border Protection began shopping for smartphone biometric appendages to scan travelers’ fingerprints onsite. “A mobile platform device would enable CBP officers to efficiently traverse in a manner not possible with other portable platforms (e.g. laptops, tablets and notebooks) and would be conducive to ad hoc questioning without the use of a kiosk or work surface,” stated a Nov. 26, 2012, request for product concepts.

DHS wanted technology that could work on devices running Apple's iOS operating system, Google's Android OS, or BlackBerry software. No information has since been released on that possible buy either. 

(Image via Bruce Rolff/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.