Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Terrorism and New Biometrics Technologies

By Dr. Myra Gray
November 1, 2008


Implementing biometrics-based technologies has increased in recent years and is helping to protect the nation and multi-national enterprises by keeping people and assets more secure.  New, lightweight, multimodal devices help make distinguishing between an insurgent and a civilian in a war environment easier.

   
Two such technologies, a laptop-based system deployed as the Biometric Automated Toolset (BAT), and the Handheld Interagency Identity Detection Equipment (HIIDE), capture fingerprint, iris and facial data. The BAT collects this biometric data and stores it on a central server in a secure network.  Currently, there are over 1,000 active BATs in Iraq.

   
The HIIDE, similar in size to a large camera, connects directly to the BAT and matches inputs against a biometric watch list of up to 10,000 individuals. The HIIDE is a shock-resistant collection and identification device. Able to capture fingerprint, iris and facial images, almost 7,000 of these devices have been deployed in Iraq and Afghanistan thus far.




IDENTIFYNG THOSE ON THE WATCH LIST

Interagency communication and compatibility greatly increase the capabilities of biometrics in the fight against terrorism.  In 2004, the Department of Defense (DoD) created a centralized biometric database called the Automated Biometric Identification System (ABIS).  This collection and storage system is compatible with the system used by the FBI so that matches may be made between the two databases.  Known enemy biometric matches are flagged for further action and analysis.

   
Biometrics standards conformance testing of these tactical devices is conducted by the Biometrics Task Force (BTF). The BTF’s mission is to lead DoD activities to program, integrate and synchronize biometric technologies and capabilities.  The BTF also operates and maintains the DoD’s authoritative biometric database to support the National Security Strategy.  By creating and sustaining a biometric database, DoD not only has records of some known threats, but can help identify those threats in active operations.

   
A 2004 bombing in Mosul, Iraq, resulted in a need for a system to more securely monitor and grant access to only authorized individuals.  The Biometric Identification System for Access (BISA) was developed and has since been used by analysts to issue more than 220,000 military base access cards and permanently bar more than 800 individuals from having access. This smartcard-based system has increased base and checkpoint security with the use of biometrics-enabled badges and employee screening.



MAKING A DIFFERENCE

Biometric technologies, especially those that can easily be used on the battlefield, are making a difference in the current fight against terrorism by protecting both the warfighter and the homeland.  Ongoing assessment and evaluation of biometric equipment will help enhance effectiveness and efficiency of those technologies.  


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dr. Myra S. Gray became the Director, G-3/5/7 Biometrics Task Force in July 2007.  As the Director, Dr. Gray is currently overseeing the development of DoD biometric policies and enterprise solutions for physical and logical access uses crossing all functional areas.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • New Study Reveals Potential for Biometrics with Air Travel

    See More
  • Meridian Technologies New All-Optical Active Fiber Protection Switch

    See More
  • U.S. Airports to Receive New Security Technologies

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing