Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Mitigating Background Fraud Risks with Biometrics

By Rick Nelson
March 25, 2014

Thirty percent of all business failures are due to theft and fraud by employees, and it has been estimated 60 percent of employee fraud and theft is committed by managers, owners, and senior executives. When a candidate cycles through the hiring and onboarding processes, and is later discovered to have lied about his or her qualifications, it not only disrupts the business, but can cost up to 50 percent of the given position’s annual salary to rehire.

Also it has been estimated that businesses in the U.S. lose more than five percent of their revenue each year to employee fraud and theft. Properly vetting prospective employees to defend against this represents a significant challenge for private firms and the government alike.

The benefits of making the right hiring decision are critical to the success of virtually every organization. Getting it right isn’t always easy, and getting it wrong can have significant consequences. Conducting comprehensive background checks for prospective employees using available technology has its beginnings within the national security agencies of the federal government and the U.S. military. However many private companies are now taking a similar approach to protect against fraud and to ensure greater workplace safety.

Until just a few years ago, the United States Army and the other armed services relied exclusively on ink and paper fingerprints that would have to be sent via the U.S. Postal Service to the appropriate authorities to conduct background checks for its recruits, processing through the Military Entrance Process Stations (MEPS). With the advent of biometric technologies, this was proven be both enormously costly and inefficient. In many cases, recruits would apply to enlist and the Army would spend months of administrative bandwidth processing a recruit only to discover that the he or she was not suitable for induction into the military due to a criminal record that was not disclosed.

To its credit, the Army recently instituted its Early Background Check Program that uses biometric enrollment technology to screen recruits rapidly to ensure they are fit for service and that they are who they claim to be at the time of enlistment. This allows recruiters nearly all Army recruiting locations to conduct the verification process early to ensure their efforts are focused on qualified candidates while creating significant savings for the taxpayer.

Using biometric enrollment technologies to facilitate rapid, highly accurate background checks is no longer limited to the government. Many leading private companies are turning to these capabilities to conduct their own pre-employment screening evaluations. In so doing, employers have found that using pre-employment livescan background screening can be instrumental in making an informed and truly objective decision based on the relevant applicant history.

As the hiring process becomes more global, so do the challenges in effectuating accurate background checks. State-of-the-art livescan background screening can effectively address the fundamental concern of the employer to determine that the applicant is who they claim to be and the information they provide in many key areas is truthful. For companies that have embarked on biometric screening of prospective employees, many have found that using higher-end technologies provides greater value long-term due to the speed and reliability these devices provide in capturing a high quality prints. By using higher resolution records, many have found that the biometrics provided to the FBI are accepted and processed quickly. Using lower resolution records can present the risk of rejection due to poor image quality. When this occurs, companies must start the process over to reacquire the print from the applicant – which can be logistically inconvenient and costly. Like so many things in business, making the needed investment to secure the right tools to do the job correctly the first time can afford big savings in the long run.

Biometric pre-employment screening is not a panacea that can universally prevent fraud or violence in the workplace. However, it can play an important role in addressing this growing problem by verifying criminal history and a number of important biographical elements in an application, such as social security numbers, age and residency. Moreover, many employers now understand that the screening process should not apply only to applicants but also to employees after they are hired. By conducting periodic screenings of employees, employers can help to ensure that workers remain fit for duty throughout their time in the workforce and maintain a more secure and productive and workplace. 

KEYWORDS: background check fingerprint scanning fraud trends hiring security secure hiring process

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rick "Ozzie" Nelson, is a Vice President at Cross Match Technologies and serves as a senior associate at the Center for Strategic and International Studies, where he directed the Homeland Security and Counterterrorism Program from 2009 through 2012.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 Minutes Santor

    Mitigating fraud, theft and scam risks within financial institutions

    See More
  • group working together at table

    Mitigating security risks with an evolving workforce

    See More
  • Mitigating Workplace Violence Risks with Awareness, Deescalation

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing