-------- Original Message -------- Subject: [Information_technology] Daily News 11/07/02 Date: Thu, 7 Nov 2002 09:08:10 -0600 From: "NIPC Watch" <nipcwatch@private> To: "Information Technology" <information_technology@private> November 6, Federal Computer Week Testing the limits of biometrics. Biometric technologies have expanded greatly in the past decade and especially following the attacks of Sept. 11. With recently enacted federal statutes and many more bills promoting their use, the market could reach $2 billion in revenues in four years. But there are few judicial developments regarding collection of biometric identifiers, even as public policy debates have swelled over their use and their potential to invade people's privacy. Biometrics has been around for a long time -- most notably fingerprinting. However, newer technologies, such as facial recognition, and iris and retinal scanning, are being considered more and more by many public- and private-sector organizations for verification of identification, authentication, perimeter security, border control, identity theft, program fraud prevention, and access to secure systems. Source. http://www.fcw.com/geb/articles/2002/1104/web-bio-11-06-02.asp November 5, IDG News Data mining suggested to deter terror. A suggestion that data mining technologies similar to those used to detect credit card fraud can also help in the battle against terrorism has received a less than enthusiastic reception from government officials as they work to establish a Department of Homeland Security, according to an IT specialist with the Council on Foreign Relations. James Shinn, a fellow at the Council on Foreign Relations and a lecturer at New Jersey's Princeton University, Monday provided details about a report called "Red-Teaming the Data Gap," which he and colleague Jan Lodal presented to government officials in January. He was speaking at the Industry Advisory Council's Executive Leadership Conference here. The report lays out a case for establishing a counterterrorism system that uses data mining to look for suspicious patterns within data contained not only in federal government databases, but also state, local authority and commercial databases such as those held by car rental agencies, Shinn said. Source. http://www.nwfusion.com/news/2002/1105datamine.html?net _______________________________________________ Information_technology mailing list Information_technology@listserv http://listserv.infragard.org/mailman/listinfo/information_technology
This archive was generated by hypermail 2b30 : Thu Nov 07 2002 - 10:54:48 PST