Sie sind auf Seite 1von 22

Biometrics and SAEDA 1

Running head: BIOMETRICS AND SAEDA

Biometrics and SAEDA

Debra E. Morton

Capella University

TS5004, Technical Communications

Dr. Eggersman

November 03, 2009


Biometrics and SAEDA 2

Abstract

Since September 11, 2001, one of the questions that Americans would ask is how is they

being protected. Is there going to be another terrorist attack? One of the ways the government

protects its citizens is by using Biometrics and SAEDA (Subversion and Espionage against the

Army). Biometrics and SAEDA are used to protect the citizens and its government from foreign

and domestic terrorism. The report will discuss the meaning of Biometrics and SAEDA. The

government protects its citizens by using the military data. Paper will discuss the enemies

within our own programs. How, when and why they spied against American and how they were

caught. The report will discuss the premise that some American feel they have lost their

alienable rights through the use of the cell phones and the internet?
Biometrics and SAEDA 3

Table of Contents

Introduction………………………………………………………………………………………5

What is Biometrics…5

What is SAEDA?............................................................................................................................6

The Types of Biometrics………………………………………………………………………..6

a. Fingerprint………………………………………………………………………………6

b. Finger Scans, Palm Scans, and Hand Geometry………………………………………..7

c. Retina Scan……………………………………………………………………………7-8

d. Signature Dynamics…………………………………………………………………….8

e. Keyboard Dynamics…………………………………………………………………… 9

f. Voice Prints…………………………………………………………………………9-10

g. Facial Scan……………………………………………………………………………10

h. You-Tube Videos……………………………………………………………………….11

Purpose of SAEDA…………………………………………………………………………11-12

a. What is Subversion?..…………………………………………………………………...12

b. What is Espionage?............................................................................................................12

c. What is Sabotage………………………………………………………………………...12

d. Terrorist Activity………………………………………………………………………...12

e. Treason/Unauthorized Disclosure………………………………………………………..13

f. Russumsan Poll on American Safety…………………………………………............14-15

Conclusion……………………………………………………………………………………..15

References……………………………………………………………………………………16-17

Appendix A…………………………………………………………………………...............18-20
Biometrics and SAEDA 4

Appendix B………………………………………………………………………………..21-22
Biometrics and SAEDA 5

Biometrics and SAEDA

Introduction

Biometrics is a type of access control mechanism that can be used to verify an individual’s

identity with unique personal attribute. Examples of fingerprints, palm scans, retina scans, and

voice prints. These kinds of authentication systems gather a lot of information that can be hard

to imitate, thus they provide a higher level of protection when compared to other

authentication technologies. Biometrics systems are usually more expensive, relative to other

approaches, and do not usually have a high acceptance rate by society because they perceived to

be intrusive and they obtain personal information. Biometrics is sometimes seen as too Big

Brother-ish and an encroachment into our personal privacy through automated means. (Harris,

2002)

Biometrics is broken down into two different categories, Physiological Biometrics - features

notably identified through the five senses and processed by finite calculable differences: Sight

(how a person looks including things like hair & eye color, teeth, or facial features), Sound (the

pitch of a person's voice), Smell (a person's odor or scent), Taste (the composition of a person's

saliva - or DNA), Touch (such as fingerprints or hand-prints).

Behavioral Biometrics - based on the manner in which a person conducts themselves, such as:

writing style, walking rhythm, typing speed, etc. In order for any of these characteristics to be

used in sustained identification encryption purposes, they must meet the criteria of: reliable,

unique, collectable, convenient, longevity, universal, and acceptable.


Biometrics and SAEDA 6

SAEDA is using Subversion and Espionage against the United State. The use of SAEDA with

Biometrics is used as a means of protecting Americans from terrorist acts foreign and domestic.

Biometrics can be used as a means of access control and SAEDA (Subversion and Espionage

Directed against the U. S. Army.) is used as means to protect military information from

espionage, subversion, sabotage, and terrorism. SAEDA and Biometrics covers all military and

civilians. In order to use SAEDA and Biometrics properly, the military and civilians must be

educated on how to report information and avoid breaches in our military community. The

proposal is to educate the military (Army, Navy, Air Force, Marines, Coast Guards, and civilians

on how to use Biometrics and how to report information using SAEDA. The other services and

civilians should be trained because they work actively on Army military installations.

Types of Biometrics

Fingerprint
Fingerprints are used in Biometrics because
points and ridges on fingerprints are considered
unique.

(Dave, n.d.)

Figure 1: Example of Fingerprint

Among all the biometric techniques, fingerprint-based identification is the oldest method

which has been successfully used in numerous applications. Everyone is known to have unique,

immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of

the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and
Biometrics and SAEDA 7

furrows as well as the minutiae points. Minutiae points are local ridge characteristics that occur

at either a ridge bifurcation or a ridge ending.

Finger Scan, Palm scans, and Hand geometry

(Wikipedia, n.d.)

Figure 2: Example of Finger Scan, Palm scans, and Hand geometry used at Walt Disney theme

park. Biometric measurements are taken from the fingers of guest to ensure that the person’s

ticket is used by the same person from day to day. Finger scans shows points on the fingerprint

that are collected and stored. This is a smaller amount of data compared to fingerprint systems.

Palm print shows creases and ridges on the palm and all fingerprint systems. Hand geometry

shows that the shape of a person’s hand (length and width and fingers) is stored in computer

systems for identifications. (Harris, 2002)

Retina scan

Retina Scan analyzes blood vessels


located in the back of the eyes.

(, n.d.) (Krotoski, n.d.)


Biometrics and SAEDA 8

Figure 3: Example of Finger Scan, Palm scans, and Hand geometry and how it could be used.

The retina biometric analyzes the layer of the blood vessels located at the back of the eye.

This technique usually uses a low-intensity light source through an optical coupler and scans the

unique patterns of the layer of blood vessels known as the retina. Retina scanning is quite

accurate and is very unique to every individual similar to the iris scan; but unlike the iris scan, it

typically requires the user to look into a receptacle and focus on a give point for the users’ retina

to be scanned. This is not particularly convenient for people who wear glasses or are concerned

about close contact with the reading device. The technique is more intrusive than other

biometric techniques; as a result, retina scanning is not the friendliest process even though the

technology itself is very accurate for use in identification, verification and authentication.

(BioVericom, n.d.)

Signature dynamics

Digital signatures are electronic stamps that can be used to identify the sender or the signer of

a digital document. Think of digital signatures as the digital equivalent of the signature placed on

a contract or a check. Digital signatures use public and private key pairs to ensure the

authenticity of an electronic document. The creator of the document will have the private portion

of a digital signature scheme which is encoded onto the document when it is signed. Then the

recipient of the document would receive the public key of the digital signature scheme. This

would allow the recipient of the document to know that the document was authentic and really

did come from the sender. Keeping with a paper document analogy, the purpose of a signature

is to verify that the signer is the originator of the document. Sometimes documents require

signatures in person to have a witness to the signature.


Biometrics and SAEDA 9

Keyboard dynamics

The behavioral biometric of Keystroke Dynamics uses the manner and rhythm in which an

individual types characters on a keyboard or keypad. The keystroke rhythms of a user are

measured to develop a unique biometric template of the users typing pattern for future

authentication. Data needed to analyze keystroke dynamics is obtained by keystroke logging. In

the simplest case, very simple rules can be used to rule out a possible user. For example, if we

know that John types at 20 words per minute, and the person at the keyboard is going at 70

words per minute, it's a pretty safe bet that it's not John. That would be a test based simply on

raw speed uncorrected for errors. It's only a one-way test, as it's always possible for people to go

slower than normal, but it's unusual or impossible for them to go twice their normal speed. Or, it

may be that the mystery user at the keyboard and John both type at 50 words per minute; but

John never really learned the numbers, and always has to slow down an extra half-second

whenever a number has to be entered. If the mystery user doesn't slow down for numbers, then,

again, it's a safe bet this isn't John. (n.d.)

Voice Prints

Voice biometrics works by digitizing a profile of a person's speech to produce a stored model

voice print, or template. Biometric technology reduces each spoken word to segments composed

of several dominant frequencies called formants. Each segment has several tones that can be

captured in a digital format. The tones collectively identify the speaker's unique voice print.

Voice prints are stored in databases in a manner similar to the storing of fingerprints or other

biometric data.
Biometrics and SAEDA 10

To ensure a good-quality voice sample, a person usually recites some sort of text or pass

phrase, which can be either a verbal phrase or a series of numbers. The phrase may be repeated

several times before the sample is analyzed and accepted as a template in the database. When a

person speaks the assigned pass phrase, certain words are extracted and compared with the stored

template for that individual. When a user attempts to gain access to the system, his or her pass

phrase is compared with the previously stored voice model. Some voice recognition systems do

not rely on a fixed set of enrolled pass phrases to verify a person's identity. Instead, these

systems are trained to recognize similarities between the voice patterns of individuals when the

persons speak unfamiliar phrases and the stored templates.

A person's speech is subject to change depending on health and emotional state. Matching a

voice print requires that the person speak in the normal voice that was used when the template

was created at enrollment. If the person suffers from a physical ailment, such as a cold, or is

unusually excited or depressed, the voice sample submitted may be different from the template

and will not match.(Homeland Security [], n.d.)

Facial Scan

(Watson, 2008)

Figure 4: Examples of a facial scanner that is going to be used at airports instead of paper

passports. In our everyday lives, our face is an important part of who we are and how people
Biometrics and SAEDA 11

identify us. Facial recognition consist two pars; facial detection and face identification. Face

detection is the computer ability to be able to detect a portion of the video image as an

individual’s face from a complex background. Once the location and area of the within an image

is identified. Facial scan emphasizes those sections of the face, which are less susceptible to

alterations, such as the upper outlines of the eye sockets, the sides of the mouth, and the areas

surrounding one’s cheekbones. (BioVericom, n.d.)

Watch Videos on Biometrics:

Select open hyperlink to watch videos on Biometrics

(ISAFMEDIA, 2009)

Videos

The videos were chosen from You-Tube and the videos are used to give the reader an idea of what

Biometrics is and how it works. You-Tube gives vast ideas of how Biometrics is used especially by the

military.

Purpose of SAEDA?

SAEDA (Subversion and Espionage Directed against the US Army) is a program directed by

Army Regulation 381-12 (U). The regulation, published January 15, 1993, has three chapters

and two appendices. The SAEDA program was created in order to combat Adversarial

Intelligence (ADVINT), Industrial Espionage and Terrorism, during both peace and war.

(Wikipedia, 2009)
Biometrics and SAEDA 12

Subversion

Advocating, causing, or attempting to cause insubordination, disloyalty, mutiny, or refusal

of duty by any member of the armed forces of the United States or by Department of

Defense civilian personnel with the intent to interfere with, impair, or influence the loyalty

morale or discipline of such Armed Forces. During time of war, subversion additionally

includes: (l) making or conveying false reports or false statements with the intent to interfere

with the operation or success of the armed forces of the United States or to promote the

success of its enemies; and (2) willfully obstructing or attempting to obstruct the recruitment or

enlistment service of the United States, to the injury of the United States. (U.S. Army, 1993)

Espionage

The act of obtaining, delivering, transmitting, communicating, or receiving information in

respect to the national defense with an intent or reason to believe that the information may be

used to the injury of the United States or to the advantage of any foreign nation.(U.S. Army,

1993)

Sabotage

An act or acts with intent to injure, interfere with, or obstruct the national defense of a country

by willfully injuring or destroying, or attempting to injure or destroy, any national defense or war

material, premises or utilities, to include human and natural resources.(U.S. Army, January 1993)

Terrorist activity

The activity that uses violence or the threat of violence to attain goals, political, religious, or

ideological in nature. This is done through intimidation, coercion, or instilling fear. Terrorism

Involves a criminal act that is often symbolic in nature and intended to influence an audience
Biometrics and SAEDA 13

beyond the immediate victims. b. Involves killing, causing serious bodily harm kidnapping, or

violently destroying property, or an attempt or credible threat to commit such an act. Appears

intended to endanger the protected of the Secret Service or the Department of State or to further

political, social, or economic goals by intimidating or coercing a civilian population or any

segment there of influencing the policy of a government international organization by

intimidation or coercion, or obtaining widespread publicity for a group or its causes.(U.S. Army,

1993)

Treason

Violation of the alliance owed to country. Aiding or attempting to aid the enemy with arms,

ammunition, supplies, money, or other things. Without proper authority, knowingly harboring

or protecting or giving intelligence to, communicating or corresponding with or holding any

intercourse with the enemy, either directly or indirectly. (U.S. Army, 1993)

Unauthorized disclosure

Unauthorized disclosure is a communication or physical transfer of classified information to an

unauthorized recipient. An unauthorized recipient is someone with no security clearance; one

with a security clearance but no need to know the information; a foreign intelligence and security

service; the press; criminal elements; in short, any person or organization who is not authorized

access to U.S. classified information and who does not absolutely require that information to

accomplish a mission in support of U. S. national security.(U.S. Army, 1993)

Does American still feel safe since the terrorist attacks on September 11, 2001?

The list of polls taken Rasmussen Reports shows that Americans feel that the United States have

changed for the worse and some Americans feel that they feel that we will have another attack on

American soil.
Biometrics and SAEDA 14

National Survey of 1,000 Adults


Conducted September 7-8, 2009
By Rasmussen Reports

1* We’re just about finished… Many people say that America was changed forever by the
attacks on September 11, 2001. Has America changed for better or worse?
16% Better
59% Worse
14% No change
11% Not sure

2* Have many Americans forgotten the impact of the 9/11 terrorist attacks?
49% Yes
39% No
12% Not sure

3* How likely is it that another 9/11 will take place in America in the next 10 years?
36% Very likely
30% Somewhat likely
22% Not very likely
2% Not at all likely
9% Not sure

4* Are security precautions stemming from 9/11, such as increased airline security more hassle
than they're worth?
31% Yes
51% No
17% Not sure

5* Do you believe Osama bin Laden is still alive?


71% Yes
8% No
21% Not sure

6* (answered by those who said no in question 36) If Bin laden is killed or captured will the
United States be safer?
26% Yes
56% No
19% Not sure

7* Is Al Qaeda stronger today than before the 9/11 attacks, weaker today than before the 9/11
attacks or are they about the same?
Biometrics and SAEDA 15

27% Stronger
25% Weaker
39% About the same
10% Not sure

8* Will the amount of terrorism in the world increase or decrease when the United States leaves
Iraq and Afghanistan?
42% Increase
19% Decrease
21% Stay the same
17% Not Sure

9* Would the world be better or worse if other countries became more like the United States?
57% Better
15% Worse
28% Not sure

NOTE: Margin of Sampling Error, +/- 3 percentage points with a 95% level of

confidence. (Rasmussen Reports, 2009)

Conclusion

SAEDA is used with a great technology called Biometrics. Biometrics used with SAEDA can

make our nation safer. The writer has shown the different techniques used with other military

services to enhance the eradication of terrorism. Biometrics and SAEDA can be used at all

venues that serve the American people in the United States and Abroad. Some Americans do not

know how they are being protected? They are protected at the banks, airports, and the

Department of Motor Vehicle. SAEDA is used within the military to protect itself against

espionage, subversion, and sabotage. This is how we catch the spies and traitors against our

government.
Biometrics and SAEDA 16

References

(n.d.). Iraq retina scan. Retrieved Nov 11, 2009, from iraqipages.com/cqi-bin/links/jump.cqi?

ID=531

(n.d.). Keystroke Dynamics. Retrieved November 3, 2009, from

http://en.wikipedia.org/wiki/Keystroke_dynamics

BioVericom (n.d.). Retina Biometrics. Retrieved November 2, 2009, from

Conjective Corporation (Copyright 2003-2009). What are Digital Signatures?. Retrieved l

November 4, 2009, from http://www.wisegeek.com/what-are-digital-signatures.html

Dave, C. (n.d.). Finger Print. Retrieved November 12, 2009, from

http://www.dreamstime.com/Cammeraydave_portfolio.pg1

Harris, S. (2002). Mike Meyers’ CISSP Certification Passport. Berkeley, California: McGraw-

Hill/Osborne.

Homeland Security (n.d.). Voice Verification. Retrieved November 8, 2009, from

http://www.globalsecurity.org/security/systems/biometrics-voice.htm

ISAFMEDIA. (2009, August). Soldiers Use Biometric Technology To Hunt Insurgents. [Video

file]. Video posted to http://www.youtube.com/watch?v=68SiuMUCGeo&feature=email

Krotoski, A. (n.d.). My Retinal Scan. Retrieved November 12, 2009, from

www.flicker.com/photos/toastkid/3635782594

Prabhakar, S., & Jain, A. (n.d.). FingerPrint Identification. Retrieved November 3, 2009, from

http://biometrics.cse.msu.edu/fingerprint.html

Rasmussen Reports (September 7-8, 2009). Toplines, National Survey of 1,000 Adults. Retrieved

November 9, 2009, from

http://www.rasmussenreports.com/public_content/business/econ_survey_toplines/
Biometrics and SAEDA 17

U.S. Army (January 15, 1993). Subversion and Espionage Directed Against the U.S.

Army(SAEDA). Retrieved November 8, 2009, from

http://seattletimes.newsource.com/html/nationaworld/2002142936_yeedocs.html

Watson, S. (2008). Interpool Details Plan For Global Biometric Facial Scan Database.

Retrieved November 12, 2009, from http://www.infowars.com/interpol-details-plans-for-

global-biometrics-facial-scan-database

Wikipedia (November 8, 2009). SAEDA. Retrieved November 8, 2009, from

http://en.wikipedia.org/w/index.php?title=SAEDA&printable=yes

Wikipedia (n.d.). Biometrics. Retrieved November 12, 2009, from

http://em.wikipedia.org/wiki/Biometrics
Biometrics and SAEDA 18

Appendix A: Proposal

Date: October 17, 2009


To: Dr. Denise Eggersman
From: Debra E. Morton
Re: Proposal to advocate the use of Biometrics and SAEDA (Subversion and Espionage
Directed against the US Army).

Summary

The use of SAEDA with Biometrics can be used as a means of protecting Americans from
terrorist acts foreign and domestic. Biometrics is a type of control access mechanism that can be
used to verify an individual’s identity with a unique personal attribute. Examples are
fingerprints, palm scans, retina scans, and voice prints (Harris, 2002, p. 32). SAEDA
(Subversion and Espionage Directed against the U. S. Army.) is a form of counter-intelligence
that is used for the protection of military information involving espionage, subversion, sabotage,
and terrorism. Subversion is the attempts by the enemy to compromise our faith, loyalties, and
confidence. Espionage is an attempt by the enemy through covert means to hinder our goals and
efforts to accomplish our mission. SAEDA and Biometrics covers all military and civilians in
America (SAEDA and Security, 2009). In order to use SAEDA and Biometrics properly,
America and the Armed Forces must be educated on how to report information and avoid
breaches in our military community. The proposal is to educate Americans and the military
(Army, Navy, Air Force, Marines, and Coast Guards on how to use Biometrics and how to report
information using SAEDA. The other services and Americans should be trained because they
work actively on Army military installations.

Problem

The company must come up with a SAEDA and Biometrics paper that gives Americans and the
Military SAEDA/Biometrics training. They will become knowledgeable on how to avoid
breaches and how to process and report information. Soldiers and civilians lack the knowledge
of SAEDA and Biometrics. Soldiers and civilians give intelligence to the enemy without
realizing that they are discussing military maneuvers. A soldier or civilian contractor is
stationed in a foreign country and a shop owner asks either of them when are they going to or
coming back from a field exercise. The soldier or the contractor tells the shop owner because
they don’t see this question as a potential problem. The shop keeper is a terrorist, who plan to
use IEDs (Improvised explosive devices) on soldiers on their return to or from a training
exercises. This same information can be used to kidnap civilians. They both provided the shop
keeper with dates. The soldier and civilian violate policies unknowingly that falls under
Biometrics and SAEDA.
Biometrics and SAEDA 19

Solution

To solve the issues of how soldiers and civilians use Biometrics and SAEDA, I will write a paper
that discusses how Biometrics and SAEDA is used to protect Americans foreign and domestic.
The paper should help Americans how to use information to their advantage.

The topics that will be included are:

• What is Biometrics?

• What are the types of Biometrics?

• How is Biometrics used to protect American Citizens?

• What is SAEDA?

• What is SAEDA briefing?

• What is Subversion and Espionage?

• What we can learn from the civilians and military personnel that have performed
subversion and Espionage.

Timeline for completion

The table on the following page provides a timeline for completing the major milestone
throughout this project.

Task Start Date End Date


Project Research and Planning September 13, 2009 September 20, 2009
Draft Outline September 20, 2009 September 27, 2009
Project Proposal October 11, 2009 October 18, 2009
Draft Paper October 18, 2009 October 25, 2009
Progress Report October 25, 2009 November 1, 2009
Initial Edits and Revision November 1, 2009 November 7, 2009
Feedback and Peers November 8, 2009 November 10, 2009
Finalize Paper (Edit and Revision) November 11, 2009 November 12, 2009
Final Submission November 13, 2009 November 13, 2009
Biometrics and SAEDA 20

Table 1: Timeline

Conclusion

In conclusion, this paper will give an infinitive definition of Biometrics and SAEDA. The
readers will gain the knowledge of how to protect themselves in a foreign country or right here in
the United States. Terrorist and spies have and still do live in the United States. The readers will
learn who some of our homegrown enemies were. Learning from our past will help us prepare
for the future.

Reference:

Harris, S., (2002) Mike Meyers’ Certification Passport. Berkley, California, McGraw-
Hill/Osborne.

SAEDA and Security, Retrieved October 18, 2009, from http://www.military


net.com/education/mpdsaeda.html.
Biometrics and SAEDA 21

Appendix B: Progress Report

Date: November 1, 2009


To: Dr. Eggersman
From: Debra E. Morton
Subject: Progress Report for research paper on Biometrics and SAEDA.

Summary:
The purpose of this progress report is to show the progress that Debra Morton has made to
complete her research paper on Biometrics and SAEDA. This paper will used tell the reader
what is Biometrics and SAEDA. The research paper will show how Biometrics and SAEDA is
used to protect the United States and its citizen foreign and domestic. The research paper will
debate whether the citizens of the United States are losing their rights by the means of the
government protection. The paper will discuss some of the violators that have used subversive
acts against the United States. Most of the research information is found and separated. Debra
will complete this project by November 13, 2009 or sooner.

Problems:

The only problems that Debra is having with the completion of the research paper are she is
taking a CCNA course and she was working late hours at work. This only left Friday, Saturday,
and Sunday to work on the course. On Monday, November 2, 2009, Debra will be moving to the
day shift and this will alleviate any problems with working with both courses. This is a courtesy
of moving to the travel team.
Progress:

Task Percentage Complete End Date Progress


Project Research and September13, 2009 September 20, 2009 Completed
Planning
Draft Outline September 20, 2009 September 27, 2009 Completed
Project Proposal October 11, 2009 October 18, 2009 Completed
Draft Paper October 18, 2009 November 3, 2009 80%
Progress Report November 1, 2009 November 1, 2009 Completed
Initial Edits and November 1, 2009 November 7, 2009 On target
Revision
Feedback and Peers November 8, 2009 November 10, 2009 On target
Finalize Paper (Edit November 11, 2009 November 12, 2009 On target
and Revision)
Final Submission November 13, 2009 November 13, 2009 On target
Biometrics and SAEDA 22

Conclusion:

Going to day shift will change the time that Debra will spend on the Research paper. She will
spend more time in the library. Going to the library right after work will put Debra in a place
where she can write and prepare here research paper before the deadline.

Das könnte Ihnen auch gefallen