Beruflich Dokumente
Kultur Dokumente
Debra E. Morton
Capella University
Dr. Eggersman
Abstract
Since September 11, 2001, one of the questions that Americans would ask is how is they
being protected. Is there going to be another terrorist attack? One of the ways the government
protects its citizens is by using Biometrics and SAEDA (Subversion and Espionage against the
Army). Biometrics and SAEDA are used to protect the citizens and its government from foreign
and domestic terrorism. The report will discuss the meaning of Biometrics and SAEDA. The
government protects its citizens by using the military data. Paper will discuss the enemies
within our own programs. How, when and why they spied against American and how they were
caught. The report will discuss the premise that some American feel they have lost their
alienable rights through the use of the cell phones and the internet?
Biometrics and SAEDA 3
Table of Contents
Introduction………………………………………………………………………………………5
What is Biometrics…5
What is SAEDA?............................................................................................................................6
a. Fingerprint………………………………………………………………………………6
c. Retina Scan……………………………………………………………………………7-8
d. Signature Dynamics…………………………………………………………………….8
e. Keyboard Dynamics…………………………………………………………………… 9
f. Voice Prints…………………………………………………………………………9-10
g. Facial Scan……………………………………………………………………………10
h. You-Tube Videos……………………………………………………………………….11
Purpose of SAEDA…………………………………………………………………………11-12
a. What is Subversion?..…………………………………………………………………...12
b. What is Espionage?............................................................................................................12
c. What is Sabotage………………………………………………………………………...12
d. Terrorist Activity………………………………………………………………………...12
e. Treason/Unauthorized Disclosure………………………………………………………..13
Conclusion……………………………………………………………………………………..15
References……………………………………………………………………………………16-17
Appendix A…………………………………………………………………………...............18-20
Biometrics and SAEDA 4
Appendix B………………………………………………………………………………..21-22
Biometrics and SAEDA 5
Introduction
Biometrics is a type of access control mechanism that can be used to verify an individual’s
identity with unique personal attribute. Examples of fingerprints, palm scans, retina scans, and
voice prints. These kinds of authentication systems gather a lot of information that can be hard
to imitate, thus they provide a higher level of protection when compared to other
authentication technologies. Biometrics systems are usually more expensive, relative to other
approaches, and do not usually have a high acceptance rate by society because they perceived to
be intrusive and they obtain personal information. Biometrics is sometimes seen as too Big
Brother-ish and an encroachment into our personal privacy through automated means. (Harris,
2002)
Biometrics is broken down into two different categories, Physiological Biometrics - features
notably identified through the five senses and processed by finite calculable differences: Sight
(how a person looks including things like hair & eye color, teeth, or facial features), Sound (the
pitch of a person's voice), Smell (a person's odor or scent), Taste (the composition of a person's
Behavioral Biometrics - based on the manner in which a person conducts themselves, such as:
writing style, walking rhythm, typing speed, etc. In order for any of these characteristics to be
used in sustained identification encryption purposes, they must meet the criteria of: reliable,
SAEDA is using Subversion and Espionage against the United State. The use of SAEDA with
Biometrics is used as a means of protecting Americans from terrorist acts foreign and domestic.
Biometrics can be used as a means of access control and SAEDA (Subversion and Espionage
Directed against the U. S. Army.) is used as means to protect military information from
espionage, subversion, sabotage, and terrorism. SAEDA and Biometrics covers all military and
civilians. In order to use SAEDA and Biometrics properly, the military and civilians must be
educated on how to report information and avoid breaches in our military community. The
proposal is to educate the military (Army, Navy, Air Force, Marines, Coast Guards, and civilians
on how to use Biometrics and how to report information using SAEDA. The other services and
civilians should be trained because they work actively on Army military installations.
Types of Biometrics
Fingerprint
Fingerprints are used in Biometrics because
points and ridges on fingerprints are considered
unique.
(Dave, n.d.)
Among all the biometric techniques, fingerprint-based identification is the oldest method
which has been successfully used in numerous applications. Everyone is known to have unique,
immutable fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of
the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and
Biometrics and SAEDA 7
furrows as well as the minutiae points. Minutiae points are local ridge characteristics that occur
(Wikipedia, n.d.)
Figure 2: Example of Finger Scan, Palm scans, and Hand geometry used at Walt Disney theme
park. Biometric measurements are taken from the fingers of guest to ensure that the person’s
ticket is used by the same person from day to day. Finger scans shows points on the fingerprint
that are collected and stored. This is a smaller amount of data compared to fingerprint systems.
Palm print shows creases and ridges on the palm and all fingerprint systems. Hand geometry
shows that the shape of a person’s hand (length and width and fingers) is stored in computer
Retina scan
Figure 3: Example of Finger Scan, Palm scans, and Hand geometry and how it could be used.
The retina biometric analyzes the layer of the blood vessels located at the back of the eye.
This technique usually uses a low-intensity light source through an optical coupler and scans the
unique patterns of the layer of blood vessels known as the retina. Retina scanning is quite
accurate and is very unique to every individual similar to the iris scan; but unlike the iris scan, it
typically requires the user to look into a receptacle and focus on a give point for the users’ retina
to be scanned. This is not particularly convenient for people who wear glasses or are concerned
about close contact with the reading device. The technique is more intrusive than other
biometric techniques; as a result, retina scanning is not the friendliest process even though the
technology itself is very accurate for use in identification, verification and authentication.
(BioVericom, n.d.)
Signature dynamics
Digital signatures are electronic stamps that can be used to identify the sender or the signer of
a digital document. Think of digital signatures as the digital equivalent of the signature placed on
a contract or a check. Digital signatures use public and private key pairs to ensure the
authenticity of an electronic document. The creator of the document will have the private portion
of a digital signature scheme which is encoded onto the document when it is signed. Then the
recipient of the document would receive the public key of the digital signature scheme. This
would allow the recipient of the document to know that the document was authentic and really
did come from the sender. Keeping with a paper document analogy, the purpose of a signature
is to verify that the signer is the originator of the document. Sometimes documents require
Keyboard dynamics
The behavioral biometric of Keystroke Dynamics uses the manner and rhythm in which an
individual types characters on a keyboard or keypad. The keystroke rhythms of a user are
measured to develop a unique biometric template of the users typing pattern for future
the simplest case, very simple rules can be used to rule out a possible user. For example, if we
know that John types at 20 words per minute, and the person at the keyboard is going at 70
words per minute, it's a pretty safe bet that it's not John. That would be a test based simply on
raw speed uncorrected for errors. It's only a one-way test, as it's always possible for people to go
slower than normal, but it's unusual or impossible for them to go twice their normal speed. Or, it
may be that the mystery user at the keyboard and John both type at 50 words per minute; but
John never really learned the numbers, and always has to slow down an extra half-second
whenever a number has to be entered. If the mystery user doesn't slow down for numbers, then,
Voice Prints
Voice biometrics works by digitizing a profile of a person's speech to produce a stored model
voice print, or template. Biometric technology reduces each spoken word to segments composed
of several dominant frequencies called formants. Each segment has several tones that can be
captured in a digital format. The tones collectively identify the speaker's unique voice print.
Voice prints are stored in databases in a manner similar to the storing of fingerprints or other
biometric data.
Biometrics and SAEDA 10
To ensure a good-quality voice sample, a person usually recites some sort of text or pass
phrase, which can be either a verbal phrase or a series of numbers. The phrase may be repeated
several times before the sample is analyzed and accepted as a template in the database. When a
person speaks the assigned pass phrase, certain words are extracted and compared with the stored
template for that individual. When a user attempts to gain access to the system, his or her pass
phrase is compared with the previously stored voice model. Some voice recognition systems do
not rely on a fixed set of enrolled pass phrases to verify a person's identity. Instead, these
systems are trained to recognize similarities between the voice patterns of individuals when the
A person's speech is subject to change depending on health and emotional state. Matching a
voice print requires that the person speak in the normal voice that was used when the template
was created at enrollment. If the person suffers from a physical ailment, such as a cold, or is
unusually excited or depressed, the voice sample submitted may be different from the template
Facial Scan
(Watson, 2008)
Figure 4: Examples of a facial scanner that is going to be used at airports instead of paper
passports. In our everyday lives, our face is an important part of who we are and how people
Biometrics and SAEDA 11
identify us. Facial recognition consist two pars; facial detection and face identification. Face
detection is the computer ability to be able to detect a portion of the video image as an
individual’s face from a complex background. Once the location and area of the within an image
is identified. Facial scan emphasizes those sections of the face, which are less susceptible to
alterations, such as the upper outlines of the eye sockets, the sides of the mouth, and the areas
(ISAFMEDIA, 2009)
Videos
The videos were chosen from You-Tube and the videos are used to give the reader an idea of what
Biometrics is and how it works. You-Tube gives vast ideas of how Biometrics is used especially by the
military.
Purpose of SAEDA?
SAEDA (Subversion and Espionage Directed against the US Army) is a program directed by
Army Regulation 381-12 (U). The regulation, published January 15, 1993, has three chapters
and two appendices. The SAEDA program was created in order to combat Adversarial
Intelligence (ADVINT), Industrial Espionage and Terrorism, during both peace and war.
(Wikipedia, 2009)
Biometrics and SAEDA 12
Subversion
of duty by any member of the armed forces of the United States or by Department of
Defense civilian personnel with the intent to interfere with, impair, or influence the loyalty
morale or discipline of such Armed Forces. During time of war, subversion additionally
includes: (l) making or conveying false reports or false statements with the intent to interfere
with the operation or success of the armed forces of the United States or to promote the
success of its enemies; and (2) willfully obstructing or attempting to obstruct the recruitment or
enlistment service of the United States, to the injury of the United States. (U.S. Army, 1993)
Espionage
respect to the national defense with an intent or reason to believe that the information may be
used to the injury of the United States or to the advantage of any foreign nation.(U.S. Army,
1993)
Sabotage
An act or acts with intent to injure, interfere with, or obstruct the national defense of a country
by willfully injuring or destroying, or attempting to injure or destroy, any national defense or war
material, premises or utilities, to include human and natural resources.(U.S. Army, January 1993)
Terrorist activity
The activity that uses violence or the threat of violence to attain goals, political, religious, or
ideological in nature. This is done through intimidation, coercion, or instilling fear. Terrorism
Involves a criminal act that is often symbolic in nature and intended to influence an audience
Biometrics and SAEDA 13
beyond the immediate victims. b. Involves killing, causing serious bodily harm kidnapping, or
violently destroying property, or an attempt or credible threat to commit such an act. Appears
intended to endanger the protected of the Secret Service or the Department of State or to further
intimidation or coercion, or obtaining widespread publicity for a group or its causes.(U.S. Army,
1993)
Treason
Violation of the alliance owed to country. Aiding or attempting to aid the enemy with arms,
ammunition, supplies, money, or other things. Without proper authority, knowingly harboring
intercourse with the enemy, either directly or indirectly. (U.S. Army, 1993)
Unauthorized disclosure
with a security clearance but no need to know the information; a foreign intelligence and security
service; the press; criminal elements; in short, any person or organization who is not authorized
access to U.S. classified information and who does not absolutely require that information to
Does American still feel safe since the terrorist attacks on September 11, 2001?
The list of polls taken Rasmussen Reports shows that Americans feel that the United States have
changed for the worse and some Americans feel that they feel that we will have another attack on
American soil.
Biometrics and SAEDA 14
1* We’re just about finished… Many people say that America was changed forever by the
attacks on September 11, 2001. Has America changed for better or worse?
16% Better
59% Worse
14% No change
11% Not sure
2* Have many Americans forgotten the impact of the 9/11 terrorist attacks?
49% Yes
39% No
12% Not sure
3* How likely is it that another 9/11 will take place in America in the next 10 years?
36% Very likely
30% Somewhat likely
22% Not very likely
2% Not at all likely
9% Not sure
4* Are security precautions stemming from 9/11, such as increased airline security more hassle
than they're worth?
31% Yes
51% No
17% Not sure
6* (answered by those who said no in question 36) If Bin laden is killed or captured will the
United States be safer?
26% Yes
56% No
19% Not sure
7* Is Al Qaeda stronger today than before the 9/11 attacks, weaker today than before the 9/11
attacks or are they about the same?
Biometrics and SAEDA 15
27% Stronger
25% Weaker
39% About the same
10% Not sure
8* Will the amount of terrorism in the world increase or decrease when the United States leaves
Iraq and Afghanistan?
42% Increase
19% Decrease
21% Stay the same
17% Not Sure
9* Would the world be better or worse if other countries became more like the United States?
57% Better
15% Worse
28% Not sure
NOTE: Margin of Sampling Error, +/- 3 percentage points with a 95% level of
Conclusion
SAEDA is used with a great technology called Biometrics. Biometrics used with SAEDA can
make our nation safer. The writer has shown the different techniques used with other military
services to enhance the eradication of terrorism. Biometrics and SAEDA can be used at all
venues that serve the American people in the United States and Abroad. Some Americans do not
know how they are being protected? They are protected at the banks, airports, and the
Department of Motor Vehicle. SAEDA is used within the military to protect itself against
espionage, subversion, and sabotage. This is how we catch the spies and traitors against our
government.
Biometrics and SAEDA 16
References
(n.d.). Iraq retina scan. Retrieved Nov 11, 2009, from iraqipages.com/cqi-bin/links/jump.cqi?
ID=531
http://en.wikipedia.org/wiki/Keystroke_dynamics
http://www.dreamstime.com/Cammeraydave_portfolio.pg1
Harris, S. (2002). Mike Meyers’ CISSP Certification Passport. Berkeley, California: McGraw-
Hill/Osborne.
http://www.globalsecurity.org/security/systems/biometrics-voice.htm
ISAFMEDIA. (2009, August). Soldiers Use Biometric Technology To Hunt Insurgents. [Video
www.flicker.com/photos/toastkid/3635782594
Prabhakar, S., & Jain, A. (n.d.). FingerPrint Identification. Retrieved November 3, 2009, from
http://biometrics.cse.msu.edu/fingerprint.html
Rasmussen Reports (September 7-8, 2009). Toplines, National Survey of 1,000 Adults. Retrieved
http://www.rasmussenreports.com/public_content/business/econ_survey_toplines/
Biometrics and SAEDA 17
U.S. Army (January 15, 1993). Subversion and Espionage Directed Against the U.S.
http://seattletimes.newsource.com/html/nationaworld/2002142936_yeedocs.html
Watson, S. (2008). Interpool Details Plan For Global Biometric Facial Scan Database.
global-biometrics-facial-scan-database
http://en.wikipedia.org/w/index.php?title=SAEDA&printable=yes
http://em.wikipedia.org/wiki/Biometrics
Biometrics and SAEDA 18
Appendix A: Proposal
Summary
The use of SAEDA with Biometrics can be used as a means of protecting Americans from
terrorist acts foreign and domestic. Biometrics is a type of control access mechanism that can be
used to verify an individual’s identity with a unique personal attribute. Examples are
fingerprints, palm scans, retina scans, and voice prints (Harris, 2002, p. 32). SAEDA
(Subversion and Espionage Directed against the U. S. Army.) is a form of counter-intelligence
that is used for the protection of military information involving espionage, subversion, sabotage,
and terrorism. Subversion is the attempts by the enemy to compromise our faith, loyalties, and
confidence. Espionage is an attempt by the enemy through covert means to hinder our goals and
efforts to accomplish our mission. SAEDA and Biometrics covers all military and civilians in
America (SAEDA and Security, 2009). In order to use SAEDA and Biometrics properly,
America and the Armed Forces must be educated on how to report information and avoid
breaches in our military community. The proposal is to educate Americans and the military
(Army, Navy, Air Force, Marines, and Coast Guards on how to use Biometrics and how to report
information using SAEDA. The other services and Americans should be trained because they
work actively on Army military installations.
Problem
The company must come up with a SAEDA and Biometrics paper that gives Americans and the
Military SAEDA/Biometrics training. They will become knowledgeable on how to avoid
breaches and how to process and report information. Soldiers and civilians lack the knowledge
of SAEDA and Biometrics. Soldiers and civilians give intelligence to the enemy without
realizing that they are discussing military maneuvers. A soldier or civilian contractor is
stationed in a foreign country and a shop owner asks either of them when are they going to or
coming back from a field exercise. The soldier or the contractor tells the shop owner because
they don’t see this question as a potential problem. The shop keeper is a terrorist, who plan to
use IEDs (Improvised explosive devices) on soldiers on their return to or from a training
exercises. This same information can be used to kidnap civilians. They both provided the shop
keeper with dates. The soldier and civilian violate policies unknowingly that falls under
Biometrics and SAEDA.
Biometrics and SAEDA 19
Solution
To solve the issues of how soldiers and civilians use Biometrics and SAEDA, I will write a paper
that discusses how Biometrics and SAEDA is used to protect Americans foreign and domestic.
The paper should help Americans how to use information to their advantage.
• What is Biometrics?
• What is SAEDA?
• What we can learn from the civilians and military personnel that have performed
subversion and Espionage.
The table on the following page provides a timeline for completing the major milestone
throughout this project.
Table 1: Timeline
Conclusion
In conclusion, this paper will give an infinitive definition of Biometrics and SAEDA. The
readers will gain the knowledge of how to protect themselves in a foreign country or right here in
the United States. Terrorist and spies have and still do live in the United States. The readers will
learn who some of our homegrown enemies were. Learning from our past will help us prepare
for the future.
Reference:
Harris, S., (2002) Mike Meyers’ Certification Passport. Berkley, California, McGraw-
Hill/Osborne.
Summary:
The purpose of this progress report is to show the progress that Debra Morton has made to
complete her research paper on Biometrics and SAEDA. This paper will used tell the reader
what is Biometrics and SAEDA. The research paper will show how Biometrics and SAEDA is
used to protect the United States and its citizen foreign and domestic. The research paper will
debate whether the citizens of the United States are losing their rights by the means of the
government protection. The paper will discuss some of the violators that have used subversive
acts against the United States. Most of the research information is found and separated. Debra
will complete this project by November 13, 2009 or sooner.
Problems:
The only problems that Debra is having with the completion of the research paper are she is
taking a CCNA course and she was working late hours at work. This only left Friday, Saturday,
and Sunday to work on the course. On Monday, November 2, 2009, Debra will be moving to the
day shift and this will alleviate any problems with working with both courses. This is a courtesy
of moving to the travel team.
Progress:
Conclusion:
Going to day shift will change the time that Debra will spend on the Research paper. She will
spend more time in the library. Going to the library right after work will put Debra in a place
where she can write and prepare here research paper before the deadline.