SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Remarks of Duane Blackburn
            Assistant Director, Identity Management and Homeland Security
                         Office of Science and Technology Policy
                            Executive Office of the President

                                              at the

                              Biometric Consortium Conference
                                    September 27, 2011




“We have some planes.”

Try to imagine the thoughts of the Boston Air Traffic Controller upon hearing this transmission
on the morning of September 11, 2001:
    • “Who is that?”
    • “Who should I share this information with?”
    • “What else do we know that should be linked with this information?”

   -- Questions asked by a solitary Federal official in the fog of a war that he didn’t yet know
   was taking place.
   -- Questions asked by Federal identity professionals in the fog of technology, policies, and
   bureaucracy every day since.

9/11 was a day that had started with remarkable clarity and calmness, but quickly devolved to
confusion and nervousness as citizens throughout the Nation watched the response and
recovery activities at the World Trade Center and the Pentagon. Citizens then took action,
forcing the terrorists on the fourth hijacked airliner to abandon their plans to attack yet another
national symbol. Just as it took some time for Flight 93 passengers to learn what was taking
place and to decide how to take action, the U.S. Government also took some time before it
initiated military action overseas while simultaneously implementing numerous new security
capabilities at home. Biometrics was to play a key role in both theaters because of the
criticality of identification in operational activities – a tool that had been exploited by the
terrorists themselves, as all but one of the 19 obtained and used U.S. identification documents.

This is the eighth and final time that I have the privilege of participating in a Biometric
Consortium Conference in my role of coordinating Federal biometric activities out of the White
House’s Office of Science and Technology Policy. The amount of progress that this community
has made over this period is truly astonishing, and the impact that you have had in securing our
country has been considerable. Our progress and impact has been enabled through
collaboration – collaboration within the Federal government, collaboration across the private

                                                -1-
sector, and numerous public-private partnerships. Our activities, and the manner in which we
pursued them, has been followed, supported, and praised by two separate presidential
administrations. Each group of individuals within this community deserves praise:
    • Biometric Consortium. The Consortium was a bit unstable on 9/11 as the policy-level
        oversight entity that it reported to had been recently terminated. It stabilized and
        evolved into what you see today: the preeminent worldwide gathering place to discuss
        biometrics. Jeff, Fernando, and Dick deserve a thank you from each of us for their
        commitment to this conference.
    • Educational Professionals. In the days following 9/11, we quickly realized that
        individuals with adequate educational background and practical biometrics experience
        were in short supply. Today we have biometrics and identity management courses,
        degrees and professional certifications that provide the training necessary for our
        community to function.
    • Researchers and standards organizations. Your advancements have been absolutely
        stunning! The core capabilities of today’s technologies are orders of magnitude better
        than they were on 9/11. The availability and use of standards, long an indicator of a
        technology’s maturity, has enabled our system of identity systems to function.
    • Biometric companies. After a rough start, biometric providers responded to provide
        vastly improved products that continually perform as we expect and need them to. You
        are the backbone of our current capabilities, and our future success depends on your
        stability and ingenuity.
    • System Integrators. Biometric technologies are but one piece of a functioning
        operational system. Fortunately, there are dozens of competent system integrators
        with experience developing complex systems for federal government and private sector
        applications that have done a wonderful job of incorporating biometric technologies.
    • Privacy professionals. There wasn’t a single departmental privacy official on 9/11, but
        the first one brought aboard immediately dove into identity issues. Many of the lessons
        learned in our initial work were applied to other technology issues as well, making this
        young field of biometrics a graybeard in the application of privacy theory within the
        federal government. We now have a cadre of privacy and civil liberties professionals
        throughout the federal government that are successfully integrating their principles
        throughout a biometric system’s lifecycle.
    • Intel Analysts. The newest entrant into the biometrics community is intelligence
        analysts. While it may be difficult enough to recognize someone with a biometric
        system, it is even more difficult to figure out what to do about the hit. It is this “so
        what” question that intel analysts answer. They have quickly gained knowledge on
        biometric systems, and what the hits mean, and seamlessly incorporated this new bit of
        information into their analyses. Working out of sight, and usually unknown to the
        world, these are the individuals who transform our technical capabilities into
        operational successes.
    • Finally, Federal program managers and policy officials. This is the group that I have
        worked the closest with over the past eight years, and they have inspired me every day.
        It is impossible to comprehend how difficult it is to collaborate across stovepipes inside

                                               -2-
the federal government without living in it firsthand. Oversight structures, the budget
       process, and even personnel evaluations seemingly conspire to convince them that
       collaboration is too risky or just plain not worth their time. Federal officials leading
       biometric activities have consistently overcome these hurdles and redoubled their
       efforts to collaborate with, and provide free assistance to, their partners throughout the
       federal service. I have worked on and led collaborative endeavors on a variety of other
       topics within the White House, but none of them have embraced the necessity and
       benefits of working together as much as your Federal biometrics leadership has. This
       has often been a thankless task for them, until now. Thank you all.

While we celebrate the progress and impact enabled by the biometrics community throughout
this week, we cannot relax and sit back contently. Threats to our homeland and national
security remain, and our adversaries are constantly studying our defensive postures -- they are
certainly looking for holes in our layers of identity protections. Because of this, we must also
move forward and continue to advance this technology so that we can provide even better
operational capabilities in the future. To that end, the NSTC Subcommittee on Biometrics and
Identity Management is releasing a 2011 update to The National Biometrics Challenge. This
new report provides an overview of current challenges related to strengthening the scientific
foundation of biometrics and improving identity management system capabilities. It clarifies
biometrics-related priorities for Federal agencies and provides context for non-governmental
entities considering collaborations with agencies as private-sector partners.

This community rose to the challenge issued in 2006, and I ask that you do so again today. Use
this conference to learn what we are currently capable of, to discover groundbreaking
opportunities for improvement, to foster collaboration, and to re-enlist in your community for
the next ten years.




                    The National Biometrics Challenge, as well as the
                       BCC 2011 Opening Video, are available for
                          download at www.biometrics.gov.




                                               -3-

Contenu connexe

En vedette

Guión para la Eucaristía
Guión para la EucaristíaGuión para la Eucaristía
Guión para la Eucaristíacristinamoreubi
 
Folkia Bizkit Presentation 090401
Folkia Bizkit Presentation 090401Folkia Bizkit Presentation 090401
Folkia Bizkit Presentation 090401Björn Karlström
 
BlendingDigitalinTeacherEducation
BlendingDigitalinTeacherEducationBlendingDigitalinTeacherEducation
BlendingDigitalinTeacherEducationNational University
 
Naco Projects
Naco ProjectsNaco Projects
Naco Projectsmaipily
 
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...Lisa Chow
 
Calculul drumului scurt
Calculul drumului scurtCalculul drumului scurt
Calculul drumului scurtadryan867up
 
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and SkillsSLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and SkillsLisa Chow
 
"5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee...
"5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee..."5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee...
"5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee...Arun Cavale Cavale
 
DiffCalculus August 9, 2012
DiffCalculus August 9, 2012DiffCalculus August 9, 2012
DiffCalculus August 9, 2012Carlos Vázquez
 
Christmas Newsletter
Christmas NewsletterChristmas Newsletter
Christmas Newsletterandy biggin
 

En vedette (18)

The Copywriter's Handbook 文案创作完全手册 Chap1
The Copywriter's Handbook 文案创作完全手册 Chap1The Copywriter's Handbook 文案创作完全手册 Chap1
The Copywriter's Handbook 文案创作完全手册 Chap1
 
Teach,Tutor, Assess ISTE 2012
Teach,Tutor, Assess ISTE 2012Teach,Tutor, Assess ISTE 2012
Teach,Tutor, Assess ISTE 2012
 
Delårspresentation Q1 09
Delårspresentation Q1 09Delårspresentation Q1 09
Delårspresentation Q1 09
 
Star 2013-pdfa-pdfa
Star 2013-pdfa-pdfaStar 2013-pdfa-pdfa
Star 2013-pdfa-pdfa
 
What’s new on f15
What’s new on f15What’s new on f15
What’s new on f15
 
Guión para la Eucaristía
Guión para la EucaristíaGuión para la Eucaristía
Guión para la Eucaristía
 
Folkia Bizkit Presentation 090401
Folkia Bizkit Presentation 090401Folkia Bizkit Presentation 090401
Folkia Bizkit Presentation 090401
 
First Partial Review
First Partial ReviewFirst Partial Review
First Partial Review
 
BlendingDigitalinTeacherEducation
BlendingDigitalinTeacherEducationBlendingDigitalinTeacherEducation
BlendingDigitalinTeacherEducation
 
Naco Projects
Naco ProjectsNaco Projects
Naco Projects
 
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
SLA@Pratt Skill Share: Leadership and Career Development for the New Informat...
 
Calculul drumului scurt
Calculul drumului scurtCalculul drumului scurt
Calculul drumului scurt
 
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and SkillsSLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
SLA Webinar: Using E-Portfolios to Showcase Your Work, Experience, and Skills
 
State Building Role Play
State Building Role PlayState Building Role Play
State Building Role Play
 
"5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee...
"5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee..."5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee...
"5 Things in 5 Minutes" Series No.4 - "Mr. Banker, 5-Reasons Why the Bank Nee...
 
DiffCalculus August 9, 2012
DiffCalculus August 9, 2012DiffCalculus August 9, 2012
DiffCalculus August 9, 2012
 
Christmas Newsletter
Christmas NewsletterChristmas Newsletter
Christmas Newsletter
 
Democratizacion
DemocratizacionDemocratizacion
Democratizacion
 

Plus de Duane Blackburn

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-ApprovedDuane Blackburn
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesDuane Blackburn
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerDuane Blackburn
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementDuane Blackburn
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Duane Blackburn
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)Duane Blackburn
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EDuane Blackburn
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Duane Blackburn
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...Duane Blackburn
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Duane Blackburn
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryDuane Blackburn
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report Duane Blackburn
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Duane Blackburn
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual FoundationDuane Blackburn
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics ChallengeDuane Blackburn
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Duane Blackburn
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Duane Blackburn
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process OverviewDuane Blackburn
 

Plus de Duane Blackburn (20)

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-Approved
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity Management
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&E
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process Overview
 
BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
 

Dernier

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 

Dernier (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 

BCC 2011: Blackburn Opening Address Transcripts

  • 1. Remarks of Duane Blackburn Assistant Director, Identity Management and Homeland Security Office of Science and Technology Policy Executive Office of the President at the Biometric Consortium Conference September 27, 2011 “We have some planes.” Try to imagine the thoughts of the Boston Air Traffic Controller upon hearing this transmission on the morning of September 11, 2001: • “Who is that?” • “Who should I share this information with?” • “What else do we know that should be linked with this information?” -- Questions asked by a solitary Federal official in the fog of a war that he didn’t yet know was taking place. -- Questions asked by Federal identity professionals in the fog of technology, policies, and bureaucracy every day since. 9/11 was a day that had started with remarkable clarity and calmness, but quickly devolved to confusion and nervousness as citizens throughout the Nation watched the response and recovery activities at the World Trade Center and the Pentagon. Citizens then took action, forcing the terrorists on the fourth hijacked airliner to abandon their plans to attack yet another national symbol. Just as it took some time for Flight 93 passengers to learn what was taking place and to decide how to take action, the U.S. Government also took some time before it initiated military action overseas while simultaneously implementing numerous new security capabilities at home. Biometrics was to play a key role in both theaters because of the criticality of identification in operational activities – a tool that had been exploited by the terrorists themselves, as all but one of the 19 obtained and used U.S. identification documents. This is the eighth and final time that I have the privilege of participating in a Biometric Consortium Conference in my role of coordinating Federal biometric activities out of the White House’s Office of Science and Technology Policy. The amount of progress that this community has made over this period is truly astonishing, and the impact that you have had in securing our country has been considerable. Our progress and impact has been enabled through collaboration – collaboration within the Federal government, collaboration across the private -1-
  • 2. sector, and numerous public-private partnerships. Our activities, and the manner in which we pursued them, has been followed, supported, and praised by two separate presidential administrations. Each group of individuals within this community deserves praise: • Biometric Consortium. The Consortium was a bit unstable on 9/11 as the policy-level oversight entity that it reported to had been recently terminated. It stabilized and evolved into what you see today: the preeminent worldwide gathering place to discuss biometrics. Jeff, Fernando, and Dick deserve a thank you from each of us for their commitment to this conference. • Educational Professionals. In the days following 9/11, we quickly realized that individuals with adequate educational background and practical biometrics experience were in short supply. Today we have biometrics and identity management courses, degrees and professional certifications that provide the training necessary for our community to function. • Researchers and standards organizations. Your advancements have been absolutely stunning! The core capabilities of today’s technologies are orders of magnitude better than they were on 9/11. The availability and use of standards, long an indicator of a technology’s maturity, has enabled our system of identity systems to function. • Biometric companies. After a rough start, biometric providers responded to provide vastly improved products that continually perform as we expect and need them to. You are the backbone of our current capabilities, and our future success depends on your stability and ingenuity. • System Integrators. Biometric technologies are but one piece of a functioning operational system. Fortunately, there are dozens of competent system integrators with experience developing complex systems for federal government and private sector applications that have done a wonderful job of incorporating biometric technologies. • Privacy professionals. There wasn’t a single departmental privacy official on 9/11, but the first one brought aboard immediately dove into identity issues. Many of the lessons learned in our initial work were applied to other technology issues as well, making this young field of biometrics a graybeard in the application of privacy theory within the federal government. We now have a cadre of privacy and civil liberties professionals throughout the federal government that are successfully integrating their principles throughout a biometric system’s lifecycle. • Intel Analysts. The newest entrant into the biometrics community is intelligence analysts. While it may be difficult enough to recognize someone with a biometric system, it is even more difficult to figure out what to do about the hit. It is this “so what” question that intel analysts answer. They have quickly gained knowledge on biometric systems, and what the hits mean, and seamlessly incorporated this new bit of information into their analyses. Working out of sight, and usually unknown to the world, these are the individuals who transform our technical capabilities into operational successes. • Finally, Federal program managers and policy officials. This is the group that I have worked the closest with over the past eight years, and they have inspired me every day. It is impossible to comprehend how difficult it is to collaborate across stovepipes inside -2-
  • 3. the federal government without living in it firsthand. Oversight structures, the budget process, and even personnel evaluations seemingly conspire to convince them that collaboration is too risky or just plain not worth their time. Federal officials leading biometric activities have consistently overcome these hurdles and redoubled their efforts to collaborate with, and provide free assistance to, their partners throughout the federal service. I have worked on and led collaborative endeavors on a variety of other topics within the White House, but none of them have embraced the necessity and benefits of working together as much as your Federal biometrics leadership has. This has often been a thankless task for them, until now. Thank you all. While we celebrate the progress and impact enabled by the biometrics community throughout this week, we cannot relax and sit back contently. Threats to our homeland and national security remain, and our adversaries are constantly studying our defensive postures -- they are certainly looking for holes in our layers of identity protections. Because of this, we must also move forward and continue to advance this technology so that we can provide even better operational capabilities in the future. To that end, the NSTC Subcommittee on Biometrics and Identity Management is releasing a 2011 update to The National Biometrics Challenge. This new report provides an overview of current challenges related to strengthening the scientific foundation of biometrics and improving identity management system capabilities. It clarifies biometrics-related priorities for Federal agencies and provides context for non-governmental entities considering collaborations with agencies as private-sector partners. This community rose to the challenge issued in 2006, and I ask that you do so again today. Use this conference to learn what we are currently capable of, to discover groundbreaking opportunities for improvement, to foster collaboration, and to re-enlist in your community for the next ten years. The National Biometrics Challenge, as well as the BCC 2011 Opening Video, are available for download at www.biometrics.gov. -3-