Free Essay

Biometric Pin


Submitted By JRDB1995
Words 1643
Pages 7
With this terms Presidential Election closed most people are now focused on the hot topics affecting the country. For a majority of Americans this topic is the deficit. Everyone has an idea of who should get less money and who is spending frivolously, but there is no concrete plan to save money and decrease debt. One area that could use a little face lift is the welfare system. This past fiscal year it was reported that the government spent $75 billion dollars on the food stamp program and over $700 million was lost in fraudulent activity (Pianin 2012). Fraud, waste, and abuse are rampant in the food stamp program; therefore, the US government should overhaul the current system utilizing a more efficient biometric pin in chip card system.
Tackling problems in the welfare system can be daunting without a clear vision. There are many theories about what changes would be more beneficial. It is evident that fraud in the system causes a great loss. To understand just how the food stamp program can be improved, an understanding of the program must be established. Currently the United States Department of Agriculture (USDA) no longer issues out paper “food stamps” but has moved on to a program called Supplemental Nutrition Assistance Program or SNAP (USDA 2012). When a U.S. citizen is enrolled into the SNAP program the local welfare office issues out an Electronic Benefits Transfer card or EBT card. These cards are used as pin activated debit cards which are loaded up monthly with a fixed amount of funds. The benefits holder can then go to a local vendor that accepts the EBT card and they are able to purchase food items that are on a government approved list.
When taking a glimpse of this system, it looks fairly simple and forthright but the fact is there are people that use this simplicity to dupe the system. For starters, the EBT card does not have the receivers name or any identifying markers. Virtually anyone with access to the pin number can utilize the card. Secondly, there is no technology in place to see who purchased on the card, where they purchased food, or electronic records of their entitlements (USDA 2012).
The United States Military currently uses Common Access Card system or CAC system. This card is mainly used for base and computer access but can be utilizes for much more. The card works as a pin in chip system and has several security features that deter unauthorized individuals access to government installations and government computers and files. When obtaining a CAC, individuals must follow a set of procedures. Employees must pass a routine background check, provide a scan of their finger prints, and have their picture taken. Information loaded on the card would consist of name, rank, security clearance, and expiration date of the card. In order to utilize the card the recipient must program the card with a password during the card issue procedures. The face of the card shows the recipients basic information as well as a picture of the authorized individual. Within the card is a chip that can only be read with a special card reader and the programmed password.
This may sound complicated, but once the software and hardware are in place it’s very simple. In fact, other government offices and civilian businesses utilize similar technologies. The fitness chain, 24 Hour Fitness, completed a trial based on the same technology with favorable results (Bulwa 2010). According to an article written in the San Francisco Chronicle, 24 Hour Fitness tested fingerprint scanning of members for several months with positive results. The draw of the biometrics technology comes from the financial standpoint. 24 Hour Fitness reported the now affordable biometrics technology saves the company money by eliminating the use for plastic membership cards. Last year the company issued out 1.9 million cards to its members.
The use of a fingerprint check have also aided in eliminating nonmembers from gaining access to their gyms. In this same article, the author interviewed a woman who admitted sneaking into the health club by using her friend’s gym membership card. The company only saw 3 percent disapproval from all the clubs who participated during the trial. According to the developers of the biometric check in device used by 24 Hour Fitness, the software is developed in such a way that a personal information leak is very marginal. “The machines, made by MorphoTrak of Alexandria, Va., map out unique points within the ridges of a finger, then convert that information into a binary code - ones and zeroes - that is encrypted” (Bulwa 2010. p 1).
With any change to an already recognized program, a need for modification must be established. In order to warrant a change for the SNAP program, the new technology would have to save money and be efficient. According to an article in the Fiscal Times, it is estimated that money lost due to fraudulent use of the EBT card averaged $750 million dollars this year alone (Pianin 2012). While several food stamp scams exist, the most common practice among dishonest recipients is the selling of the physical EBT card for cash. The way the SNAP recipient sells their card is quite simple. The recipient advertises by word of mouth or by posting ads on pubic selling sights marketing their desire to sell their benefits card for cash. Once the transaction between the two criminals is cemented the beneficiary and the buyer will agree on a specific amount of time for the buyer to use the amount on the card. After the agreed time has passed the beneficiary will report the card stolen and a new card and pin will be issued by the local welfare office. The card is sold for less than what the card is actually worth. For example, if the card has $100 dollars loaded on it, the seller will charge $50 dollars for the physical card and pin number. Why would a beneficiary be willing to accept a $50 dollar loss? By selling the benefits entitlement for cash, the benefits holder can use then use that cash for items that are not listed on the approved list such as beer, cigarettes, or toiletries.
There is very little a vendor or the government can do to pinpoint fraudulent claims other than investigating consistent card reissuing. The flaws in the system fail to provide a tally of total taxpayer money that is lost and fail to identify without a reasonable doubt the culprits. By utilizing a fingerprint system, the practice of selling benefits for cash is all but exterminated. If a CAC type card is adopted, the criminal who buys a benefits card must get through several fail saves before they are free and clear. First, the new SNAP card would have a picture that can alert a vendor. Second, they must know the password to activate the card and last they must be able to fabricate a fingerprint that can fool the approved biometric check system. As with any system, people that want to dupe the system will find a way. At least with this system, the money saved can be used to help those who are straightforward and in need.
With any newly introduced program, problems can arise. Most of these problems occur when computer specialists try to “reinvent the wheel”. Other government agencies such as the military and even the Department of Motor Vehicles use this type of technology (Bulwa 2010). Utilizing the experience of other government departments would help to isolate system hiccups. It could also identify pros and cons other departments have already learned by trial and error. Information sharing alone could save both employee time and taxpayer money.
Efficiency is another selling point for this technology. If it is not user friendly and direct then there is no need to even introduce it. Currently the Federal Bureau of Investigations (FBI) is taking steps to improve biometric technology accuracy, efficiency, and timeliness by developing a user friendly and efficient database that can be used by many government agencies (Lynch 2011). Right now the database is focusing on face recognition in support of criminal tracking and identification; however the one of the missions of the FBI is to protect the economy of this nation (Lynch 2011). It is feasible that this technology could go beyond national security and help other agencies, including The Bureau of Special Investigations (BSI), which investigates fraud cases regarding the SNAP program.
Another problem that will need to be addressed is the refusal of some US citizens to participate in this new system. This new idea could pose personal rights questions. An article published in the New York Post stated that by making a biometric system mandatory lawmakers are basically assuming all welfare recipients are crooks and out to take advantage of the system (Taylor 2011). According to the article, some lobbyists suggest fingerprinting is an infringement of civil rights. Most citizens already provide finger prints for a driver’s license. Why would it be difficult for people to provide them in order to receive food for their hungry children? By cracking down on culprits who wish to take advantage of the generosity of others, the capital of the welfare program can be divided amongst law abiding citizens who are truly in need.
Millions of taxpayer dollars are stolen from the U.S. lower class every year. A need to restructure the welfare system would not only benefit them but would save the taxpayer millions of dollars in loss. Biometric identification is no longer a novelty seen only in spy movies. Today, this science can be used to wipe out a majority of welfare benefits fraud. The embrace of new technology and tools that are readily available in this era can not only enrich the country, but its citizens, as well.

Similar Documents

Premium Essay

Nt2580 Unit 3 Assignment & Lab

...Identification, which is defined in this sense as: physical keys or cards, smart cards, and other physical devices that might be used to gain access to something. What needs to be done for the Remote Access Control Policy is a group member policy needs to be setup which uniquely identifies each user. Users should be identified by rank with higher ranking users requiring more authentication. Each individual user should be assigned to a group based on rank with special permissions. Using this system for Identification will make our company more secure in day to day operations. The second part I need to implement for this remote access control policy is Authentication, which is defined as: what you know or passwords, numeric keys, PIN numbers, secret questions and answers. For remote access, there must be proof that the person is who they say they are every time they attempt to access a workstation with a retry limit. This is to help thwart any hacking attempts that could be made such as: Man in the middle attacks, keylogging and brute forcing. Also using knowledge authentication for recovery will make it harder to any potential threats to take ownership of an account. The last part...

Words: 477 - Pages: 2

Free Essay


... DHT11 vs DHT22 We have two versions of the DHT sensor, they look a bit similar and have the same pinout, but have different characteristics. Here are the specs: DHT11 ( Ultra low cost 3 to 5V power and I/O 2.5mA max current use during conversion (while requesting data) © Adafruit Industries Page 3 of 10 Good for 20-80% humidity readings with 5% accuracy Good for 0-50°C temperature readings ±2°C accuracy No more than 1 Hz sampling rate (once every second) Body size 15.5mm x 12mm x 5.5mm 4 pins with 0.1" spacing DHT22 ( Low cost 3 to 5V power and I/O 2.5mA max current use during conversion (while requesting data) Good for 0-100% humidity readings with 2-5% accuracy Good for -40 to 125°C temperature readings ±0.5°C accuracy No more than 0.5 Hz sampling rate (once every 2 seconds) Body size 15.1mm x 25mm x 7.7mm 4 pins with 0.1" spacing As you can see, the DHT22 ( is a little more accurate and good over a...

Words: 834 - Pages: 4

Premium Essay

Gait Analysis

...arbitrary viewpoints is an important requirement for different applications such as intelligent environments, surveillance and access control. Human gait is an attractive modality for recognizing people at a distance. Human gait is a spatio-temporal phenomenon that characterizes the motion characteristics of an individual. There is an increased interest in gait as a biometric, mainly due to its nonintrusive as well as non-concealable nature. It is possible to detect and measure gait even in low resolution video. Our goal is to establish a simple baseline method for human identification based on body shape and gait. Our project describes a representation of the dynamics of human walking action for the purpose of person identification and classification by gait appearance. The outer contour of the binarized silhouette of a walking person is chosen as the basic image feature. This project is also based on face recognition software to obtain recognition in a short period of time interval after the image is searched.. Since there has been significant improvement in the sector of retrieval systems and recognition based on biometric systems the project gains a lot of weightage in terms of research carried out. 1 Introduction 1. INTRODUCTION 1.1 IMAGE PROCESSING: Image Processing is a technique to enhance raw images received from cameras or sensors placed on satellites, space probes, aircrafts, surveillance systems or pictures taken in normal day-to-day life for various applications...

Words: 8133 - Pages: 33

Premium Essay


...What is a Biometric Time and Attendance System? Biometrics is the identification of people based upon their physical characteristics; most commonly their fingerprints, hands, eyes, or facial features. While time and attendance systems are used to manage employee attendance, scheduling, and associated payroll tasks. Within time and attendance, biometric devices are often used as a punch clock in order to add an extra layer of security, accountability and efficiency. How Does Biometric Time and Attendance Software Work? Step 1: Biometric Devices: Using biometric time and attendance systemsallows employees to clock in and out using their fingerprint, retinal scan, etc. Often times this process is also accompanied by a PIN (Personal Identification Number) which must also match the fingerprint or other scan. Step 2: Time and Attendance Software: Pairing your biometric device with a time and attendance software allows for more efficient payroll and attendance processing. Rather than spending hours adding up manually submitted clock-in and clock-out times, your biometric time and attendance software will allow you to automatically import data into your payroll software. This will significantly cut down on processing time and will eliminate errors derived from manually inputting information. Different Types of Biometric Devices Fingerprint Scanners are probably the most common type of biometric time and attendance device, simply because they are easy to use and are generally quite...

Words: 573 - Pages: 3

Free Essay

Information and Communication Technology

...Information and Communications Technology (ICT) is defined as the set of technologies which provide information through devices for communication or application such as wireless networks , television and satellite systems cellular phones, just to name a few. Information and Communication technology is also linked to various services and applications such as video conferencing and distance learning. This essay will therefore be focused on the impact of Information and Communications Technology in the health sector. Benefits of Information and Communications Technology to this sector will also be highlighted as well as some of the concerns that evolve around it and also an emerging ICT trend. The use of health communication strategies and health technologies has improved the health of populations all throughout the world which has enabled persons to understand and use information from the health care sector effectively. One benefit of ICT to the healthcare sector is the building of social support networks. According to Bau, I (2011)“The widespread use of health and communications technologies has the potential to engage patients and health consumers in their own self-care” . Even though there are many persons with the same illness worldwide, not everyone is capable of handling the mental aspect of their illness, the same way. These social support networks provide the help needed and the comfort of knowing that there is in fact, someone there for you. Another benefit of using...

Words: 676 - Pages: 3

Premium Essay

Biometric Eigenvalue estimation plays an important role in biometrics. However, if the number of samples is limited, estimates are significantly biased. In this article we analyse the influence of this bias on the error rates of PCA/LDA based verification systems, using both synthetic data with realistic parameters and real biometric data. Results of bias correction in the verification systems differ considerable between synthetic data and real data: while the bias is responsible for a large part of classification errors in the synthetic facial data, compensation of the bias in real facial data leads only to marginal improvements. September 14, 2003 September 2003 Introduction Among the many reactions to the September 11 tragedy has been a renewed attention to biometrics. The federal government has led the way with its new concern about border control. Other proposals include the use of biometrics with ID cards and in airports, e.g. video surveillance enhanced by facial-recognition technology. The purpose of this document is to sketch out EFF's concerns about biometrics. In today's public arena, biometric technologies are being marketed as a "silver bullet" for terrorism; however, very little independent, objective scientific testing of biometrics has been done. Deploying biometric systems without sufficient attention to their dangers makes them likely to be used in a way dangerous...

Words: 7685 - Pages: 31

Free Essay

The Security Authentication Process

...(passwords or passphrases) * Something a person has (such as cryptographic tokens or smartcards) * Something a person is (a fingerprint, retina or iris scan, or hand topography or geometry * Something a person produces (such as voice or pattern recognition) The level of access control associated with a system and the data contained on the system is determined by legislation (varies geographically) governing data, and control policies developed and implemented by the entity who owns or controls the data. Passwords and passphrases, or something a person knows, are potentially the most commonly recognized forms of authentication. Specific examples of password and passphrase authentications include a Personal Identification Number (PIN) used at a bank ATM or a password safeguarding an e-mail account. However, stronger authentication is required for some...

Words: 1415 - Pages: 6

Free Essay

Drawing Pin

...The drawing pin. In this essay, I intend to write about the advantages and disadvantages about a drawing pin. I will also write about the key features of a drawing pin. These include; • Thumb Tacks - long heads, can be used as hooks • Drawing Pins - flat plastic heads • Giant Thumb Tacks - easy grip • Hexagonal Pins- paper labels on heads for coding • Map Pins - coloured heads for coding • Pyramid Pins - coloured heads for coding • All pins in assorted colours only Drawing pins are a short nail or pin used to fasten items to a wall or to a board which may be used in displays and intended to be inserted by hand, generally without the assistance of tools. Basic History Edwin Moore invented the "push-pin" in 1900 and founded the Moore Push-Pin Company. Moore described the push-pin as a pin with a handle. Later, in 1904, in Germany, a clockmaker Johann Kirsten invented the flat-headed thumb tacks for use with drawings. Components A drawing pin has two basic components: the head, often made of plastic, metal or wood, and the body, usually made of steel, brass, tin or iron. Many head designs are often flat, domed, spherical, cylindrical and a variety of heads such as hearts or stars. Drawing pins heads also come in a variety of colours. These can be particularly useful to mark different locations on a map. Some drawing pins are designed to have the body cut out of the head and bent downward to produce a tack. Drawing pins are really useful...

Words: 284 - Pages: 2

Premium Essay


...BIOMETRICS BY: WILLIAM C. NEWTON SECR 5080 INFORMATION SYSTEMS SECURITY TABLE OF CONTENTS 1. TITLE PAGE………………………………………………………………………1 2. TABLE OF CONTENTS………………………………………………………….2 3. ABSTRACT………………………………………………………………………..3 4. HISTORY…………………………………………………………………………..4 5. TYPES OF BIOMETRICS………………………………………………………….6 6. FACIAL RECOGNITION…………………………………………………………..7 7. RETNA SCANNER………………………………………………………………….8 8. FINGERPRINT……………………………………………………………………….9 9. HANDPRINT…………………………………………………………………………9 10. VOICE AUTHENTICATION………………………………………………………10 11. AUTHENTICATION………………………………………………………………...11 12. SUMMARY…………………………………………………………………………..11 13. REFERENCES………………………………………………………………………..12 ABSTRACT This paper previewed my research of biometrics from the early 500 BCs to the 21st century. Upon understanding some of the biometrics differences and earlier methods used, I think the world is definitely is a better place to live in, as well as a much safer world to be in. One example of how this was used to make the world a better place was where biometrics were used at the NFL Super Bowl game in Tampa, Florida. There are many different types and ways of using biometrics to prevent entry into certain places or even to catch criminals from further causing damage in society. Biometrics is the overall study of measurable characteristics, specifically in computer security biometrics refers to the different authentication techniques that rely on measurable physical characteristics...

Words: 2368 - Pages: 10

Premium Essay


...“Biometric attendance in the workplace is a threat to privacy”. How far do you agree? (30 marks) Ref - Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy...

Words: 665 - Pages: 3

Premium Essay


...Biometrics in Schools, Colleges and other Educational Institutions The following guidance has been prepared as an aid to schools, colleges and other educational institutions that may be considering the installation and use of a biometric system. This document is intended to encourage such institutions to fully consider if there is need for a biometric system in the first place and then to assess the privacy impact of different systems. The critical issues to be considered from a data protection perspective are the proportionality of introducing a biometric system and the requirement to obtain the signed consent of the student users (and their parents or guardians in the case of minors) giving them a clear and unambiguous right to opt out of the system without penalty. The document is not intended to promote any particular system, but is intended to make schools and colleges aware of their responsibilities under the Data Protection Acts 1988 & 2003. It is the use of a biometric system that may give rise to a data protection concern, not necessarily the production or sale of a system. All situations must be judged on a case-by-case basis. 1. Different types of Biometric systems All biometric systems operate on the basis of the automatic identification or authentication/verification of a person. What differs between systems is the nature of the biometric and the type of storage. 1.1 Information used to generate biometric data Biometric data may be created from physical or physiological...

Words: 3989 - Pages: 16

Premium Essay

Biometrics Technology in Healthcare Industry

...Biometrics Technology in Healthcare sector Miss Chawisa Srisinthara Mr. Sangsan Poonyapotapirata Miss Chadaporn Champangoen Miss Tanwarat Trangpanich Mr. Ekapol Koosuwan NIDA Business School National Institute of Development Administration 118 Seri Thai Road, Bangkapi, Bangkok 10240, Thailand Email : Tel. +66890710010 Biometrics Technology in Healthcare sector ABSTRACT Nowadays, Biometrics has become an important system in a process for all industries due to this technology can help the companies to manage the data such as gathering, integration, and summary. The companies can also apply this system in every working process steps. Besides, the data can be transferred from paper-based data into computer-based data which is convenience, safety, and accuracy. Moreover, The Biometrics system provides excellence operation and improves productivity. Especially, the biometrics system should be executed in healthcare industry because the patient information is classified and considerable for healthcare providers. 1. Introduction The “Biometrics” is the combination of “Bio” which means a creature and “Metrics” which means a characteristic that can be measured and estimated an amount. So, Biometrics is the biological technology that integrates between biological, medical, and computer technology. It use for measure physiological characteristics and behaviors that is the individual character of each person for identification...

Words: 5739 - Pages: 23

Premium Essay

Biometrics Moving Forward

...BoBiometrics to Secure Networks John W. Sisson American Public University Contents Abstract 3 Biometrics to Secure Networks 4 Biometrics Defined 4 Biometric Process 5 Fingerprinting 6 Face Recognition 7 Iris Recognition 8 Hand Recognition 9 Voice Recognition 9 Dynamic Signature 10 Keystroke Dynamics 10 Gait Recognition 10 Facial Thermograph 11 Emergence 11 Obstacles to Biometric Success 12 Conclusion 13 References 15 Abstract Biometrics was once thought to be more of a science fiction means of authentication, not something that could be used in real life applications. The cost was much higher than most companies dreamed of spending. Username and passwords were an effective and efficient means of security. Computer security was not looked at as a must, but more of a way to keep honest people honest. However, as computing power increased, and corporate espionage has led to massive losses for companies, computer security needs increased. Passwords just were not the best means of securing a network anymore. At the same time, improvements in technology made the use of biometrics more efficient. We will now examine the different types of biometric and how they will make the network more secure. Biometrics to Secure Networks For years, passwords have been the method used to secure networks. A user would input his or her userid and password to gain access. Many times, the userid was also the first portion of the users E-mail address. This means...

Words: 3757 - Pages: 16

Free Essay

My Project

...Biometric Authentication and Applications. Unlike traditional authentication techniques, e.g., PIN code or password, biometrics provides an alternative yet natural way for personal identity authentication. Biometrics handles authentication of individuals on the basis of biological and/or behavioural characteristics (measurements of the human body). As a primary advantage, biometric features are typically unique and, therefore, cannot be misplaced and forgotten since these are always inherently associated with human beings. The major biometric features include voice, face, fingerprint, irises, retinas, palmprint, signature, and so on. In general, there are two types of biometric systems: identification for identifying an unknown biometric token as belonging to one of people (registered in the system) and verification for accepting or rejecting the identity claim of a person based on an input biometric token. Due to the tragedy of 11th September 2001 in New York City and 7th July 2005 in London, automatic biometric authentication systems are highly demanded for security. Therefore, the development of such systems of high performance is of great significance and huge potential applications. In this project, the selected biometrics will be researched in order to develop biometric authentication systems of high performance and explore other novel applications, e.g., the use of biometric information in multimedia information retrieval. The main issues to be studied include silent feature...

Words: 758 - Pages: 4

Premium Essay

Biometrics and the Future

...Project: Biometrics and the Future Biometrics and the Future An identity is stolen every second; at least ten were stolen in the time it took to read this sentence (Chaflin, 2005). On a daily basis people all over the world are subject to navigating the ins and outs of life depending on an assortment of cards and passwords that confirms their identity. If they were to lose their bank card an ATM will refuse to give them money. Forget a simple password, and their own computer will not respond to them. By far the worse outcome is to allow their cards or passwords to fall into the wrong hands, and what was intended to be a security measure can become the tool of fraud or identity theft. The time for a more secure form of identification is upon us. A potential solution can be seen in the form of biometric identification. To understand the benefits of biometric identification one must understand the concept of biometrics. By combining the Greek words “bio”, which stands for “life”, and “metrics”, which stands for “measure”, a person can produce the term “biometrics” or “life measurements” (Woodward, 2003). Everyone has at least, once in their lives seen a movie where a villain or hero accesses a secret area by the use of a handprint or voice command. What was considered science fiction many years ago, today biometrics is being used in a variety of ways and the average person may not even be aware of it. To begin to grasp the concept and to truly understand biometrics at the most...

Words: 2060 - Pages: 9