Australia’s Department of Defence (DoD) is seeking a mobile biometric capture device to capture finger, facial and other biometric data….
Military Applications
Militaries around the world use biometrics for secure access control to facilities, equipment, and IT systems, and to identify adversaries in the field.
Piecemeal update of US military base ID rules continues
The U.S. military is upgrading its digital ID requirements in bits and pieces, including as part of pandemic control. Two…
Australia’s DoD issues tender for multi-biometric capture device
Australia’s Department of Defence (DoD) has released a request for proposal seeking a mobile biometric capture device that can capture…
Military monitoring system nets $1.5M in DND funding for Alberta team
The call of duty may soon be safer, or at least more closely monitored, thanks to a proposed development from…
US military group wants weaponized deepfakes, better biometric tools
At least some in the U.S. military have heard enough about deepfakes and they want in. Investigative-news publisher The Intercept…
US military says it can put facial recognition into robot drones
Whenever a radically new technology comes along, someone worries that it will be weaponized and, at least in the United…
Australia DoD looks to facial recognition to ID bodies in disaster response
The Australian Department of Defence is working on a project using artificial intelligence (AI) and facial recognition to identify the…
More talk about ethical AI but it’s still mostly just talk
In a rare conjunction, February has seen formal global, national, regional and intensely local discussions, independent of each other, about…
Deepfake protocols for world leaders needed now: Brookings
A United States think tank analyzing the global economy says it is beyond time for national security and policymaking officials…
The latest lesson on biometric data privacy could cost people’s lives
Two United States government documents about the use of biometric identification in occupied Afghanistan lack any mention of data security…