Cross Match Technologies

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Solving the Challenge of “Combined” Fingerprints in EBTS 10.0

    When the FBI released the EBTS 10.0 specification in 2013, it contained requirements for a number of capabilities which were not yet available on the market. Over time, the biometrics industry and the FBI itself have partnered to meet the high bar set by EBTS 10.0, delivering new functionality and robust standards to end users in the field. Mobile tenprint enrollments are one area where EBTS 10.0 ...

Cross Match Technologies

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Fingerprint Image Capture Quality

    Under normal conditions, commercially-available fingerprint scanning systems are able to capture quality prints that satisfy the FBI’s Appendix F certification but there is still a sizable group of individuals with difficult-to-capture fingerprints due to various physical and environmental conditions. Fingerprinting was traditionally the mainstay of law enforcement but the increasing demand from b...

Cross Match Technologies

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Revisiting the NIST 800-63-3 SMS Authentication Conversation

    It’s been nearly a year since the National Institute of Standards and Technology, commonly referred to as NIST, rocked the two-factor authentication world with its recommendation that classic, traditional Short Message Service (SMS) not be used to deliver One-Time Passwords. The recommendation—in their draft 800-63-3—set off a wave of debate in the security community over the role of the entrenche...

Cross Match Technologies

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • Is Privatization the Future of Travel Security Technology?

    When Crossmatch participated in the recent World Border Congress in Morocco, we were treated to a behind-the-scenes tour of Casablanca airport. During the tour, one piece of the security workflow stood out as symptomatic of a new trend in the travel security industry. After passing through physical security checks and standard border control procedures, travelers are put through a secondary check,...

Cross Match Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Should Children Be Fingerprinted?

    At Crossmatch, we have recently seen growing interest in the issue of fingerprinting children. As policymakers and operators start to grapple with the complicated issues surrounding this application of biometric technology, we thought we would lay out a few of our perspectives on the matter. In a recent advisory opinion, the European Union Agency for Fundamental Rights took up the complicated task...

Cross Match Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • Cash Assistance Accountability with the Use of Biometrics

    There are an unprecedented 65 million forcibly displaced people worldwide as a result of conflict, persecution or environmental disasters. Perhaps the most glaring example is the ongoing Syrian refugee crisis which to date has displaced over 11 million people from their homes and resulted in 13.5 million people requiring humanitarian assistance. The sheer numbers alone of persons requiring assista...

Cross Match Technologies

Category: Content
Type: Blog Article

Generated 2 months ago

New blog articles detected

  • How Biometrics Advance the UN Sustainable Development Goals

    The UN Sustainable Development Goals set ambitious targets – some might say overly ambitious. Statements like “zero hunger” and “no poverty” ring true on a conceptual level, but sound much harder when it comes to practical implementation. What helps us move the needle on these generational challenges? The key may lie in goal sixteen – specifically the “strong institutions” part which strives to pr...

Cross Match Technologies

Category: Content
Type: Blog Article

Generated 3 months ago

New blog articles detected

  • What Brexit Means for the United Kingdom/Ireland Border

    Immigration was the centerpiece of the Brexit campaign – a key factor in Britain’s decision to leave the European Union. During the lead-up to the vote, the term “immigration” was used as a shorthand reference to asylum seekers, refugees, and workers from the periphery of the EU. In reaction to the idea that floods of immigrants were changing British society for the worse, voters took the drastic ...

Cross Match Technologies

Category: Content
Type: Blog Article

Generated 3 months ago

New blog articles detected

  • Biometrics, the Sendai Framework and the Hidden Risk of Corruption

    Last week, Crossmatch introduced its new foreign assistance/disaster relief solution at the Action on Disaster Relief Conference in Panama. While at that conference, we heard a lot about the Sendai Framework for Disaster Risk Reduction, a handbook for disaster preparedness efforts around the world. That got us thinking about how biometrics fit into existing models of disaster preparedness. Disaste...

Cross Match Technologies

Category: Content
Type: Blog Article

Generated 3 months ago

New blog articles detected

  • The Impact of Trump’s Executive Order on Vetting

    Today President Trump signed several Executive Orders on immigration, including one which moves toward the “extreme vetting” of refugees which he promised during the campaign. Now that political rhetoric is being transformed into operational reality, what do those of us in the biometrics industry expect? What does “extreme” vetting really mean? The value of vetting (whether through biometrics or a...

  • Promoting Accountability in Foreign Assistance through Biometrics

    Fraud, waste and abuse are significant problems in the assistance sector. From ghost beneficiaries to “leakage” from aid warehouses, the entire foreign assistance supply chain is vulnerable to exploitation. This is not merely a theoretical problem – it is a reality which impacts assistance operations around the world every day. There are many examples: A report by the UN Security Council found tha...

  • ETIAS and the Future of Travel Authorization Systems

    Border management once consisted of an isolated encounter with an immigration officer at a border crossing point. Now it is a complex, layered process bristling with technology that extends beyond a simple passport check. As governments get more sophisticated about how they manage border security and secure immigration workflows, they are pushing the idea of a “border” far beyond the physical port...

  • Migrants Should Benefit from Identity Management

    International Migrant Day is a valuable reminder of the many hurdles faced by migrants in the world today. From those escaping brutal conflicts to those who simply seek a better life, migrants deserve respect and dignity to match their courage. Increasingly, identity management plays a critical role in the experience of migrants. Governments started using tools such as biometrics, documents and da...

  • What will replace the CAC card?

    DOD CIO Terry Halvorsen threw down the gauntlet at a Washington conference in June. The fifteen year-old Common Access Card, long the staple of physical and logical access in the military, will be phased out within two years. Now DOD agencies are searching for answers. What will replace the CAC card? The short answer: we don’t know. Halvorsen himself admitted in a later interview that he signalled...

  • Why INTERPOL is Urging Wider Use of Biometrics

    INTERPOL knows that the identity data in its database is the best weapon governments have in the fight against terrorism and criminal activity. This is no news to terrorists and criminals, who have long used forged documents, aliases and other methods of deception to maintain a tactical advantage over law enforcement. Today’s integrated data systems – particularly those developed after 9/11 – were...

  • Cyber Security Awareness for All

    October is National Cyber Security Awareness Month! Created under the leadership of the U.S. Department of Homeland Security and the National Cyber Security Alliance, NCSAM is a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Many of the security recommendations provided during this month-long event foc...

Cross Match Technologies

Category: Conversion
Type: Landing Page

Generated 4 months ago

Cross Match Technologies

Category: Conversion
Type: Landing Page

Generated 5 months ago

Cross Match Technologies

Category: Conversion
Type: Landing Page

Generated 6 months ago

Cross Match Technologies

Category: Conversion
Type: Landing Page

Generated 6 months ago

Cross Match Technologies

Category: Conversion
Type: Landing Page

Generated 6 months ago

Cross Match Technologies

Category: Conversion
Type: Landing Page

Generated 6 months ago

Cross Match Technologies

Category: Conversion
Type: Landing Page

Generated 6 months ago

Cross Match Technologies

Category: Conversion
Type: Landing Page

Generated 6 months ago

Cross Match Technologies

Category: Conversion
Type: Landing Page

Generated 6 months ago

Cross Match Technologies

Category: Conversion
Type: Landing Page

Generated 6 months ago

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in