The Most Rapid Essay Writing Service For Your Academic Success

Become a better student and get high grades with our professional writers.

Welcome to the #1 paper writing service, where each essay writer knows your needs and saves you from endless tasks!

  • We cover all disciplines and academic styles.
  • We meet your deadlines and formatting requirements.
  • We ask nothing but your “thank you” in return.

Entrust our essay writing service with your homework today—and forget about dull tasks and poor grades forever.

Reply To The Following Post Below.

  Traditionally, technology has been associated with  rationality,  objectivity and structure; traits oft considered  masculine in the  traditional societal definition of gender roles.  While some technologies  have largely been male-dominated, throughout  history, women have had an  often unrecognized presence in making  significant contributions to  these technological advancements. One such  technology would be the  digital computer. While its development is  generally viewed as a product  of male logic and rationality, much of  the progress in this area has  required an intuitive, interactive and  generally less structured  feminine approach. These culturally  appropriated gender  characteristics as well as historic gender roles  have had a significant  influence in consumerism and technological  development. In this  activity, you will explore technologies that may  be gender-specific and  evaluate technological innovations that have  shaped current society 

I have chosen Next Generation Biometrics Capture Capability (NXGBCC) as my project.

The Department of Defense (DoD) Defense Forensics and Biometrics Agency (DFBA) is responsible for all matter regarding Biometrics. The Department of the Army and more specifically Program Manager Biometrics (PM Bio) manages the program of record (POR) to ensure training and equipment are function for military operations.  Biometrics are the unique personal physical characteristics, such as fingerprints, iris, DNA, that can be used for automation recognition (DHS, 2019). 

First a little history, in December of 2004 an Iraqi insurgent wearing an Iraqi security forces uniform was able to get into the U.S. military base in Mosul Iraq blowing himself up in the dining facility full of U.S. service personnel.  In total 14 U.S. service members, 4 U.S. civilians and 3 Iraqi Soldiers were killed in the incident (AP, 2005).  Since then the military has used Biometrics extensively to identify of personnel entering U.S. installations in the Middle East as well as all U.S. sponsored trained personnel working along U.S. and coalition forces. 

U.S. Forces also collect DNA and latent fingerprints from operational and forensics exploitation locations allowing to identify persons of interest (POI) operating against U.S. and Coalition partners.

Although biometrics mostly used for Intelligence gathering, screening, and force protection. One of the more important matters regarding the collection of Biometrics of non-U.S. individuals who interact with U.S. forces (Host Nation Soldiers, Police Officers, third country, and host nation nationals working at U.S. Bases) in the middle east is that the DoD shares the information with other federal agencies allowing for screening of all Middle Eastern personnel requesting Visas to enter the U.S.  This ensures that any persons who have acted against U.S. and coalition interest are prohibited from legally entering the U.S.

The current PM Biometrics systems that consist of the Biometrics Automated Toolset (BAT) have become antiquated and have reached their operational lifecycle.  Currently the BAT systems require a lot of manual loading of data and a long time in processing, analytical examination, comparisons and sharing with other U.S. agencies. Current civilian application of Biometrics has advance to the point that individuals who are persons of interest (POI) can be biometrically identified by the authorities within matter of minutes.  Appling these commercially advance to military operations would provide with identification of those that are good guys working for our forces and those who are working against us. can be identified within less than returning

SWOT

Strengths:

– Identifying persons of interest (POI)

– Positively Identifying U.S. Base workers

– Vetting host country nationals, Soldiers, police officers

– Force protection

Weakness:

– Old Biometrics systems

– Loading data is manual process

– Processing, analyzing and sharing data takes days

– Requires close proximity of subject to capture biometric or identify

Opportunities:

– New systems are commercially available

– Capabilities to capture biometrics at greater distances are currently available and improving – very fast

– Biometric standoff (at a distance) identification would provide protection to U.S. forces

– Sharing data with Federal agencies faster would identify persons of interest attempting to enter U.S.

– Sharing data with Allies could protect U.S. interest overseas

Threats:

– Bad guys trying to figure way to defeat Biometrics capabilities

– Slow processing of data could put U.S. forces in harms way

– Slow sharing of Data with U.S. Federal agencies could place U.S. homeland in harms way

The business area for this project would be Information Technology (IT) and Intelligence (Intel) gathering/analysis/operations/force protection. For the purpose of this class I plan on keeping this project in the (IT) business area.

Return on Investment (ROI): Although when insurance cost is taken into consideration, it may be possible to try to place a cost on a loss of a life.  It would be impractical and unwise to conduct an ROI when trying to determine the value of saved lives.  From a person who has lost fellow Soldiers and has had to talk to loved ones of lost family members I will say the ROI would be priceless.

The most challenging part of this project proposal is that I am actually working with the Product Manager (PdM) in trying to develop actual methodologies to evaluate the Next Generation Biometrics Capture Capabilities (NXGBCC) that would replace the current BAT systems.  I have worked in the Biometrics area for over 12 years so this will be a great opportunity to possibly identifying some new considerations for the capabilitys development documents (CDD) for the NXGBCC.

Reference:

Department of Homeland Security.  (2019, May 9).  Biometrics. Retrieved from https://www.dhs.gov/biometrics (Links to an external site.)

Associated Press.  (2005, August 19).  Details of Mosul mess hall bombing emerge.  NBCNEWS.  Retrieved from http://www.nbcnews.com/id/9013247/ns/world_news-mideast_n_africa/t/details-mosul-mess-hall-bombing-emerge/#.XiIqAi3MxhE (Links to an external site.)

You can leave a response, or trackback from your own site.
Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes