Discussions in this course are post-first activities, which means that you are required to upload your completed initial post first before others’ posts are viewable.
Before posting the discussion messages, please read the term project instructions.
This activity will provide you with an opportunity to engage in a discussion with this class on a project topic that you have selected to implement as the term project. The class interaction will foster a learning environment in which you will learn from each other’s experiences and opinions.
In addition, you will practice using project management jargon and expressing your opinions in a professional manner. The options available in this discussion have ethical considerations that are important to consider as a project manager.
I have chosen Next Generation Biometrics Capture Capability (NXGBCC) as my project.
The Department of Defense (DoD) Defense Forensics and Biometrics Agency (DFBA) is responsible for all matter regarding Biometrics. The Department of the Army and more specifically Program Manager Biometrics (PM Bio) manages the program of record (POR) to ensure training and equipment are function for military operations. Biometrics are the unique personal physical characteristics, such as fingerprints, iris, DNA, that can be used for automation recognition (DHS, 2019).
First a little history, in December of 2004 an Iraqi insurgent wearing an Iraqi security forces uniform was able to get into the U.S. military base in Mosul Iraq blowing himself up in the dining facility full of U.S. service personnel. In total 14 U.S. service members, 4 U.S. civilians and 3 Iraqi Soldiers were killed in the incident (AP, 2005). Since then the military has used Biometrics extensively to identify of personnel entering U.S. installations in the Middle East as well as all U.S. sponsored trained personnel working along U.S. and coalition forces.
U.S. Forces also collect DNA and latent fingerprints from operational and forensics exploitation locations allowing to identify persons of interest (POI) operating against U.S. and Coalition partners.
Although biometrics mostly used for Intelligence gathering, screening, and force protection. One of the more important matters regarding the collection of Biometrics of non-U.S. individuals who interact with U.S. forces (Host Nation Soldiers, Police Officers, third country, and host nation nationals working at U.S. Bases) in the middle east is that the DoD shares the information with other federal agencies allowing for screening of all Middle Eastern personnel requesting Visa’s to enter the U.S. This ensures that any persons who have acted against U.S. and coalition interest are prohibited from legally entering the U.S.
The current PM Biometrics systems that consist of the Biometrics Automated Toolset (BAT) have become antiquated and have reached their operational lifecycle. Currently the BAT systems require a lot of manual loading of data and a long time in processing, analytical examination, comparisons and sharing with other U.S. agencies. Current civilian application of Biometrics has advance to the point that individuals who are persons of interest (POI) can be biometrically identified by the authorities within matter of minutes. Appling these commercially advance to military operations would provide with identification of those that are good guys working for our forces and those who are working against us. can be identified within less than returning
SWOT
Strengths:
– Identifying persons of interest (POI)
– Positively Identifying U.S. Base workers
– Vetting host country nationals, Soldiers, police officers
– Force protection
Weakness:
– Old Biometrics systems
– Loading data is manual process
– Processing, analyzing and sharing data takes days
– Requires close proximity of subject to capture biometric or identify
Opportunities:
– New systems are commercially available
– Capabilities to capture biometrics at greater distances are currently available and improving – very fast
– Biometric standoff (at a distance) identification would provide protection to U.S. forces
– Sharing data with Federal agencies faster would identify persons of interest attempting to enter U.S.
– Sharing data with Allies could protect U.S. interest overseas
Threats:
– Bad guys trying to figure way to defeat Biometrics capabilities
– Slow processing of data could put U.S. forces in harm’s way
– Slow sharing of Data with U.S. Federal agencies could place U.S. homeland in harm’s way
The business area for this project would be Information Technology (IT) and Intelligence (Intel) gathering/analysis/operations/force protection. For the purpose of this class I plan on keeping this project in the (IT) business area.
Return on Investment (ROI): Although when insurance cost is taken into consideration, it may be possible to try to place a cost on a loss of a life. It would be impractical and unwise to conduct an ROI when trying to determine the value of saved lives. From a person who has lost fellow Soldiers and has had to talk to loved ones of lost family members I will say the ROI would be priceless.
The most challenging part of this project proposal is that I am actually working with the Product Manager (PdM) in trying to develop actual methodologies to evaluate the Next Generation Biometrics Capture Capabilities (NXGBCC) that would replace the current BAT systems. I have worked in the Biometrics area for over 12 years so this will be a great opportunity to possibly identifying some new considerations for the capability’s development documents (CDD) for the NXGBCC.
Reference:
Department of Homeland Security. (2019, May 9). Biometrics. Retrieved from https://www.dhs.gov/biometrics (Links to an external site.)
Associated Press. (2005, August 19). Details of Mosul mess hall bombing emerge. NBCNEWS. Retrieved from http://www.nbcnews.com/id/9013247/ns/world_news-mideast_n_africa/t/details-mosul-mess-hall-bombing-emerge/#.XiIqAi3MxhE (Links to an external site.)
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more