In the last decade there has been a significant increase in the use of biometrics (fingerprints, iris, face detection). The introduction of a similar disk imaging biometrics for identification of certain documents (such as passports and omissions on specially protected objects) makes the task for spies and very well doing his job, frightening as spies and terrorists and saboteurs. On the other hand, the introduction of biometrics also restricts the activities of their own intelligence. All this has led to certain efforts of the intelligence services in an attempt to get around this "problem of". Intelligence agencies do not report if they were able to find such solutions. But it would have to wait.
Meanwhile, the United States developed devices allowing to combat units to use biometric data in the field. The main device for the troops is SEEK (Secure Electronic Enrolment Kit), representing a portable electric device that collects biometric data of people. It contains a fingerprint, iris and digital photos of suspects. All this eventually falls into the main database, which now contains information about millions of terrorists, suspected terrorists, their supporters and others "representing particular interest." The troops on the battlefield may have with for a portion of the database in their device SEEK, and so makarom searched personality can be rapidly identified and arrested. Specifically, this South American special forces and engaged in the 2011th year of catching Osama bin Laden. Despite the fact that DNA testing (the end which takes several hours for not very portable equipment) are the best form of identification, the availability of fingerprint data of iris image and allow us to identify personality virtually certain. Even the identification of only the fingerprint scan / photo person runs completely impressive.
In Afghanistan, the U.S. government used the kits SEEK for the collection of biometric data of almost 2-million Afghans, who now can be issued very strong (hard spoofs) ID. This makes it more difficult for criminals, the Taliban and Islamic radicals in general, infiltrate government agencies, or simply to act freely. United States has long been engaged in the collection of biometric data as prisoners and those with whom the United States is faced by any other way. These data allow us to better understand who is at risk and who is not.
It all started during the war in Iraq. Early on in the war on terrorism, U.S. Department of Defense took over almost all of the practice has long been used by the police. One of the ways is more relevant biometrics. So Makar, whenever troops are facing a "suspicious persons," they not only wrote down their names and addresses, but also used the SEEK system for collecting biometric data.
Particularly useful are fingerprint, because they are stored in electrical form. If necessary, you can find out who owns imprint finger, just filmed from elsewhere, for example, a piece of a car bomb. Also useful are produced, and digital photos from multiple angles. Implementation of special software can make a digital identification (ID), which can be used by security cameras for finding a particular individual or in order to find someone on the witness described. Some countries combined digitized photo in profile and full face, which also allows you to quickly check these people on the U.S. database.
In the decades South American military often collect a large amount of disk imaging with seats unfortunate incidents and clashes. So now, not surprisingly, that the forensic experts inspect every explosion (a car bomb or roadside bomb) and a clash for fingerprints. Most manufacturers bombs were arrested specifically in this way despite the fact that earlier war often faced with suspicious persons, but could not detain them without any proof.
Collection of biometric data system SEEK takes only about 2-minutes because data on all suspicious persons swiftly added to the main database. Now counterterrorism group delay for at least some of the upcoming investigation of who they think will panic at the sight of biometric equipment. The terrorists now know that biometrics is bad news for them, and they try to avoid it.
At the current time combat troops are training in the use of biometric devices and all now already recognize that these things are massive weapon in the fight against terrorists. Adaptation of this experience for the creation of very complex for forging identity cards will not be a big discrepancy, but most likely it will not get much exposure.