United States, Germany Agree To Share Fingerprint Databases, Information On Terrorists

Officials from the United States and Germany recently initialed a bilateral agreement related to sharing access to biometric data and spontaneous sharing of data about known and suspected terrorists. At a bilateral ceremony in Berlin, Attorney General Michael B. Mukasey and Secretary of Homeland Security Michael Chertoff joined the German Interior Minister Wolfgang Schauble and Justice Minister Brigitte Zypries in initialing the agreement.

The agreement gives the countries mutual access to fingerprint databases for the purpose of determining if evidence in them could be helpful in criminal investigations and prosecutions. It also sets forth procedures for obtaining that evidence through lawful processes, while ensuring that personal data is appropriately protected.

The agreement additionally provides a mechanism for the U.S. and Germany to share information about known and suspected terrorists, allowing the two countries to more readily assist one another in preventing serious threats to public security, including terrorist entry into either country.

"Beyond the important practical value of this agreement, it symbolizes the joint resolve of Germany and the United States to fight terrorism and transnational crime," said Attorney General Mukasey. "The values we share with Germany and our mutual interest in protecting our citizens makes us even more determined to deepen our partnership with Germany. We look forward to implementing this important instrument in a spirit of mutual respect and cooperation."

"I applaud Germany's leadership as we work as an international community to deter and defend against those who seek to do our citizens harm," said Homeland Security Secretary Michael Chertoff. "This agreement builds upon our strong relationship with Germany to protect not only the security, but also the privacy of our citizens. We must work together against a patient and adaptive adversary; in today's world, our enemies are far less concerned with borders than they are with attacking freedom wherever they can."

Under the agreement, the U.S. and Germany can, for the purpose of advancing criminal investigations and prosecutions, query each other's fingerprint databases with unknown prints to determine if the other party has information about the print. If a "hit" is received, the querying party will make a mutual legal assistance request for identifying data, and the use of that data is governed by treaty. If no hit is received, then no information is retained.

Additionally, the agreement contains a spontaneous sharing article that can be used to share biographic and fingerprint information about known and suspected terrorists, as well as information about planned attacks or persons trained to commit terrorist acts.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.