Lockheed Martin Team Begins Development on Third Phase of FBI's Next Generation Identification System

The Lockheed Martin-led Next Generation Identification (NGI) team is beginning to fully develop and deploy a capability that will enhance the FBI's latent fingerprint matching accuracy and introduce palm print matching to the system. Development efforts began after a successful Critical Design Review for the system's Increment 3.

The milestone came just weeks after the FBI declared Initial Operating Capability on NGI's Increment 1 fingerprint matching capability.

"The FBI's Next Generation Identification system is now operational and providing law enforcement officials with more accurate fingerprint identification services than ever before," said June Shrewsbury, vice president of Lockheed Martin's Citizen Protection Solutions division. "We're excited to keep up the momentum and begin implementing the system's latent fingerprint and palm print matching capabilities."

The latent and palm print matching algorithms for the NGI system will be provided by Alexandria, Va.-based MorphoTrak. MorphoTrak also provided the system's fingerprint matching algorithms.

NGI's Increment 2: Repository for Individuals of Special Concern (RISC), is also progressing according to schedule. Now in the final stages of development, this phase will provide law enforcement users more speed and flexibility in how they search the FBI's RISC fingerprint database, which includes wanted persons, known or appropriately suspected terrorists, sex offenders registry subjects and other persons of special interest.

NGI is providing an incremental replacement of the FBI's current Integrated Automated Fingerprint Identification System. The Lockheed Martin-led NGI team includes Accenture, BAE Systems Information Technology Inc., Global Science & Technology and Innovative Management & Technology Services.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3

  • Camden Door Controls Application Spec Guide

    Camden Door Controls Application Spec Guide

    Camden Door Controls, an industry-leading provider of innovative, high quality door activation and locking products, has published a new application spec guide for specification writers designing a wireless barrier-free restroom control system. 3

  • Genetec Security Center

    Genetec Security Center

    This major new release allows more system components to run in the cloud, reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex, specialized integrations. 3