13

Biometric-Border Security Advice and Guidance

Embed Size (px)

DESCRIPTION

L-3 ASA are a pioneering systems engineering company with core capabilities in thedevelopment and full life-cycle management of complex systems which include informationmanagement and intelligence systems, data-fusion, watch-listing & watch-list systems,command and control and mission-critical configurable communications.

Citation preview

Page 1: Biometric-Border Security Advice and Guidance
Page 2: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page i

Table of Contents

1.0 Introduction .................................................................................................................................. 1

2.0 Biometric/Border Security Advice and Guidance ........................................................................ 3

2.1 Description ............................................................................................................................... 3

2.2 Characteristics .......................................................................................................................... 4

2.3 Our Approach ........................................................................................................................... 5

2.4 Your Results ............................................................................................................................. 7

3.0 Contact .......................................................................................................................................... 8

4.0 Why L-3 ASA............................................................................................................................... 9

5.0 Other Key Points ........................................................................................................................ 10

5.1 Information Assurance ........................................................................................................... 10

5.2 Backup/Restore and Disaster Recovery .................................................................................. 10

5.3 On-Boarding and Off-Boarding .............................................................................................. 10

5.4 Pricing ..................................................................................................................................... 10

5.5 Service Management Details .................................................................................................. 10

5.6 Service Constraints ................................................................................................................. 10

5.7 Service Levels......................................................................................................................... 10

5.8 Financial Recompense Model ................................................................................................ 11

5.9 Training and Knowledge Transfer .......................................................................................... 11

5.10 Ordering and Invoicing Process ............................................................................................. 11

5.11 Termination Terms ................................................................................................................. 11

5.12 Data Restoration / Service Migration ..................................................................................... 11

5.13 Customer Responsibilities ...................................................................................................... 11

5.14 Technical Requirements ......................................................................................................... 11

5.15 Trial Services .......................................................................................................................... 11

Page 3: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 1

1.0 INTRODUCTION

L-3 ASA are a pioneering systems engineering company with core capabilities in the

development and full life-cycle management of complex systems which include information

management and intelligence systems, data-fusion, watch-listing & watch-list systems,

command and control and mission-critical configurable communications.

We provide a broad range of services with applicability to cloud-based systems, using our in-

house engineering and management expertise. Backed by the depth and expertise of our

parent company, L-3, we offer advanced solutions in cyber operations, intelligence

operations, enterprise IT, and operational infrastructure. Key capabilities include specialised

applications for border security, border protection, biometric services, intelligence

management, workflow and case management, situational awareness and secure

communications services in law enforcement, border security, defence and commercial

environments.

In the UK, L-3 ASA have a well-established presence in the following sectors:

Defence

Communications

Intelligence

Transportation

In each sector, we supply expertise across the following areas:

Information Strategy

Advice and Guidance

Technical Strategy and Planning

Business Change Management

Systems Development

Installation and Integration

Service Design

Service Transition

Service Operation

Quality and Conformance

In the defence and communications sectors, we have supplied and supported robust high

availability systems for deployment in complex and challenging environments for more than

25 years.

In the intelligence sector, we have a rich history of enabling UK law enforcement agencies to

analyse and disseminate highly sensitive information. Our services provide the means to

ingest, analyse and disseminate both structured and unstructured data relating to criminal

threats within the UK and from across its borders, and are at the heart of the fight against

organised crime in the UK and internationally.

In the rail and air transportation sectors, our flexible Agile approach to system design and

delivery focuses on strategy, requirements definition, system engineering, content

management and software development.

L-3 ASA are based at a List X site in Hampshire, where we maintain workstations for

performing system design, development and testing. Our workshop facilities include

development and integration laboratory areas, as well as protected secure enclaves for high

classification work. We also conduct customer training at our facilities, which have access to

Page 4: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 2

appropriate hardware and reference equipment for fielded systems that we maintain to

support post-deployment activities.

All L-3 ASA staff are subject to HMG Baseline Personnel Security Standard and higher

levels of security clearance are obtained as necessary via the MOD DBS National Security

Vetting System. Staff security obligations are met through employee contracts of service and

with Non Disclosure Agreements for subcontractors and third parties. The Official Secrets

Act also applies to all staff, subcontractors and third parties as necessary.

We hold a number of key industry accreditations and certifications including ISO9001 and

TickIT registrations. Relevant endorsements are continuously being identified and achieved.

Through L-3, our parent company, L-3 ASA also have access to other facilities and

capabilities within the UK, namely: L-3 Security and Detection Systems (scanners and

detection systems), L-3 TRL Technologies (secure communications), L-3 Marine Services

(integrated command and communications), L-3 Link Simulation (simulators and training

services).

Overall, L-3 have a culture which encourages innovation and an open and user-focused

approach. Key strengths include the ability to migrate and integrate technology to meet

increasingly complex and visionary customer objectives. Therefore, our companies are able

to provide services across new domains (including those unrelated to the domains listed

above), and are ideally placed to exploit emerging cloud-based technologies.

The linkage between L-3 ASA and L-3 also enhances use of modern, industry standards,

methodologies and best practices to support delivery of services. Both iterative and Agile

methods are employed in software development. Use of appropriate methods across all

aspects of service delivery ensures both efficiency and quality are maximised. L-3’s working

practices allow rapid deployment and integration of services, which is a key requirement for

cloud-based systems. Technical expertise spans the software development lifecycle and

regular training (either in-house or external) enables staff to keep their skills up-to-date with

the latest technologies and methodologies.

In addition, our L-3 parent brings significant expertise in border management and

immigration services (including use of biometrically-enhanced security measures). This has

been demonstrated during the U.S. Visitor and Immigrant Status Indicator Technology (US-

VISIT) Program, a major programme with the US Government’s Department of Homeland

Security. The company also has experts in cloud-based systems, who devise innovative,

secure and cost-effective cloud solutions.

With the expertise and agility to meet time-critical operational requirements and with a

proven record of assured delivery, L-3 ASA are ideally placed to respond to the most

demanding challenges of the information age, including the increasing adoption of cloud-

based systems.

Page 5: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 3

2.0 BIOMETRIC/BORDER SECURITY ADVICE AND GUIDANCE

L-3 ASA provide a full spectrum of IT lifecycle support including all aspects of designing,

developing, managing, and maintaining customer Information Technology (IT) systems.

Backed by the depth and expertise of our parent company, L-3, we offer advanced solutions

in cyber operations, intelligence operations, enterprise IT, and operational infrastructure. Key

capabilities include specialised applications for border security, border protection, biometric

services, intelligence management, workflow and case management, situational awareness

and secure communications services in law enforcement, border security, defence and

commercial environments.

Our Biometrics/Border Security Advice and Guidance services leverage our core capabilities

in the development and full life-cycle management of complex systems which include

information management and intelligence systems, data-fusion, watch-listing and watch-list

systems, data profiling, data mining, command and control and mission-critical configurable

communications. Our experience includes biographic and biometric data integration,

biometric system integration, business strategy development, data modelling and analysis,

software development, stakeholder management, object-oriented design, ad-hoc reporting,

requirements definition and analysis, and project management. Based on our capabilities and

experience, we provide advice and guidance on:

Service oriented architecture implementation – We provide service standardisation,

policies and governance for border protection

Biometric systems integration – We specialise in performing biometric systems

integration in a high availability environment with strong experience in immigration

and border management

Biometric suitability analysis and consultancy – We offer consultation, strategy,

analysis, implementation, and testing to evaluate the suitability of different biometric

modes in multiple border management scenarios

System performance analysis – We perform capacity and throughput analysis and

recommend technical approaches to increase system capacity when appropriate

Border security database architecture – We design, develop and deploy Online

Transaction Processing (OLTP) and data-warehouse databases used in border security

operations

System security – We provide IT security support to system development teams by

assessing proposed system modifications to ensure operating systems are secured in

accordance with IT security directives

We understand the unique challenges of border management and immigration systems and

can bridge the communication gap between operations and technology customers.

2.1 DESCRIPTION

Our Biometrics/Border Security Advice and Guidance services leverage our core capabilities

in the development and full life-cycle management of complex systems. Based on our

capabilities and experience, we provide advice and guidance on:

Service Oriented Architecture (SOA) definition and implementation

Web based applications and systems

Biometric system design/implementation and independent Evaluation

E-gates specification and on-going assessment and performance analysis

Independent Biometric system Testing

Page 6: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 4

Biometric suitability analysis and consultancy

Identity Management and Biometric data integration and sharing

L-3’s past customers include the UK Border Agency, the UK Border Force, the UK Passport

Agency (now IPS), and the US Department of Homeland Security (DHS). Our consultants

understand the unique challenges of border management and immigration systems and can

bridge the communication gap between operations and technology customers. L-3 consultants

are able to communicate at a conceptual level as well as at a technical detail level; they can

simplify and explain ideas and technology to people with a varying degree of technical

knowledge. Our staff provides thought leadership, innovation, and technical management to

customers requiring highly available, highly visible solutions. L-3 personnel guide strategic

decisions, create architectural roadmaps, and lead the implementation of solutions from

planning to operations.

Our core capabilities include biographic and biometric data integration, biometric system

integration, business strategy development, data modelling and analysis, software

development, stakeholder management, object-oriented design, ad-hoc reporting,

requirements definition and analysis, and project management.

Service Oriented Architecture: We design service oriented architectures to migrate tightly

coupled, vertically integrated and loosely controlled systems to a disaggregated, loosely

coupled and tightly controlled solution.

Web based applications and systems: L-3 provide Technical Leads with experience in the

design, development and implementation of web based applications and services. Our

personnel have expertise in the methodologies, technologies and interfaces relevant to web

enabled services and have experience in their deployment across the military, law

enforcement and commercial sectors. L-3 have implemented these technologies within a

service oriented architecture interfacing to existing and legacy systems. Our staff have

experience in the development of browser based interfaces for use on mobile devices as well

as desk top provision in a command and control environment.

Biometric System Integration: L-3 personnel have extensive experience creating and

integrating biometric systems in a high availability environment coupled with strong

understanding of immigration and border management. Our team’s knowledge includes

watch-list management and accuracy analysis to maximise performance of the identity

management solution.

Biometric suitability analysis and consultancy: L-3 consultants provide strategy, analysis,

and suitability of different biometric modes within operational environments.

System Performance Analysis: We define, collect, and monitor metrics to ensure system

performance meets Service Level Agreements.

Border Security Database Architecture: We design, develop and deploy Online

Transaction Processing (OLTP) and data-warehouse databases used in border security

operations.

System security: We provide IT security support to system development teams by assessing

proposed system modifications to ensure operating systems are secured in accordance with IT

security directives.

2.2 CHARACTERISTICS

Our biometric and border management consultancy service leverages our extensive

experience and provides robust solutions through the use of:

Page 7: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 5

Business Process Modelling (BPM)

Client services management

Business development support

Strategic management and control

Strategic direction

Technical leadership

Organisational leadership

Data governance and stewardship

Watch-list management

Data profiling and mining

Data interoperability and sharing via standards and policies

SOA governance

SOA system integration in a highly available, high volume environment

Data warehouse establishment

Biometric identification security

Biographic matching integration

False Acceptance Rate (FAR) and False Rejection Rate (FRR) analysis

2.3 OUR APPROACH

L-3 leverage our extensive team to provide technical specialism based the customer’s needs.

This specialism ranges from high level strategy and conceptual architectures to specialised

software engineers, testers, and database administrators. We will work with your organisation

to determine the correct makeup of our team in order to meet your needs.

Service Oriented Architecture

L-3 consultants design service oriented architectures (SOA), along with accompanying

technical specifications describing every service, message, and data element, to provide

biometric identification and verification services to external stakeholders.

Border management often requires highly available, high volume systems. Border

Management and immigration systems need to vet each traveler thoroughly while preventing

long lines of travelers at the port of entry. L-3 consultants design and develop SOA systems

that meet these operational requirements. In addition, we provide a roadmap to apply a

phased approach to transitioning to a SOA system in a low risk manner. L-3 architects have

experience creating message standards to simplify interoperability among systems.

Our engineers develop canonical data models and governance to ease the integration of

legacy systems to conform to a common standard. Our architects maintain detailed reference

architecture diagrams for the current reference architecture and future state architecture. L-3

consultants define and develop architecture building blocks and guide the implementation of

the future state architecture. Our staff align business processes and data flows to the technical

strategy by leading cross-functional teams to ensure that operational requirements are met,

and the solution maximises value for money.

Our Solution Architects review software designs and collaborate with project managers and

technical leads to verify designs meet technical and architectural standards for the program.

Biometrics System Integration

L-3 provide solutions-oriented Technical Leads focused on large scale biometric information

systems. Our personnel have extensive experience performing system integration in a high

Page 8: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 6

availability environment coupled with strong experience in immigration and border

management. Our team can predict and advise business requirements, processes, applications

and systems that can be developed for future business improvement, including modularisation

to reap the rewards of cloud and G-cloud based technology, PaaS, IaaS and SaaS. L-3 has

expertise integrating workflow engines, managing watch-lists, implementing business rules,

and developing identity management solutions. We also have experience redirecting off-

course, expensive projects toward more strategic, less risky, and less expensive solutions.

Biometric suitability analysis and consultancy

L-3 staff also performed consultation, strategy, analysis, implementation, and testing to

evaluate the suitability of different biometric modes in multiple border management

scenarios. L-3 consultants made recommendations on the applicability of different biometric

modes including hand geometry, iris, facial recognition (2D and 3D), and vein recognition.

L-3 engineers integrated fingerprint, iris, palm, and facial capture devices into kiosks and

hand-held devices. In addition, L-3 analysts assessed the use of biometric capture devices

within an e-Gate border management solution. We performed extensive testing of these

devices and evaluated the usability, performance, and accuracy of devices based on the

subject’s age, ethnicity, and disability.

System Performance Analysis

L-3 ensure mission-critical applications remain operational and meet service level

agreements. We perform ad-hoc data analysis and reporting for business owners and guide

modelling and simulation teams in designing system models that accurately capture system

performance and throughput. We then recommend technical approaches to increase system

capacity when appropriate.

Border Security Database Architecture

L-3 develop logical and physical data models for Online Transaction Processing (OLTP) and

data-warehouse databases used in border security operations. We design and develop

Informatica processing for data-warehouse Extract, Transform, Load (ETL) processing and

provide Backup and Recovery best-practices overviews for production databases (400+

terabyte [TB] databases). We also have experience conducting trade studies for biometric

image separation with prototyped solutions (billions of biometric images). L-3 Database

Architects design and develop data archive strategies for transactional data and large scale

Programming Language (PL)/Structured Query Language (SQL) packages for ETL

processing, data conversions and migrations. We also document standards and approaches for

data-warehousing for ETL processes.

System Security

L-3 Security Architects provide IT security support to system development teams by

assessing proposed system modifications to ensure operating systems are secured in

accordance with IT security directives. We also have extensive experience coordinating with

United States agencies on security requirements for sharing sensitive data and documenting

those security controls in Interconnection Security Agreements (ISA). L-3 coordinates

firewall rules with development teams and Security Operations Centers to allow biometric

identification systems to connect to other IT systems. We develop and implement processes

for controlling access to systems’ production, development, and test servers and databases

and assist with Incident Response Teams by coordinating the identification of the incident

cause, ensuring it is resolved, and implementing remedial actions.

Page 9: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 7

2.4 YOUR RESULTS

L-3 delivers expertise for border security and biometric IT operations – the output of our

analyses are tailored to the customer’s requirements.

Page 10: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 8

3.0 CONTACT

Business Development

L-3 Communications ASA Ltd

Rusint House

Harvest Crescent

Fleet

Hampshire

GU51 2QS

Tel: 01252 775700

email: [email protected]

Page 11: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 9

4.0 WHY L-3 ASA

Our technical credentials and 20+ years’ experience of developing custom applications

with vendor independence with our best of breed COTS partners set us apart as the

partner of choice in advising on how to take full advantage of today’s emerging

markets and cloud/web based computing technology.

Our extensive experience of successfully delivering complex IT systems and services

covering border security, border protection and biometrics, high grade intelligence

management, workflow and case management, and secure communications. Working in

the most demanding environments where mistakes have severe consequences where we

pride ourselves in delivering mission critical systems that provide mission critical data.

Our experience in managing complex environments to provide services for both on-

premise and cloud-based business models.

Agility and innovation are our key performance drivers and trademarks of the solutions

and services we deliver.

The risks associated with web and cloud based environments play to our core areas of

strength: security, integrity, reliability, compliance and integration.

Our proven track record of delivering highly secure solutions means we are best placed

to address any security or privacy issues regarding adoption of software services.

Page 12: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 10

5.0 OTHER KEY POINTS

5.1 INFORMATION ASSURANCE

The services described in this document are not eligible for information assurance

accreditation as defined in HMG IA Standard No. 1 – Technical Risk Assessment (IS1). No

IS027001 certifications apply to the services.

L-3 ASA is a List X company accredited up to UK SECRET with CESG qualified

cryptographic custodians. It is also recognised by L-3 ASA that due to the nature of the end

users, its personnel may be required to attend environments of high protective marking, and

there are a number of staff already cleared to highest security levels.

5.2 BACKUP/RESTORE AND DISASTER RECOVERY

L-3 ASA’s systems and development environments are all regularly backed up and managed

to ensure no loss of effort takes place and a comprehensive disaster recovery plan is in place.

Any data held is handled in compliance to the latest UK Security Policy Framework.

It should be noted that these considerations are not relevant to all the services listed. Where

applicable L-3 ASA will provide advice and support for implementation and maintenance of

suitable backup/restore and disaster recovery procedures at customer sites where cloud

services are hosted.

5.3 ON-BOARDING AND OFF-BOARDING

This will not be applicable to all of the services offered. Where on-boarding and off-boarding

are applicable, L-3 ASA will identify the relevant issues and requirements early in the

process of delivering the service, and will supply the customer with the required level of

advice and support. This will cover areas such as:

Data migration

Connecting/disconnecting databases, systems and applications within cloud services

Security continuity

5.4 PRICING

The pricing for the services is detailed in the pricing document and the SFIA rate card

supplied as supporting documentation within the G-Cloud 4 framework.

5.5 SERVICE MANAGEMENT DETAILS

All relevant service management details will be included in line with the agreed requirements

and scope of the service. L-3 ASA’s standard Service Management model provides for a

three tier service management offering but these can be tailored to meet any customer’s

requirements.

5.6 SERVICE CONSTRAINTS

All relevant service constraints will be clarified with the customer before a service is

supplied. The constraints will be defined in terms of the agreed requirements and scope of the

service. Service constraints will not apply to all services.

5.7 SERVICE LEVELS

A full service management arrangement will be produced within which all service levels for

the service agreement will be defined and detailed. Our standard Service Management model

provides for a three tier service level management offering but these can be tailored to meet

any client’s requirements.

Page 13: Biometric-Border Security Advice and Guidance

G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance

Page 11

5.8 FINANCIAL RECOMPENSE MODEL

Where applicable, conditions for financial recompense will be defined in the contractual

terms and conditions.

5.9 TRAINING AND KNOWLEDGE TRANSFER

All training and knowledge transfer requirements will be agreed with the customer and

documented prior to any service being supplied. These may include (but are not limited to):

Technical overview of the service and its relationship and interactions with other cloud-

based services.

Specific technical knowledge transfer training activities

Customer operational training focusing on the specific service.

Local support training (delivered in line with degree of knowledge transfer required).

5.10 ORDERING AND INVOICING PROCESS

L-3 ASA’s ordering and invoicing process is described in the L-3 ASA Terms and Conditions

document supplied as supporting documentation within the G-Cloud 4 framework. If

necessary, clarification or further details can be supplied by L-3 ASA on request prior to

ordering.

5.11 TERMINATION TERMS

The relevant termination terms are described in the L-3 ASA Terms and Conditions

document supplied as supporting documentation within the G-Cloud 4 framework.

5.12 DATA RESTORATION / SERVICE MIGRATION

Data restoration and service migration strategies relating to any service will be discussed and

agreed with the customer (and documented) prior to supply of the service.

5.13 CUSTOMER RESPONSIBILITIES

General customer responsibilities are described in the L-3 ASA Terms and Conditions

document supplied as supporting documentation within the G-Cloud 4 framework. All

service-specific customer responsibilities and dependencies will be discussed and agreed with

the customer (and documented) prior to supply of the service.

5.14 TECHNICAL REQUIREMENTS

All relevant technical requirements; both functional and non-functional (including service

dependencies technical interfaces, client side requirements, bandwidth / latency, etc.) will be

included in high and low level requirements and design documentation as appropriate.

Requirements matrices will be used to relate requirements at different levels and ensure the

delivered service is aligned with the customer’s requirements.

5.15 TRIAL SERVICES

The services described are not suitable for offering on a trial basis.