Lakota Software Solutions has worked with numerous government agencies and organizations (FBI, Department of Homeland Security, US Army, NASA) providing impactful technology solutions and support to help them fulfill their designated objectives.
Specifically, Lakota works with government entities to help them develop, enhance, and automate their biometrics collection systems. Additionally, Lakota also helps organizations leverage mobile, in-field mobile biometric technologies to create faster, more accurate information.
Government Entity Case Studies
FBI Next Generation Identification (NGI) – the FBI’s Criminal Justice Information Services (CJIS) Division developed and incrementally integrated a new system to replace the Integrated Automated Fingerprint Identification System (IAFIS). This new system, the Next Generation Identification (NGI), provides the criminal justice community with an efficient electronic repository of biometric and criminal history information.
Biometrics has been incredibly useful to the FBI and its partners in the law enforcement and intelligence communities, and the Bureau continues to look to new scientific advancements to increase the range and quality of its identification and investigative capabilities. The NGI System offers services that provide a platform for multimodal functionality that will continue to evolve with new technologies and user requirements.
What We Provided to Help
Lakota has provided software engineers/integrators serving as part of the Biometric Products team to perform software development and integration in support of the FBI’s Next Generation Identification (NGI) program. This included developing custom software and integrating specialized COTS Products (MorphoTrak, MorphoTrust) to include Facial recognition. Lakota ensured that solutions met performance, accuracy, and operational requirements. In addition, Lakota provided support to the NGI Operations & Maintenance team at FBI CJIS. The O&M support included providing support to operations in troubleshooting anomalies and performance related issues, developing software fixes and COTS software updates to fix identified problems and/or to enhance the capabilities and performance of the system.
Lakota has developed key technologies that have drastically improved system performance, stability and accuracy. These included fixing nearly 100 resource leaks, redesigning and implementing major portions of the system to alleviate bottlenecks and system contentions, developed technologies that enabled the successful migration of billions of records without impacting current operations, plus many major system improvements. Lakota has also developed key systems that allowed non-operational environments to share resources, which eliminated the need for stubs and enabled accurate system end-to-end testing. Lakota’s unique holistic point of view and forward thinking has played a critical role in ensuring the successful deployment of NGI increment 2 and increment 3, and continues to play a vital role in the NGI’s final increment.
Software Solution(s) Implemented
Ani – Lakota’s Ani SDK “sits at the front door of NGI” and verifies each and every submission meets the FBI EBTS specification. This ensures clean data entry into the system. NGI also uses Ani to extract the biometric and contextual data from the submissions and is used to build the responses that goes back to the federal, state, and local agencies. The FBI’s eDO system also uses Ani to produce the EBTS FOID transactions that are routed to NGI, process the responses from NGI, and receive the EDOF transactions coming from USPS.
Whorl – FBI utilizes Whorl as the de facto standard tool to verify that submissions and images are compliant with the ANSI/NIST-ITL standard and the FBI EBTS specification. Whorl is also used to support the operations and maintenance development and test teams to create test submissions to verify functionality, compliance, and troubleshoot issues. FBI NICS also uses Whorl with the LIA scan plugin to scan and process fingerprint cards for firearm related background investigations.
The eDO application can be characterized as a centralized console for the monitoring, execution,and management of daily tasks performed by the Criminal History Analysis Team (CHAT), and a public website for customers to submit requests, check status, and retrieve responses. Daily
tasks for the CHAT team consists of processing Departmental Order (DO) Requests, challenges, handling special requests, and retrieving information through search forms. The eDO Dashboard not only facilitates these tasks, but gives each member of the team a quick overview of the status
of their work environment.
What We Provided to Help
Lakota played a vital role in design, implementation, testing and fielding of the eDO system. The entire system was developed using a Scrum Agile lifecycle where the customer was constantly involved throughout the entire development lifecycle.
Department of Defense (DoD) Automated Biometric Identification System (ABIS) – The Project Manager (PM) Department of Defense (DoD) Biometrics is the materiel developer charged with executing the Army enterprise biometric solution for ingesting, storing, processing, matching, sharing and managing national biometric resources for adversary (red force) and neutral/unknown/non-aligned (gray force) population groups across the full range of military operations. These capabilities are currently provided by the Department of Defense Automated Biometric Identification System (DoD ABIS), which serves as the central, authoritative enterprise repository for biometric data collected in the field from known and suspected terrorists, along with persons of interest to DoD. The repository ingests, stores, processes, matches, shares and manages biometric records supporting military and homeland security missions. The DoD ABIS repository, using biometric data, enables deployed forces to distinguish between adversaries and innocents and to decide and act based on scientific processing.
The DoD ABIS replaced the prototype ABIS database in January 2009 and far surpassed it in both response time and capability. The original ABIS database was based on the Federal Bureau of Investigation’s (FBI) Integrated Automated Fingerprint Identification System (IAFIS), and stored and matched fingerprints only. The DoD ABIS ingests, stores, processes, matches, shares and manages four distinct biometric modalities including fingerprint, facial images, palm-prints and iris patterns. The system also uses advanced algorithms to combine partial matches of multiple modalities in order to increase the frequency of automatic matches and decrease the frequency of inconclusive or non-automatic identifications requiring human intervention. The development and deployment of the DoD ABIS gave the warfighter access to a vastly improved enterprise system to better achieve the goal of identity dominance. The DoD ABIS currently interfaces with multiple DoD organizations and the FBI’s IAFIS system seamlessly around the clock, sharing biometric data with the FBI’s IAFIS to determine any linkage between battlefield attacks and criminal activity.
The mission of PM DoD Biometrics is to design, engineer, acquire, deploy, and sustain enterprise biometrics solutions in multiple operating environments enabling identity dominance on the battlefield and across the Department of Defense.
Software Solution(s) Implemented
Ani – used to convert submissions, extract EBTS data from the submission files, validation of the data in the file against the EBTS, reads, and modifies data…
Whorl – multiple comparison tool, editing transactions and viewing for compliance issues, face tool, build submissions? On the Leidos development team, used to create EBTS test files, validation testing,
DHS Homeland Advanced Recognition Technology (HART) – this system replaces the existing identity management system, the Automated Biometric Identification System (IDENT) with an enhanced, scalable, modular, and multimodal identity system. Increment 1 formed the architectural foundation for HART that replaced IDENT and its monolithic, custom-coded IDENT transaction processing application with the HART core application – a modular application that results from the integration of proven, off-the-shelf software applications, open-source products, and frameworks. The HART core application shall provide business workflow and business rules management; interface to biometric matching services; feature an authentication and authorization web service, and fully integrate with DHS enterprise system security.
What We Provided to Help
We deployed a team to implement various microservices mostly related to biographic data such as identity and encounter retrieval. Developed automated regression tests and integrated them into the CI/CD pipeline to quickly identify defects. Providing proof of concept for a third-party tool that will allow orchestration and synchronization between HART’s microservices.
Lakota Software Solutions for Government Entities
Below is a listing of the primary solutions Lakota can provide to government entities:
- Biometric Software Applications
- Biometric (NIST, EBTS, etc.) file creation and editing
- Livescan fingerprinting and file creation
- Multi-modal biometric collection and submission
- RIAC – Document scanning, image acquisition, and automated NIST file conversion
- Biometric Software Development Kits
- Ani – biometric specification translation and compliance (EBTS)
- Image – FBI Appendix F certified WSQ compression/decompression & encoding/decoding algorithms
- Sequence – fingerprint sequence and orientation checking/correction
- LIA – FBI Appendix-F certified image acquisition library (certified with the Epson V800 and Fujitsu fi-7600; supports full duplex scans)
- Software development and integration services