Biometric Border Control
Biometric border control uses face or fingerprint recognition at checkpoints to verify travelers and automate border processes.
Biometric border control systems automate entry and exit checks with biometric capture and matching at e-gates or manual stations.
Latest Updates
- 2025-06-30: Somalia deployed the U.S.-backed PISCES border system at Mogadishu airport, capturing fingerprints and face images for real-time watch-list checks, with national roll-out planned.
References
Vendors using Biometric Border Control
Latest Data Cards
Data Card Paravision and emaratech deploy face recognition corridor at Dubai airport
2026-01-26CC-BY-4.0facial-recognitionbiometric-border-controlParavision and emaratech deployed a face recognition corridor at Dubai International Airport to support passenger processing.
- The deployment is at Dubai International Airport.
- The corridor uses face recognition for identity checks in the passenger flow.
Data Card Manila’s NAIA rolls out 78 biometric eGates
2026-01-23CC-BY-4.0biometric-border-controlManila’s Ninoy Aquino International Airport rolled out 78 biometric eGates for passenger processing.
- The rollout includes 78 biometric eGates.
- The system supports automated border checks at NAIA.
Data Card TSA launches PreCheck Touchless ID at Boston Logan Airport
2026-01-22CC-BY-4.0facial-recognitionbiometric-border-controlThe TSA launched PreCheck Touchless ID at Boston Logan Airport, allowing identity verification without handing over a physical ID.
- Touchless ID uses facial matching for eligible TSA PreCheck travelers.
- Boston Logan is a new deployment location for the program.
Frequently Asked Questions
What is biometric border control?
It uses biometrics like fingerprints or face images at border crossings to verify travelers.
Where is it used?
Many countries deploy biometric e-gates at airports and land checkpoints for security.
How does it help travelers?
Automated gates reduce wait times while enhancing identity assurance.
What’s the difference between entry and exit checks?
Entry typically verifies a traveler against their travel document and watchlists (1:1 and 1:N). Exit can confirm departure and detect overstays, often with facial verification at gates.
How do systems handle spoofing?
They combine document checks, live capture quality controls, and presentation attack detection (PAD) to detect photos, masks, or replays.
