Biometric Border Control

Biometric border control uses face or fingerprint recognition at checkpoints to verify travelers and automate border processes.

Biometric border control systems automate entry and exit checks with biometric capture and matching at e-gates or manual stations.

Latest Updates

  • 2025-06-30: Somalia deployed the U.S.-backed PISCES border system at Mogadishu airport, capturing fingerprints and face images for real-time watch-list checks, with national roll-out planned.

References

Vendors using Biometric Border Control

Latest Data Cards

  • Data Card

    Paravision and emaratech deploy face recognition corridor at Dubai airport

    2026-01-26CC-BY-4.0facial-recognitionbiometric-border-control

    Paravision and emaratech deployed a face recognition corridor at Dubai International Airport to support passenger processing.

    • The deployment is at Dubai International Airport.
    • The corridor uses face recognition for identity checks in the passenger flow.
  • Data Card

    Manila’s NAIA rolls out 78 biometric eGates

    2026-01-23CC-BY-4.0biometric-border-control

    Manila’s Ninoy Aquino International Airport rolled out 78 biometric eGates for passenger processing.

    • The rollout includes 78 biometric eGates.
    • The system supports automated border checks at NAIA.
  • Data Card

    TSA launches PreCheck Touchless ID at Boston Logan Airport

    2026-01-22CC-BY-4.0facial-recognitionbiometric-border-control

    The TSA launched PreCheck Touchless ID at Boston Logan Airport, allowing identity verification without handing over a physical ID.

    • Touchless ID uses facial matching for eligible TSA PreCheck travelers.
    • Boston Logan is a new deployment location for the program.

Frequently Asked Questions

What is biometric border control?
It uses biometrics like fingerprints or face images at border crossings to verify travelers.
Where is it used?
Many countries deploy biometric e-gates at airports and land checkpoints for security.
How does it help travelers?
Automated gates reduce wait times while enhancing identity assurance.
What’s the difference between entry and exit checks?
Entry typically verifies a traveler against their travel document and watchlists (1:1 and 1:N). Exit can confirm departure and detect overstays, often with facial verification at gates.
How do systems handle spoofing?
They combine document checks, live capture quality controls, and presentation attack detection (PAD) to detect photos, masks, or replays.