The use of biometrics which identifies one based on physiological or behavioral traits have found mass application. There are various traits that could be used for identification but this paper focuses on fingerprint biometrics as a widely used technology to ensure border security. The aim would be to determine from secondary sources whether the system could be considered effective in attaining its intended purpose. The paper will also seek to analyze the costs involved in acquisition and operation of such systems and whether the current economy would sustain such technologies. Despite the cost involved, the benefits of acquiring and implementing such technology should guide on whether to employ such technology or not. Introduction Since September 9 bombing of the US, countries have been increasingly adopting effective mechanisms to ensure that only verified and authenticated individuals cross their borders, access computer services and other service areas such as banking and commerce. Border crossing presents a myriad of challenges because it involves physical introduction of persons capable of causing harm into a country. As such, transportation, particularly the aviation industry, becomes a paramount target for effective installation of security since it supports emergency response, commerce, law enforcement, economic development, leisure and personal travel. According to Federal Aviation Administration, FAA (2002), aviation opens up investment to the local communities and presents new domestic and even international supply chains and markets. With all these movements that a country would be exposed to realize development, the need for a reliable user authentication mechanism arises. Bragdon (2008) while considering transportation across borders in general observed that security involved in transportation could cost as much as 6% of the annual GDP globally, hence, an integral aspect of the economy. Therefore, this calls for building capacity and increase in cooperation both domestically and internationally. According to Ratha, Connel and Bolle, “the consequences of an insecure authentication system in a corporate or enterprise environment can be catastrophic” (2001, p. 614). Among these consequences could include wrongful denial of service, loss of confidential data and information and compromising the integrity of data. Literature Review Various methods have been traditionally used to identify individuals in various countries and organizations. Passwords, PINs (personal identification numbers) and IDs (identifiers) have proved to be inefficient. Passwords and PINs could be illegally acquired by an intruder, hence, allowing unauthorized access to one’s resources. Protection of repudiation also becomes difficult as linking usage to a user becomes almost impossible when users share passwords or when a credit card number is used online. In modern world, a combination of user ID and corresponding password would still be considered inadequate. Ashbourn (2000) points out at biometric identity verification as a radical alternative to these traditional forms of identification and verification. Biometrics technology employs behavioral or physiological traits to identify the identity of individuals including fingerprints, retinas, typing styles, teeth, speech recognition and hand geometry. Since the biometrics would be an individual’s intrinsic property, duplication and sharing of user identity becomes difficult.