THE KEYLESS SOCIETY. Reading Practice

Similar documents
BIOMETRICS - WHY NOW?

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Identity Verification in Passport Issuance

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011]

Biometrics in the Workplace. The Promise and Peril of It s Use

Case Study. MegaMatcher Accelerator

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Biometrics: primed for business use

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

Introduction-cont Pattern classification

Recommended Practice 1701 l

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

January Caux Initiatives for Business Global Secretariat Asia Plateau Panchgani India

Biometric Authentication

Achieving Interoperability

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

Biometrics from a legal perspective dr. Ronald Leenes

REPORT VOLUME 6 MAY/JUNE 2017

The digital traveler. Automating border management solutions to facilitate travel and enhance security

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012

Opinion 3/2012 on developments in biometric technologies

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003

Policy Framework for the Regional Biometric Data Exchange Solution

MoneyPad, The Future Wallet

SUMMARY INTRODUCTION. xiii

FastPass and EasyPASS ABC from science to solution

Smart Voting System using UIDAI

COUNCIL OF THE EUROPEAN UNION. Brussels, 20 February /04 VISA 33 COMIX 111

CPSC 467b: Cryptography and Computer Security

Marc R. Rosenblum. MPI Webinar July 30, E-Verify: Analysis and Recommendations for Reform

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Overview Purpose of the EU-VIS

Control Process. Border. Fernando Moya Castro

Singapore's Automated Clearance using Biometrics

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

German Federal Ministry of the Interior 20 August / 6

IOM/ACBC CAPACITY BUILDING INITIATIVES

Immigration: Globalization. Immigration Practice Group Lex Mundi March 4-7, Rome, Italy

Research Article. ISSN (Print)

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)

Glasgow 2014 Commonwealth Games: Changes to UK Visa requirements A Guide for Carriers

CRS Report for Congress

Background and Status of the Tanzania National ID System

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

CASE STUDY 2 Portuguese Immigration & Border Service

One set of photocopies of all documents submitted

Emerging Biometric Data Risks

An Open Letter to the ICAO

International Biometrics & Identification Association

(Approved December 30, 2010) AN ACT

Biometrics: New Laws and Potential Litigation Implications

Voters' Rights Teacher s Sheet

Biometric Technology for DLID

Ten Years of Reforms Structural impact

ALBERTA OFFICE OF THE INFORMATION AND PRIVACY COMMISSIONER ORDER F December 19, 2013 WORKERS COMPENSATION BOARD. Case File Number F5771

APPLICATION REVIEW A SILICON TRUST PUBLICATION. May Utilising the synergies between passports and eid cards

Barring Service (DBS)

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

Global Entry Program. Information Guide

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

Acceptance of Biometrics: Things That Matter That We Are Ignoring

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

Policy Framework for the Regional Biometric Data Exchange Solution

ABC and Integrated Border management

Confronting Biometric Detractors

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

Making Further Submissions Advice to Legal Representatives 30 th October 2009

> Contents. About your visa requirements. Do I need a visa? What type of visa should I apply for? Making a Tier 4 application

ICAO: THE TECHNICAL ADVISORY GROUP FOR MACHINE READABLE TRAVEL DOCUMENTS

IMMIGRATION FINGERPRINT BUREAU...3

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

TWELFTH SESSION OF THE FACILITATION DIVISION THE MALAYSIAN ELECTRONIC PASSPORT

The problems with a paper based voting

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

The Angola National ID Card

REPUBLIC OF MONTENEGRO GOVERNMENT OF THE REPUBLIC OF MONTENEGRO MINISTRY OF INTERIOR LAW ON THE STATE BORDER SURVEILLANCE. Podgorica, July 2005.

BY-LAWS FOR THE COAL CITY UNIT 1 ATHLETIC BOOSTERS CLUB. The name of this organization shall be the Coal City Unit 1 Athletic Boosters Club.

Blue card application

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Adapting the common visa policy to new challenges

ARTICLE 29 Data Protection Working Party

The Philippine Department of Foreign Affairs began the issuance of the Philippine epassport (electronic passport) on 11 Aug 2009.

CORPORATE HEADQUARTERS

Identification checking guidelines

ORIGINAL PASSPORTS Escrito por peterhayye - 05/05/ :53

GOLD COAST SCHOOLIES COMMUNITY SAFETY RESPONSE POSITIVE NOTICE (BLUE CARD) PAPERWORK CHECKLIST

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

Voting Corruption, or is it? A White Paper by:

Changes in Schengen visa application process

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY

CHAPTER 2 LITERATURE REVIEW

Printed: 8. June THE ALIENS ACT

GAO HOMELAND SECURITY. Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed

Happy Flow and Border control. ICAO 13th TRIP SYMPOSIUM AND EXHIBITION 26 October 2017

EMN FOCUSSED STUDY Establishing Identity for International Protection: Challenges and Practices. National Contribution from Sweden

Transcription:

Reading Practice A THE KEYLESS SOCIETY Students who want to enter the University of Montreal's Athletic Complex need more than just a conventional ID card - their identities must be authenticated by an electronic hand scanner. In some California housing estates, a key alone is insufficient to get someone in the door; his or her voice print must also be verified. And soon, customers at some Japanese banks will have to present their faces for scanning before they can enter the building and withdraw their money. B All of these are applications of biometrics, a little-known but fast-growing technology that involves the use of physical or biological characteristics to identify individuals. In use for more than a decade at some high- security government institutions in the United States and Canada, biometrics are now rapidly popping up in the everyday world. Already, more than 10,000 facilities, from prisons to day-care centres, monitor people's fingerprints or other physical parts to ensure that they are who they claim to be. Some 60 biometric companies around the world pulled in at least $22 million last year and that grand total is expected to mushroom to at least $50 million by 1999. C Biometric security systems operate by storing a digitised record of some unique human feature. When an authorised user wishes to enter or use the facility, the system scans the person's corresponding characteristics and attempts to match them against those on record. Systems using fingerprints, hands, voices, irises, retinas and faces are already on the market. Others using typing patterns and even body odours are in various stages of development. D Fingerprint scanners are currently the most widely deployed type of biometric application, thanks to their growing use over the last 20 years by law-enforcement agencies. Sixteen American states now use biometric fingerprint verification systems to check that people claiming welfare payments are genuine. In June, politicians in Toronto voted to do the same, with a pilot project beginning next year. E To date, the most widely used commercial biometric system is the handkey, a type of hand scanner which reads the unique shape, size and irregularities of people's hands. Originally developed for nuclear powerplants, the handkey received its big break when it was used to control access to the Olympic Village in Atlanta by more than 65,000 athletes, trainers and support staff Now there are scores of other applications. F Around the world, the market is growing rapidly. Malaysia, for example, is preparing to equip all of its airports with biometric face scanners to match passengers with luggage. And Access http://mini-ielts.com for more practices 1

Japan's largest maker of cash dispensers is developing new machines that incorporate iris scanners. The first commercial biometric, a hand reader used by an American firm to monitor employee attendance, was introduced in 1974. But only in the past few years has the technology improved enough for the prices to drop sufficiently to make them commercially viable. 'When we started four years ago, I had to explain to everyone what a biometric is,' says one marketing expert. Now, there's much more awareness out there.' G Not surprisingly, biometrics raise thorny questions about privacy and the potential for abuse. Some worry that governments and industry will be tempted to use the technology to monitor individual behaviour. If someone used your fingerprints to match your healthinsurance records with a credit-card record showing you regularly bought lots of cigarettes and fatty foods,' says one policy analyst, 'you would see your insurance payments go through the roof.' In Toronto, critics of the welfare fingerprint plan complained that it would stigmatise recipients by forcing them to submit to a procedure widely identified with criminals. H Nonetheless, support for biometrics is growing in Toronto as it is in many other communities. In an increasingly crowded and complicated world, biometrics may well be a technology whose time has come. Access http://mini-ielts.com for more practices 2

Questions 1-7 Reading Passage 3 has eight paragraphs (A-H). Choose the most suitable headings for paragraphs B-H from the list of headings below. Write the appropriate numbers (i-x) in boxes 1-7 on your answer sheet. NB There are more headings than paragraphs, so you will not use all of them. Example Paragraph A Answer vi 1... Paragraph B 2... Paragraph C 3... Paragraph D 4... Paragraph E 5... Paragraph F 6... Paragraph G 7... Paragraph H List of Headings i Common objections ii Who's planning what iii This type sells best in the shops iv The figures say it all v Early trials vi- They can't get in without these vii How does it work? viii Fighting fraud ix Systems to avoid x Accepting the inevitable Questions 8-14 Look at the fallowing groups of people (Questions 8-14) and the list of biometric systems (A-F) below. Match the groups of people to the biometric system associated with them in Reading Passage 3. Write the appropriate letters A-F in boxes 8-14 on your answer sheet. NB You may use any biometric system more than once. 8... sports students 9... Olympic athletes 10... airline passengers 11... welfare claimants List of Biometric Systems A B fingerprint scanner hand scanner Access http://mini-ielts.com for more practices 3

12... business employees 13... home owners 14... bank customers C D E F body odour voiceprint face scanner typing pattern Access http://mini-ielts.com for more practices 4

Solution: 1. iv 8. B 2. vii 9. B 3. viii 10. E 4. iii 11. A 5. ii 12. B 6. i 13. D 7. x 14. E Access http://mini-ielts.com for more practices 5