BIOMETRICS - WHY NOW?

Similar documents
HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

The digital traveler. Automating border management solutions to facilitate travel and enhance security

Biometrics: primed for business use

CASE STUDY 2 Portuguese Immigration & Border Service

Government of Pakistan NADRA Headquarters, Islamabad

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

Biometrics & Accessibility

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Going with the flow. Helping border agencies to exploit technology convergence to gain consistent, comprehensive and automated border management

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Identity Verification in Passport Issuance

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

REPORT VOLUME 6 MAY/JUNE 2017

Ten Years of Reforms Structural impact

SUMMARY INTRODUCTION. xiii

Biometrics Technology for Human Recognition

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

ABC systems in Europe and beyond - status and recommendations for the way forward

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

BIOMETRIC INDUSTRY LETTERS

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

THE KEYLESS SOCIETY. Reading Practice

INF 10 eborders Security and Faciliation. Gemalto Government Programs Ion Otazua Gemalto

Consumer Attitudes About Biometric Authentication

REVIEW OF THE COMMON CASH FACILITY APPROACH IN JORDAN HEIDI GILERT AND LOIS AUSTIN. The Cash Learning Partnership

International Biometrics & Identification Association

How biometrics can improve the targeting of social protection. What we do. How we do it.

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009

TWELFTH SESSION OF THE FACILITATION DIVISION THE MALAYSIAN ELECTRONIC PASSPORT

(c) 2009, Government of Pakistan

Background and Status of the Tanzania National ID System

Opinion 3/2012 on developments in biometric technologies

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

The Angola National ID Card

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

Introduction-cont Pattern classification

Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams

Integrated Population Register. a key pillar in a holistic approach to citizen identification

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

CORPORATE HEADQUARTERS

BIOMETRICS 101. Facial Recognition in Oregon

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program

M-Vote (Online Voting System)

IDENTIFICATION FOR DEVELOPMENT (ID4D)

Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation

Policy Framework for the Regional Biometric Data Exchange Solution

FastPass and EasyPASS ABC from science to solution

Singapore's Automated Clearance using Biometrics

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

Policy Framework for the Regional Biometric Data Exchange Solution

2 nd Symposium on ICAO-Standard MRTDs, Biometrics and Security

Verify and Authenticate Identities before Issuing a Driver s License or State Identification Card.

Identification Revolution: Can Digital ID Be Harnessed for Development?

CRS Report for Congress

Cross-Border & Regional Identity Management

VISION IAS

EVIDENCE OF IDENTIFICATION

Changes in Schengen visa application process

Mykonos Ports EU FastPass Project IISA 2014 Chania

DHS Biometrics Strategic Framework

Border Management and Visa Management

BIOMETRICS IN A HUMANITARIAN CONTEXT

Acceptance of Biometrics: Things That Matter That We Are Ignoring

Case Study. MegaMatcher Accelerator

MoneyPad, The Future Wallet

For personal use only

Recommended Practice 1701 l

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

INTRODUCTION 4 Borders under pressure 4 On the move 4 Open for business 4 Experience matters 4

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs)

Public Consultation on the Smart Borders Package

Using Identification for Development: Some Guiding Principles

Tanzania s Digital ID Ecosystem Roadmap: A vision for integration and enhanced service delivery

THE FEASIBILITY OF HARMONIZATION OF NATIONAL IDENTITY DATA AND VOTER REGISTER: The Technical Challenges, Legal Obstacles and the Opportunities

Users Guide to the Automated Gates (For Foreign Nationals)

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

German Federal Ministry of the Interior 20 August / 6

TABLE OF CONTENTS. Executive Summary. Introduction. Public Safety Border Control & Law Enforcement

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of

Confronting Biometric Detractors

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

Semlex, one print ahead

January Caux Initiatives for Business Global Secretariat Asia Plateau Panchgani India

Overview Purpose of the EU-VIS

Smarter European borders through an increased use of biometric recognition

Ad-hoc query on fingerprint biometry and facial image in identity documents. Requested by EE EMN NCP on 19 th February 2014

Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals

Ad-Hoc Query on identity documents issued by EU Member States. Requested by EE EMN NCP on 2 nd June Compilation produced on 9 th August 2010

International Journal of Research and Review E-ISSN: ; P-ISSN:

(Legislative acts) REGULATIONS REGULATION (EU) 2017/458 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. of 15 March 2017

October Next Generation Smart Border Security Ability. Quality. Delivery.

13462/18 BN/cr 1 JAI.1 LIMITE EN

REPORT 2015/168 INTERNAL AUDIT DIVISION. Audit of the operations in Thailand for the Office of the United Nations High Commissioner for Refugees

Compendium of Good Practices in Identity Management

Transcription:

BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services is not new and dates back thousands of years. In today s highly complex crime environment pass-cards, paper based passports, and passwords can get compromised but biometrics do not. Q&A WITH JAMES CANHAM MANAGING DIRECTOR OF ACCENTURE BORDER SERVICES The use of biometrics for security purposes brings with it a strong element of personal accountability - with biometrics, individuals understand they alone are being granted transit or access to systems or services and this personal association with access ensures a strong since of personal responsibility and drives appropriate behaviour. In the coming years, as IT infrastructure costs reduce and new biometric technologies mature we will see an increase in the deployment of biometric solutions right across the world by both public and private sector organisations.

Which industry sectors have created the biggest impact using biometrics? What sectors are currently seeing strong uptake? Biometric technologies are presenting new opportunities for organisations both public and private to create new innovative identity and access management solutions. With the growth of globalisation, increased mobility and the societal shift toward online activities and home-working, the pressure is on for biometrics technologies to provide more robust forms of authentication to better facilitate business and citizen transactions, to protect organisational data and to facilitate travel and trade. With advances in biometrics technologies and improvements in IT infrastructure, there is a growing acceptance of biometric recognition technologies in our daily lives and this acceptance will grow further with time. At the moment this acceptance however is largely confined to sharing biometric details with corporate entities such as banks and employers, with a growing acceptance of it across social media networks. Globally we are seeing a noted increase in the use of biometric technologies (facial recognition in particular) by our policing and border agency clients as well as by airlines. Traditionally facial recognition was used to enable physical access control primarily but we are now seeing greater use by public sector clients to identify persons of interest on the street (police) or high-risk travellers at border crossings (border management agencies). In Europe, proposals for a formalised European Union (EU) registered traveller programme and entry/exit system exist as part of an EU wide smart borders initiative. This is exciting and a fundamental shift in the approach to border management in the EU region. These proposed changes in border management processes offer a unique opportunity for border agencies to not only improve the experience of the vast majority of travellers and simplify life for the frequent flyer, but also to focus security efforts on the small minority of travellers who pose a risk or to whom entry or exit from a particular country should not be permitted. What is more, by fully exploiting the benefits of new border management technologies, border agencies can gain a consistency and completeness in border management, better support immigration programs and revitalise the traveller experience. Biometric technologies are also playing an increasing role in securing corporate data but is by no means the next saviour of personal and corporate security. We are seeing biometrics play an increasing role but only along with existing and more established identity and access management solutions such as smartcards, security keys, pass-codes etc. While traditional access management solutions can be compromised as a result of person-person sharing, collaboration and theft, biometrics cannot be shared (and are rarely compromised) as each Individual has his/her own unique biometrics, with them at all times. It therefore makes sense to use biometrics as part of an organisations overall data security strategy in tandem with other access management tools. Many healthcare organisations are using biometric identification solutions to enable both site/ perimeter access and access to patient data. Aside from policing and border agencies, are biometrics being used more widely in other areas of the public sector and government? The private sector has seen significant uptake of biometrics to enhance user experience and security in smartphones, ATMs and mobile wallets, and the potential applications of this technology have not been overlooked by government agencies. Accenture recently surveyed nearly 800 public service technology professionals from nine countries in Europe, North America and Asia-Pacific to identify emerging technologies being implemented or piloted - including biometrics/identity analytics, the internet of things, video analytics, machine learning and others. Q&A WITH JAMES CANHAM 2

More than two-thirds (69%) of respondents said they are deploying or considering deploying biometrics. The study found biometric solutions are in high demand and widespread use across government agencies, with e-passports and iris recognition being implemented most frequently. The industry sector citing the highest adoption rate of biometric technologies is public safety, at 51%, followed closely by respondents from pension and social security agencies (48%). Public service agencies primary objectives for implementing biometrics/identity analytics 1. Increasing citizen satisfaction and engagement 2. Reducing risk and improving security Source: Emerging Technologies in Public Service, Accenture, 2016 While historically slow to digitise, governments have in fact long recognised the potential of biometrics to improve the way they serve citizens. The US Government began using biometrics for Trusted Traveler programmes in the mid-1990s, and the current US Visitor and Immigrant Status Indicator Technology programme (US-VISIT), which has a registry of approximately 200m unique identities, uses biometric technology to enable domestic and international stakeholder organisations to verify the identity and status of travellers. Automated e-passport gates, using biometric recognition software, are also becoming more commonplace at airports around the world. These gates enjoy high-levels of user satisfaction, increase passenger capacity at border crossing points and enhance security. The Netherlands has relied on biometricsenabled passports for citizens since the mid- 2000s, while countries like Ireland have been using biometrics to reduce identity theft and resulting welfare fraud. But perhaps the most important application of biometrics technology is in the creation of national identity management programmes. In India, the Government-led Aadhaar programme aims to establish a biometrics-based registry for all 1.2bn residents. The United Nations High Commissioner for Refugees (UNHCR) is also working to register and verify the identities of displaced persons. The Biometric Identity Management System captures and stores fingerprints, iris data and facial images of individuals, providing them with what is often their only personal identity record. To-date the system has enrolled over 1.3m refugees across 69 locations in 29 countries. One major concern aired about biometric technologies is they pose a threat to individual privacy. But advocates argue the opposite, that biometrics can be used to safeguard citizens against data breaches, identity theft, fraud and other violations of personal rights. Opponents of biometrics also cite the risk involved in creating a database of iris, fingerprint or other physical identifiers that cannot easily be altered or replaced in the event of duplication or theft. But unlike a password or PIN, the physical markers used in biometrics technology are difficult to replicate. One potential solution is to develop multimodal systems for verification. Both Aadhaar and UNHCR s system aggregate iris, facial and fingerprint data for each person. Of course, those who are unable to provide multiple forms of ID - for health, religious or other reasons can still participate. Q&A WITH JAMES CANHAM 3

Those challenges are not inconsequential, but interest and investment in biometrics are unlikely to fade. Some analysts are predicting that the industry will undergo double-digit growth by 2020. What are your predictions for the next 10 years? Biometrics are presenting new opportunities for organisations to create new innovative identity and access management solutions. With the growth of globalisation, increased mobility and the societal shift toward online activities and home-working, the pressure is on for biometrics technologies to provide more robust forms of authentication to better facilitate business and citizen transactions and to protect organisational data. With advances in biometrics technology and improvements in IT infrastructure, there is a growing acceptance of biometric recognition technologies in our daily lives and this acceptance will grow with time. At the moment, this acceptance however is largely confined to sharing biometric details with corporate entities such as social networks etc. Over the next 10 years this acceptance will broaden to allow for sharing of personal biometric data with one s employer and indeed Government. In the coming years, Accenture believes businesses and governments alike will introduce biometric technologies to enable better and more secure access to their data and operations but also to protect from data breaches and data loss. What are the main barriers to biometric adoption? In the past biometrics solutions have been expensive and difficult to deploy and use, and these challenges have hindered usage levels. In the future, as the total cost of ownership for biometrics decreases such technologies will become more prevalent in our daily lives - be it at airports and border crossings, in banks, at hospitals or when accessing government services (Citizen ID cards etc.). unfounded belief that biometric technologies are challenging to use, unreliable, and prone to inaccurate matching. Again, with time and increased usage this misconception will be altered. Cultural issues can still hinder the adoption of biometric solutions in some countries where individuals do not like to have their pictures taken or the fingerprints copied. In some countries there also exists a negative association of finger printing with criminality - again these cultural issues will decrease with time as citizens and employees experience benefits accruing for the usage of biometrics by both governments and businesses alike. What are the benefits of the various biometrics modalities (voice, fingerprint /vein, eye etc.) in border biometrics and where does your preferred modality fit in? The use of biometrics to enable access to data or to facilitate travel must be based on a multimodal approach, because different biometric modes have different strengths and should be used for different purposes. To establish the identity of an individual fingerprints and iris are highly reliable, with fingerprints being the most common of course. Arguably, a gold standard so to speak of biometric technologies is the iris scan, because it is the closest thing to a bar-code on the body, and is difficult to spoof, but this technology while highly accurate is expensive to roll-out across an organisation as part of an access management solution. Finger-vein technology is perhaps one of the most promising of the established biometric modalities. Finger-vein authentication captures images of the vein patterns inside a finger. As they are inside your body, finger vein patterns are virtually impossible to replicate. The procedure to capture finger-veins is also noninvasive and contactless unlike the process of giving fingerprints. Ease of usage has also improved greatly in recent years but there still remains an Q&A WITH JAMES CANHAM 4

Finger-vein technologies are proving popular in the healthcare industry whereby contact and touching is not desired and also in countries where cultures they do not like physically touching machines or having their photographs and fingerprints taken. We are also seeing increased usage of facial recognition technologies to enable physical access control primarily but less so for data access. We are also seeing increased use of facial recognition technologies by our policing and public safety clients globally. Voice recognition technologies are also on the increase and are highly suitable for transactions that can be completed over the phone - we are seeing the increased usage of these technologies by the financial services sector globally to allow clients access their accounts over the phone. Where do you think are the future opportunities for border biometrics in terms of applications or markets/ regions? Banks in other countries have since followed suit, with BPS bank in Poland being one of the latest adopters of this technology. Doing so makes it harder for fraudsters to withdraw cash using stolen or fake cards it also makes for a more convenient interaction for the customer, with no need to remember PIN codes to access their accounts. The United States Department of Motor Vehicles use face recognition to confirm the identity of drivers when renewing their license, as well as to search their database of existing drivers before issuing new driver licenses, this ensures unicity of identity for these crucial photo ID documents. *This Q&A was first published on Biometric Technology Today in February 2018. Visit the publication here. Clearly for some industry applications biometrics work best, but these are usually in-person transactions for example when accessing banking services or government services and where in-person attendance can be required. Mobility, health, and e-commerce activities are all increasing and all demand robust forms of authentication in the face of increasing security threats. As biometrics solutions become more affordable and reliable, organisations will have more options for acquiring and implementing the technologies to suit their own environments to help manage threats to their data. Globally we are already seeing examples of biometrics being used successfully to grant access to corporate data and customer/citizen information. As early as 2004, several Japanese banks, including Tokyo-Mitsubishi Bank and Mizuho Bank, chose to implement vein recognitions in ATMs and for over the counter transactions, to replace PIN codes when using bank cards. More than half of the country s ATMs are now equipped with vein readers. Copyright 2018 Accenture. All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture.