Confronting Biometric Detractors

Similar documents
How Techno-Populism Is Undermining Innovation

An Open Letter to the ICAO

BIOMETRICS - WHY NOW?

The changes are aimed at fighting both terrorism and identity theft.

Biometrics: primed for business use

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Consumer Attitudes About Biometric Authentication

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned

State Legislative Activities & Identity Management

Testimony before Senate Budget Subcommittee 4 on Implementation of the Federal Real ID Act of 2005

SUMMARY INTRODUCTION. xiii

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

REAL ID: CONNECTING THE DOTS TO AN INTERNATIONAL ID

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

COUNCIL OF THE EUROPEAN UNION. Brussels, 11 November /04 LIMITE VISA 203 COMIX 684 NOTE

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency

The Angola National ID Card

Biometrics how to put to use and how not at all?

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

EVIDENCE OF IDENTIFICATION

Recent Privacy Developments in the United States, Particularly with Respect to Travelers Using Air Transport

The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

Now, in the interest of full disclosure, I must begin my remarks with the following important announcements. These include:

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of

Biometrics how to put to use and how not at all?

MoneyPad, The Future Wallet

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY

VISION IAS

(c) 2009, Government of Pakistan

ICAO: THE TECHNICAL ADVISORY GROUP FOR MACHINE READABLE TRAVEL DOCUMENTS

Towards One Person, One Vote via Real-Time Voter s Registration and Identification

The Impact of Surveillance and Data Collection upon the Privacy of Citizens and their Relationship with the State

An Act to Promote Transparency and Protect Individual Rights and Liberties With Respect to Surveillance Technology

Chief, Legal Division, Office of Passport Policy, Planning and Advisory Services, 2100 Pennsylvania Ave., NW., 3rd Floor, Washington, D.C.

48TH LEGISLATURE - STATE OF NEW MEXICO - FIRST SESSION, 2007

Policy Framework for the Regional Biometric Data Exchange Solution

Topics. Current Challenges at the Land Border. Western Hemisphere Travel Initiative (WHTI) Identity and Security at the Border

United States Traveling Market Passport White Paper The impact of lost/stolen passports on United States Citizens June 10, 2014 Mandala Research, LLC

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

The digital traveler. Automating border management solutions to facilitate travel and enhance security

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

Ontario Enhanced Driver s Licence Applicant s Guide

Chapter 5. Enforcing the Brussels Dictatorship in Europe

DEPARTMENT OF HOMELAND SECURITY Border and Transportation Directorate

Acceptance of Biometrics: Things That Matter That We Are Ignoring

L9. Electronic Voting

INTRODUCTION BACKGROUND. Chapter One

Opinion 3/2012 on developments in biometric technologies

THE KEYLESS SOCIETY. Reading Practice

TWELFTH SESSION OF THE FACILITATION DIVISION THE MALAYSIAN ELECTRONIC PASSPORT

Eastern Region Office PO Box Philadelphia, PA T F

INTRODUCTION 4 Borders under pressure 4 On the move 4 Open for business 4 Experience matters 4

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009

CPSC 467b: Cryptography and Computer Security

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

Frequently Asked Questions

Ontario Enhanced Driver s Licence Applicant s Guide

International Campaign Against Mass Surveillance THE EMERGENCE OF A GLOBAL INFRASTRUCTURE FOR MASS REGISTRATION AND SURVEILLANCE

WORKING DRAFT REVISE AS NEEDED

April 4, Privacilla.org is pleased to make the following comments on the proposed Electronic Passport rule.

CASE STUDY 2 Portuguese Immigration & Border Service

CRS Report for Congress

INTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014

27. National ID Cards

555 Wright Way Carson City, Nevada Telephone (775) December 9, 2009

ORDINANCE NO. 7,592 N.S. ADDING CHAPTER 2.99 TO THE BERKELEY MUNICIPAL CODE, ACQUISITION AND USE OF SURVEILLANCE TECHNOLOGY

Information and Application Form

STANDARDS & SPECIFICATIONS. General Manager, New Zealand Passports Chair, ICAO ICBWG

Biometrics from a legal perspective dr. Ronald Leenes

Chips Ahoy? The Legal Issues Associated with Radio Frequency Identification Technology (RFID) in the Workplace

The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528

Privacy in a new democracy: Changing attitudes in a changing society?

Notes from the JFK Port of Entry Tour:

Click on E-Passport Application Form

Comments on Proposed Amendments To N.J.A.C. 13:21-1.3, 8.1, and 8.2 And Proposed New Rule at N.J.A.C. 13:21-8.2A

Ad-Hoc Query on identity documents issued by EU Member States. Requested by EE EMN NCP on 2 nd June Compilation produced on 9 th August 2010

Biometric Technology for DLID

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY

Biometrics How to Put to Use and How Not at All?

Global Entry Program. Information Guide

Public Consultation on the Smart Borders Package

BIOMETRICS 101. Facial Recognition in Oregon

The Open Biometrics Initiative and World Card

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Information and Privacy. Commissioner. Ontario ORDER MO Ann Cavoukian, Ph.D. Commissioner /

The Canadian epassport Project

REPORT VOLUME 6 MAY/JUNE 2017

CHAPTER Committee Substitute for Council Substitute for House Bill No. 105

Recommended Practice 1701 l

Emerging Biometric Data Risks

Introduction-cont Pattern classification

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

DHS Biometrics Strategic Framework

Transcription:

Confronting Biometric Detractors Presentation at the 2006 Biometric Consortium Conference Baltimore, MD. Dr. Robert Atkinson President Information Technology and Innovation Foundation

ITIF ITIF is a non-partisan public policy think tank committed to articulating and advancing a pro-innovation and protechnology public policy agenda internationally, in Washington and in the states. Recognizing the vital role of technology in ensuring American prosperity, ITIF focus exclusively on innovation, productivity, and digital economy issues.

Detractors vs. Opponents Detractors: raise legitimate questions that need to be asked and answer regarding the effectiveness and value proposition of biometrics. Opponents: oppose the deployment of biometric technologies in most applications, although they often deny that they are anti-technology.

Who Are the Opponents? On the left: some more strident privacy groups that see the spread of new IT and biometric technologies as threat to personal privacy and anonymity. (e.g., ACLU, EPIC, CASPIAN) On the right: some conservative/libertarian organizations that distrust government (e.g., Cato Institute, Eagle Forum).

Who Are the Opponents? Immigration Advocates that see biometrics/stronger IDs as means of keeping out immigrants (e.g., National Council of LaRaza, National Immigration Law Center). Techno-Libertarians who hide their ideological opposition behind computer security expertise (e.g., Bruce Schneier)

Why Are They Opposed to Biometrics? They believe that biometrics is leading to (or has already led to) the loss of privacy and the rise of a totalitarian state and they are very, very committed to stopping biometrics. They know that demonizing the technology expands and engages their organizations membership.

What Arguments Do They Use? The problem is serious, but biometrics won t solve it. For example, the ACLU states: We do not dispute the government s need to secure the borders, but policies must make sense, provide security and be effective: the WHTI fails on all three points. Facial Recognition Is Not Effective E-passports distract border agents and make them less effective. Bruce Schneier states, Biometrics such as thumbprints show some promise here, but bring with them their own set of exploitable failure modes.

Arguments II Biometrics Will Create a False Sense of Security (ACLU)

Arguments III Biometrics is a threat to privacy through data breaches. Recent security breaches have shown that storing vast information in a single database is especially precarious and a ripe target for identity thieves. (ACLU, 2006) Biometric database would be a target for identity thieves; (EPIC) Biometric templates can be reengineered to produce your fingerprint (Bruce Schneier)

Arguments IV Biometrics is a threat to privacy by enabling tracking. The ACLU opposes using biometrics for airline passengers because it is so intrusive. To be effective, the government would have to have the iris scan or digital fingerprint of every person living in the United States and probably that of anyone traveling through America s airways. This would be the high-tech equivalent of creating a National ID system. "We've reached a point where a '1984' surveillance society is technologically possible, and that trend was accelerated by the events of September 11," said Barry Steinhardt, director of technology and liberty programs at the American Civil Liberties Union. (Washington Times, 2003) In the future, a spychipped passport will enable [government] to scan the information and create enormous databases so people can be monitored and tracked through their travels. What happens when those databases are run by corrupt officials of foreign countries? Do we want our own government, much less some third-world dictator, having computerized records of us that include a digital photograph, biometric information, date of birth, age and any other information they decide to encode on the chip? (Katherine Albrecht) Standardizing driver's licenses with biometrics establishes the framework to take us even further toward a surveillance society that would significantly diminish the freedom and privacy of law-abiding people in the United States. (Eagle Forum)

Arguments V The Government Isn t Smart Enough to Get it Right The State Department has done a great job addressing specific security and privacy concerns, [with the RFID passport] but its lack of technical skills is hurting it. The collision-avoidance ID is just one example of where, apparently, the State Department didn't have enough of the expertise it needed to do this right. Bruce Schneier

And of course, Big Brother Big Brother Is Monitoring Us by Databases (Phyllis Schlafly, Eagle Forum) Why is the administration using RFID on the passport? There is only one possible reason: The administration wants surreptitious access themselves. It wants to be able to identify people in crowds. It wants to surreptitiously pick out the Americans, and pick out the foreigners. It wants to do the very thing that it insists, despite demonstrations to the contrary, can't be done. (Bruce Schneier)

Their Solution: Smash the Machines

Actually, it s Don t Deploy the Machines If all employees who oppose fingerprinting, GPS tracking, and RFID-card quit instead of submitting to these technologies the resulting talent drain might cause companies to reconsider such one-sided workplace surveillance mandates. (CASPIAN) EPIC recommends that funding for these [biometric] systems be suspended until a comprehensive evaluation of their utility and effectiveness is completed.

Fear of New Technology is Not New Despite the protection against invasion of privacy afforded by he fourth Amendment to the Constitution, bugging is so shockingly widespread and so increasingly insidious that no one can be certain any longer that his home is his castle - free of intrusion. (Life Magazine, May 20, 1966)

Persuading the Detractors and Confronting the Opponents If possible, prove it in the private sector, then deploy to public sector. Build in privacy from the beginning. Don t over promise. Realize that in most cases opponents won t play fair. Realize that government officials and the media are not experts and are likely to believe the opponent s claims, even when they are false. Make it clear that could is not the same as will. Point out that most systems are not perfect, yet they work perfectly well. Focus on the benefits, including safety, security and convenience. Keep the debate on the rules, not on the technology. Educate, educate, educate.

www.innovationpolicy.org ratkinson@itif.org