6
Privacy: Biometric Privacy: Biometric Technology and Civil Technology and Civil Liberties Liberties Biometric technology is used because it Biometric technology is used because it relies upon “highly reliable” characteristics relies upon “highly reliable” characteristics which cannot change or be lost. Eyes, face, which cannot change or be lost. Eyes, face, DNA and fingerprints are so closely tied to DNA and fingerprints are so closely tied to an individual that they cannot be lost or an individual that they cannot be lost or forgotten, short of amputation or mutilation— forgotten, short of amputation or mutilation— and therein lies part of the problem. and therein lies part of the problem. The very reasons that these traits are used— The very reasons that these traits are used— uniqueness and permanence—are the reasons uniqueness and permanence—are the reasons that they should are dangerous. Harm to the that they should are dangerous. Harm to the individual’s right to security of their individual’s right to security of their person and property is at risk. person and property is at risk.

Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change

Embed Size (px)

Citation preview

Page 1: Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change

Privacy: Biometric Technology Privacy: Biometric Technology and Civil Libertiesand Civil Liberties

Biometric technology is used because it relies upon Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change or “highly reliable” characteristics which cannot change or be lost. Eyes, face, DNA and fingerprints are so closely be lost. Eyes, face, DNA and fingerprints are so closely

tied to an individual that they cannot be lost or forgotten, tied to an individual that they cannot be lost or forgotten, short of amputation or mutilation—and therein lies part short of amputation or mutilation—and therein lies part

of the problem.of the problem.

The very reasons that these traits are used—uniqueness The very reasons that these traits are used—uniqueness and permanence—are the reasons that they should are and permanence—are the reasons that they should are dangerous. Harm to the individual’s right to security of dangerous. Harm to the individual’s right to security of

their person and property is at risk.their person and property is at risk.

Page 2: Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change

Problems with Biometric TechnologyProblems with Biometric Technology

1.1. Identity theft takes on new proportions.Identity theft takes on new proportions.

2.2. Use of biometrics increases the risk to an individual’s Use of biometrics increases the risk to an individual’s person and property.person and property.

3.3. Civil liberties are threatened.Civil liberties are threatened.

Page 3: Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change

If someone receives your biometric information, If someone receives your biometric information, this information is compromised for life.this information is compromised for life.

• “ “Biometrics is more private to you than a number that somebody assigned to you. I Biometrics is more private to you than a number that somebody assigned to you. I cannot cancel my face,” said IBM research Nalini Ratha.cannot cancel my face,” said IBM research Nalini Ratha.

• There have been attempts to make distorted models of fingerprints so a hacker There have been attempts to make distorted models of fingerprints so a hacker could not access them, but the models are not foolproof.could not access them, but the models are not foolproof.

• Once data is in a database, government or corporate, there is potential for it to be Once data is in a database, government or corporate, there is potential for it to be misused.misused.

• There is a big distinction between a credit card number being stolen and a genetic There is a big distinction between a credit card number being stolen and a genetic identity being stolen—not just in uniqueness, but in potential for racism or other identity being stolen—not just in uniqueness, but in potential for racism or other genetically based discrimination.genetically based discrimination.

Page 4: Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change

Once means of security is linked to physical Once means of security is linked to physical person, physical person is put at risk.person, physical person is put at risk.

• It’s not just about stealing passwords or decrypting information.It’s not just about stealing passwords or decrypting information.

• Case in point: In 2005, Case in point: In 2005, K Kumaran of Subang Jaya in Malaysia lost a finger to K Kumaran of Subang Jaya in Malaysia lost a finger to auto thieves taking his Mercedes-Benz S-Class.auto thieves taking his Mercedes-Benz S-Class.

• There is concern that information can be “skimmed” remotely by kidnappers, There is concern that information can be “skimmed” remotely by kidnappers, terrorists, etc.terrorists, etc.

Page 5: Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change

Biometric technology threatens civil liberties.Biometric technology threatens civil liberties.

• Does the government really need to know this much about people? Does the government really need to know this much about people?

• People may feel a sense of criminalization if biometric technology becomes People may feel a sense of criminalization if biometric technology becomes associated with everyday tasks. associated with everyday tasks.

• Different uses for biological identifiers may emerge in the future that were not Different uses for biological identifiers may emerge in the future that were not considered when the data was first collected.considered when the data was first collected.

““With the biometric passport, every country may have its own surveillance system, With the biometric passport, every country may have its own surveillance system, accumulating fingerprints and face-scans and keeping them for as long as they wish accumulating fingerprints and face-scans and keeping them for as long as they wish

with no regard to privacy or civil liberties. Governments may claim that they are with no regard to privacy or civil liberties. Governments may claim that they are under an international obligation to create national databases of fingerprints and under an international obligation to create national databases of fingerprints and

face scans but we will soon see nations with appalling human rights records face scans but we will soon see nations with appalling human rights records generating massive databases, and then requiring our own fingerprints and face-generating massive databases, and then requiring our own fingerprints and face-

scans as we travel.” – Dr. Gus Hosein, Privacy International. scans as we travel.” – Dr. Gus Hosein, Privacy International.

Page 6: Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change

Natalie Dawe, Sarah Howell, Carolyn Russell, Courtney Taylor, Lindsay WhiteNatalie Dawe, Sarah Howell, Carolyn Russell, Courtney Taylor, Lindsay White