COMP 2903 A9 – National ID: Biometrics Pinned to Social Secuiry Cards Danny Silver JSOCS, Acadia University.

Slides:



Advertisements
Similar presentations
Dr. Marc Valliant, VP & CTO
Advertisements

Hiring/Onboarding in Compliance Meetings with Supervisors Hiring/Onboarding Compliance Training for Supervisors.
Roll out of Biometric Residence Permits RTW documentation
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
CSCI E-170: Computer Security, Privacy and Usability Hour #2: Biometrics.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Face Recognition and implications on society By Zubin Singh ICS 131.
The Role of Computers in Surveillance ~ Katie Hatland.
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
Face Recognition By: Thanh Do Warren Ju. Face Recognition By: Thanh Do Warren Ju.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Prepared by HR-Nov 2006 Southern Illinois University Edwardsville Office of Human Resources I-9 Training.
FIT3105 Semester Research in Digital Identification and Authentication Systems Lecture 12.
An Introduction to E-Verify North Carolina Office of State Personnel.
RESIDENCY CODING. New Applications New Applications have “3” as the residency code – Classification in Progress Graduate Specialists change codes based.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Unit 3: Work and the Workplace Presented By: Ryan Akers, Christopher Hulen, Jonathon Rhoad, Troy McLaughlin, Kristen Vogan, and Katy Crouch.
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
Immigration United States: A “Nation of Immigrants” Welcoming New Arrivals.
Florida Information Protection Act of 2014 (FIPA).
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
NAPHSIS REAL ID Overview June 6, 2007 In support of this key requirement,
COMP 2903 A19 – Center Stage Danny Silver JSOCS, Acadia University.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.

Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
The Emerging Global Identity & Tracking System October 28, 2004 Barry Steinhardt Director, Technology & Liberty Project American Civil Liberties Union.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Real ID Vibhas Chandrachood, Executive Director Office of Application Development Commonwealth Office of Technology Commonwealth of Kentucky December 15,
Employment Eligibility Verification The I-9 Form Bluefield State College New River Community & Technical College.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
BIOMETRICS.
ESTABLISHING IDENTIFICATION Lesson Three Click on sound.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Biometrics.
Hiring/Onboarding in Compliance Meetings with Supervisors.
Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Module 1 4 th November, Module 1 4 th November, 2010 Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Verification of Eligibility for Public Benefit Technical College System of Georgia Office of Adult Education FY2013.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Securities vs. Liberties Greg Gough & Ben Paulson Those Who Sacrifice Liberty For Security Deserve Neither-Benjamin Franklin.
1 I-9 Completion for People Managers Hiring Manager Training Version January 2016.
Objectives In this module you will learn to Explain Unique Identity Define Aadhaar Explain the UIDAI Eco-system Interpret the benefits of Aadhaar.
AAMVA: Region 1 Conference License Security & Fraud Control Connecticut DMV Document Audit Web Application (“DAW”) Lynn C. Blackwell Division Chief July.
Immigration – Common Errors and How To Conduct An Internal I-9 Audit
Diane DiLorenzo Cosc 101 section 7
I-9 Instructions and FAQs
Biometric technology: The beginning of a digital era
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
JP Morgan spends $500 million per year on cyber security
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Filing basics Spring 2018, LAMC.
Biometrics.
Driver License Division Management Team Houston, TX
Difficulties faced by people with disabilities in being self-employed
CHAPTER 1 The NJ Driver License System
Federal contracting laws: walsh-healey act
Acceptable forms of identification
Buy SSN Online. Are you looking to Buy SSN Online?. So you've come to the right place, Because we have years of experience in this industry, we have made.
IT and Society Week 2: Privacy.
Pacific Regional Workshop on Legal Identity and Identity Security 8-10th July 2019 PALAU Efrecia R. Kazuma.
Presentation transcript:

COMP 2903 A9 – National ID: Biometrics Pinned to Social Secuiry Cards Danny Silver JSOCS, Acadia University

Ryan Singel Wired, May 15, 2007 A San Francisco-based blogger and journalist Covers civil liberty and privacy issues Co-author of a blog with journalist and convicted hacker Kevin Lee Poulsen Has covered issues of government monitoring Chronicler of AT&T's alleged involvement in the NSA warrantless surveillance controversy Not liked by federal authorities

Social Security Cards What are they for?

Social Security Cards Face first major upgrade in 70 years Several proposals in the US for proof of being able to be employed: – New driver’s license that meets Real ID standards – High-tech temporary work visa – US passport with RFID – High-tech additions to Social Security card – New biometric Social Security card

Problems with the Biometric Proposal The type of biometric is not specified: – Digital photo, Finger print, Iris scan How would one receive the card Preferably something that would last a lifetime How would employers verify a card – Post Office?

Security –vs- Freedom American Civil Liberties Union does not like the move to a high-tech SS ID Too great a risk of wrongful denial: – Problems/expense verifying cards – Database errors estimated that 17.8M records in the US governments employment database have errors – Mission drift – tracking people for other reasons