Biometric technology: The beginning of a digital era

Slides:



Advertisements
Similar presentations
Red Flag Rules: What they are? & What you need to do
Advertisements

AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Janice Kephart Director of National Security Policy, Center for Immigration Studies Heritage Foundation July 14, 2009.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Ethics What is it, why is it relevant to HCI, why is it important?
Things To Remember About Completing I-9 Forms
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
A condensed guide for writing a research paper.  Learn about the Academic Integrity Code  Learn how to conduct research this year and in the future.
Chapter 17 Controls and Security Measures
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
PERSONAL RECORDS.  What is Personal Identification?  Do you have any forms of Personal Identification? Is so, What?  When would you need Personal Identification?
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
Identity Cards: Strategy, Implementation & Challenges A Melodrama in Three Parts Simon Davies Director, Privacy International Visiting Fellow, London School.
Predictive Testing & Insurance Law. Content of the Presentation: A. Predictive Tests B. Benefits of Predictive Testing C. Drawbacks of Predictive Testing.
Biometrics: Voice Recognition
1.Requirements to apply for a new Smart ID Card?
 Voter ID Laws GROUP 24 Joyce Anderson, Douglas Grant Caitlyn Smith, & Alice Willis.
Challenges for Civil Liberties
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
Dr. Benito Nacif Electoral Council, IFE Mexico 9 September, 2010 Building Trust through an Independent Electoral Registry: the Mexican Experience.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
What do you know about immigration?. Objective To learn about the history, policy, and processes involved in becoming an American immigrant in order to.
Identity Document Fraud Awareness
Immigration United States: A “Nation of Immigrants” Welcoming New Arrivals.
HIPAA EFFECTS OF HEALTH CARE LEGISLATION. Evaluation of the influences of HIPAA  How it affected health care system  How it works as a law  Changes.
Administrative Registers & Register Based Population Census Sonia Jackson CARICOM Census Symposium Radisson Grenada Beach Resort May 27, 2014 CARICOM Census.
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
NAPHSIS REAL ID Overview June 6, 2007 In support of this key requirement,
Bill of Rights through the 27th Amendment
Changes Provoked by the 9/11 Attack  Various changes in the U.S. legislation  Exceptional number of adopted policies  Change of Americans’ perceptions.
Chapter 13 Domestic & Economic Policy. Domestic Policy  Domestic policy = all the laws, government planning, and government actions that affect the lives.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Real ID Vibhas Chandrachood, Executive Director Office of Application Development Commonwealth Office of Technology Commonwealth of Kentucky December 15,
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
The Revealed “I” A Conference on Privacy and Identity October 25-27, 2007 Faculty of Law, University of Ottawa Lillie Coney Associate Director EPIC.
Biometrics Authentication Technology
NJ DMV CHAPTER 10 WESTFIELD HIGH SCHOOL DRIVER EDUCATION
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Registered Traveler Jody Blanke Mercer University ALSB, Ottawa August 19, 2004.
Historical Representation Historical Representation cont.
CODE OF CONDUCT TRAINING We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
OMV – One Million Votes! YOU can make the Difference! Register Yours and Your Family Members’ Names in the Electoral Roll - Today!!
REAL ID PUBLIC INFORMATION Campaign Overview. AGENDA I.Preparation II.The Approach III.Creative Elements IV.Launch.
21 st Century America U.S. History. A Changing Society Technological Revolution Increased PC ownership during the 1990s and 2000s Rise of the Internet.
Multimodal Biometric Security 1.
FDR, the New Deal (“3 R’s”)  FDR initiated his New Deal, a series of laws that were designed to fight the depression by offering:  Relief: gov’t relief.
COMP 2903 A9 – National ID: Biometrics Pinned to Social Secuiry Cards Danny Silver JSOCS, Acadia University.
The Solution SSIVS.
Smart Data infrastructure
Asymmetries in international migration flow data
Diane DiLorenzo Cosc 101 section 7
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Voting in Texas GOVT 2306, Unit 4.
Rights and Genomic Medicine: Risks to Individuals
Multimodal Biometric Security
Records and Information from DMVs for E-Verify (RIDE) Presentation for 2011 Annual Region II Conference.
Welcome to the VRD Circulator training
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
USA Learns Citizenship
Texas Secretary of State Elections Division
Primary vs. Secondary Sources
Sociological Research Methods
Who are America’s citizens?
Citizen Graphic Organizer
E-identities (and e-signatures)
Presentation transcript:

Biometric technology: The beginning of a digital era National ID Cards Ousmane Gueye CST300L Biometric technology: The beginning of a digital era

Overview History of the Identification System What is a National ID card Biometric technology Current Situation Constraints Pros and Cons

What is the motive? Develop a flawless identification system Build a national biometric bank where each individual is identified by his/her unique genetic, biometric, physical, and behavioral traits

Historical Events 1775 First passport is issued (War of Independence) 1936 Social Security number is created and National ID idea rejected 2005 Real ID Act (restrictions apply to State issued ID's) Identification systems have always existed using different technologies, and providing documents in different formats

What is a National ID Has a RFID chip on it Contains biometric information Connects to a National Data Bank Common to all 50 states

Biometric technology Uses a computerized method to collect biometric information Data is recorded on a Radio Frequency ID chip The chip issues a unique ID number when hit with a signal frequency Chip can be inserted under the skin, on cards, or sewn in clothes

Biometric technology Individual behavioral and physical traits such as retinal scan, genetic characteristics, face and finger prints It's more accurate than the current technology Uses a complete set of biometric data to identify each individual

Current Situation State issued ID cards are widely used Driver's licenses and ID cards still use the old technology Biometric methods are in place and the field is growing Biometric companies include 3M Cogent, Antheus Technology, and others Congress faces strong opposition to pass legislation

Constraints - Budgetary The Real ID program suffers budgetary constrains In 2009 Budget was cut from $100 million to $60 million (40%) Not a top priority in the Homeland Security agenda

Constraints - Legal Opposition from lawmakers Opposition from advocacy groups such as ACLU and EPIC Citizens' reluctance to lose privacy Differences in State Laws

Pros Increases National Security Fight terrorism End illegal immigration Fight tax and ID theft End ID-related fraudulent activities

Cons Violates Privacy Rights and Leads to Stereotypes A weapon that might be abused by the legal authority Discrimination against patients by insurance companies Risk of stereotypes by genotype, behavioral traits, and race Mishandling or theft of biometrics can be detrimental

Recommendation What can you do? Do more research (visit epic.org, aclu.org, dhs.gov) Evaluate the benefits and the detrimental effects Raise awareness on the issue Vote for or against the implementation of this National ID system

Conclusion Biometric technology is a direct consequence of the the digital era. It engenders deep social transformations as its impact on society is unprecedented. Since we went from a hand-written form of ID to a chip-enabled ID card, does gaining security mean losing privacy?

References Amitai, E. (1999). The Limits of Privacy. Basic Books, New York. Print. ACLU. (2008). National Security Letters. ACLU. Retrieved 3/7/11 from BBC. (Producer). (n.d.). 1161854869. [Web Graphic]. Retrieved from http://news.bbc.co.uk/2/shared/spl/hi/guides/456900/456993/html/ BBC. (n.d.).Biometric Technology.. Retrieved from http://news.bbc.co.uk/2/shared/spl/hi/guides/456900/456993/html/ Chindaro, S. (Photographer). (2012). Biometrics. [Web Graphic]. Retrieved from http://drsamuelchindaro.blogspot.com/2012/07/biometrics-elections-in-zimbabwe-march.html EPIC. (2008, May). National id and the real id act. Retrieved from http://epic.org/privacy/id_cards/ Grand, D. (Producer). (2012). Socsecthelmamariegrandhamiltonsmaller. [Print Photo]. Retrieved from http://freepages.genealogy.rootsweb.ancestry.com/~grand/ Nick, G. (Producer). (2009). Tiny chip. [Web Photo]. Retrieved from http://www.opednews.com/articles/Go Norton, et al. (2010). A people & a nation. (8th ed., Vol. 2). Boston, MA: Wadsworth Print. NTEB News. (Producer). (2011). mexican-id-now-equal-with-ca-id. [Web Photo]. Retrieved from http://www.nowtheendbegins.com/blog/?attachment_id=7018 Starnes, S. (Producer). (2010). 0_12_national_id_card_450. [Web Photo]. Retrieved from http://scottystarnes.wordpress.com/2010/04/30/the-democrats-double-standard/ The Telegraph. (Producer). (2008). /id-card-reverse_998586c. [Web Photo]. Retrieved from http://www.telegraph.co.uk/news/politics/labour/3077827/Anger-as-Jacqui-Smith-prepares-to-unveil-ID-card- design.html

References U.S. Department oh Homeland Security, Office of the Press Secretary. (2011). Fact sheet: Fiscal year 2012 budget request. Retrieved from Office of the Press Secretary website: http://www.dhs.gov/news/2011/02/14/secretary-napolitano-announces-fiscal-year-2012-budget-request U.S. Social Security Administration, Office of Retirement and Disability Policy. (2009). The story of the social security number (2). Retrieved from website: http://www.ssa.gov/policy/docs/ssb/v69n2/v69n2p55.html