Www.ipc.on.ca Biometrics and The Privacy Paradox Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Identity: The Promise & Perils.

Slides:



Advertisements
Similar presentations
Building in Privacy from the Bottom up: How to Preserve Privacy in a Security-Centric World Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario.
Advertisements

12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Janice Kephart Director of National Security Policy, Center for Immigration Studies Heritage Foundation July 14, 2009.
National Security in a Post-9/11 World: The Rise of Surveillance, … the Demise of Privacy? Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Security of eGovernment, European Parliament, Brussels 2013 Max Snijder, Linda Kool, Geert Munnichs L Kool | 1 19 February 2013 Findings from the ePassport.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
The Privacy Imperative: Go Beyond Compliance to Competitive Advantage Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Bell.
Emerging Privacy Issues for Governments North of U.S.A Mike Gurski Senior Policy & Technology Advisor Information & Privacy Commission, Ontario Canada.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Introduction to Fingerprint Biometrics By Tamar Bar.
Hosted by: June 23-26, 2003 New York City ID Card Projects Large Scale ID Projects Based on Biometrics (Specifically Fingerprint)
Privacy in Ontario Brian Beamish Office of the Information and Privacy Commissioner/Ontario Presentation to Security Canada Central 2002 International.
Biometrics & the Privacy Paradigm: Separating Fact from Fiction Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Security.
GSA Expo 2009 Impact of Secure Flight Program on DoD Travel Mr. George Greiling GSA Expo June 2009.
Getting to Privacy A Presentation to: Presented by: Mike Gurski.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
US-VISIT Program Overview United States Visitor and Immigrant Status Indicator Technology.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
© Information and Privacy Commissioner of Ontario, 2006 EBF Research Seminar - 02 Oct 2007 Biometric Encryption: Privacy-Enhancing Technology European.
Privacy by Design: Building Trust into Technology Ann Cavoukian, Ph.D. Information and Privacy Commissioner/Ontario 1 st Annual Privacy & Security Conference.
Privacy: Do We Need It? Mike Gurski Senior Policy & Technology Advisor Information & Privacy Commission, Ontario Canada JetNet September 25, 2001 Ottawa.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
The Privacy Imperative: Go Beyond Compliance to Competitive Advantage Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Cambridge.
The Privacy Payoff: Build Your Business By Building Customer Trust Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Coast.
1 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the Ambient Intelligence Environment Sabine Delaitre.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
Getting to the Truth about Privacy & Security Ann Cavoukian Ph.D. Information and Privacy Commissioner/Ontario Privacy & Security: Totally Committed November.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Initial reflections of the privacy commissioner on Ontario’s draft privacy bill Ann Cavoukian, Ph.D. Information and Privacy Commissioner/Ontario Toronto.
The Emerging Global Identity & Tracking System October 28, 2004 Barry Steinhardt Director, Technology & Liberty Project American Civil Liberties Union.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
NIST Update: Part Deux Elaine Newton, PhD NIST
BIOMETRICS.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Brenda Watkins Director Policy and Business Strategies Information.
THE MALAYSIAN ELECTRONIC PASSPORT
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Go Beyond Compliance to Competitive Advantage: Make Privacy Pay Off Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario IFB Toronto.
Registered Traveler Jody Blanke Mercer University ALSB, Ottawa August 19, 2004.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Managing Secure Biometric Systems Meghan Armes IA Management April 24, 2007.
Jason Tortorete COSC 316.  Concept: Access Control  CISSP and Access Control Framework  Biometric Applications and Functionality  Verification and.
Biometrics Seminar Report on Submitted by : Shikha Bundiwale EE 4 th year (0903EE081050) Submitted to: Lect. Rupali mam EE DEPARTMENT.
THE MALAYSIAN ELECTRONIC PASSPORT
Athina Antoniou and Lilian Mitrou
Facial Recognition What is it and how does it work? 1. LEAs collect photo mugshots of arrestees and ask other government agencies (like the DMV or the.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Biometrics.
Biometric technology.
A New Technology for Video Surveillance Cameron Serles
A SEMINAR REPORT ON BIOMETRICS
Presentation transcript:

Biometrics and The Privacy Paradox Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Identity: The Promise & Perils of the Technological Age DePaul University, Chicago October 14, 2004

Privacy – What are the Issues?  Expanded surveillance  Diminished oversight  Absence of knowledge/consent  Loss of control

Privacy Defined  Informational Privacy: Data Protection  Personal control over the collection, use and disclosure of any recorded information about an identifiable individual  An organisation’s responsibility for data protection and safeguarding personal information in its custody or control

OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data 1.Collection Limitation Principle 2.Data Quality Principle 3.Purpose Specification Principle 4.Use Limitation Principle 5.Security Safeguards Principle 6.Openness Principle 7.Individual Participation Principle 8.Accountability Principle

Growth of Biometrics  U.S. Border Security Enhancement Act  International Civil Aviation Organization approved facial recognition for travel documents  EU to implement biometrics in passports and visas  CANPASS and INSPASS programs  AAMVA Unique Identifier Working Group

The Myth of Accuracy  The problem with large databases containing thousands (or millions) of biometric templates:  False positives  False negatives

Biometric Applications Identification:  one-to-many comparison Authentication:  one-to-one comparison

Biometric Identification: False Positive Challenge Even if you have a 1 in 10,000 error rate per fingerprint, then a person being scanned against a million-record data set will be flagged as positive 100 times. And that’s every person. A system like that would be useless because everyone would be a false positive. Bruce Schneier, quoted in Ann Cavoukian’s Submission to the Standing Committee on Citizenship and Immigration, November 4,

Biometric Identification  False Negative Challenge:  Attackers could fool the system  Pay-offs high for compromising the system  Increased vulnerability to a target once a terrorist succeeds in obtaining a false negative: threat escalates considerably

Biometric Strength: Authentication The strength of one-to-one matches  Authentication/verification does not require the central storage of templates  Biometrics can be stored locally, not centrally – on a smart card, passport, travel document, etc.

Designing Privacy Into Biometrics The Privacy Challenges:  Central template databases  Unacceptable error rates  Unrelated secondary uses

Facial Recognition: the Dream “ Khalid Al-Midhar came to the attention of federal law enforcement about a year ago. As the Saudi Arabian strolled into a meeting with some of Osama bin Laden’s lieutenants at a hotel in Kuala Lumpur in December 1999, he was videotaped by a Malaysian surveillance team. The tape was turned over to U.S. intelligence officials and, after several months, Al-Midhar’s name was put on the Immigration and Naturalization Service’s “watch list” of potential terrorists. … The videotape of Al-Midhar also could have been helpful. Using biometric profiling, it would have been possible to make a precise digital map of his face. This data could have been hooked up to airport surveillance cameras. When the cameras captured Al-Midhar, an alarm would have sounded, allowing cops to take him into custody.” - Business Week, Sept. 13, 2001, p. 39

Facial Recognition: the Reality  Test results in place show less than stellar results - Logan Airport pilot had a 50% error rate in real world conditions - U.S. State Department has stated that facial recognition has “unacceptably high error rates” - U of Ottawa tests this summer resulted in accuracy rates between 75% to more than 90% - National Institute for Standards and Technology, under ‘ideal lighting and controlled environment conditions’ reported 90% accuracy - Superbowl facial recognition no longer considered ‘useful’ by subsequent Superbowl organizers “Biometrics Benched for Super Bowl” By Randy Dotinga, Wired MagazineRandy Dotinga

Comparison of Accuracy Rates  NIST Studies show for single biometrics: Facial recognition: % true 0.01 false accept rate % true 1.0% false accept rate Fingerprint: % true 0.01% false accept rate % true 1.0% false accept rate

Facial Recognition and Privacy Research  Confounding Facial Recognition systems:  Creating visual noise through: - Disguises, obstructions, light sources, face paint  Objective: - Creating a framework for facial recognition countermeasures  Results: - Research by James Alexander, U. Pennsylvania

Biometrics Can Be Privacy-Enhancing, if they: 1.Have privacy hard-wired into the deployed technology 2.Authenticate personal credentials without necessarily revealing identity 3.Do not facilitate surveillance or tracking of an individual’s activities – avoid the use of template-based central databases 4.Put control of the biometric in the hands of the individual 5.Provide excellent security without compromising privacy

Final Thoughts on Biometrics  Current off-the-shelf biometrics permit the secondary uses of personal information  The Goal: “Technology that allows for informational self-determination and makes good security a by-product of protecting one’s privacy”  Using the biometric to encrypt a PIN or a standard encryption key will meet that goal: Biometric Encryption – Dr. George Tomko

“I am not a number, I am a human being. I will not be filed, stamped, indexed or numbered. My life is my own.” The Prisoner TV series, 1968 “I am not a number, I am a free man”

How to Contact Us Ann Cavoukian, Ph.D. Information & Privacy Commissioner of Ontario 80 Bloor Street West, Suite 1700 Toronto, Ontario, Canada M5S 2V1 Phone: (416) Web: