Biometric Technology Dissenters: Alex Feinberg Brad Harris Ashley DiSilvestro Charisma Nelson.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

SEARCH AND SEIZURE The 4 th. Disclaimer Mr Koepping is NOT an attorney. This discussion is for the purpose of explaining general constitutional principles.
Exploring the Bill of Rights For the 21st Century
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
The Fourth Amendment What Are Your Rights? Mr. Carr Social Studies.
Teaching American History: Moot Courts and Constitutional Concepts.
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of.
The Bill of Rights is the name of the first ten amendments to the United States Constitution They were introduced by James Madison to the First United.
Suspects Rights Amendments 4, 5 and 6. 4 th Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
Privacy & Personal Information -- Why do we care or do we?
The Bill of Rights.
What rights are protected under the Bill of Rights?
Amendment: (noun) a change made to a law or document Founders wanted Constitution to be a “living document” (able to evolve with the nation) Making changes.
The Bill of Rights The first 10 amendments to the U. S. Constitution ©2012, TESCCC 10/21/12page 1 of 9.
The Bill Of Rights The First Ten Amendments to the Constitution
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
California vs. Acevedo By: Caroline Correa & Raul Perez.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
SS4H5 The student will analyze the challenges faced by the new nation.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
Bill of Rights Proposed: September 25, 1789 Ratified: December 15, 1791 Meant to restrict national government, not the states (14 th Amendment makes them.
The Bill of Rights During the debates on the adoption of the Constitution, its opponents repeatedly charged that the Constitution as drafted would open.
Bill of Rights.
By: Justin Cruz Engl Ms. Deezy. Government?  Government is supposed to protect us but who protects us from the government?  How much control should.
Amendments to the U.S Constitution that have particular implications in science, medicine, and the delivery of health care >>>>>>
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
The Bill of Rights The First Fundamental Changes of the Constitution.
Lecture 2 Applications of Propositional Logic. Translating English into Logic " The right of the people to be secure in their persons, houses, papers,
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
The Fourth Amendment and the Home By Laura Zajac.
Amendment I Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech,
Get ready for a WOD. WOD Bill of Rights Definition The first ten amendments to the US Constitution. It was created to list the rights that certain Framers.
Bill of Rights  First Ten Amendments to the Constitution  Aims to protect people against the abuses of the Federal Government.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
7 th Grade Government and Civics The Bill of Rights Grade 7 Mr. Cole
U.S. Constitution The Bill of Rights By: Leah Thompson.
THE BILL OF RIGHTS REASONS AND CONTENTS. REASONS CREATED RIGHTS WERE NOT LISTED IN THE ORIGINAL CONSTITUTION ANTI-FEDERALISTS WANTED A GUARANTEE THAT.
According to the Bill of Rights, you have the freedom of speech which means that you have the right to practice your religion › The rules are a little.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
 The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Ch. 15: The Bill of Rights Vocabulary: amendments, bail, citizen, ratify, Constitution.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
CALL TO ORDER  Have you or someone you’ve known ever been searched by the police, legally or illegally?  What do you know about the rules that police.
You remember the 4th Amendment, don’t you?  “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
First 10 Amendments to the United States Constitution.
Rights of the Accused. 1. Arrest With a warrant: a) based on probable cause b) warrant obtained from a judge presented with probable cause With a warrant:
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
The Bill of Rights and the Criminal Trial Process.
Criminal Investigation: Laws of Arrest, Search and Seizure Chapter 12 Law and Government.
Arrest and Detainment How do you know you’ve been arrested?
CONSTITUTION. Preamble We the people of the United States, in order to form a more perfect union, establish justice, insure domestic tranquility, provide.
The Bill of Rights and Search and Seizure. The students will be able to: 1. Discuss the amendments involved from the Bill of Rights that pertain to obtaining.
Limiting the Right of Search
Introduction to Constitutional Law
The Bill of Rights SS.7.C.2.4 & SS.7.C.2.5.
The Fourth Amendment and the Home
Introduction to Constitutional Law
Understanding Law: Mr Thompson, APT Academy
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
Warm Up – February 11 Grab the handouts from the front table
How does this Constitutional amendment protect Americans?
Arrest.
Baltimore Police Department & CitiWatch
Judicial Restraint vs. Judicial Activism
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

Biometric Technology Dissenters: Alex Feinberg Brad Harris Ashley DiSilvestro Charisma Nelson

Biometrics are convenient until they are stolen.

Cost for Biometric Technology: Prohibitively High Many expected biometric technology to be widespread by the mid 1990’s, but even in 2007 it is still unpopular because it remains too expensive to implement. -Katy Lieber, “Identifying the market for biometrics” East Bay Business Times, January 23, 2006 “Iris recognition units--typically used to authorize physical access to a place--cost about $2,000 per unit. Hand geometry readers usually cost between $2,000 and $4,000. Putting together a comprehensive iris or hand recognition system, for example, would cost far more, on the order of hundreds of thousands of dollars, and involves hardware, software, and licensing costs.” -Paul Rosenzweig, Alane Kochems, and Ari Schwartz: “Biometric Technologies: Security, Legal, and Policy Implications” The Heritage Foundation, June 21, 2004

Just imagine if one hospital or one university, with all of its access points, sought to implement iris or hand recognition biometric technology… it would cost MILLIONS of dollars. Now imagine biometric technology being installed at sites across the country! The initial investment of converting security systems nation-wide to biometric would be on the order of many billions of dollars. We are not just talking about little scanners over doorways, we are talking about the design and construction of an entirely new infrastructure that would rely on sophisticated and expensive hardware technology and computer software. Who is going to pay for this? Private business? What about businesses that cannot afford the technology overhaul?

Rebuttal: SECURITY Biometrics Technology is NOT a foolproof security system. If traditional security methods (identity cards, passwords, etc) still needed, what is the point??? Biometrics are not foolproof; it may be more convenient in the future, but may not be more secure.

Malaysia car thieves steal finger By Jonathan Kent BBC News, Kuala Lumpur Police in Malaysia are hunting for members of a violent gang who chopped off a car owner's finger to get round the vehicle's hi-tech security system. The car, a Mercedes S-class, was protected by a fingerprint recognition system. Accountant K Kumaran's ordeal began when he was run down by four men in a small car as he was about to get into his Mercedes in a Kuala Lumpur suburb. The gang, armed with long machetes, demanded the keys to his car. It is worth around $75,000 second-hand on the local market, where prices are high because of import duties. Stripped naked The attackers forced Mr Kumaran to put his finger on the security panel to start the vehicle, bundled him into the back seat and drove off. But having stripped the car, the thieves became frustrated when they wanted to restart it. They found they again could not bypass the immobiliser, which needs the owner's fingerprint to disarm it. They stripped Mr Kumaran naked and left him by the side of the road - but not before cutting off the end of his index finger with a machete. Police believe the gang is responsible for a series of thefts in the area. Story from BBC NEWS: Published: 2005/03/31 10:37:04 GMT © BBC MMVII

What about false-positives and false-negatives? Can you distinguish these faces? A computer may not be able to False Positive = Incorrect match between identifiers of two different individuals  detaining an innocent person False Negative = Unsuccessful identification of a wanted individual  allows criminal to slip through During a recent test at the Palm Beach Airport in Florida, a biometric system produced a false positive more than twice an hour. It was able to identify the 15 employees who had volunteered to pose as terrorists on a watch list only 47 percent of the time (false negative). The airport announced it would not adopt the system. - Simson Garfinkel, International Biometric Group  ???

Violation of the Fourth Amendment of The U.S. Constitution The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Violates Article 12 of the United Nations’ Universal Declaration of Human Rights Article 12: No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks.

The Slippery Slope of Biometric Technology Biometrics is a good idea in theory BUT when put into practice, infringes upon individual’s right to privacy. Endless Possibilities for Exploitation and Abuse Will Cause more Harm than Good Poses Unacceptable Risk to Loss of Privacy & Personal Freedom Big Brother is Watching You: when does it end?