The Emerging Global Identity & Tracking System October 28, 2004 Barry Steinhardt Director, Technology & Liberty Project American Civil Liberties Union.

Slides:



Advertisements
Similar presentations
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
Advertisements

E- passports Erik Poll Digital Security Group Radboud University Nijmegen.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
The Evolution of the Trusted Traveler Concept September 2010.
FAL Programme Presentation to ACI July 2004 Mary McMunn Chief FAL section Presentation to ACI July 2004 Mary McMunn Chief FAL section.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
1 Preview of the self service airport R edesign P assenger P rocess (RPP) Club of Amsterdam, 1 Maart 2006.
COMP 006: Computers Make It Possible 25 August 2004.
FIT3105 Biometric based authentication and identity management
Risk of Using RFID chips in Passports Oscar Mendez.
Biometrics & the Privacy Paradigm: Separating Fact from Fiction Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Security.
Face Recognition and implications on society By Zubin Singh ICS 131.
The Role of Computers in Surveillance ~ Katie Hatland.
Biometrics and The Privacy Paradox Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Identity: The Promise & Perils.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
Airport Security. Objectives  Identify where the computer is used at the airport  State the benefits of using computers at the airport  List the steps.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Securing Data in ePassports Policy Issues ICAO/NTWG.
Biometrics on the international scene David Gamper, ACI Headquarters Scope of presentation ICAO TAG/MRTD progress Different uses of biometrics ACI World.
1 New Zealand’s Advance Passenger Screening and Biometrics Presentation to : BALI AHEG II Identity Management Workshop 17 March 2004 Rob Bolton Chief Information.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
New Technologies and Travel Documents ICAO 12 th Meeting of the Facilitation Division Cairo March 23, 2004.
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
SPT - the way travel should be!. Current Environment  Check-in, security and border clearance processes are resource intensive  High staff costs, cumbersome.
”Billboard that looks back”  What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics.
Exposing the Myths, Exploring the Solutions Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Privacy & Security: Seeking the.
Policy Laundering and Privacy. A Special Warning To US Allies BE AFRAID! BE VERY AFRAID! Carnegie Mellon University March Barry Steinhardt.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
BUS2302 Information Technology and the Business Student Group 2 Biometrics March 28, 2013.
Biometrics.
THE MALAYSIAN ELECTRONIC PASSPORT
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
European Commission Living in an area of freedom, security and justice Directorate-General Justice and Home affairs Silvia Kolligs DG Justice and Home.
Registration systems in Migration Management
Biometric Technologies
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Francis Lasalo Ngonga1 AVIATION SECURITY Last session’s recap  General definitions of safety & security  A few characteristics of security  AVSEC 
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
ACI Biometrics Task Force Status Report ACI Bio TF Meeting 2 Geneva, Switzerland April 21, 2005.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
Securing Data in ePassports
THE MALAYSIAN ELECTRONIC PASSPORT
Outline The basic authentication problem
Silvia Kolligs DG Justice and Home Affairs Unit B1 -Borders and Visas-
Silvia Kolligs DG Justice and Home Affairs Unit B1 -Borders and Visas-
Rachel Williams, Inger Mordre, Kyra Ward, Rory Langan, Dillon Yeh
Athina Antoniou and Lilian Mitrou
Summary Physical Access & Time and Attendance PC/Network Access
New Technologies and Travel Documents
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Securing Data in ePassports
Global Biometric System Market : Trends, Forecast, and Opportunity Analysis 1.
Facial Recognition in Biometrics
Biometrics.
Debate Session II – 10 October 2013
Biometric technology.
TECHNOLOGICAL PROGRESS
RECORDING AND DOCUMENTING IMMIGRATION CONTROLS
Presentation transcript:

The Emerging Global Identity & Tracking System October 28, 2004 Barry Steinhardt Director, Technology & Liberty Project American Civil Liberties Union

“Policy Laundering” Cycling policies through international bodies that can’t be enacted directly at home

Biometric Passports Required by US Congress Standards created by ICAO

Biometric Passports Face-Recognition set as the standard RFID chips included too Standards allow for optional use of other biometrics

RFID Chips Can be read at a distance (20m in tests) –see No encryption Could enable tracking

Face Recognition Highly unreliable biometric Allows tracking-at-a-distance

Once created, biometric passports will: Become gold standard of identity verification around the world Become template for domestic National ID systems Increasingly be demanded for more and more purposes, abroad and domestically Be subject to private sector “piggybacking” Eventually they may become practical necessities

Expansion is inevitable Be used for more and more purposes Contain ever-more information Incorporate more biometrics, such as fingerprints and iris scans Once created, passports are likely to:

Passports won’t exist in a vacuum National Identity systems Immigration database systems Passenger profiling systems

“Policy Laundering” National ID proposals failed in US US sets standards for allies US prods international body (ICAO) to set standards US complies with international standards

NGO input could have improved the product Biometrics can be implemented in ways that prevent use for surveillance or tracking Local storage 1-1 checks biometric systems related to physical characteristics which do not leave traces (e.g. shape of the hand but not fingerprints)

Attempts to participate were rebuffed NGOs Ignored

Passenger Screening February 2002: CAPPS II (version 1.0) Data mining, wide sharing, the works August 2003 CAPPS II (version 2.0) Commercial data, Red light/Green light, August 2004 “Secure Flight” CAPPS version 3.0: Watch lists, commercial data

Secure Flight Compared to CAPPS II Program ElementsCAPPS IISecure Flight Provides no protection against terrorists with Fake IDs √√ Provides no meaningful way for individuals to challenge their security designation √√ Centers around reliance on secret, inaccurate government terrorist watch lists √ Checks personal information against private databases √√ Requires collection of personal information from travelers making reservations √√ Expands program beyond terrorists √* Uses computer algorithms to rate individuals’ “threat to aviation” √*

Passenger Screening Foisted On Canada & EU Must be international to work EU-US agreement reached over parliamentary objection – Canada too International agreements reached while domestic program still embattled

For More Information: