Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change.

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

Some Thoughts on Cyber-Resiliency, Time, and Surveillance Peter Swire Huang Professor of Law and Ethics Georgia Institute of Technology NAS/NRC Forum on.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Introduction to Fingerprint Biometrics By Tamar Bar.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Emerging Biometric Applications Expectations and Reality (in 29 minutes or less!) (C) Mr David Heath of Triton Secure.
George Turner Effectiveness of Biometric Security CS591 Semester Project
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Identity, privacy and technology: DNA fingerprints, identity cards, and CCTV HI 269 Week 5.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Identity theft By: Blake D uncan.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Scams & Schemes Common Sense Media.
 What Is Biometric  History Of Biometric  Biometric Identity: initiative of the Indian Government  Potential for Biometrics in Retailing  How Biometric.
Introduction to Biometrics Charles Tappert Seidenberg School of CSIS, Pace University.
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Ways in which Information can be misused By:Nastassja Grant Tajea Taylor Abigail White.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
”Billboard that looks back”  What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics.
The Emerging Global Identity & Tracking System October 28, 2004 Barry Steinhardt Director, Technology & Liberty Project American Civil Liberties Union.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Police 3.6 Politics and Government. DNA Data Collection.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics.
Data Security.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
CS 6v Privacy Nothing to Hide? Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
COMP 2903 A9 – National ID: Biometrics Pinned to Social Secuiry Cards Danny Silver JSOCS, Acadia University.
Mrs. Esman Computer Special
Challenge/Response Authentication
BIOMETRICS Libraries have begun to see the value of biometrics M. G
Stovall and Klee Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Biometrics.
Scams and Schemes.
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Presentation transcript:

Privacy: Biometric Technology and Civil Liberties Biometric technology is used because it relies upon “highly reliable” characteristics which cannot change or be lost. Eyes, face, DNA and fingerprints are so closely tied to an individual that they cannot be lost or forgotten, short of amputation or mutilation—and therein lies part of the problem. The very reasons that these traits are used—uniqueness and permanence—are the reasons that they should are dangerous. Harm to the individual’s right to security of their person and property is at risk.

Problems with Biometric Technology 1.Identity theft takes on new proportions. 2.Use of biometrics increases the risk to an individual’s person and property. 3.Civil liberties are threatened.

If someone receives your biometric information, this information is compromised for life. “Biometrics is more private to you than a number that somebody assigned to you. I cannot cancel my face,” said IBM research Nalini Ratha. “Biometrics is more private to you than a number that somebody assigned to you. I cannot cancel my face,” said IBM research Nalini Ratha. There have been attempts to make distorted models of fingerprints so a hacker could not access them, but the models are not foolproof. There have been attempts to make distorted models of fingerprints so a hacker could not access them, but the models are not foolproof. Once data is in a database, government or corporate, there is potential for it to be misused. Once data is in a database, government or corporate, there is potential for it to be misused. There is a big distinction between a credit card number being stolen and a genetic identity being stolen—not just in uniqueness, but in potential for racism or other genetically based discrimination. There is a big distinction between a credit card number being stolen and a genetic identity being stolen—not just in uniqueness, but in potential for racism or other genetically based discrimination.

Once means of security is linked to physical person, physical person is put at risk. It’s not just about stealing passwords or decrypting information. It’s not just about stealing passwords or decrypting information. Case in point: In 2005, K Kumaran of Subang Jaya in Malaysia lost a finger to auto thieves taking his Mercedes-Benz S-Class. Case in point: In 2005, K Kumaran of Subang Jaya in Malaysia lost a finger to auto thieves taking his Mercedes-Benz S-Class. There is concern that information can be “skimmed” remotely by kidnappers, terrorists, etc. There is concern that information can be “skimmed” remotely by kidnappers, terrorists, etc.

Biometric technology threatens civil liberties. Does the government really need to know this much about people? Does the government really need to know this much about people? People may feel a sense of criminalization if biometric technology becomes associated with everyday tasks. People may feel a sense of criminalization if biometric technology becomes associated with everyday tasks. Different uses for biological identifiers may emerge in the future that were not considered when the data was first collected. Different uses for biological identifiers may emerge in the future that were not considered when the data was first collected. “With the biometric passport, every country may have its own surveillance system, accumulating fingerprints and face-scans and keeping them for as long as they wish with no regard to privacy or civil liberties. Governments may claim that they are under an international obligation to create national databases of fingerprints and face scans but we will soon see nations with appalling human rights records generating massive databases, and then requiring our own fingerprints and face- scans as we travel.” – Dr. Gus Hosein, Privacy International.

Natalie Dawe, Sarah Howell, Carolyn Russell, Courtney Taylor, Lindsay White