90 likes | 205 Views
Privacy In Biometrics. Colin Ratcliffe, Frank Jackson, Jeff Ditzler. Privacy in Biometrics Colin Ratcliffe, Frank Jackson, Jeff Ditzler. What IS Biometrics?.
E N D
Privacy In Biometrics Colin Ratcliffe, Frank Jackson, Jeff Ditzler Privacy in Biometrics Colin Ratcliffe, Frank Jackson, Jeff Ditzler
What IS Biometrics? • The science of using biological properties to identify individuals for the purpose of authentication; for example, fingerprints, retina scan and voice recognition.
Convenience Speed Medical advancements Security* * On a personal or small level in which the individual has the control over distribution of information Possible Benefits:
Potential Threats to Privacy and Security • If attacked: economical, technological, social, governmental collapse • Obvious terrorist target • Threat to civil liberties and attack on 4th amendment • Identity theft on a much larger scale • Stakes of benefits go up • Can’t close the box
Threat 1: Worst Case Scenario • If mainframe was hacked: • Withdrawal of all identities to prevent further loss • Economic collapse • Social structure collapse • Security collapse • Example: stolen laptop from Dept. of Veteran’s Affairs, July 2006
Threat 2: Attack on the 4th Amendment • To protect identity, identity is lost • Discretion of disclosure of personal information and identity is given up • Driver’s licenses to passports to molecular structure • Information lifted without knowledge or consent • radio frequency identification (RFID) in passports • Big Brother idea • Where is the line drawn? Fingerprints left everywhere • Beyond the 4th Amendment: “The technology has outstripped our ethical standards, our privacy standards and our legal standards” [Peter Scharf, Communications of the ACM, July 2002.]
Threat 3: Pandora’s Box • Real identity theft: • No longer can claim your own identity if there is no way to prove it • SSN, DNA, etc all gone • Its opening a box which cannot be closed • The technology to hack WILL catch up with security
Attacks on Privacy • "Currently it's only researchers that are doing spoofing and copying. It's not a mainstream activity--but it will be. It's just human nature; if it can be done it will be done if you can achieve some benefit from it." -Bori Toth biometric research and advisory lead at Deloitte & Touche
Ends Justify Means…? • This is an interesting new idea that has great potential. However, the risks with widespread implementation greatly outweigh the benefits that could be gained by the use of such an uncontrollable technology.