When “the face says it all”: the Stakes of Biometric Identification

 

By Cpl. Spencer M. Murphy, 2006. Wikimedia Commons, Public domain.

Biometric technology has been increasingly used for personal identification, in both the public and private sector, as a rapid way of verifying identity and controlling access to a variety of services. However biometric identification also brings up serious concerns over privacy rights and discriminatory profiling.

The aim of this essay is to provide a historical and comparative analysis of this burgeoning technology and its implications within the socio-political and economic context. This essay will then analyze the arguments for and against the implementation of this regulatory system in Australia.

What is biometric identification?

Biometric identification refers to the process of using biological or behavioural characteristics, such as fingerprints, iris scans, facial recognition, handwriting, to identify individuals (see Figure 1).

Figure 1. Classification of Biometric Traits. By Alessio Damato, April 2007. Creative Commons Attribution-Share Alike 3.0 Unported

 

 

 

 

 

Biometric practices date back thousands of years. Cummins (1942) describes fingerprints found in ancient clay objects from the Babylonian era; in Ancient Egypt, physical characteristics were used to describe merchants (Nadeau, 2012). In the nineteenth century, biometric systems of identification, namely the Bertillon system, were widely adopted in Europe and the United States for criminal identification.
In the computerized age, biometric authentication techniques gained widespread use and grew increasingly sophisticated (Nadeau, 2012). Nowadays biometric technology has permeated various aspects of everyday life and serves a variety of purposes, from tracking national security threats to accessing a bank account. According to a report by the Council of Europe, globalisation, the development of information technology and global security issues are also contributing factors to the increasing use of biometrics.

 

How does it work?

A biometric system is composed of a sensor that detects the human trait, a computer to read and store the information, and a software that analyzes this characteristic.

Biometric devices (1) register individual traits (through the process of “enrollment”), (2) analyze and store the coded information and (3) compare each captured image to the database in order to determine if the image matches the stored templates (see Figure  2).

 

Figure 2. Biometric system.  By Alessio Damato, 2007. CC BY-SA 3.0

 

 

 

 

 

 

 

Van Hamme et al. (2018) identify three interacting dimensions to characterize authentication systems: usability, security and privacy. The balance of these three elements is necessary in order to achieve a frictionless experience towards the users.

 

India’s national system of biometric identification

In 2009, the government of India launched Aadhaar, a national identification program based on biometric information. The system became the largest biometric database in the world, containing the fingerprints, iris scans and photographs of more than a billion people. As of mid-February 2018, 89% of India’s population has been registered in the Adhaar system.

Figure 3. Aadhaar Biometric Collection at the Chirantani Vidyapith camp in Shibpur, Howrah. By Biswarup Ganguly, 10 August 2012. CC BY-SA 3.0

 

 

 

 

 

 

 

Aadhar is described by a government website as a unique program which provides “state-of-the-art digital and online Id” at a large scale. Registration is free of charge and the system is notably used for welfare schemes and service delivery. The use of biometric data can be considered an innovative way of promoting the social and financial inclusion of marginalized groups, especially women or people living in impoverished rural areas.  

However Aadhar requires an Internet connection and electricity, which poses a serious problem for the people living in remote and marginalised areas with weak signal, who rely on this technology for necessities. The system has also been criticized for violating privacy rights and instituting “mass surveillance”, although this view has been repealed by the Supreme Court, which upheld the validity of the system in accordance with constitutional rights.  Reports of misuse and security breaches reinforce the arguments against the collection of biodata for governmental use.

 

A new model for state surveillance?

Biometric technology has also been employed by Chinese authorities to collect data on citizens and strengthen their ever-tighter control over the population, as was revealed in a BBC report.

Surveillance technology has been used to roll out a ”social credit” system to monitor both social and financial behaviour (see excerpt from the Foreign Correspondent below).  Facial recognition is used for routine law enforcement such as identifying jaywalkers. In addition, a report by the Human Rights Watch  revealed that the government collected biodata to identify minority groups and political dissidents from the Uyghur region, under the guise of a healthcare program. These invasive mass surveillance techniques have been strongly criticized by human rights activists for violating privacy rights.

China’s surveillance system. Excerpt from “Exposing China’s Digital Dystopian Dictatorship” from the Foreign Correspondent. ABC News. Available on Youtube.

 

Should Australia fully embrace biometric identification?

Biometric identification is a growing trend and has gained widespread use around the world. It is estimated that 50% of the Australian population has some kind of biometric data registered in the national database. In 2008, the Australian Law Reform Commission issued a report stating that biometric systems are being increasingly introduced by the Australian government and organisations. Yet biometric technology raises a number of concerns, for instance over the security breaches, privacy rights and the protection of personal data.

The ACIC recently suspended a biometric program designed to create a criminal database using facial recognition due to delays and over-budgeting. The program would have added to the national fingerprint database as part of law enforcement measures which involve an increasing reliance on biometrics. The question therefore remains: should the Australian government systematically rely on biometrics for personal identification?

The arguments  for

Biometric identification offers relatively secure and fast authentication. Biometric technology is effective as it allows for the identity of an individual to be authenticated within seconds with a “fair degree of certainty” (ALRC, 2008). If properly encrypted, multimodal biometric technology has the potential to reduce security issues and present itself as a solution to identification problems (Normalini and Ramayah, 2012).

Technological advancements in biometrics have opened new pathways for “frictionless” authentication (Van Hamme et al., 2018). Identity verification through biometric modalities ultimately offers access control with a “high degree of assurance”, which ultimately make the system “a much safer alternative to passwords”.  

These systems allows for a number of online governmental services to be readily accessed by individuals registered in the national database and could therefore contribute to a greater inclusion of groups in the social and financial schemes by facilitating their access to these services.

Biometric technology is a powerful tool for the state. It is seen as a cost-effective way of identifying individuals for the purposes of criminal law enforcement and managing security threats, such as terrorism. The technology is also used to effectively to track immigration and border control, and to prevent identity fraud (ALRC, 2008). Biometric systems provide valuable demographic and biometric information about individuals which can be readily accessed and more accurately recorded. The World Bank has estimated that the Indian government was able to save close  to $1 billion per year by using Aadhaar.

 

The arguments against

Privacy is a major source of concern in regards to the use of biometric identification for extensive monitoring of individuals (OECD, 2004). The collection of biometric data combined with other personal information could be used to create a complete profile of a person. This sensitive information could then be used for profiling and influencing political behaviour. Freedom of choice is also put into question should the system become mandatory for every citizen. With the proliferation of this type of verification there would be increasing pressure to participate in the program in order to access certain services, making it more of a “requirement” rathen a voluntary act.

Biometric recognition is prone to several vulnerabilities and one of the biggest risks of biometric technology is that of security breaches. As Gupta et al. (2016) demonstrate, iris recognition systems may suffer from various attacks. Multimodal biometric systems are also vulnerable to spoof attacks (Akhtar and Kale, 2011). The question of security therefore raises legitimate concerns with empirical cases such as the hacking of biometric passports in the United Kingdom. Furthermore, it is nearly impossible to modify one’s biodata once it has been stolen and the damage could be irreversible.  

The reliability and accuracy of these systems can be put into question. In India, there were incidents where citizens being denied access to services due to errors or false identification. In addition, health issues or aging may interfere with the reliability and efficiency of authentication. The accuracy of biometric recognition may encounter problems due to biomedical changes which may alter certain features. A false positive or negative can imply serious security breaches or exclusion from a particular service.

Another issue is that of accessibility. In places with unreliable internet connection, people will struggle to get online authentication. The system may further instigate dynamics of exclusion set targets for discriminatory profiling.

 

Conclusion

Any kind of technological project is embedded within the socio-political and economic context. Digitization provides new mediums for online personal identification. At the same time here is a growing concern for protecting sensitive personal information. Although biometrics may appear as reliable forms of identification, there are several drawbacks to these systems. Regulation and effective measures to protect privacy rights would need to be implemented alongside the advent of automated authentication methods and digital databases.

 

References

Akhtar Z., Kale S. (2011) Security Analysis of Multimodal Biometric Systems against Spoof Attacks. In: Abraham A., Lloret Mauri J., Buford J.F., Suzuki J., Thampi S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg
Australian Law Reform Commission (2008) “9. Overview: Impact of Developing Technology on Privacy”. For Your Information: Australian Privacy Law and Practice (ALRC Report 108)
Available at: https://www.alrc.gov.au/publications/9.%20Overview%3A%20Impact%20of%20Developing%20Technology%20on%20Privacy/biometric-systems
Ayyar, Kamakshi (2018) The World’s Largest Biometric Identification System Survived a Supreme Court Challenge in India. Time.com http://time.com/5388257/india-aadhaar-biometric-identification/
BBC News (2017) “China: ‘the world’s biggest camera surveillance network’”.Published on: Youtube.com Available at: https://www.youtube.com/watch?v=pNf4-d6fDoY
Carney, Matthew (2018) “Leave No Dark Corner” Foreign Correspondent, ABC News. http://www.abc.net.au/news/2018-09-18/china-social-credit-a-model-citizen-in-a-digital-dictatorship/10200278
Council of Europe (2005) Progress Report on the Application of the Principles of Convention 108 to the Collection and Processing of Biometric Data http://www.oecd.org/sti/ieconomy/councilofeuropesworkonbiometrics.htm
Cummins, Harold (1941-1942) Ancient Finger Prints in Clay, 32 J. Crim. L. & Criminology 468https://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=3083&context=jclcGupta, Richa and Sehgal, Priti (2016) A survey of attacks on iris biometric systems, International Journal of Biometrics, Volume 8 Issue 2, p. 145-178 DOI: https://doi.org/10.1504/IJBM.2016.077833

Human Rights Watch (2017) China: Minority Region Collects DNA from Millions. https://www.hrw.org/news/2017/12/13/china-minority-region-collects-dna-millions

Johnson, Bobbie (2006) Hackers Crack New Biometric Passports. The Guardian. https://www.theguardian.com/technology/2006/aug/07/hacking.security

Kolachalam, N. (2017) The Privacy Battle Over the World’s Largest Biometric Database. The Atlantic. https://www.theatlantic.com/technology/archive/2017/09/aadhaar-worlds-largest-biometric-database/538845/

Lemmon, G.T. (2017) How India’s Controversial Biometric ID System Can Help Women. Time.com
http://time.com/4828808/india-biometric-id-system-aadhaar-benefits-women/

M.K. Normalini,T. Ramayah (2012) Biometrics Technologies Implementation in Internet Banking Reduce Security Issues? Procedia – Social and Behavioral Sciences, Volume 65, Elsevier Ltd. p. 364-369 DOI: https://doi.org/10.1016/j.sbspro.2012.11.135
Government of India. “About Aadhaar”. Unique Identification Authority of India.
https://uidai.gov.in/your-aadhaar/about-aadhaar.html
Nadeau, L.K., (2012) Tracing the History of Biometrics, Government Technology http://www.govtech.com/Tracing-the-History-of-Biometrics.html
National Law Enforcement Museum Insider (2011) “Bertillon System of Criminal Identification”. Volume 3, Issue 9. http://www.nleomf.org/museum/news/newsletters/online-insider/november-2011/bertillon-system-criminal-identification.html

Pash, Chris (2018) Australia’s biometric identification project has been terminated. Business Insider.
https://www.businessinsider.com.au/australia-biometric-identification-project-terminated-2018-6Press Trust of India (2018) “Aadhaar neither creates surveillance state nor violate privacy, claims UIDAI”. First Post. https://www.firstpost.com/tech/news-analysis/aadhaar-neither-creates-surveillance-state-nor-violates-privacy-claims-uidai-5268751.htmlRjeily, A. and Jacco, C. (2017) Passwords Are Terrible, but Will Biometrics Be Any Better?https://hbr.org/2017/05/passwords-are-terrible-but-will-biometrics-be-any-better

The Economic Times (2016) Aadhaar ID saving Indian govt about $1 billion per annum: World Bank.
//economictimes.indiatimes.com/articleshow/50575112.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst

Trigger, Rebecca (2018) Experts sound alarm as biometric data from drivers’ licences added to government database. ABC News. http://www.abc.net.au/news/2018-01-15/alarm-raised-as-drivers-licences-added-to-government-database/9015484

Yerman, Jordan (2017)  Does Biometric ID Verification Give Way to Data and Discrimination Risk? Apex. https://apex.aero/2017/03/02/biometric-id-verification-data-discrimination-risk

Images:

Cpl. Spencer M. Murphy.  (2006) File:IrisScanIraq.jpg. Wikimedia Commons. Accessed:
https://commons.wikimedia.org/wiki/File:IrisScanIraq.jpgDamato, Alessio (2007) File:Biometrics traits classification.png. Wikimedia Commons.
Accessed: https://commons.wikimedia.org/wiki/File:Biometrics_traits_classification.png

Damato, Alessio (2007) File:Biometric system diagram.png. Wikimedia Commons. Accessed: https://commons.wikimedia.org/wiki/File:Biometric_system_diagram.png
Ganguly, Biswarup. File: Aadhaar – Biometric Data Collection Camp -Chirantani Vidyapith – Howrah – 08-10 01547.jpg. Wikimedia Commons. Accessed: https://commons.wikimedia.org/wiki/File:Aadhaar_-_Biometric_Data_Collection_-_Chirantani_Vidyapith_-_Howrah_2012-08-10_01547.jpg

ABC News. “Exposing China’s Digital Dystopian Dictatorship”Foreign Correspondent. ABC News. Available on Youtube. https://www.youtube.com/watch?v=eViswN602_k

Roma Drelich
About Roma Drelich 6 Articles
Exchange student from France studying for one year at the University of Sydney.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


eighteen + five =