Printer Friendly
The Free Library
22,741,889 articles and books

Monitoring biometric technologies in a free society. (American Thought).



CONTROVERSY CONTINUES in Washington over Internet privacy Internet privacy consists of privacy over the media of the Internet: the ability to control what information one reveals about oneself over the Internet, and to control who can access that information.  legislation to deal with unwanted marketing online. However, that debate has been overshadowed by the rise of public surveillance technology, particularly biometrics, which are even more invasive, using individuals' unique physical characteristics for purposes of identification and/or authentication. Biometrics gained at the 2001 "Snooper Bowl" when fans at Super Bowl XXXV Super Bowl XXXV was the 35th championship game of the modern National Football League (NFL). The game was played on January 28, 2001 at Raymond James Stadium in Tampa, Florida following the 2000 regular season.  were observed by surveillance cameras and their faces compared to a database of criminals using face-recognition software. After the 9/11 terrorist attacks on the World Trade Center and the Pentagon, the Pentagon, the, building accommodating the U.S. Dept. of Defense. Located in Arlington, Va., across the Potomac River from Washington, D.C., the Pentagon is a five-sided building consisting of five concentric pentagons connected to each other by corridors and covering  idea of government-issued national ID cards containing some form of biometric identifying information took root.

Face-recognition cameras are now common at airports, on city streets, and in other public places. Biometric technologies also include retina or iris scanners, digitized fingerprints and handprints, and voiceprints. They even include implantable rice-sized radio frequency chips coded with personal information that can be displayed by a scanner.

Biometric technologies can benefit us. Such technologies will find their way into cell phones and mobile computers, car doors, doorknobs, and office keys. They can bolster online commerce, helping prevent identity theft. Implanted microchips have been used to help track pets. Especially for our descendants, implantation of scannable biometric chips may become more accepted and practiced, as has already been done to a limited extent for Alzheimer's patients. For example, they could help locate a missing child or transmit medical information to doctors.

As Paul Saffo Paul Saffo (born in 1954 in Los Angeles) is a technology forecaster. He is the Roy Amara Fellow at the Institute for the Future in Palo Alto, California. He is also a board member of the Long Now Foundation.  of the Institute for the Future put it, "The computer has jumped off our desktops and it is insinuating itself into every corner of our lives. Now it's finding its way into our bodies."

Still, no one wants to be treated like a human bar code by the authorities. What are the benefits and concerns surrounding the further deployment of biometric identification Noun 1. biometric identification - the automatic identification of living individuals by using their physiological and behavioral characteristics; "negative identification can only be accomplished through biometric identification"; "if a pin or password is lost or  techniques into various facets of American life? Do they promise new levels of physical security and more-secure commerce, or do they threaten fundamental values of privacy and even liberty itself? What are the distinctions between governmental and commercial deployment of biometric technologies, and what principles can help identify proper and improper uses?

Biometrics range from completely involuntary to partially voluntary to totally voluntary. The most-pressing threat to liberty is the first, all-inclusive database mandated by government--a national identification card with biometric identifiers. The threat of such an D is apparent--it is involuntary, will increase unwelcome surveillance, and will undercut a presumptive pre·sump·tive  
adj.
1. Providing a reasonable basis for belief or acceptance.

2. Founded on probability or presumption.



pre·sump
 right to maintain anonymity. It would devolve devolve v. when property is automatically transferred from one party to another by operation of law, without any act required of either past or present owner. The most common example is passing of title to the natural heir of a person upon his death.  into a general law enforcement tool having nothing to do with the terrorism that prompted recent calls for national IDs, and would blur the distinction between public and private databases.

A less-sweeping biometric database would be partial, containing criminals and suspects, but not the general population, such as face-recognition cameras deployed in public places like airports and sporting events. Individuals would be observed, but presumably pre·sum·a·ble  
adj.
That can be presumed or taken for granted; reasonable as a supposition: presumable causes of the disaster.
 only to see if they matched a face already in the database by way of proper legal procedures. Nevertheless, many observers doubt that governments can be trusted to discard incidental data collected on innocents.

Finally, private applications of biometrics would be those that contain data solely on individuals who have garnered clearance for a particular private purpose (access to financial records, for instance), as opposed to governmental databases. Here, the technologies hold considerable promise.

The challenge of the biometric future is to prevent mandatory national ID cards, ensure Fourth Amendment protections with respect to public surveillance, and avoid the blurring of public and private databases. Private industry must generate its own information, for purposes limited by the market's twin engines of consumer choice and consumer rejection.

Government vs. private databases and their risks to liberty. In private hands, biometric technologies enlarge our horizons. They expand the possibilities of a market economy by bolstering security in private transactions ranging from face-to-face authentication to long-distance commerce.

Government interference with the evolution of biometrics or, worse, domination of the technology changes the picture dramatically. Governments can use the technology to restrain us and violate our liberty and privacy, giving the entire biometrics industry a black eye and turning society against the technology. Information acquired through the commercial process must be kept separate from that extracted through government mandates. Similarly, private companies should not have access to information that government has forced individuals to relinquish. To the extent that private companies encourage the blurring between governmental and market databases, they ensure the industry's regulation and politicization.

"We don't automatically have to call it a national ID card; that's a radioactive term," Rep. Jane Harman (D.-Calif.) said in 2002. The most-pressing threat to privacy and individual liberty is an all-inclusive involuntary database--one mandated by government in which everyone is forced to participate.

This kind of database corresponds to proposed national ID card systems with biometric identifiers. The identifiers would likely take the form of mathematical representations of one's face, iris, fingerprints, and so forth, encoded into a magnetic strip or chip.

No such thing as a "voluntary" national ID card. Many proponents claim that such a national ID system could be voluntary, but it doesn't seem possible to sustain a voluntary system. Terrorists would not volunteer to sign up, Cato Institute "Cato" redirects here. For Cato, see Cato.
The Institute's stated mission is "to broaden the parameters of public policy debate to allow consideration of the traditional American principles of limited government, individual liberty, free markets, and peace" by striving "to achieve
 constitutional studies scholar Robert A. Levy argues, and the "predictable failure of a voluntary system will lead to compulsory IDs."

Even a "voluntary" ID would contain underlying compulsory elements. For example, part of the ID push by the American Association of Motor Vehicle Administrators, which advocates streamlining drivers' license information across the states, would link Immigration and Naturalization Service Noun 1. Immigration and Naturalization Service - an agency in the Department of Justice that enforces laws and regulations for the admission of foreign-born persons to the United States
INS
 files as well as Social Security and Bureau of Vital Statistics data. By incorporating information collected across agencies, the AAMVA's proposed ID starts off as fundamentally compulsory since it would ride atop already administered mandatory databases.

The motive behind the recent interest in a national ID is apparent, even understandable. Backers claim that such a system might have thwarted the 9/11 attacks. It doesn't follow, though, that more surveillance and tracking of ordinary citizens would improve security. Rather, still-unresolved intelligence failures seem to have been the real problem. By and large, the terrorists were who they said they were and could have obtained IDs through official processes.

"Show us your papers"

Many critics of national IDs, such as Marc Rotenberg Marc Rotenberg is a law professor and the Executive Director of the Electronic Privacy Information Center (EPIC). He teaches at Georgetown University Law Center. He has won a number of awards, including the EFF Pioneer Award in 1997, the Norbert Wiener Award for Social and  of the Electronic Privacy Information Center Electronic Privacy Information Center or EPIC is a public interest research group in Washington D.C.. It was established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values in the , have noted that mandatory IDs would lead to many new checkpoints in society that do not exist now. That capability would lead even private entities to ask for ID everywhere--at the cineplex, the concert, the stadium, Disneyland, etc. Governmental abuse is especially worrisome. Syndicated columnist Inc.com defines a syndicated columnist as, "[A] person hired by publications or broadcast organizations to produce written or spoken commentary about specific feature subjects.  William Safire William L. Safire (born December 17, 1929) is an American author, semi-retired columnist, and former journalist and presidential speechwriter.

He is perhaps best known as a long-time syndicated political columnist for The New York Times
 called the national ID a "discredit" card, and worried that ultimately its size could then be reduced for implementation. That is the ultimate expression of the "Big Brother" scenario that scares so many. It will no longer be "show us your papers." One's vital statistics will be readily scannable by the authorities.

Bureaucratic mission creep Mission creep is the expansion of a project or mission beyond its original goals, often after initial successes.[1] The term often implies a certain disapproval of newly adopted goals by the user of the term.  means that ID would morph into a general law enforcement tool having nothing to do with the terrorism or national security concerns that presumably prompted its creation, likely covering such things as underage drinking, petty crime, fighting the drug war, tracking deadbeat dads and welfare cheats, registering guns, and so forth. The impulse for private-sector businesses to piggyback piggyback

1. A broker trading in his or her personal account after trading in the same security for a customer. The broker may believe the customer has access to privileged information that will cause the transaction to be profitable.

2.
 on such an ID would be irresistible, much like the widespread use of the Social Security number by private companies like banks that itself is an unfortunate source of identity theft.

An unnecessary loss of anonymity. The effect of surveillance on political speech and anonymity can become oppressive. Undermining anonymity effectively abolishes civil disobedience civil disobedience, refusal to obey a law or follow a policy believed to be unjust. Practitioners of civil disobediance basing their actions on moral right and usually employ the nonviolent technique of passive resistance in order to bring wider attention to the .

Citizens have a right to legitimate, peaceful civil disobedience and communication. Anonymity and pseudonymity pseu·do·nym  
n.
A fictitious name, especially a pen name.



[French pseudonyme, from Greek pseud
 are "cornerstones of free speech," as noted by attorney Jonathan Wallace This article is about the American basketball player. For the U.S. Representative from Ohio, see Jonathan H. Wallace.
Jonathan Lewis Wallace (born May 16, 1986, in Huntsville, Alabama) is a collegiate men's basketball player in the NCAA.
 in 1999. "The Supreme Court has consistently held that anonymous and pseudonymous Refers to a pseudonym, which is a fictitious name or alias. Pronounced "soo-don-a-miss." Contrast with anonymous, which means nameless.  speech is protected by the First Amendment," he said. "In [a] recent statement ... the Court invalidated an Ohio ordinance requiring the authors of campaign leaflets to identify themselves." In 2002, the Court struck down an ordinance requiring Jehovah's Witnesses and other door-to-door canvassers to carry written identification permits.

Particularly in an era in which the Internet can facilitate anonymous speech and in which businesses are developing tools whereby individuals can shop anonymously, a national ID would represent a bizarre rejection by the government of its own alleged commitment to privacy. A mandatory biometric ID's detrimental impact on individual liberty is apparent. It is involuntary; it will blur public and private databases and facilitate increased unwelcome surveillance; and it undercuts a presumptive right to anonymity. A national ID poses another, more-practical problem as well--it dampens critical competitive market forces that would otherwise drive improvements in authentication technology.

Aside from the national ID's involuntary character and incompatibility with personal and political liberty, the potential uses of ID technologies are too divergent to entertain seriously the idea of a single national, government-sanctioned identification card. Few want all parties, governmental or not, to have access to all the information that exists about themselves in a central location. Having numerous IDs, rather than a single one, can be perfectly appropriate in civil society. Moreover, the requirements of commercial and social society differ from the limited needs of official civic and political identification.

Often, IDs won't need to be "national," but, rather, localized. We typically want our IDs to contain only that information we choose to release for limited purposes. An ID that functions as an office key, for instance, may not need to be part of a database containing bank records, Social Security payment history, medical records, or one's last will and testament. A compulsory government ID that makes pooling irresistible is unwarranted and detrimental to individual rights, privacy, and security.

Governmental "bad guy" databases. Another kind of biometric database--a partial one containing data on criminals, suspects, and other "wanted" individuals--isn't as sweeping as the total database underlying a national ID card. Such databases would correspond to those underlying the face-recognition cameras used during Super Bowl XXXV. During surveillance in public areas, faces are scanned and features converted to a mathematical representation, presumably only to see if there is a match with someone already in the database.

If we start with the assumption--and granted, it is an assumption which requires taking law enforcement at its word that the incidental images of innocent individuals are not recorded or are otherwise immediately discarded, face camera surveillance may not count as invasive surveillance of ordinary citizens in the manner critics fear. In other words Adv. 1. in other words - otherwise stated; "in other words, we are broke"
put differently
, the information collection--that pertaining to criminals--has already taken place, presumably under appropriate legal procedures. Nevertheless, concern over whether governments can be trusted to discard incidental data collected on innocents is valid.

Properly restrained, cameras might even cut down on unwanted searches. If we assume a setting where police inspection is legitimate (for example, if cameras are merely substituting for uniformed officers on the beat), there may be less need for random, invasive searches. As UCLA UCLA University of California at Los Angeles
UCLA University Center for Learning Assistance (Illinois State University)
UCLA University of Carrollton, TX and Lower Addison, TX
 law professor Eugene Volokh notes, the camera is more impartial and creates none of the "demeaning pressure" one feels to be "especially submissive" in a search or pullover by a police officer, and there is no wondering whether one is stopped on the basis of "sex or race or age."

Still, authorities might use the cameras to begin learning about particular subjects, thereby violating Fourth Amendment rights by initiating unwarranted searches. It is easy to create a record of individuals' movements without their knowledge. People are understandably bothered and already consider cameras a privacy invasion. Critics also note that "People behave in self-conscious ways under the cameras, ostentatiously os·ten·ta·tious  
adj.
Characterized by or given to ostentation; pretentious. See Synonyms at showy.



os
 trying to demonstrate their innocence or bristling at the implication of guilt," like a group of teens who give "the finger" to a camera pivoting to follow them or protestors who wear masks in defiance of cameras.

Critics of camera surveillance systems do have valid fears. Thus, such systems need to be overloaded with checks and balances. Although there is no general expectation of privacy in public places, neither is there an expectation that one will be purposefully identified and one's movements mapped by the authorities. Probable cause Apparent facts discovered through logical inquiry that would lead a reasonably intelligent and prudent person to believe that an accused person has committed a crime, thereby warranting his or her prosecution, or that a Cause of Action has accrued, justifying a civil lawsuit.  and court orders must apply in a biometric, digital age. At some point, tracking of an individual without a court order crosses into the territory of an unreasonable search.

The traditional interpretation of the Fourth Amendment as protecting places--our homes--evolved with the 1967 Katz v. United States Katz v. United States, 389 U.S. 347 (1967) was a United States Supreme Court decision that extended the Fourth Amendment protection from unreasonable searches and seizures to protect individuals in a telephone booth from wiretaps by authorities without a warrant.  decision, in which a telephone booth had been bugged. In that case, the warrantless eavesdropping Secretly gaining unauthorized access to confidential communications. Examples include listening to radio transmissions or using laser interferometers to reconstitute conversations by reflecting laser beams off windows that are vibrating in synchrony to the sound in the room.  was found to have violated the Fourth Amendment rights, beyond the home.

That the Fourth Amendment protects people and not places must be a defining constraint with respect to the use of surveillance technology by the government. However, what will count as a search in the future--given the ease of very intimate, up-close surveillance--remains unclear. For instance, with respect to the government's use of technology to observe an individual's home (in this case, thermal imaging), the 2001 Kyllo v. United States Kyllo v. United States, 533 U.S. 27 (2001), held that the use of a thermal imaging device from a public vantage point to monitor the radiation of heat from a person's apartment was a "search" within the meaning of the Fourth  decision seems favorable to privacy rights at first glance. The Court found that "obtaining information regarding the interior of the home that could not otherwise have been obtained without physical intrusion into a protected area constitutes a search--at least where (as here) the technology in question is not in general public use."

Yet, as noted by Mark Milone in Business Lawyer, Justice John Paul Stevens' dissent in Kyllo points out that, given the Court's interpretation, Fourth Amendment protection seems to erode as soon as the technology attains "general public use." Seemingly, once a technology capable of invading privacy is widely used in society, government will also be free to use it. Therefore, the unresolved question now, despite both Katz and Kyllo, is what applications of biometrics against individuals--wherever they may be--will count as a search. The pressing constitutional privacy issue is that, one way or another, governments must acquire clearances equivalent to those that they must secure in the non-digital world.

One bright spot in the digital revolution, given the potential loss of Fourth Amendment protections, is that surveillance technologies are cheap, not just for governments, but for individuals as well. As technologies improve and prices decline, individuals can turn the electronic eyes right back on the government, exposing abuses of individual rights. The Witness Project, for instance, documents human rights abuses worldwide, a perfect example.

Private voluntary databases

Another use of biometrics is private, voluntary databases for particular applications. In them, individuals are identified by such means as retina scans and fingerprints, and matched with their previously created record in the database. Unlike databases of criminals, to which everyone must demonstrate they do not belong, these are databases of members, wherein one must show one does belong. The manager of the private database is saying, in effect, "You may enter my privately owned building, airplane, factory, laboratory, campus, office park, parking garage, neighborhood, house, and so forth, but only if I know who you are."

Members-only databases are common and exist where security clearances are needed for entry to sensitive areas. Computer scientist Dorothy Denning points to how such technologies are more secure than password-type security clearances since they aren't dependent upon secrecy--rather, they depend upon "liveness." These technologies can make it hard for malicious individuals to impersonate im·per·son·ate  
tr.v. im·per·son·at·ed, im·per·son·at·ing, im·per·son·ates
1. To assume the character or appearance of, especially fraudulently: impersonate a police officer.

2.
 another person. They can even assure that only the appropriate, living, breathing, certified pilot commands an aircraft.

Clearly, the encroachment of biometrics into society will raise important social issues. Businesses will have to tread carefully regarding what level of surveillance is consistent with customer and employee preferences. Such uses of biometrics will be regulated by market forces and evolving social norms, and they will continue to be fine-tuned by acceptance or resistance.

Fundamentally, though, biometrics is about increasing convenience and service more than invading privacy. People have alternatives to dealing with parties that snoop too much:

Interestingly, however, the marketplace enters the biometric age with individuals seemingly more accepting of modern surveillance technology than is commonly acknowledged. Individuals already use such tools as "nannyware" and "adulteryware" to find out what their kids and spouses, respectively, are up to online. Tracking of patrons in Las Vegas casinos is a given. Yearly pass-holders at Disney World's Magic Kingdom can attain clearance by fingerprint. Visa International is exploring biometrics to combat credit card fraud Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. , and ATMs that recognize faces are imminent. A pilot project in a Kroger supermarket in Texas allows shoppers to leave purses, wallets, and IDs at home and pay with a fingerprint. Biometrics can make medical information from pacemakers, artificial joints, and pumps more readily available to medical professionals. When used in cell phones and personal digital assistants, biometric identification chips will better enable digital signatures and mobile commerce.

People, especially the young, will likely adapt to tomorrow's cashless, keyless, walletless society very easily. It is not hard to envision the convergence of young people today who think nothing of multiple body piercings with the mobile-computer wearing "not-quite-cyborgs" of MIT MIT - Massachusetts Institute of Technology  and Xybemaut Corporation. They and their progeny undoubtedly will have fewer qualms about merging man and machine than many currently do. There is already a family in Florida with implanted biometric chips. In each case, the private sector must generate its own information, for purposes limited by the market's twin engines of consumer choice and consumer rejection.

The proliferation of biometric technologies raises new and challenging questions in a society that enshrines privacy and liberty. A framework is needed by which we may resolve issues pertaining to proper and legitimate deployment.

Most fundamentally, governments should not force citizens to submit to biometric identification, which rules out national ID cards. Governments also must recognize that Fourth Amendment protections will apply in the biometric age, which rules out using public surveillance systems to identify and track individuals deliberately without the authority of a court order. Finally, private-sector biometrics that show enormous promise must face either the approval or wrath of the public in order to be properly "regulated"--and that process is undercut when the lines between public and private databases are blurred.

Clyde Wayne Crews Jr., director of technology studies, Cato Institute, Washington, D.C., is co-editor of Copy Fights: The Future of Intellectual Property in the Information Age.
COPYRIGHT 2003 Society for the Advancement of Education
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2003 Gale, Cengage Learning. All rights reserved.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Author:Crews, Clyde Wayne, S. Jr.
Publication:USA Today (Magazine)
Geographic Code:1USA
Date:Jul 1, 2003
Words:3026
Previous Article:The Pentagon is fighting--and winning--the public relations war. (Mass Media).
Next Article:What's in a name? More than you think. (Words & Images).
Topics:



Related Articles
The right look can open doors.
NEC introduces biometric and smartcard security system.
Biometrics in corrections: current and future deployment.
Leading Fingerprint Software Chosen to Enroll and Verify Pilgrims at Hajj by the Kaduna State Muslims Pilgrims Board in Nigeria.
Biometrics in the light.

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters