Recently biometrics has been in the news as a key to identifying the body of Osama bin Laden after the raid in Pakistan. Heightening security concerns around the world are leading to an expanded use of automated recognition technologies for individuals based on their behavioral and biological characteristics. Biometric systems are used increasingly to recognize individuals and regulate access to physical spaces, information, services, and other rights or benefits.
Because biometric systems use sensed traits to recognize individuals, privacy, legal, and sociological factors are involved in all applications. Biometrics in this sense sits at the intersection of biological, behavioral, social, legal, statistical, mathematical, and computer sciences as well as sensor physics and philosophy. It is no wonder that this complex set of technologies called biometrics has fascinated the government and the public for decades.
Biometric Recognition: Challenges and Opportunities provides a comprehensive assessment of biometric recognition that examines current capabilities, future possibilities, and the role of government in technology and system development This book addresses issues of effectiveness, design, and uncertainty surrounding broader implementation of this technology.
Who Goes There? Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. This book offers a comprehensive set of guidelines to ensure that an individual’s privacy is not unnecessarily compromised, whether by commercial or government organizations.
These books and others from the Computer Science and Telecommunications Board can add perspective and contribute to discussion.
|Biometric Recognition: Challenges and Opportunities
Biometric recognition–the automated recognition of individuals based on their behavioral and biological characteristic–is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and…
|Who Goes There?: Authentication Through the Lens of Privacy
Who Goes There?: Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. As authentication becomes ever more…
|Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric Systems
Biometricsthe use of physiological and behavioral characteristics for identification purposeshas been promoted as a way to enhance security and identification efficiency. There are questions, however, about, among other issues, the effectiveness of biometric…
|Engaging Privacy and Information Technology in a Digital Age
Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and…
|Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment
All U.S. agencies with counterterrorism programs that collect or “mine” personal data — such as phone records or Web sites visited — should be required to evaluate the programs’ effectiveness, lawfulness, and impacts on privacy. A framework is…