You are here: Resources > FIDIS Deliverables > HighTechID > D3.10: Biometrics in identity management > 

D3.10: Biometrics in identity management

Privacy problems  Title:
DIRECT IDENTIFY ABILITY, LINK ABILITY AND PROFILING
 Additional and in some cases health related information in biometrics

 

Direct identify ability, link ability and profiling

Biometric characteristics are tightly bound to a physical person. In most cases, an individual is even unable to influence his biometric characteristics without harming himself. It is therefore difficult to deny or to hide biometric properties. For governments and identity management system operators, biometrics offer the unique possibility to authenticate individuals that are uncooperative and even to prove to an impostor his true identity (negative authentication). Biometrics is the only authentication concept with this quality. In a world where identity theft becomes a serious threat for whole populations, biometric properties become the crucial factor for secure authentication.  

On the other hand, the use of biometrics inherently holds some risks for the privacy and the social life of a user. The lifetime of a typical identity credential should be shorter or at least not exceed the lifetime of a typical identity record in an IMS of a biometric system. For biometric templates used as identity credentials, this is clearly not the case. Most biometric characteristics remain identical for a long time and some of the characteristics even remain unchanged for a full lifetime of a person. In addition, individuals have to use the same biometric characteristic as a biometric credential in many different authentication situations. 

Therefore, a corrupted biometric credential can severely harm a person. There is naturally no revocation list for corrupted or out of date biometric characteristic and properties. Therefore biometric data should never run the risk of corruption or disclosure to non-authorised entities. The usual concept of a central repository for the storage of identity credentials is not adapted to this request. States and large organisations collect and store huge amounts of biometric data from their citizens or members in large databases. Nobody can guarantee that such data will not be abused for privacy violating profiling or fall in the hands of an external attacker. A further drawback of centralised databases is the limitation on scalability (see section ). Depending on the technology, biometric template databases have collisions between individual templates already with a few hundred or thousands of Biometric Information Records (BIRs). This can lead to confusion of persons with potentially dramatic consequences for innocent people.

Especially face pictures can be used to identify data subjects outside the biometric system directly if analysed by people who know the person on the picture. This identity information then can be used to link additional information from publicly and not publicly available sources such as the internet or databases from the police or national security agencies. Based on these linked information items profiling can be done.

Civil liberty organisations warn with good arguments of such dangers and the population is still reluctant to accept biometric authentication within such boundary conditions. Neither the measurement of biometric data nor the comparison with a stored reference template should be done outside a highly protected and user-controlled infrastructure. There is no good reason to measure, store or compare biometric data in a centralised architecture. In most cases it is sufficient that the result of biometric identity verification is transmitted in a secure way to the IMS.  

 

Privacy problems  20071228_fidis_deliverable_wp3_10_V1.0.final.sxw  Additional and in some cases health related information in biometrics
20 / 40