SlideShare une entreprise Scribd logo
1  sur  12
Privacy, trust and biometrics


                     Dr Ian Brown
           Oxford Internet Institute
              University of Oxford
Short-term trust
    Reputation of the organising institution
•
    Opinions in the mass media about
•
    technologies
    Attitudes & opinions of friends and family
•
    Convenience system brings
•



                 AM Oostveen (2007) Context Matters: A Social Informatics
               Perspective on the Design and Implications of Large-Scale e-
                   Government Systems, PhD thesis, Amsterdam University
Trust in government
Trust is fragile
    “Trust is built over the long term, on

    the basis not of communication but of
    action. And then again, trust, once
    established, can be lost in an instant”
    -Neil Fitzgerald, Chairman, Unilever
Longer-term legitimacy
    Informed, democratic consent
•
        Do citizens and their representatives have full
    •
        information on costs & benefits?
        Privacy Impact Assessment?
    •

    Compatibility with human rights (S & Marper v
•
    UK, Liberty v UK, I v Finland)
    Continued legislative and judicial oversight and
•
    technological constraint
        Privacy by Design
    •
How not to do it
    “We really don't know a whole lot about the overall
•
    costs and benefits of homeland security” –senior DHS
    economist Gary Becker (2006)
    “Policy discussions of homeland security issues are
•
    driven not by rigorous analysis but by fear, perceptions
    of past mistakes, pork-barrel politics, and insistence on
    an invulnerability that cannot possibly be achieved.” –
    Jeremy Shapiro (2007)
    “Finding out other people’s secrets is going to involve
•
    breaking everyday moral rules.” –David Omand (2009)
Credible impact assessment
    Risk must be quantified to be meaningful, even for
•
    low-probability high-impact events
    How strong is evidence that “solution” will work?
•
    How widely do stakeholders agree that cost <
•
    benefit? Include direct
    cost, inconvenience, enhancement of fear, negative
    economic impacts, reduction of liberties
    “Any analysis that leaves out such considerations is
•
    profoundly faulty, even immoral”


                John Mueller (2009) The quixotic quest for invulnerability,
                             International Studies Association, New York
CCTV efficacy
    Effective only in limited
•
    circumstances (e.g. car
    parks); otherwise reduces
    crime by about 3% (NACRO)
    Better street lighting reduces
•
    crime by 20% (Home Office)
    “It's been an utter fiasco:
•
    only 3% of crimes were
    solved by CCTV” -DCI Mike
    Neville, head of Visual
    Images, Identifications and
    Detections Office
Efficacy of facial recognition
    Does it identify terrorists
•
    and serious criminals, or
    pickpockets and ticket
    touts?
    How many arrests might
•
    we expect?
    How accurate in typical
•
    conditions?
    Do we have high-quality
•
    images of terrorist
    suspects?
What we need for biometrics
     Strong evidence base for any biometric proposed for public use
1.
     A careful threat analysis and cost/benefit assessment for each
2.
     proposed use, including damage caused to privacy and other
     human rights and a comparison with alternative
     mechanisms, with independent scrutiny
     The strict technological limit of the use of biometrics to the
3.
     minimum required to achieve the security goals of each use
     Wherever possible, full consumer choice in the decision to use
4.
     biometrics at all and then in the issuer (eg Crosby-style private
     sector leadership and consumer choice with govt playing a
     minimal standards-setting role)
     Full transparency and strict oversight and enforcement of DPA
5.
     and ECHR principles in the design and operation of systems
Conclusions
    Democratic legitimacy and human rights
•
    are critical to ensure security technology
    supports rather than subverts liberal
    political values
    Meaningful transparency, ECHR
•
    compliance and oversight are critical
    Slap-dash risk assessment and spin are
•
    extremely corrosive to trust in long term

Contenu connexe

Tendances

002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
Michalis Mavis, MSc, MSc
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
Russell Publishing
 

Tendances (14)

Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
 
Isa12b
Isa12bIsa12b
Isa12b
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
at the pleasure of the mayor
at the pleasure of the mayorat the pleasure of the mayor
at the pleasure of the mayor
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
nudging change.
nudging change. nudging change.
nudging change.
 
David Mayer, Chief Operating Officer NTSB
David Mayer, Chief Operating Officer NTSBDavid Mayer, Chief Operating Officer NTSB
David Mayer, Chief Operating Officer NTSB
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
The Justification for an Analysis of Stakeholder Input in the National Inform...
The Justification for an Analysis of Stakeholder Input in the National Inform...The Justification for an Analysis of Stakeholder Input in the National Inform...
The Justification for an Analysis of Stakeholder Input in the National Inform...
 

En vedette (7)

HKGCC_Luncheon_20160413
HKGCC_Luncheon_20160413HKGCC_Luncheon_20160413
HKGCC_Luncheon_20160413
 
Privacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric SystemsPrivacy and ethical issues in Biometric Systems
Privacy and ethical issues in Biometric Systems
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 

Similaire à Trust, Privacy and Biometrics

Outline D
Outline DOutline D
Outline D
butest
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
festockton
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
blogzilla
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
donnajames55
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Cameron Brown
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
hartrobert670
 

Similaire à Trust, Privacy and Biometrics (20)

Outline D
Outline DOutline D
Outline D
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Privacy in the developing world
Privacy in the developing worldPrivacy in the developing world
Privacy in the developing world
 
Privacy in the Modern World. thesis Leiden University
Privacy in the Modern World. thesis Leiden UniversityPrivacy in the Modern World. thesis Leiden University
Privacy in the Modern World. thesis Leiden University
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Journal #1
Journal #1 Journal #1
Journal #1
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Marsden regulating disinformation Brazil 2020
Marsden regulating disinformation Brazil 2020Marsden regulating disinformation Brazil 2020
Marsden regulating disinformation Brazil 2020
 
CPA Democracy and AI.pptx
CPA Democracy and AI.pptxCPA Democracy and AI.pptx
CPA Democracy and AI.pptx
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Brussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACKBrussels Privacy Hub: SATORI and iTRACK
Brussels Privacy Hub: SATORI and iTRACK
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 

Plus de blogzilla

Plus de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Trust, Privacy and Biometrics

  • 1. Privacy, trust and biometrics Dr Ian Brown Oxford Internet Institute University of Oxford
  • 2.
  • 3. Short-term trust Reputation of the organising institution • Opinions in the mass media about • technologies Attitudes & opinions of friends and family • Convenience system brings • AM Oostveen (2007) Context Matters: A Social Informatics Perspective on the Design and Implications of Large-Scale e- Government Systems, PhD thesis, Amsterdam University
  • 5. Trust is fragile “Trust is built over the long term, on  the basis not of communication but of action. And then again, trust, once established, can be lost in an instant” -Neil Fitzgerald, Chairman, Unilever
  • 6. Longer-term legitimacy Informed, democratic consent • Do citizens and their representatives have full • information on costs & benefits? Privacy Impact Assessment? • Compatibility with human rights (S & Marper v • UK, Liberty v UK, I v Finland) Continued legislative and judicial oversight and • technological constraint Privacy by Design •
  • 7. How not to do it “We really don't know a whole lot about the overall • costs and benefits of homeland security” –senior DHS economist Gary Becker (2006) “Policy discussions of homeland security issues are • driven not by rigorous analysis but by fear, perceptions of past mistakes, pork-barrel politics, and insistence on an invulnerability that cannot possibly be achieved.” – Jeremy Shapiro (2007) “Finding out other people’s secrets is going to involve • breaking everyday moral rules.” –David Omand (2009)
  • 8. Credible impact assessment Risk must be quantified to be meaningful, even for • low-probability high-impact events How strong is evidence that “solution” will work? • How widely do stakeholders agree that cost < • benefit? Include direct cost, inconvenience, enhancement of fear, negative economic impacts, reduction of liberties “Any analysis that leaves out such considerations is • profoundly faulty, even immoral” John Mueller (2009) The quixotic quest for invulnerability, International Studies Association, New York
  • 9. CCTV efficacy Effective only in limited • circumstances (e.g. car parks); otherwise reduces crime by about 3% (NACRO) Better street lighting reduces • crime by 20% (Home Office) “It's been an utter fiasco: • only 3% of crimes were solved by CCTV” -DCI Mike Neville, head of Visual Images, Identifications and Detections Office
  • 10. Efficacy of facial recognition Does it identify terrorists • and serious criminals, or pickpockets and ticket touts? How many arrests might • we expect? How accurate in typical • conditions? Do we have high-quality • images of terrorist suspects?
  • 11. What we need for biometrics Strong evidence base for any biometric proposed for public use 1. A careful threat analysis and cost/benefit assessment for each 2. proposed use, including damage caused to privacy and other human rights and a comparison with alternative mechanisms, with independent scrutiny The strict technological limit of the use of biometrics to the 3. minimum required to achieve the security goals of each use Wherever possible, full consumer choice in the decision to use 4. biometrics at all and then in the issuer (eg Crosby-style private sector leadership and consumer choice with govt playing a minimal standards-setting role) Full transparency and strict oversight and enforcement of DPA 5. and ECHR principles in the design and operation of systems
  • 12. Conclusions Democratic legitimacy and human rights • are critical to ensure security technology supports rather than subverts liberal political values Meaningful transparency, ECHR • compliance and oversight are critical Slap-dash risk assessment and spin are • extremely corrosive to trust in long term

Notes de l'éditeur

  1. - eg use genuinely one-way templates (hardly any of which exist), keep templates on hardware directly under user control (not in verifier databases), do checks on equipment under user control (eg smartcards) or at most on readers certified not to retain biometric data after scanning it and passing it to user-controlled equipment that says \"yes/no\" (and hence will need some TPM-style zero-knowledge certified approval and check against revocation)