You are on page 1of 4

FEATURE

Iris biometrics: a legal


invasion of privacy?
Steve Gold, journalist
Steve Gold
Steve Gold looks at the legal and privacy issues surrounding iris biometrics
technologies, and why a growing number of legal and liberty professionals are
worried that iris identification systems may be rolling out before the legal and The pilot programme at the airport was to
political ramifications have been considered fully. have operated on a volunteer basis and was due
to start in November 2003, running for six
Movie director Steven Spielberg could never the Bank of America, Harvard and MIT, at months.
have imagined that his 2002 science fiction film which he caused a minor privacy stir by pre-
‘Minority Report’ – starring Tom Cruise and dicting that ‘every person, place, and thing on
featuring a raft of fictional future technologies – this planet will be connected [to the iris system] Retinal versus iris
would set the minds of civil libertarians racing in within the next 10 years’. scanning
the way it has done over the past decade. Critics of the GRI/Leon project have come
It was fitting, perhaps, that when Global out in force over the past two and half years, but Before we look at the privacy issues surround-
Rainmakers Inc (GRI) announced in August the privacy concerns over iris-based biometrics ing iris biometrics, it is helpful to understand
2010 that it was rolling out an iris biometrics- systems go back around a decade to the summer the subtle differences between retinal and iris
based citizen recognition system in the Mexican of 2003 when the Greek data protection agency scanning – both of which fall under the head-
city of Leon, that it referenced Spielberg’s banned the use of a pilot fingerprint and iris ing of ocular-based biometric identification
movie adaptation of Philip K Dick’s dystopian biometric system at Athens airport. technologies, meaning they rely on the unique
future in its launch marketing materials. The 2003 pilot system was part of an EU physiological characteristics of the eye in order
test programme aimed at testing methods of to identify an individual.
“It was fitting, perhaps, that increasing security at border crossing. A retinal scan is carried out by casting a
The very limited programme to conduct scarcely perceived beam of low-energy infrared
when Global Rainmakers Inc
fingerprint and iris scans on Alitalia passengers light into a person’s eye as they look through
(GRI) announced in August travelling from Athens to Milan’s Malpensa the scanner’s eyepiece.
2010 that it was rolling out airport was cancelled after the agency con- This beam of light traces a standardised path
an iris biometrics-based cluded that these types of scans – and their on the retina and because retinal blood vessels
citizen recognition system consequential transfer of data – violated Greek are more absorbent of this light than the rest of
privacy laws. the eye, the amount of reflection varies during
in the Mexican city of Leon,
the scan.
that it referenced Spielberg’s Unlike retina scanning, iris recognition uses
movie adaptation of Philip K camera technology with subtle infrared illu-
Dick’s dystopian future in its mination to acquire images of the detail-rich,
launch marketing materials” intricate structures of the iris.

GRI called its project a design blueprint “Unlike retina scanning,


for the creation of ‘the most secure city in the
iris recognition uses camera
world’ in partnership with Leon, one of the
largest cities in Mexico with a population of
technology with subtle
more than a million. infrared illumination to
“In the future, whether it’s entering your acquire images of the
home, opening your car, entering your work- detail-rich, intricate
space, getting a pharmacy prescription refilled,
structures of the iris”
or having your medical records pulled up,
everything will come off that unique key that is
your iris,” says Jeff Carter, GRI’s chief develop- Digital templates encoded from these
ment officer. patterns using mathematical and statistical
algorithms allow the unambiguous positive
identification of an individual with almost
Iris predictions impossibly small false match rates.
These were no ill-chosen words as, prior to A key advantage of iris recognition, besides
joining GRI earlier that year (May 2010), Spielberg’s ‘Minority Report’ set the minds its speed of matching and its extreme resist-
of civil libertarians racing.
Carter headed a think tank partnership between ance to false matches, is the stability of the iris

5
March 2013 Biometric Technology Today
FEATURE

scheme so beloved of US newspapers and TV


dramas, after two episodes earlier in 2010 when
prisoners arrested on serious offences tricked
the authorities into freeing them by pretend-
ing to be a minor offence defendant when they
appeared at their court arraignment.
At the time, the New York print and TV
media were severely critical of the events – one
of which took place in February 2010 in the
Bronx, and another in Staten Island a month
later – as exposing a weakness in the city’s
handling of suspects as they move from police
custody into the complex court and judicial
system in the five boroughs of New York.
Under the iris biometrics programme –
which was rolled out to all courts in New York
by the end of 2010 – police officers and court
officials use a handheld scanning device to ver-
ify a prisoner’s identity in a matter of seconds
when the suspect is presented in court.

Iris and retinal scanning: debate over commercial application. “Under the iris biometrics
programme – which was
as an internal, protected, yet externally visible
organ of the eye.
NYPD: looking crime in rolled out to all courts
An iris scan is consider to be no differ- the eye in New York by the end
ent than taking a normal photograph of a of 2010 – police officers
person and can be performed at a distance In the US, at least, the privacy issue surround- and court officials use a
– whereas, for retinal scanning, on other ing iris recognition did not hit mainstream
handheld scanning device to
hand, the eye must be brought very close to media until November 2010, when the New
an eyepiece. York Police Department (NYPD) announced it
verify a prisoner’s identity
As a result of these differences, iris scan- had started photographing the irises of people in a matter of seconds when
ning has become more widely accepted in who are arrested, largely in an effort to cut the suspect is presented in
the biometrics industry as a commercial down on escapes as suspects move through the court”
modality than retinal scanning: retinal scan- complex New York court system, which spans
ning is also considered by many users to be five boroughs.
an invasive technology, whereas iris scan- The iris photography programme was imple- The programme kicked off a raft of wor-
ning is not. mented as an extension to the usual ‘mug shot’ ries amongst civil libertarians and privacy
advocates, who noted that the New York
authorities’ cataloguing of defendants’ data
could place innocent people under perma-
nent suspicion.
“It’s really distressing that the Police
Department is once again undertaking a new
regime of personal data collection without any
public discourse,” said Donna Lieberman, exec-
utive director of the New York Civil Liberties
Union at the time.
Speaking to the New York Times in late
2010, Lieberman said that it is debateable
whether the programme is cost-effective, let
alone whether there are protective systems in
place to mitigate against any misuse of the
data that is collected.
Steven Banks, attorney-in-chief of the
Legal Aid Society, meanwhile, told the news-
paper that the programme was an unneces-
sary process.
“It’s unauthorised by the statutes, and of
questionable legality at best. The statutes
New York Police Department started collecting iris scans in 2010.
specifically authorise collecting fingerprints.

6
Biometric Technology Today March 2013
FEATURE

There has been great legislative debate about these events are a stark reminder that – if the
the extent to which DNA evidence can be adoption of biometric identification systems
collected, and it is limited to certain types of continues as it has done and without seri-
cases,” he said, adding that the idea that the ous contemplation of the pitfalls – we are all
New York Police Department can forge ahead headed for trouble.
and use a totally new technology without any In her EFF Red Flag media report, Bowe
statutory authorisation is almost certainly points out that, when it comes to the col-
suspect. lection and storage of individuals’ digital
The annual budget for the programme – fingerprints, iris scans, or facial photographs,
which continues to this day – has been set the system’s vulnerability is a major security
at $500,000 and is being funded by a grant concern.
from the US Department of Homeland A social security number, for example, she
Security. argues, can always be cancelled and reissued if
it’s compromised, but it is impossible for some-
one to get a new eyeball if an attacker succeeds
The privacy issue in in seizing control of his or her digital biometric
detail information.
“Among all the various biometric traits
In one of biometrics security vendor M2sys’ that can be measured for machine identifica-
Police iris biometric programme has sparked
Twitter-based online discussions held in privacy fears.
tion – such as fingerprints, face, voice, or
January 2013, Shaun Dakin, a privacy keystroke dynamics – the iris is generally
expert and the founder of the US National financial institutions use their personal data regarded as being the most reliable,” she says.
Political Do Not Call Registry, said there for marketing purposes. “Yet Galbally’s team of researchers has shown
is a pressing need for a baseline US privacy He notes, however, that the recent that even the method traditionally presumed
legislation that takes into account the tre- announcement by Disney that it will be using to be foolproof is actually quite susceptible to
mendous strides the biometrics industry has RFID-based bracelets carrying the personal being hacked,” she adds.
made in recent years. information of visitors to their parks has
This legislation, he says, needs to be started to raise mainstream awareness of the “Among all the various
enforced in the US by an agency ‘with teeth’ biometrics privacy issue.
biometric traits that can
and he reminded attendees to the Twitter
conference that, in the last session of the US
be measured for machine
Congress, there were more than 21 pieces The EFF privacy view identification – such as
of privacy legislation introduced, not one of Perhaps surprisingly – especially given its track fingerprints, face, voice, or
which was actually passed. record or keeping a weather eye on emerging keystroke dynamics – the
Against this backdrop, Dakin said that the and potentially privacy-invading biometrics tech-
iris is generally regarded
‘Privacy by Design’ concept, which actively nology – it took until July of 2012 before the
encourages embedding privacy designs into EFF, the Electronic Frontier Foundation, waded
as being the most reliable.
biometric systems, is a good idea on paper, into the iris biometrics privacy argument. Yet Galbally’s team of
but a tough one to implement in reality. According to Rebecca Bowe, a security and researchers has shown
privacy governance specialist with the EFF – a that even the method
“The ‘Privacy by Design’ US privacy agency founded in 1990 by IT
traditionally presumed to
industry veterans John Perry Barlow and Mitch
concept, which actively be foolproof is actually
Kapor – besides the invasive privacy issues that
encourages embedding iris biometrics engender, there is a real issue quite susceptible to being
privacy designs into with the technology’s accuracy. hacked”
biometric systems, is a Bowe, who moved on from the EFF at
good idea on paper, but the start of 2013 to become investigative The EFF security and privacy govern-
projects editor with the San Francisco Bay ance specialist went on to say that Galbally’s
a tough one to implement
Guardian newspaper, points out that, at the research – which was carried out against
in reality” Black Hat July 2012 security conference in Neurotechnology’s VeriEye platform – the
He pointed out that most biometrics tech- Las Vegas, Spanish security researcher Javier synthetic images were produced using a
nology developers do not think about privacy Galbally presented a paper on how it is now genetic algorithm.
as a necessary step for design, instead they possible to spoof a biometric iris scanning With the replicas, she added, Galbally found
– perhaps understandably – place their focus system using synthetic images derived from that an imposter could spoof the system at a
on revenue and number of user issues. real irises. rate of 50% or higher.
Dakin, a regular contributor to the “The Madrid-based security researcher’s These revelations, she explained, not only
Washington Post on privacy issues, said that talk is timely, coming on the heels of a July expose a security hole in a commercial iris-
the general public – in the US, at least – does 23 Israeli Supreme Court hearing where recognition system, but also prove that B12
not generally think of biometric technology as the potential vulnerabilities of a proposed Technologies – an FBI contractor tasked with
a threat to their privacy in the same way that governmental biometric database, drove the building a database of iris scans for the Next
they have concerns over how, for example, debate,” she said at the time, adding that Generation Identification System – is wrong

7
March 2013 Biometric Technology Today
FEATURE

ous consideration to any new information accordance with the law, to fair and reasonable
surfacing about biometric system vulner- conditions of employment which have proper
abilities. regard for his health, safety and physical well-
being’,” he says.
The Canadian lawyer concludes his paper
The legality issues by noting that, while the convenience of
The EFF’s Red Flag media release of July biometric identification systems may appear
2012 was soon followed by legal viewpoint unquestionable from an employers’ view-
white paper in September from Frédéric point, this does not prove that they are abso-
Desmarais, a leading lawyer with the lutely necessary, or legally permitted,
Montreal-based law firm Heenan Blaike in Quebec.
LLP. Employers wishing to implement these sys-
The Canadian lawyer’s paper – which was tems, he says, must first assess any available
published by McMillan and has since been alternatives, even if they are more costly or
presented at a number of North American difficult to set up.
conferences – centres on the legal and pri- Furthermore, he adds, the consent of each
vacy issues surrounding the implementation employee who will be subject to the system
of biometric identification programmes in must be obtained and employees may withhold
Quebec. their consent without providing any justifica-
In his paper ‘Quebec: convenience is not tion whatsoever.
enough’, Desmarais argues that employers “In any event, as soon as an employer
carrying out business in Quebec are increas- wishes to implement a biometric identifica-
Legal issues hang in the balance in Quebec. ingly considering the opportunity to imple- tion system, legal counsel should be consult-
ment biometric identification systems. ed in order to assess human rights issues that
At first glance, he says, these systems may may be raised and to ensure that all the nec-
in claiming on its website that biometric appear convenient and cost-effective, and, in essary legal requirements, including reporting
templates “cannot be reconstructed, decrypt- some circumstances, they indeed are. obligations, are fully complied with,” he says.
ed, reverse-engineered or otherwise manipu- “Unfortunately, convenience is not the
lated to reveal a person’s identity”. decisive criterion to justify their implemen- References
Bowe rounded off her EFF Red Flag alert tation: necessity is that criterion,” he says,
by saying that any new detection of biometric adding that, under Quebec’s November 2001 UÊ ,œÌ…ŽiÀV…]ʰʼ7ˆÊ̅iÊvÕÌÕÀiÊÀi>ÞʏœœŽÊ
system flaws is highly relevant in the context ‘Act to Establish a Legal Framework for like “Minority Report”?’. Salon.com. July
of the massive governmental identification Information Technology’ it is a requirement 2002. http://bit.ly/VGu3LQ. Accessed
programs moving forward at the global level. that employers must comply with relatively February 2013.
There is, she says, India’s bid to create the burdensome formalities before proceeding UÊ ,ˆÛiÀ>]Ê,]Ê >ŽiÀ]ʰʼ 9* ÊÌ>Žˆ˜}Ê
world’s largest database of irises, fingerprints with the implementation of such systems. ID photos of suspects’ irises’. New York
and facial photos (the Aadhaar project), as In his paper, Desmarais says that, depend- Times. November 2010. http://bit.ly/
well as Argentina’s creation of a nationwide ing on the nature and use of the biometric VGtyS5. Accessed February 2013.
biometric database containing millions of characteristics or measurements recorded, UÊ iÓ>Àˆ>Ã]ʰʼ+ÕiLiV\ÊVœ˜Ûi˜ˆi˜ViʈÃÊ
digital fingerprints. certain practices may lead to discrimination not enough’. September 2012. McMillan.
Lawmakers, she adds, who approve such claims. http://bit.ly/VGtNMQ. Accessed
identification schemes should give seri- February 2013.
“Depending on the UÊ ›Lˆœ“iÌÀˆVV…>ÌÊ-Փ“>ÀÞÊqÊ*ÀˆÛ>VÞÊ>˜`Ê
Biometrics with Special Guest Shaun
nature and use of the
Dakin. M2Syss Technology. January 2013
biometric characteristics – http://bit.ly/VGtjXg. Accessed February
or measurements recorded, 2013.
certain practices may lead UÊ ¼ Ê>˜`Ê -ÊÌi>“ÊÕ«Ê̜ʘ>LÊLœÀ-
to discrimination claims. der intruders with iris recognition’.
Nextgov.com January 2013. http://bit.ly/
They also beg the question
VGtGRw. Accessed February 2013.
whether they infringe
section 46 of the Quebec
About the author
Charter of Human Rights
and Freedoms” Steve Gold has been a business journalist
and technology writer for 27 years. A qualified
accountant and former auditor, he has special-
“They also beg the question whether they ised in IT security, business matters, the Internet
infringe section 46 of the Quebec Charter of and communications for most of that time. He
Biometrics may infringe human rights. Human Rights and Freedoms which provides lectures regularly on criminal psychology and
that ‘Every person who works has a right, in cybercrime.

8
Biometric Technology Today March 2013

You might also like