Professional Documents
Culture Documents
Failure to authenticate equals cybercrime. This is the sole reason for the world’s
most prolific criminal activity and it is a byproduct of the creation of the
Internet and the ensuing ‘electronification’ of our world. Until we can solve the ing a database somewhere to carry out some
failures associated with authenticating people, cybercrime will not only persist, kind of transaction.
it will become systemically worse and the associated costs greater. The problem is compounded where unsuper-
vised (absence of human supervision) transac-
The fact that it is so remarkably easy to news stories published worldwide. Tokens as tions prevail – and these transaction types are
impersonate another person by obtaining we know them simply do not work. becoming more numerous daily offering new
their identification credentials has allowed identity theft opportunities with each one.
crooks to become professional thieves. As An easy problem to solve? It is true that there have been significant
there is little to no evidence left at the scene developments that set attackers back a step only
of a cyber crime, these crooks are largely Until now and despite all of the really groovy to see these new solutions conquered again –
invulnerable and thus extremely difficult to technology that surrounds us at virtually and generally faster each time. It is, and always
catch. every point of electronic contact with others, will be the case that attackers have the upper
It is easy to understand that the use of nobody has been able to solve what, theoreti- hand due to the elements of surprise and, in
tokens as a means of identification is inher- cally, should be an easy problem to solve. Let’s the case of cyber based attacks, anonymity.
ently flawed. And, we have plenty of proof to remember that we build highways thousands Is biometric technology the solution? For
underpin this theory as the runaway problem of miles long; through and around mountains, ages – we’ll call it since the advent of the
of identity theft, is, well, a few orders of mag- seas and other insurmountable obstacles – but digital age – we have looked long and hard at
nitude greater than virtually all other daily we can’t be sure that you are you when access- biometric technology as a likely solution for
9
February 2014 Biometric Technology Today
FEATURE
10
Biometric Technology Today February 2014
FEATURE
11
February 2014 Biometric Technology Today