You are on page 1of 3

FEATURE

paying by cash and non-cash being similarly


easy – would provide a substantial cost saving to
retailers. This would be realised immediately in
the reduced cost of settlement and a reduction in
the ‘set aside’ to cover payment delays and errors.
While biometrics has a long way to go before
a mainstream audience adopts it, it is cer-
tainly the future towards which we are headed.
Technological advancements in the sector and
the spoof-proof nature of palm vein technology
mean it will inevitably become the standard,
once again altering the relationship between the
retailer and the consumer and moving the retail
experience in to a new era.

About the author


David Lowrence is a retail consultant for Fujitsu
UK & Ireland. With over 20 years’ experience,
he is an expert in the field of retail technology
and trading solutions, with an emphasis on
in-store and customer-centric implementations.
Fujitsu is a Japanese information and commu- Acuity Market Intelligence, 2013.
nication technology company offering a range
of technology products, solutions and services. Fujitsu’s other operations in the UK bring its and product for customers in the private and
Approximately 170,000 Fujitsu people support total employee numbers to over 14,000 and its public sectors including retail, financial services,
customers in more than 100 countries. Fujitsu total revenues to £1.8bn. Its integrated product telecoms, government, defence and consumer
UK & Ireland employs over 10,100 people with and service portfolio includes consulting, appli- sectors. For more information, please see: http://
an annual revenue of £1.6bn. Additionally, cations, systems integration, managed services uk.fujitsu.com

Ending identity theft and


cyber crime
Chris Edwards, Primary-Net

Failure to authenticate equals cybercrime. This is the sole reason for the world’s
most prolific criminal activity and it is a byproduct of the creation of the
Internet and the ensuing ‘electronification’ of our world. Until we can solve the ing a database somewhere to carry out some
failures associated with authenticating people, cybercrime will not only persist, kind of transaction.
it will become systemically worse and the associated costs greater. The problem is compounded where unsuper-
vised (absence of human supervision) transac-
The fact that it is so remarkably easy to news stories published worldwide. Tokens as tions prevail – and these transaction types are
impersonate another person by obtaining we know them simply do not work. becoming more numerous daily offering new
their identification credentials has allowed identity theft opportunities with each one.
crooks to become professional thieves. As An easy problem to solve? It is true that there have been significant
there is little to no evidence left at the scene developments that set attackers back a step only
of a cyber crime, these crooks are largely Until now and despite all of the really groovy to see these new solutions conquered again –
invulnerable and thus extremely difficult to technology that surrounds us at virtually and generally faster each time. It is, and always
catch. every point of electronic contact with others, will be the case that attackers have the upper
It is easy to understand that the use of nobody has been able to solve what, theoreti- hand due to the elements of surprise and, in
tokens as a means of identification is inher- cally, should be an easy problem to solve. Let’s the case of cyber based attacks, anonymity.
ently flawed. And, we have plenty of proof to remember that we build highways thousands Is biometric technology the solution? For
underpin this theory as the runaway problem of miles long; through and around mountains, ages – we’ll call it since the advent of the
of identity theft, is, well, a few orders of mag- seas and other insurmountable obstacles – but digital age – we have looked long and hard at
nitude greater than virtually all other daily we can’t be sure that you are you when access- biometric technology as a likely solution for

9
February 2014 Biometric Technology Today
FEATURE

Another astonishing statistic according to


the UNODC is that there are approximately
one million victims of cyber crime every single
day. This is a massive figure that would be
impossible for anyone group or association to
catalogue, analyse and manage in one central
location, hence the vast disparity of data avail-
able on the subject matter.
Further evidence to support the scale of the
cybercrime problem is the incredible myriad of
statistical data that exists for the projections of
everything cyber crime; universal financial cost,
cost by country, cost by type, average cost per
hack, number of hacks, etc – the list is long.
Additionally, the difference between data,
even by credible sources, is significant. And,
the sheer number of news stories chronicling
attacks can only be tracked by supercomputers.
All of this underscores the depth and breadth
2012 Norton Cybercrime Report by Norton Online. of the problem. The fact that nobody knows with
any reasonable accuracy what the real implication
some of the more challenging and security- biometrics as technology and instead something of cybercrimes is, only serves to prove that it is
based applications. It makes sense, after all. If closer to science fiction. likely far greater than any of us imagines.
we could use something intrinsic and unique The bottom line is conventional biometrics
to each of us; something that is part of our have not worked for applications where security
anatomy to identify us, then we would have is a critical requirement. The evidence of this is First cyber war
the answers to the identity theft question. that cybercrime remains one of the most pub- Let’s remember that the first engagement of
Human biometry is, therefore, the Holy Grail lished news topics on earth, day in and day out. cyber war was successfully carried out against
of authentication solutions. Or is it? Iran in 2010 at its Bushehr Nuclear Plant
Until now, nobody has made the technology whereby an attacker caused real physical dam-
foolproof. Is biometric technology inherently Why the proliferation of age through electronic commands between
flawed? Or has nobody developed the right cyber crimes? computers controlling centrifuge management
process yet? The fact is, cyber crimes persist and within its extremely high security network.
the problem only more pervasive as time passes. Why the proliferation of cyber crimes? Never before had a cyber attack caused physical
How do consumers feel about biometrics? According to the United Nations Office on damage to another using computers.
The most recent evidence of consumer inter- Drugs and Crimes (UNODC) February 2013 What this means is that the game has
est in biometrics was made most abundantly Comprehensive Study on Cybercrime, the pri- changed considerably. Due to the relative ease
clear with the release of Apple’s iPhone 5S in mary reasons for the ascent of digital crimes are of identity manipulation, cyber warfare is a new
October 2013. It has followed with massive the result of “global connectivity, the automa- phrase that has made its way to Wikipedia.
sales despite the prompt hack of its biometric tion of data processing, and the development of
sensor (the biometric sensor is construed to non-face-to- face transactions…”1
have been the major selling point of this new With population on earth still increasing at Designing a solution
smartphone). an exponential rate, people becoming more Any real solution to cyber crime – and there are
The fact that the iPhone was hacked through tech savvy and the developing world coming solutions – must eliminate any third party docu-
the biometric sensor underscores the notion online at a far greater rate than the developed ments entirely. Until we divest ourselves of easy-
that biometrics are (still) valuable as a gimmick world that is now well connected, means a to-lose, non personal identifiers, cyber crimes
or for straight convenience-based applications, future full of e-crimes ahead, barring a legiti- will continue their proliferation. Plastic cards,
but the technology continues to fail to add real mate solution. pin codes – manufactured tokens of any kind –
security value. How big is the problem? McAfee, although cannot be a part of the electronic transaction.
The truth is that humans have long been criticized for its reports on the global financial If we wish to put a stop to e-crimes, the solu-
enamoured with the notion of using their body scale of cybercrimes by some observers, con- tion has to involve some form of human biom-
parts to do stuff that we still do with things tinue to report that annual losses are in the etry – or something that is inherently unique
like cards and pin codes. The obvious applica- hundreds of billions. The most recent report to each of us; something that cannot be stolen
tions are mostly authentication related, but commissioned by McAfee pegs the cost in 2012 from us and that requires us to be present for
the technology has systemically failed here, to have been in the range of $500bn2. This any desired transaction.
otherwise cyber crime would be a thing we’d figure is nearly equal to the estimated cost of If we could accurately identify every person
be reading about in the history books. Instead, drugs trafficking worldwide. And, frankly, this wishing to make an electronic transaction through
we read about these electronic attacks in the loss estimate is almost certainly understated as the gateway of the Internet, the problem would
newspapers. And still, despite repeated authen- we have no clue about a large proportion of have its solution. This seems simple goal in terms
tication failures, we’re still deeply intrigued attacks, either because people don’t report them of the simplicity of the premise. Given all of
with the technology, albeit most of us don’t see or they don’t even know they’ve been hacked. the available technologies today, we should look

10
Biometric Technology Today February 2014
FEATURE

to create a guardianship with an un-spoofable


authentication process and we all go home know-
ing the crooks will have to either get jobs or find
new places beyond the digital realm to thieve.
This solution should be created around a uni-
versal online authentication centre. Eventually, it
would need to be capable of having the identities
of every human enrolled in it. This centre would
have the following requirements:

1 It should belong to everyone in the world


2 It should be available to everyone in the
world
3 At no time should it contain any sensitive
personal data
4 It should only contain ‘mirrors’ of each per-
son enrolled; first name, last name, nation- Human biometry.
ality, gender at birth and date of birth
5 Addresses, telephone numbers, bank Logically, a successful authentication system a digital society. Let’s tighten the screws and
accounts, email addresses, credit card num- solution should have the following criteria: make this a safe and convenient place to exist.
bers, or any other information can never be UÊ
œ˜Ûi˜ˆi˜ViÊqʈÌʓÕÃÌÊLiÊi>ÃÞÊ̜ÊÕÃi
in the database UÊ iۈViÊ ÃˆâiÊ qÊ ˆÌÊ “ÕÃÌÊ LiÊ Ã“>ÆÊ i>ȏÞÊ «œÀÌ- References
6 The centre must be totally inaccessible and able if desired
the stored identities must be too UÊ -iVÕÀˆÌÞÊ qÊ ˆÌÊ “ÕÃÌÊ LiÊ iÝÌÀi“iÞÊ `ˆvvˆVՏÌÊ ÌœÊ 1 United Nations Office on Drugs and
7 The users’ data must not be accessible by attack Crime, Comprehensive Study on
system administrators UÊ ,œLÕÃ̘iÃÃÊqʈÌʓÕÃÌÊLiÊiÝÌÀi“iÞÊ>VVÕÀ>Ìi Cybercrime, February 2013. http://
8 It would also need to devise a secure means UÊ vvœÀ`>LˆˆÌÞÊqʈÌʓÕÃÌÊLiʏiÃÃÊiÝ«i˜ÃˆÛiÊ̅>˜Ê www.unodc.org/documents/organized-
of enrolling the users, storing their data other high security solutions; even those of crime/UNODC_CCPCJ_EG.4_2013/
and accessing it - meaning login credentials inferior technology CYBERCRIME_STUDY_210213.pdf.
with plastic cards, pin codes and other tra- Accessed January 2014.
ditional tokens would not be acceptable 2 Egan, M. ‘Report: Cyber Crime Cost
9 It would need to use human biometry to The endgame Global Economy Up to $500B a Year’.
distinguish each person With an effective solution, there would be no 22 July 2013. Fox Business. http://www.
10 It must be fail-proof in its ability to con- need for digital evidence preservation, restric- foxbusiness.com/technology/2013/07/22/
nect a live, known user to the database in tions on specific IP address connections, or report-cyber-crime-costs-global-economy-
real-time other conventional attack firewalls. Neither up-to-1-trillion-year/. Accessed January
would any measures be required to prevent 2014.
The concept of limiting user data to non- copyright/trademark infringement, decryp-
sensitive is that it renders that data useless to tion of encrypted material or employment of About the author
anyone seeking to use it for any kind of mali- measures against computer misuse – they are all
cious purpose. unnecessary. Chris Edwards is the director of Business
Today, for reasons of cost, acceptability, The solution must be simple to use and Development for Primary-Net, a Dutch based
mathematical uniqueness and neutrality, it is designed for use in unsupervised environments, authentication technology developer with R&D
commonly believed the human fingerprint is meaning hackers will have a new challenge that operations in Madrid, Spain. He has been with
the best biometric option. However, using the never before existed. It will not be biometric the company since July 2011. For the previous
fingerprint in its traditional form is flawed. The technology as we know it – rather a new pro- five years, he worked as lead analyst for a Nice,
solution requires a means to be certain that the cess using human biometry. France-based consultancy who provided advisory
‘fingerprint’ is genuine, something more akin to Eliminating cyber crime is such as big issue services for political candidates in eastern Europe
today’s finger scan, and this data must be able that when we succeed, it will change the world and Asia on campaign strategies. Primary-Net is
to be encrypted in such a way that it cannot as we knew it. Achieving this is bigger than the developer of a patented innovative informa-
ever be recreated. Today’s technology allows us any energy concern, any armed conflict or any tion security technology called Biocryptology www.
to do these things. natural resource depletion for we have become biocryptology.net.

11
February 2014 Biometric Technology Today

You might also like