Abstract
This paper presents a classification of biometric applications wanted by politics in the shade of the terror attacks of Sep. 11th 2001. Politics in the urgent obligation to protect the health and property of inhabitants is in need to quickly find appropriate methods. Biometrics was one of the general technical methods almost immediately claimed for passports, person tracking, and fight against terror. At second sight it is clear that biometrics is no help in finding an unknown, “sleeping” terrorist in advance. But what kind of applications can help to protect a nation’s inhabitants against attacks by terrorists and how much privacy is to be given up, if one wants to enable special biometric applications for surveillance and to react adequately in the case of danger? With an initial classification of biometric applications and the description of a possible scenario of antiterror biometrics this paper offers a starting point for the discussion on how privacy in particular and society in general will be influenced by biometric applications wanted by politics.
The updated original online version for this book can be found at DOI: 10.1007/978-0-387-35609-9_29
Chapter PDF
Similar content being viewed by others
Key words
References
Jain, A.K., Bolle, R. and Pankanti, S. (Eds.): Biometrics Personal Identification in Networked Society, Kluwer Academic Publishers, 1999
Zhang, D.D.: Automated Biometrics - Technologies and Systems, Kluwer, 2000
Brömme, A.: A Discussion on Privacy Needs and (Mis)Use of Biometric 1T-Systems, IFIP WG 9,6/11. 7 Working Conference on Security and Control of IT in Society (SCITS-II), Bratislava, Slovakia, 2001
Fischer-Hübner, S.: Privacy-Enhancing Design and Use of IT-Security Mechanisms, habilitation, Faculty of Informatics, University of Hamburg, 1999
Denning, D.E. and MacDoran, P.F.: Location-Based Authentication: Grounding Cyberspace for Better Security, Computer Fraud and Security, Elsevier Science, 1996
Smith, R.E.: Authentication - From Password to Public Keys, Addison-Wesley, 2002
Pfleeger, C.P.: Security in Computing, 2nd edition, Prentice-Hall, 1997
General Assembly of the United Nations: Universal Declaration of Human Rights, http://www.un.org/Overview/rights.htm, December 10th, 1948
Westin, A. F.: Privacy and Freedom, Atheneum, New York, 1967
Garfinkel, S.: Database Nation - Death of Privacy in th 21’ Century, OReilly, 2000
Brömme, A., Kronberg, M, Ellenbeck, O. and Kasch, O.: A Conceptual Framework for Testing Biometric Algorithms within Operating Systems’ Authentication, ACM Symposium on Applied Computing SAC 2002, Madrid, Spain, March 10–12, 2002
SPD, BÜNDNIS 90/DIE GRÜNEN: Gesetzentwurf der Fraktionen SPD und BÜNDNIS 90/DIE GRÜNEN - Entwurf eines Gesetzes zur Bekämpfung des internationalen Terrorismus (Terrorismusbekämpfungsgesetz), Deutscher Bundestag, 14. Wahlperiode, Drucksache 14/7386 (neu), 8. Nov. 2001
Vom 9. Januar 2002, Bundesgesetzblatt, Jahrgang 2002, Teil I Nr. 3, ausgegeben zu Bonn am 11. Januar 2002
Deutscher Bundestag: Protokoll: 78. Sitzung des Innenausschusses am Freitag, den 30. November 2001, Vorsitz: Abg. Ute Vogt, Einziger Punkt der Tagesordnung: Öffentliche Anhörung von Sachverständigen zum Thema Terrorismusbekämpfungsgesetz, 2001
Bundesrepublik Deutschland: Passgesetz, Bundesgesetzblatt 11986, 537, Stand: Zuletzt geändert durch Art. 25 G v. 3.12. 2001 13306, 3. Dez. 2001
Bundesrepublik Deutschland: Gesetz über Personalausweise, Bundesgesetzblatt 1950, 807, Stand: Neugefasst durch Bek. v. 21. 4.1986 I 548, zuletzt geändert durch Art. 25a G v. 3.12. 2001 13306, 3. Dez. 2001
Asimov, 1.: The Three Laws of Robotics, Handbook of Robotics, 56th Edition, 2058“, quoted in ”I, Robot“, http://www.asimov.com, 2001
Stanley, J and Steinhardt, B.: Drawing a Blank: The failure of facial recognition technology in Tampa, Florida, American Civil Liberties Union, ACLU Special Report, http://www.aclu.org, 3. January 2002
Viisage Inc.: Government of Uganda Selects Viisage for new Electoral System - Face- Recognition Technology to be used to Reduce Potential Voter Registrations, 2002
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Broemme, A. (2002). A Classification of Biometric Applications Wanted by Politics. In: Brunnstein, K., Berleur, J. (eds) Human Choice and Computers. IFIP — The International Federation for Information Processing, vol 98. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35609-9_17
Download citation
DOI: https://doi.org/10.1007/978-0-387-35609-9_17
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5429-2
Online ISBN: 978-0-387-35609-9
eBook Packages: Springer Book Archive