Skip to main content

Security in the Danger Zone: Normative Issues of Next Generation Biometrics

  • Chapter
  • First Online:
Book cover Second Generation Biometrics: The Ethical, Legal and Social Context

Part of the book series: The International Library of Ethics, Law and Technology ((ELTE,volume 11))

Abstract

In this chapter, a new set of ethical and socio-political issues emerging with the development of second generation biometrics are analysed and discussed. Two main elements of this development focussed on are, first, the emergence of new biometric traits, in particular so-called soft biometrics and physiological biometrics, and second, the shift to embedded biometric systems, which includes an emphasis on distant sensing, both particularly with regard to security related applications. These technologies, it is argued, reify highly sensitive and essentially contestable social categorisations, thereby closing them off from inspection, debate and contestation. Moreover, the shift towards embedded systems and distant sensing biometrics, requiring no conscious cooperation from subjects, gives rise to some obvious concerns about covert data capture, transparency and consent. A discussion of ‘under the skin biometrics’, highlights how a whole new range of body data are thus brought within reach of data controllers, and especially when used in embedded and distant fashion, need to be assessed from social and ethical viewpoints urgently. Drawing the various types of developments discussed together, a highly normative assumption embedded in biometrics, is articulated: the assumption of availability, which concerns the presuppositon that the body is available for security measures in ways that ought not to be simply taken for granted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For example, a Japanese software company has developed technologies named FieldAnalyst and Eye Flavour, which are automated market research systems that determine the gender and age of passers by, using facial pictures taken by cameras; they have been installed in several shopping malls in Japan. http://www.nec.co.nz/news/news.html

  2. 2.

    Hence, we define soft biometric traits as characteristics that provide some information about the individual, but lack the distinctiveness and permanence to sufficiently differentiate any two individuals. The soft biometric traits can either be continuous (e.g., height and weight) or discrete (e.g., gender, eye color, ethnicity, etc.) (Jain et al. 2004, p. 732).

  3. 3.

    European Group on Ethics in Science and New Technologies (2005) Opinion on Ethical Aspects of ICT Implants in the Human Body, March 16.

  4. 4.

    http://www.sarnoff.com/products/iris-on-the-move

  5. 5.

    http://www.thalesgroup.fr

  6. 6.

    See for example the EC funded FP7 projects HUMABIO (http://www.humabio-eu.org/news.html) and ACTIBIO (http://www.actibio.eu:8080/actibio) Although within these research projects the terms ECG and EEG are used, these do not equal the measurements performed in medical context referred to by the same terms, which involve the use of officially gauged and certified equipment based on international standards.

  7. 7.

    See for example the projects: (United States’ Department of Home land Security) Hostile Intent; Future Attribute Screening Technology – FAST, and (EU-FP7) Suspicious and Abnormal Behavior Monitoring – SAMURAI.

  8. 8.

    For example, in “The National Biometrics Challenge”, we find this definition: “Non-cooperative user: An individual who is not aware that his/her biometric sample is being collected. Example: a passenger passing through a security line at an airport is unware that a camera is capturing his/her face image.” National Science and Technology Council Subcommittee on Biometrics (2007). The National Biometrics Challenge. Washington, DC: 1–19. p. 12.

  9. 9.

    Ibidem.

References

  • Biometrics in Human Services. 1998. 2(2).

    Google Scholar 

  • Bordo, S. 1993. Unbearable weight. Feminism, western culture, and the body. Berkeley: University of California Press.

    Google Scholar 

  • Boussadia, K. 2009. The evolution of airport screening technology. Biometric Technology Today 17(2): 7–8.

    Article  Google Scholar 

  • Bowker, G.C., and S.L. Star. 1999. Sorting things out. Classification and its consequences. Cambridge, MA/London: MIT Press.

    Google Scholar 

  • Burns, R.P., and H. Teufel. 2008. Privacy impact assessment for the future attribute screening technology project. Washington, DC: Department of Homeland Security.

    Google Scholar 

  • Castle, M.N. 1998. Hearing on biometrics and the future of money. Washington, DC: Committee on Banking and Financial Services.

    Google Scholar 

  • Cole, S.A. 2006. The myth of fingerprints. Gene watch http://www.gene-watch.org/genewatch/articles/19-6Cole.html. Accessed 25 June 2009.

  • den Hartog, J.E., S.L. Moro-Ellenberger, et al. 2005. How do you measure a child? A study into the use of biometrics on children. Delft: TNO.

    Google Scholar 

  • Duden, B. 1991. The woman beneath the skin. A doctor’s patients in eighteenth century Germany. Cambridge, MA/London: Harvard University Press.

    Google Scholar 

  • Fausto-Sterling, A. 2008. The bare bones of race. Social Studies of Science 38(5): 657–694.

    Article  Google Scholar 

  • Foucault, M. 1975. The birth of the clinic: An archeology of medical perception. New York: Vintage/Random House.

    Google Scholar 

  • Foucault, M. 1977. The history of sexuality vol. 1: The will to knowledge. London: Penguin.

    Google Scholar 

  • Foucault, M. 1979. Discipline and punish. The birth of the prison. New York: Vintage/Random House.

    Google Scholar 

  • Hacking, I. 1986. Making up people. In Reconstructing individualism, ed. T.C. Heller, M. Sosna, and D. Wellbury, 222–236. Stanford: Stanford University Press.

    Google Scholar 

  • Haraway, D.J. 1991. Simians, cyborgs, and women: The reinvention of nature. London: Free Association Books.

    Google Scholar 

  • Harding, S. (ed.). 1993. The ‘racial’ economy of science. Bloomington: Indiana University Press.

    Google Scholar 

  • Hayles, K.N. 1999. How we became posthuman. Virtual bodies in cybernetics, literature, and informatics. Chicago: Chicago University Press.

    Google Scholar 

  • Home Office Identity and Passport Service Passport Photographs. London http://www.direct.gov.uk/en/TravelAndTransport/Passports/Applicationinformation/DG_174152. Accessed 28 June 2009.

  • Jain, A.K., and X. Lu. 2004. Ethnicity identification from face images. In SPIE International Symposium on Defense and Security: Biometric Technology for Human Identification. Orlando.

    Google Scholar 

  • Jain, A.K., Sarat C. Dass, et al. 2004. Soft biometric traits for personal recognition systems. In International Conference on Biometric Authentication. Hong Kong.

    Google Scholar 

  • Lacqueur, T. 1990. Making sex. Body and gender from the Greeks to Freud. Cambridge, MA/London: Harvard University Press.

    Google Scholar 

  • Latour, B. 1983. Give me a laboratory and I will raise the world. In Science observed, ed. K.D. Knorr-Cetina and M. Mulkay, 141–170. London: Sage.

    Google Scholar 

  • Latour, B. 1987. Science in action: How to follow scientists and engineers through society. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Li, S.Z., B. Schouten, et al. 2009. Biometrics at a distance: Issues, challenges, and prospects. In Handbook of remote biometrics for surveillance and security, ed. M. Tistarelli, S.Z. Li, and R. Chellappa, 3–21. London: Springer.

    Chapter  Google Scholar 

  • Lyon, D. (ed.). 2003. Surveillance as social sorting: Privacy, risk, and digital discrimination. London/New York: Routledge.

    Google Scholar 

  • Merleau-Ponty, M. (1945) 1962. Phenomenology of perception. London: Routledge and Kegan Paul.

    Google Scholar 

  • National Academy of Sciences. 2008. Protecting individual privacy in the struggle against terrorists. A framework for program assessment. Washington, DC: The National Academies Press.

    Google Scholar 

  • National Science and Technology Council Subcommittee on Biometrics. 2007. The national biometrics challenge, 1–19. Washington, DC.

    Google Scholar 

  • Reardon, J. 2004. Decoding race and human difference in a genomic age. Differences 15: 38–65.

    Article  Google Scholar 

  • Riera, A., A. Soria-Frisch, et al. 2008a. Multimodal physiological biometrics authentication. Biometrics: Theory, methods, and applications. Piscataway: Wiley/IEEE.

    Google Scholar 

  • Riera, A., A. Soria-Frisch, et al. 2008b. Unobtrusive biometric system based on electroencephalogram analysis. EURASIP Journal on Advances in Signal Processing 2008: 1–8.

    Article  Google Scholar 

  • Rouvroy, A. 2009. Governmentality in an age of autonomic computing. Technology, virtuality, utopia. Computer Privacy and Data Protection, Colloquium on Autonomic Computing, Human Identity and Legal Subjectivity. Brussels.

    Google Scholar 

  • Schiebinger, L. 1993. Nature’s body. Gender in the making of modern science. Boston: Beacon.

    Google Scholar 

  • Star, S.L. 1991. Power, technology and the phenomenology of conventions: On being allergic to onions. In A sociology of monsters: Essays on power, technology, and domination, ed. J. Law, 26–56. Oxford: Basil Blackwell.

    Google Scholar 

  • The BioSecure Network of Excellence. 2007. The biosecure research agenda. http://biosecure.it-sudparis.eu/AB/index.php?option=com_content&view=article&id=67&Itemid=36.

  • Van der Ploeg, I. 1999. Written on the body: biometrics and identity. Computers and Society 29(1): 37–44.

    Google Scholar 

  • Van der Ploeg, I. 2002. Biometrics and the body as information: Normative issues in the socio-technical coding of the body. In Surveillance as social sorting: Privacy, risk, and automated discrimination, ed. D. Lyon, 57–73. New York: Routledge.

    Google Scholar 

  • Van der Ploeg, I. 2008. Machine-readable bodies: Biometrics, informatisation and surveillance. In Identity, security and democracy, NATO science series, ed. E. Mordini and M.S. Green, 85–94. Amsterdam/Lancaster: Ios Press.

    Google Scholar 

  • Van der Ploeg, I. 2010. Normative assumptions in biometrics: On bodily differences and automated classifications. In The impact of europe on eGovernment, ed. S. van der Hof, and M. Groothuis. The Hague: TMC Asser Press, IT&Law series.

    Google Scholar 

Download references

Acknowledgement

Funding of the research for this paper was partly provided by the European Research Council and the European Commission, both under the European Community’s Seventh Framework Programme (FP7/2007–2013), DigIDeas Project/ERC Grant Agreement 201853, and HIDE project/EC Grant Agreement 217762

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Irma van der Ploeg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this chapter

Cite this chapter

van der Ploeg, I. (2012). Security in the Danger Zone: Normative Issues of Next Generation Biometrics. In: Mordini, E., Tzovaras, D. (eds) Second Generation Biometrics: The Ethical, Legal and Social Context. The International Library of Ethics, Law and Technology, vol 11. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-3892-8_13

Download citation

Publish with us

Policies and ethics