Israel is preparing to provide biometric identification solutions

This is what Uzi Berlinski - the government responsible for biometric identification and information security says: Mishna: Accenture: The most requested biometric system in airports: facial recognition

The late Uzi Berlinski
The late Uzi Berlinski

"There is no way that can guarantee the complete security of the traveling public at the airport as long as the human factor is involved. At the same time, biometrics (voice recognition, face, iris, fingerprint) may be the best solution for protecting the front 'doors' and the backwardness in this space," says Dennis Philo, a researcher at the international business consulting and technology services company Accenture.

The aviation industry wants the passenger public to trust that it implements sophisticated technologies that will prevent the intrusion of unwanted elements. In reality, the success of these efforts depends on the passage of these unwanted elements through the front doors alone. "In many airports," says Filo, "the situation is such that employees can enter rear staff parking lots and enter terminals from side entrances without being required to go through metal detectors. The hope is that these 'holes' in the security network can be plugged using biometrics."

Just a few years ago, the main concern that overlooked US airport managers was flight delays, labor costs and birds on the flight paths. Today, the main concern is security and its side effects. The heavier security creates delays in flights and the flying public is starting to get tired of the body checks, Confiscating the tweezers and removing the socks from the suitcase.The airport managers are desperate to find ways to disperse security points and are showing interest By adopting biometric systems, which are currently used in licensing offices, casinos and prisons.

"In the biometric systems, the system leads to facial recognition (long before fingerprints and iris and voice recognition). This is mainly because facial recognition in existing databases is much easier than collecting fingerprints, eyes and voices," says Philo. For example, fingerprint scanning of so-called "trusted passengers" requires the passenger to register in advance. On the other hand, facial scanning requires the passenger to pose briefly in front of a camera. The image is converted to print using software, which turns facial features into a unique set of numbers. The image print is compared to a database containing up to a million images. If a match is suspected, the print is checked again by an on-site technician.

"Of course, all of this costs a lot of money, a serious problem for the aviation industry, which is suffering from financial problems," Philo says. "Therefore, discussions are underway regarding spreading the economic burden across organizations that may show interest in scanning large population groups. The first to be interested are law enforcement institutions, which invest considerable effort in pursuing bail and parole violators. Adding photos of these and other risk factors to a database A rule of 'wanted' will, theoretically, allow the security team at airports to block the air escape route."

Intermediate: Resistance

Opposition to the biometric method is emerging from the ranks of private lawyers, mainly in view of the risk of misidentification of a biometric system. Concern also arises regarding the way the images are collected in these databases and their use, and whether a signature of the passenger is necessary, confirming the use of his image.

Currently, one company called Viisage is trying to sell extremely successful systems to airports, operating in casinos in Las Vegas and Atlantic City. The company even provided the biometric security system for the 2001 Super Bowl. Recently, the company won two tenders from the US Department of State and Defense to supply the technology, which will be implemented in several initiatives related to defense and immigration.

Uzi Berlinski, the inspector general in the prime minister's office, is responsible for five areas: responsible for correcting the deficiencies that appeared in the state auditor's reports under the committee of ministers and the prime minister; responsible for the audit and information security section and also serves as the chairman of the council for the security of sensitive information in the government , and is also responsible for the areas of ethics, quality of service control and internal audit in the government.

The government recently appointed Berlinski to coordinate the issue of biometrics in various aspects of the government and its operations. "About two weeks ago, the biometrics steering committee met for the first time, and we plan to meet once a month at the Prime Minister's Office to determine areas of activity, priorities, investments in certain areas, training, and so on," he says.

What is biometrics?

"Biometrics is what you are, and not what the documents indicate about you, or the password you remember. From this it can be understood that the ability to achieve identification verification using biometrics is much higher than the other abilities. The other abilities Easy to fake and copyable, and the possibility of human memory and the limited amount of ability to remember passwords from applications, hardware and software we work with."

Which applications are in the crosshairs?

"There is a respectable list of applications not all of which are currently prioritized.

"The potential is huge and includes biometric identification on the use of cell phones (by voice recognition, fingerprint or face recognition by a camera, biometric identification that will be attached to a digital signature), border crossings - biometric identification that will be attached to a passport, identity card or other official documents; entry into systems A computer for those who are approved for it; the elimination of the need to use metal keys in prisons; the image of the hybrid who walks with bunches of keys Will disappear in the near future, in my opinion; entry into classified areas for those who are allowed, for example at airports - increased options for employees and less for others.

"Biometric identification can also be used for law enforcement - for example, comparing photos of people from criminal databases with those who enter the same area that is a sensitive area or an area where there are crowds, such as football fields, stadiums and so on; verification tools for online payment, preventing credit card forgeries - the latest stories that were published about young people who duplicated credit cards can disappear in the blink of an eye if biometric identification elements are integrated into the credit cards. In the morning we won't have to to look for the car keys, we can get in by touching the remote control or the car door. The fingerprint or photo can also be used as an immobilizer; we are close to the elections - it will be possible to verify in an almost absolute way that the person who presents himself as having the right to vote is indeed the right one.

"The thousand people aged 120 and over who were discovered in the voter's book, and hence also in the National Insurance's eligible lists, are alarming. Is it possible to prevent fraud in the National Insurance by those 'living dead'?

"In the state of Connecticut in the USA, all those eligible to receive benefits from the local National Insurance were required to have a smart card that carries biometric identifiers. The National Insurance Institute reports annually on savings of tens of millions of dollars as a result of fraud prevention. Funds that can then be earmarked for important social causes and will not end up in the pockets of crooks.

"After September 11, there was a tremendous momentum in the issue of biometrics in the US, including legislation that requires, as of October 26, 2003, anyone who wants to enter the borders of the US and is not an American citizen, to come equipped with biometric identifiers in addition to the usual documentation. They have not yet determined Which and how. We are waiting for the publication of the procedures that they will surely issue soon and then we will have to contact some office or the embassy to To register in the biometric database and be equipped with the database. This is similar to the process that goes through someone who wants to win a magnetic card, with the help of which and with the help of palm recognition, he will avoid having to stand for a long time in passport control lines."

How do you achieve increased individual modesty and privacy protection in the age of biometric identification?

"This subject must accompany every sensitive database. A biometric database is, by definition, a sensitive database and the provisions of the law for the protection of privacy and databases apply to it, which require its protection, security, prevention of cross-referencing of information through or with its help, and use of the data only for the exact purpose for which they were taken. For example Do not consent in any way to police uses of 'civilian' biometric databases, do not consent to the creation of personal medical profiles or others on a person for biometric databases taken, say, for the purposes of entering secure areas or using them to cross the country's borders. An administrator must be appointed for these databases, who will be responsible for preventing unusual uses of these sensitive databases.

"The steering committee will decide in its upcoming meetings on government applications that will receive priority in their promotion due to the needs of the state and the government. In addition, a list of biometric products will be included that will be tested by authorized parties and offered for use by the various state authorities according to their unique needs, such as access control, attendance registration, access to computer websites, for computer systems, and so on."

Are there global standards in the field?

"The major difficulty is the lack of a relevant standard in the world. This is a field that is in development, so Israel may be forced to set standards for itself in order not to rely on manufacturers' statements. We have, for example, come across very respectable manufacturers who announce zero identification errors with their products, something that does not seem possible , and from the tests we carried out on not even large samples, it turns out that there is sometimes a gap between the statement and the results of the tests that are carried out.

"In the US they want to close the social gap and not discriminate against children who don't have money to buy a meal at school. They give everyone a card with biometric IDs, pass them through a 'reader' and no one knows who got an exemption and who didn't. On the other hand, one of the most serious malfunctions has already happened in the USA. The American Ministry of Defense has determined not long ago that everyone involved in its activities, including suppliers and family members, a total of about 5 million people, will be equipped with biometric identifiers for entering military facilities, the Ministry of Defense for meetings, and so on And here we were recently 'informed' that this sensitive database was stolen - about half a million people had their biometric identity stolen, including other data - this phenomenon Emphasizes even more what we have already said regarding strict adherence to the protection of these databases and prevention of leakage or theft or disruption of data.

"There is tremendous potential here, both in terms of government services to the public, both in terms of improving personal security, and in terms of streamlining the systems that today are under a difficult attack by hackers, crooks and terrorists.

There is no real value today to paper documents that are very easy to forge using computers, scanners, digital cameras, image processing software. Any child today can produce a magnetic card and the serious consequences are felt both in the economy, in security and in government. The good news brought by the new steering committee is in dealing with these phenomena and creating a better quality of life.

"The potential is in everything - also in the creation of the repositories, also in connecting other applications. I mentioned earlier the digital signature. It is a very beautiful and very important thing, but if I receive your password, I also received your digital signature at the same time and they will never know if it is indeed my father He is the sender or Uzi is the sender and the court will have to deal with very serious issues in the face of the great trust he places in the digital signature. Connecting the biometrics to the signature The digital and to the encryption is another line."

Leave a Reply

Email will not be published. Required fields are marked *

This site uses Akismet to filter spam comments. More details about how the information from your response will be processed.