12
Privacy, trust and biometrics Dr Ian Brown Oxford Internet Institute University of

Trust, Privacy and Biometrics

Embed Size (px)

DESCRIPTION

Presentation given to the Biometrics Working Group on 14 May

Citation preview

Page 1: Trust, Privacy and Biometrics

Privacy, trust and biometrics

Dr Ian Brown

Oxford Internet Institute University of Oxford

Page 2: Trust, Privacy and Biometrics
Page 3: Trust, Privacy and Biometrics

Short-term trust

• Reputation of the organising institution• Opinions in the mass media about

technologies• Attitudes & opinions of friends and family• Convenience system brings

AM Oostveen (2007) Context Matters: A Social Informatics Perspective on the Design and Implications of Large-Scale e-

Government Systems, PhD thesis, Amsterdam University

Page 4: Trust, Privacy and Biometrics

Trust in government

Page 5: Trust, Privacy and Biometrics

Trust is fragile

“Trust is built over the long term, on the basis not of communication but of action. And then again, trust, once established, can be lost in an instant” -Neil Fitzgerald, Chairman, Unilever

Page 6: Trust, Privacy and Biometrics

Longer-term legitimacy

• Informed, democratic consent• Do citizens and their representatives have full

information on costs & benefits?• Privacy Impact Assessment?

• Compatibility with human rights (S & Marper v UK, Liberty v UK, I v Finland)

• Continued legislative and judicial oversight and technological constraint• Privacy by Design

Page 7: Trust, Privacy and Biometrics

How not to do it• “We really don't know a whole lot about the overall costs

and benefits of homeland security” –senior DHS economist Gary Becker (2006)

• “Policy discussions of homeland security issues are driven not by rigorous analysis but by fear, perceptions of past mistakes, pork-barrel politics, and insistence on an invulnerability that cannot possibly be achieved.” – Jeremy Shapiro (2007)

• “Finding out other people’s secrets is going to involve breaking everyday moral rules.” –David Omand (2009)

Page 8: Trust, Privacy and Biometrics

Credible impact assessment• Risk must be quantified to be meaningful, even for

low-probability high-impact events• How strong is evidence that “solution” will work?• How widely do stakeholders agree that cost <

benefit? Include direct cost, inconvenience, enhancement of fear, negative economic impacts, reduction of liberties

• “Any analysis that leaves out such considerations is profoundly faulty, even immoral”

John Mueller (2009) The quixotic quest for invulnerability, International Studies Association, New York

Page 9: Trust, Privacy and Biometrics

CCTV efficacy

• Effective only in limited circumstances (e.g. car parks); otherwise reduces crime by about 3% (NACRO)

• Better street lighting reduces crime by 20% (Home Office)

• “It's been an utter fiasco: only 3% of crimes were solved by CCTV” -DCI Mike Neville, head of Visual Images, Identifications and Detections Office

Page 10: Trust, Privacy and Biometrics

Efficacy of facial recognition

• Does it identify terrorists and serious criminals, or pickpockets and ticket touts?

• How many arrests might we expect?

• How accurate in typical conditions?

• Do we have high-quality images of terrorist suspects?

Page 11: Trust, Privacy and Biometrics

What we need for biometrics1. Strong evidence base for any biometric proposed for public use

2. A careful threat analysis and cost/benefit assessment for each proposed use, including damage caused to privacy and other human rights and a comparison with alternative mechanisms, with independent scrutiny

3. The strict technological limit of the use of biometrics to the minimum required to achieve the security goals of each use

4. Wherever possible, full consumer choice in the decision to use biometrics at all and then in the issuer (eg Crosby-style private sector leadership and consumer choice with govt playing a minimal standards-setting role)

5. Full transparency and strict oversight and enforcement of DPA and ECHR principles in the design and operation of systems

Page 12: Trust, Privacy and Biometrics

Conclusions

• Democratic legitimacy and human rights are critical to ensure security technology supports rather than subverts liberal political values

• Meaningful transparency, ECHR compliance and oversight are critical

• Slap-dash risk assessment and spin are extremely corrosive to trust in long term