Skip to main content

The Identity We Can't Change

You are here

The Identity We Can't Change

16 May 2017
We look at our smartphone first thing in the morning to check the weather, and our to-do list for the day. During breakfast, we read the news and learn about what is going on in the rest of the world. In our commute to work or college, we scroll through our social media feeds to check on our friends, family, and acquaintances. We might download a new app, or listen to a new song.
We can do all of this, quickly and easily - we just press our finger on the smartphone's fingerprint reader to unlock it, to purchase an app or check our bank balance. Without realizing our biometric personal identity has become fused with our most personal electronic device.
The introduction of biometrics in consumer technologies has taken massive leaps forward in the last few years, which has led to its normalisation.
Biometrics is the process by which one seeks to recognize, authenticate, and identify a person, based on their biological (DNA and blood), morphological (shape of hand, palm print, fingerprint, vein pattern, face, iris, voice, and ears) or behavioural (the way of walking, posture, signature, typing) characteristics. That is to say, attributes that are irrevocably related to the identity of a person.
The market for biometric technology has become one of the most lucrative in the world, not only because of its application on mobile devices (smartphones with fingerprint, iris and facial readers), but also because of its increasing use in web services (mainly facial and voice recognition). Despite being presented on occasion as an infallible technology, biometrics are not free of weaknesses and vulnerabilities.
The report "The Identity We Can't Change" seeks to explore this issue and raises some of the questions about the role of this type of technology in society, and fundamentally how it can become a tool capable of affecting human rights.
The title of the report emerged from two key problems of biometrics. Firstly, our biometric information, except our DNA, is not secret. Secondly, biometric data is practically impossible to change. How do we get a new set of fingerprints? A new face? A new voice?
Experts from diverse fields have carried out studies that address the vulnerabilities of certain biometric identification technologies, such as the extraction of fingerprints from photographs and objects we touch, and subsequent falsification of those fingerprints; or the accuracy problems of facial recognition systems, which may lead to discriminatory practices on ethnic and racial grounds.
Biometric data is not used solely by private companies in order to make a profit. States are one of the main actors in biometrics, with large scale biometric databases of their citizens. In light of this, what are the safeguards in place to avoid manipulation and adulteration of such stored data? What type of guarantees should be established to ensure the integrity of the data obtained?
In Argentina, the recognition of biometric data as sensitive data, within the genre of personal data, is a debate that is still pending. In this sense, it is worth asking ourselves: What are the new challenges posed by the identification of people from biometric data? How can we prevent discriminatory practices based on that biometric data? What are the guarantees put forward by the state to prevent biometric data being used as a tool for segregation or against particular social groups?
One of the goals of our research is to shed some light on one of the less debated subjects in Argentina's society, but which presents great concerns for the exercise and development of individual freedoms of people - The Federal Biometric Identification System for Security (known as SIBIOS, which is its acronym in Spanish), introduced in 2011, based on a security and crime prevention logic.
Through our report we resume the work started by ADC in previous years, deepening and updating the information, exploring what data is being collected by SIBIOS, what is the collection process, which organisms and provinces are part of the System, what is the technology used by the Ministry of Security and the Ministry of Interior, and some of the uses of the System in practice.
The report shows that, despite the lack of publicly available information on this matter, SIBIOS has been in constant expansion, being implemented practically in all the provinces of the country, and recently with expectations of being extended to agencies dependent on the Executive and Judicial Branch in all the jurisdictions of the country.
The use of biometric identification systems, and particularly SIBIOS in Argentina, are cloaked in secrecy, characteristic of traditional intelligence and military institutions. SIBIOS is rooted in the development of the policies of identification of citizens, often related to former authoritarian regimes, as is the case in Argentina. The lack of transparency in how the State uses these systems, how the biometric data stored in the databases are safeguarded, and what the limits to the use of biometric technologies by governments should be, what were the parameters of consideration for the acquisition of technological solutions, are all questions that are yet to be answered.
All responses to these questions should take into account the elements provided for in the Constitution and the main international human rights treaties. Any interference by the State must be based on strong grounds, supported by hard data and evidence, as well as serious and independent diagnoses. These are all essential, to meet the conditions of necessity and proportionality for any measures that seek to restrict our fundamental rights.

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…


Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC

Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…