BIOMETRICSREPORT
BIOMETRICSREPORT
BIOMETRICSREPORT
Stephen Coleman
April 1999
1
BIOMETRICS IN LAW ENFORCEMENT AND CRIME PREVENTION
Executive Summary
This report is about the new computer technology of biometrics and its application to law
enforcement and crime prevention. The purpose of biometrics is to distinguish one person
from another based on each person's physical characteristics, such their fingerprints, face,
voice, eyes, or hands.
Our review of biometrics technology shows that: It works very well; it can save money;
and it has good public acceptance. The wide variety of biometrics systems can present
difficult questions, however, for a government agency that wants to purchase one.
Different types of biometrics systems have different characteristics and levels of
accuracy, and none is compatible with any other. Before purchase, a system must be
carefully tested in a realistic setting.
Biometric systems in government and the private sector raise significant issues about
personal privacy, which the Legislature should address. Current laws provide few
safeguards for a person's biometric data. The potential value of biometrics for crime
prevention will not be realized if individual privacy is undermined. The report describes
what other jurisdictions are doing to safeguard privacy.
This report fulfills a request from the 1998 Minnesota Legislature for a study of
innovative uses of biometrics in law enforcement, the costs of potential uses, and a
discussion of related data privacy issues. This is one of several reports that the
Legislature commissioned in establishing the Center for Applied Research and Policy
Analysis at the School of Law Enforcement, Criminal Justice and Public Safety,
Metropolitan State University.
2
CONTENTS
Executive Summary i
Biometric Systems 2
Fingerprints 4
Eyes 5
Hand Geometry 6
Voice 6
Face 7
Other biometrics 7
Accuracy 8
Applications 10
Criminal identification 10
Criminal background checks 12
Photo identification 13
Drivers' licenses 13
Corrections 15
Border control 17
Government benefit programs 19
Banking and credit cards 22
Computer security 23
Other applications 23
Public acceptance 24
Notes 33
3
TABLES
4
BIOMETRICS IN LAW ENFORCEMENT AND CRIME PREVENTION
This report is about the new technology of biometrics and its application to law
enforcement and crime prevention. The purpose of biometrics is to distinguish one person
from another based on each person's physical characteristics. To do this, a computer can
use information about a person's fingerprints, face, voice, eyes, or hands.
The first application of biometrics in law enforcement was the automated identification of
fingerprints, and law enforcement continues to use biometric fingerprint data to solve
crimes, identify criminals, and keep criminal records. Increasingly, however, people will
be using biometrics in everyday life. Biometrics creates new opportunities for preventing
crime by accurately identifying people when they cash a check, collect welfare benefits,
use an ATM card, cross the border into the United States, sign on a computer network, or
enter a secure building.
5
innovative uses of biometrics in law enforcement and evaluate the costs
associated with these potential uses . . . (and to) address any data privacy issues
that are raised by the use of biometrics in law enforcement.
Is biometrics legal?
The study first reviews each type of biometric technology — fingerprints, voice, eyes,
hands, and face. We then investigate biometric systems used in other states, at the federal
level, and in other countries. Finally, we discuss laws and court rulings affecting
biometrics, and what other governments are doing about biometrics and privacy.
Biometric Systems
6
converts the fingerprint images into computer data, and searches the fingerprint file for
similar prints, which are stored digitally as electronic data.
A different situation arises when, for example, a person uses a credit card. The store clerk
wants to know if the person presenting the card is its owner. This is a case of
authentication or verification. The clerk may ask for additional proof of identity, such as
a driver's license. To use an ATM card, the owner must use a password or PIN number to
prove authenticity. Experience shows, however, that this type of security is weak, and
fraudulent use of cards, checks, and drivers' licenses costs businesses millions of dollars
each year.
In a biometric ATM system, a person's fingerprint data or another biometric could be put
on the magnetic strip on the back of an ATM card when the person first applies for the
card. To use the card, the owner would place it in a cash machine and put a finger on the
machine where the fingerprint would be read, converted into numbers, and compared
with the fingerprint data on the card. If the numbers match, the machine pays out. A
small computer in the ATM machine does the work. An alternative to a magnetic strip
holding the biometric data is a "smart card" that has a small computer chip memory, or
the biometric can be stored on a central computer and retrieved for comparison when a
person presents their identification card or password to the system.
7
Another important issue for a biometric system is how the public responds to it. Some
people may have an aversion to having their biometric identification recorded, or some
people may have trouble using a particular biometric system. These factors affect the
choice of a biometric system.
We will return to the accuracy and public response issues after describing the types of
biometric systems currently available.
Fingerprints
Each of our fingers has a pattern of lines or ridges that, together with breaks and forks in
the lines, are unique to each person. Fingerprints are well-established in law enforcement
and the courts as unique personal identifiers. No two people have ever been found to have
the same fingerprints.
Most biometric fingerprint systems work by finding the breaks and forks in the
fingerprint ridges, also called minutiae, and then converting information about their
position into a series of numbers, like coordinates on a map. Some systems use other
information about the ridges or pores of the skin. A dozen or more manufacturers
produce biometric fingerprint systems, but each company has its own mapping and
computational procedures, which are trade secrets. This makes their systems
incompatible with one another. That is, the data for a fingerprint read into one system
cannot be used on a computer of a different manufacturer. Compatibility among law
enforcement agencies that have different types of systems is achieved by re-creating a
visual image of the fingerprints from the computer data and sending the visual image to
another agency, where it is re-entered into their computer.
Law enforcement agencies take fingerprint data from all fingers. This greatly enhances
the accuracy of law enforcement systems over a commercial biometric system that might
8
use just one or two fingers for authentication. Fingerprint authentication may be
problematic for some persons if their occupation affects their fingerprints or because of
missing fingers.
Eyes
Two biometric systems use information about a person's eye; one looks at the pattern of
veins in the retina, the other uses the pattern of fibers, tissues, and rings in the iris. Both
of these biometrics are believed to be as unique as fingerprints, but their use in
identification lacks the established history of fingerprints.1
The retinal system was first to be invented. It is an intrusive system because it must shine
a light into the eye at close range to illuminate the retinal pattern; this also demands close
cooperation of the person being checked. Retinal systems are used mainly in very high
security institutions, such as nuclear plants, because they never let the wrong person in.
The iris-based system is relatively new but seems to be emerging as a favorite in the
market. The iris system requires only that a person look toward a video camera, which
can be several feet away. Eye glasses and contact lenses have no effect on the biometric,
nor does eye color. Similarly, change in size of the iris does not change the biometric. A
biometric system can use the fact that the iris adapts to light to verify that the eye is that
of a living person, not a photograph of an eye.
Some evidence suggests that patterns in the eye may change over time because of illness
or injury, but little is known about this. Blind people or people whose eyes have been
damaged by diabetes, for example, may not be able to use eye identification systems.
Only a small of number of companies sell eye identification systems. Almost all iris-
based systems use the same technology, which was invented by John Daugman, a British
scientist.2
9
Hand geometry
A hand has distinct characteristics in three dimensions, including the length, width, and
thickness of fingers, contour of fingers, veins, and other features, which are used in
biometric systems. Hand geometry systems are most common in building access control.
A person seeking admittance places a hand in a device that examines it with a video
camera and converts the video image to numbers in a computer for comparison with the
person's pre-recorded hand geometry.
Hand identification may be affected by changes in a person's fingers if they are swollen,
or by someone wearing a large ring. The system may also be sensitive to environmental
problems, such as temperature or light shining at the camera. People with paralysis in a
hand or tremors may not be able to use these systems.
Voice
People can be identified to a limited degree by their voice or speech pattern. To use a
voice recognition system, a person must pre-record specific words on the system. Later
when authentication is required, the system prompts the person to say one of these words.
A computer analyzes the speech pattern and tries to determine if the voice matches the
pre-recorded version. Notice that voice recognition is not the same as speech recognition,
in which a computer tries to "understand" what a person is saying.
Voice recognition suffers a variety of problems. A person's voice may change because of
illness or stress, and women are more difficult to identify than men. A noisy background
can also be a problem.
10
Face
Facial biometric systems are improving rapidly. 3 A video camera scans the face and
records the arrangement of features for comparison with previously recorded facial
images. How this is done is a proprietary secret of each manufacturer. One new system
uses the infrared heat pattern of the face as the biometric, which means the system works
in the dark.
Facial systems potentially have very wide application. They can identify digital
photographs of people stored on a computer, as when photos are made for drivers'
licenses in some states, and they can be used anywhere a video camera is available.
Facial recognition systems can automatically scan people's faces as they appear on
television or a closed-circuit TV monitoring a building or street.
Facial recognition can be impaired by people who change their appearance markedly, as
by growing beards, or who take on unusual facial expressions. The orientation of a
person's face toward the camera can also influence accuracy. These systems may not be
able to distinguish twins.
Facial systems are different from other biometric systems because they are the easiest to
use without a person's awareness, which raises some concerns about privacy. All other
biometric systems require a person's cooperation.
Other biometrics
A few biometric systems are available that use palm prints, which are similar to
fingerprint systems, and others use finger geometry, which is similar to hand geometry.
These biometrics are infrequently used, however, so we do not consider them further.
Some researchers are trying to develop biometric systems based on hand-written
signatures, personal odors, ears, sweat pores, the way a person types on a keyboard, or
11
body motions. To date, however, these are not sufficiently advanced for practical
application. DNA analysis is not usually considered a biometric because a person's DNA
cannot be read externally.
Accuracy
Biometric systems use two measures of accuracy, one for each type of mistake they
make. Suppose, for example, that a biometric system limits access to a building. One
mistake is to let in someone who doesn't belong in the building. The percentage of people
let in by mistake is the false acceptance rate (FAR). At other times the system might fail
to recognize a person who should be admitted. The frequency that this happens is the
false rejection rate (FRR).
The degree of error permissible in a biometric system is a decision that users have to
make in each application, taking into account the type of biometric system needed, cost,
security desired, and what happens if a mistake is made. Some biometric systems allow
these rates to be adjusted, which involves a trade-off between the two types of errors. If a
system reduces the chance of a person getting into a building by mistake, it increases the
chance that legitimate users will be denied admittance. So users must balance security
interests against the annoyance and problems that arise when legitimate users are denied
access. If too many bank customers are denied access at an ATM machine, for instance,
they may switch to a different bank. In some applications, high error rates are tolerable.
For example, when a fingerprint from a crime scene is searched against a fingerprint file,
a low chance of success in identifying the suspect is acceptable because there may be no
other possibility of finding the suspect, and a fingerprint examiner will always check the
computer's results for false matches before identifying a suspect.
In general, fingerprint and eye identification systems are the most accurate, followed by
hand geometry and face; voice recognition is least accurate. Table 1 shows typical
accuracy rates of biometric systems. These figures should be viewed cautiously, however,
12
as most information on accuracy comes from manufacturers; there is little independent
testing of biometric systems. A potential purchaser of a system should always test its
accuracy in a realistic situation before buying it. For example, a realistic trial of a bank-
by-phone system that used voice recognition in Switzerland found that accuracy was
disappointing and worse than the figures reported in experiments on voice recognition
(which are in Table 1).4
Sources: Rayco Security (retina); Richard Wildes, "Iris Recognition: An Emerging Biometric Technology,"
Proceedings of the IEEE, 85 (1997):1361; Identix Corp., (fingerprint systems); Recognition Systems (ID3D
HandKey Reader); Fredric Bimbot, et al. "Speaker verification in the telephone network: research activities
in the CAVE project," Proceedings of the 5th International Conference on Speech Communication and
Technology, Rhodes, Greece, September 1997: 971-974; VisionSphere Technologies, Inc. (Canada),
UnMask+ test for West Virginia driver's license program with 30,000 photos by digital camera;
Identification Technologies International, PAC-1000 system specifications.
Some institutions are developing standards for accuracy. The European Union is
considering a standard for access control that would have a false acceptance rate of 1 per
100,000 (0.001%) combined with a false rejection rate of less than 1 percent.5 The British
13
banking community has called for a false acceptance rate of less than 1 per 10,000,000
(0.00001%).6
Accuracy of a system may also depend on how much information is extracted from the
biometric. For example, ten fingerprints are better than one. And a system that looks at
more features on a face or finger may be more accurate than one that uses fewer features.
Accuracy may also be improved by allowing a person to try using a system more than
once before rejection, or by combining several types of biometrics on a single system.
Applications
This review covers a wide variety of applications for biometrics technology.7 We include
law enforcement, corrections, drivers' licenses, government benefits, banking and credit
card fraud prevention, physical access control, and computer access control. Some of
these technologies are already being used in Minnesota, while others could be used
almost immediately. We also discuss applications that may not seem germane to
Minnesota, such as border control, but which show the effectiveness of different types of
systems. Unfortunately, few biometric systems have been rigorously evaluated, a
problem compounded by the rapid pace of change in the industry. We begin with
applications in traditional law enforcement activities, which are summarized in Table 2.
Criminal identification
Minnesota was the first state to install an automated biometric fingerprint identification
system. It identifies criminals on arrest and permits searching of prints found at crime
scenes.8 The Bureau of Criminal Apprehension (BCA) manages the system. For 20 years
the state has kept its place at the forefront of this evolving technology. Law enforcement
agencies throughout the state are connected by an electronic network that permits rapid
identification of criminals by their digitized fingerprints. The FBI has standardized the
electronic transmission of digitized computer fingerprints so they can be sent to the FBI
14
or between states for further identification. The latest development is the replacement of
traditional inked fingerprinting by "live scanning," which is the direct reading of
fingerprints by video camera and computer
The FBI is testing a new "NCIC 2000" system that will let law enforcement agencies
transmit digitized fingerprint information to the FBI to quickly identify whether a suspect
is on the national list of wanted persons. The sheriff's off ices of Hennepin and Ramsey
counties, the St. Paul police, and a local company, Digital Biometrics, plan to test a
portable fingerprint reader for NCIC 2000. The portable device will be used in a police
car or within a short distance from a police car to learn on the spot whether a suspect is
on the national wanted list. An image of a suspect's finger would be sent to the BCA and
on to the FBI. The initial test will place portable readers in 40 cars. These devices are
expected to cost about $2,500 to $4,000, with additional costs to upgrade police radio or
telephone systems to accommodate the fingerprint readers; federal funds are expected to
pay for the equipment.
15
It may take several years for police agencies to learn whether portable fingerprint readers
are useful and how many might be needed by a department. So we are unable to estimate
a cost for this biometric application.
BCA makes about 120,000 background checks each year. In addition, the Department of
Human Services has access to BCA's computerized criminal history file and makes about
100,000 checks each year. Private companies make another 65,000 yearly background
checks using public terminals at BCA. BCA usually does background checks by name
and date of birth only. If fingerprints are included with the request, BCA will also check
those to verify identity. Any background checks that go to the FBI must include
fingerprints.
16
We consulted BCA about whether a live-scanning terminal would help with their
background checks. They replied that it would be hard to incorporate live scanning into
their operations at this time. In the future, however, it might be a good option.
Photo identification
Facial recognition can be added to automated systems that capture and digitize mugshots
after people are arrested. In 1988 the Lakewood Division of the Los Angeles County
Sheriff's Department installed a system that can search the composite drawing of a
suspect or a video image of someone committing a crime against its database of digitized
mugshot photos. They also intend to use the system to search for suspects on "Megan's
Law CD," a photo database of registered sex offenders.9
British police are moving ahead with plans to automatically monitor closed-circuit
surveillance video cameras with facial recognition software. Britain has over 200,000
video cameras used for surveillance, many watching streets and shopping areas. In
Newham, a borough of London, with 140 street cameras and 11 mobile units, the local
police have planned a six-month trial of facial recognition at a cost of about $100,000.10
Video cameras will be monitored by a computer that will watch for known criminals, and
police will be alerted if they are seen on camera. The computer can compare 250 images
per second. The system will be tested at soccer games to scan the crowd for chronic
troublemakers. This technology can also monitor public video cameras for missing
children or scan for terrorists at an airport.
Drivers' licenses
Because a driver's license has become a key form of personal identification, its
authenticity is very important. Driver's license fraud contributes to other types of crime,
including passing bad checks, stolen identities, credit card fraud, and illegal purchase of
alcohol and tobacco by underage minors. States are taking more precautions to control
17
the issuance of a driver's license, and biometrics offers the best way to check a person's
identity.
West Virginia was the first state to apply facial recognition to a driver's license.11 When
people apply for a new license, their photo is stored digitally. Later, if someone applies to
replace a lost license or renew a license, their photo is again captured digitally and
automatically compared with their previous photo. The aim is to prevent people from
getting an extra license under a false identity. West Virginia gives people the option of
using a fingerprint for identification, which is done electronically. West Virginia has
installed 74 workstations at 54 locations to process drivers' licenses and expects to issue
450,000 each year.
Illinois will also be using facial recognition to help authenticate drivers' licenses.12 And
Illinois State Police will be able to access the system for a variety of law enforcement
purposes.
If a person's biometric data is put on a driver's license, it can be used to authenticate the
person at a store or other locations. First, the license is read like a credit card by swiping
it through a magnetic strip reader attached to a computer (a regular PC will do the job.)
Then, depending on the biometric, the person puts a finger on a fingerprint reader or
looks at a video camera so the computer can read the biometric a second time and
compare it with data from the license.
18
might be desirable so that a license could be used for multiple purposes or to reduce
costs. Incompatibility, however, ensures a disconnection among government and
commercial identification systems, which might protect the privacy of license users. The
decision to put a biometric on a driver's license also involves many other considerations,
such as whether it should be optional, which biometric should be used, whether multiple
vendors are available (to provide competition), how information is stored on the license,
and so forth.
Corrections
19
The department installed the systems in 1997 and continues to refine them, with an eye
toward putting similar systems in other prisons. The cost at Lino Lakes was $130,000,
which included a computer network and terminals at three access points to the prison.
The cost was greater than for an off-the-shelf system, however, because of computer
programming to tailor the system to the department's specifications. The system has the
added feature of continuously tracking which staff and visitors are in the prison.
The Minnesota Department of Corrections modeled its system after hand geometry
systems of the Federal Bureau of Prisons. In a number of federal prisons, visitors, staff,
and inmates have their hand biometric put on a photo identification card, which they must
carry with them. Card and hand readers are installed throughout the prison to control
access to various areas; the system also records everyone's movements. As reported to the
General Accounting Office by prison officials, one prison has made over 200,000 identity
checks with hand geometry without finding any errors.14 One system of this type with
eight hand readers, cameras, and related computer software cost about $90,000.
In 1990 the Cook County (Illinois) Sheriff's Office began using a retinal identification
system for prisoner identification and release.15 At that time the system cost about
$500,000 for 23 scanners and other equipment to connect the system, but prices for the
equipment have come down. It scans about 300 prisoners daily, comparing their retinal
biometrics against a database of more than 300,000. The system takes about 2 minutes to
identify someone in the database but only a few seconds to verify someone for access
control.
20
In November 1998 Wisconsin contracted for a combined photo and facial recognition
system for the state's prisons, at 44 locations.18 It will cost $1.4 million.
In 1997 New York City contracted for an electronic probation monitoring system.19 The
system uses kiosks with video touch-screens that allow probationers and parolees to
check in electronically with probation officers on reporting dates. The system identifies
people by their hand geometry. (The manufacturer also makes a system that uses
fingerprints.) The city expects to use the system to monitor about 35,000 low-risk
probationers, allowing probation officers to spend more time supervising high-risk
probationers. New York paid $925,000 for their system.
Another biometric option for monitoring probationers is voice recognition. In one system,
a probationer is paged randomly and must call an 800 number that verifies who the caller
is.22 The location of the caller is checked by "Caller ID."
Border control
The federal Immigration and Naturalization Service (INS) has pioneered biometric
systems in border control. The number of people crossing into the United States daily is
enormous — 100,000 in El Paso, Texas alone — which makes prompt and accurate
identification necessary. In 1993, INS began a trial of its INSPASS control system, which
uses either hand geometry or, at one location, fingerprints.23 Business travelers who fly
into the United States at least three times yearly can apply for a biometric identification
card at an INSPASS enrollment center. Then, on arrival, the traveler puts the card into a
21
kiosk and puts a hand on the designated spot. If the system verifies the person's identity,
it opens a gate and records the process.
INSPASS started at New York's JFK terminal, Newark International Airport, and Pearson
International Airport in Toronto, and by 1997 over 60,000 people had enrolled. INS has
decided to add the program to at least six more airports. Other countries are developing
similar systems.
The U.S. Department of Justice evaluated the initial INSPASS system, which cost about
$3 million.24 Their audit found that INSPASS ". . . has the potential to be a cost effective
means of reducing processing time for frequent travelers . . . without sacrificing security."
The one-time cost of a kiosk — about $45,000 — is less than the on-going cost of a
border inspector, which is about $50,000 per year. And accuracy of the system is at least
as good as that provided by the normal manual inspection process. The audit also
recommended several improvements in kiosk design, enrollment accuracy, staff training,
the identity card, and the biometric. The auditors did a survey of travelers and reported a
high level of satisfaction among those who had used the system.
INS selected hand geometry for most of its kiosks because a person's hand biometric can
be put into a nine-character code that can be printed on any standard identity card in a
font that is compatible with the machine-readable optical standard used for passports.
INS tried one fingerprint kiosk, but fingerprint data takes more space and could not be
printed on the card, so the system had to store the data of all enrollees in a computer in
the kiosk. INS also had been reluctant to use fingerprints because of a presumed stigma
among travelers. The audit discovered, however, that 89 percent of travelers responding
to a survey had no objection to using their fingerprints. The auditors recommended
further testing of a fingerprint biometric in case the hand geometry system is not accurate
enough for nationwide implementation.
22
The auditors urged INS to consider using a "smart card," which has a computer chip that
can store much more data about the card-holder than a conventional magnetic card strip.
An INS identity card costs 40 cents; a smart card costs from $4.00 to $10.00.
INS has opened automated border crossing systems (PORTPASS) on the northern border
in Montana and in Coronach, Canada. These are remote locations that are not manned
around the clock. Here INS uses a voice recognition system to authenticate border
crossers because it is most able to withstand severe weather at these sites. To use the
system, a person lifts a phone, dials a special number on a keypad, then recites a specific
phrase. It a computer decides that the voice matches a pre-recorded version, it raises a
gate and admits the person.
On the Mexican border, INS is trying a facial biometric system to speed recognition of
daily commuters. As a vehicle drives through a special commuter lane, an electronic
device (a transponder) on the car sends information about the car to the system. The
system links the car with previously recorded information about the expected driver and
passengers who normally cross the border in the car, and the information is displayed on
a terminal for a custom's inspector, who can verify the car's occupants with a facial
recognition system. If they pass the check, they proceed across the border; if not, they are
sent to a conventional border inspection lane.
Biometrics are being used increasingly in government benefit programs for two purposes:
to secure the electronic transfer of funds to eligible recipients and to prevent "double
dipping," that is, to prevent a person from receiving multiple benefits under different
names.
23
credit cards to transfer funds to recipients through ATM machines; Minnesota law also
permits this.25 In 1995 the General Accounting Office (GAO) reviewed options for
increasing the security of EBT, focusing on the potential use of biometrics.26 GAO
concluded that "EBT alone does not effectively deter fraud in the delivery of food stamp
benefits. Thus, an EBT program without the enhanced security of biometric verification
raises a genuine concern about the potential for increased program costs and losses."
After reviewing various biometrics available, GAO reported, ". . . we believe fingerprint
verification is the biometric form that offers the greatest potential for success and
acceptance in securing EBT systems from fraud."
As of 1998 at least eight states had biometric systems for verifying eligibility of welfare
recipients; some also use them for EBT. Table 3 summarizes the state systems. Los
Angeles County started the first system in 1991 using fingerprint identification for its
550,000 welfare recipients. According to the GAO report, the county spent $9.6 million
to buy the system and had $14 million in savings between June 1991 and July 1994.
GAO also cited an evaluation of the county system by Ernst & Young showing that only
3 percent of clients had negative feelings about fingerprinting. The success of the system
led to its implementation in several other California counties, which share data on
recipients. California is moving ahead toward a statewide system.
On a smaller scale, Connecticut recently set up a statewide system that had about 150,000
welfare recipients enrolled as of February 1998.27 Their fingerprint-based system is
projected to cost $5.1 million over three years, which is about $6.64 for each person
enrolled of a prospective 200,000. The main effect of the system has been to reduce the
number of people who are registered for welfare; many previous recipients chose not to
enroll in the new system. Based on the smaller number of recipients, the state estimates
savings of $3.8 million annually for general assistance (GA) and $5.6 million or more for
AFDC. These savings do not include people who might be deterred in the future from
fraudulent applications for welfare.
24
Table 3. State programs for authentication of welfare recipients.
Notes: (1) Data as of 4/30/98. (2) Titles of benefit programs may be different after welfare reform. (3) Most
states began with a pilot or limited program before statewide implementation. (4) NY and MA may also
use systems for electronic benefits transfer. (5) Fingerprint identification systems generally use two fingers.
(6) Several other states are planning systems.
Sources: Connecticut Department of Social Services, "The U.S. human services eight state biometric tour,"
http://www.dss.state.ct.us/digital/8_states/8states.htm; and "Report to the General Assembly, DSS digital
imaging project," March 1998.
Although other states have had good experiences with their biometric welfare systems, it
is difficult to extrapolate the potential benefits to Minnesota. Welfare reform and falling
welfare rolls might reduce the potential for cost savings. Another limiting factor is that
Minnesota would not be able to exchange data with nearby states because none have
these systems. In 1995 the Minnesota Legislature stipulated that identity verification
should be added to requests for proposal on the expansion of EBT.28 As in other states, a
biometric system could offer both reduced opportunity for welfare fraud and increased
security for recipients who get their benefits electronically.
25
Most states that have biometric welfare systems began with modest pilot programs. In
1996, for example, Texas started a one-year test of a fingerprint-based welfare
identification system in San Antonio at a cost of $300,000. The pilot system had 27
workstations at 14 sites and a database of about 100,000 welfare recipients. Texas has
since decided to expand to a statewide system.
To this point we have discussed applications that are mainly governmental. These have
been the first large-scale uses of biometric technology. With the fall in prices for
biometric technology and the increasing power of personal computers (PCs) to do
biometric processing, businesses are turning to biometrics to prevent fraud in banking
and credit cards. Commercial applications of biometrics are pertinent to our study
because they are opportunities for crime prevention, and they also raise privacy concerns
that government may have to deal with.
MasterCard reported losses worldwide to fraud in 1997 that amounted to 7.7 cents for
every $100 of transactions, or a total loss of $462 million.29 The company believes that
biometrics will someday virtually eliminate fraud. To hasten that day, the company has
been testing a smart card with a fingerprint biometric, and in 1998 or 1999 will be
starting a pilot program with the card.
In Britain the Nationwide Building Society, which is the country's largest home mortgage
lender, began testing an ATM card in March 1998 that relies on the iris biometric instead
of a PIN number.30 To use the ATM, a customer puts an ATM card into the machine, and
a stereoscopic camera on the ATM machine photographs the customer's iris and checks
its pattern against the pre-recorded iris biometric associated with the cardholder located
in its main computer database or on the card itself. The trial was expected to last six
months, leading to a decision about nationwide implementation.
26
Computer security
Biometrics is developing rapidly for computer and Internet security. It can authenticate
the person signing on a computer or computer network and control access to sensitive
data over a network. Biometrics could guard government databases against snooping by
employees. Another application is to make financial transactions over the Internet more
secure. The biometric replaces passwords and PIN numbers. Law enforcement agencies,
the Department of Revenue, and other government departments that have confidential
data on networked computers may wish to consider adding biometric security. For
example, police agencies that share information on narcotics or gangs over a computer
network could limit access to this data more securely by a fingerprint than with password
control.
A variety of low-cost biometrics can be used with PCs. A small video camera can be
attached to a PC for about $100 to $300, depending on the computer's capabilities, and
some facial recognition software is under $100. Fingerprint readers for a PC are sold for
$300 or less. In 1998 Compaq began offering a fingerprint sign-on system for its PCs for
$99. Software for fingerprint authentication on a network or the Internet would be an
additional expense.
Other applications
A recent breakthrough in technology will further reduce prices and extend the range of
fingerprint verification.31 Most fingerprint scanners have a small video camera to capture
an image of the fingerprint. But fingerprint scanners will soon be available on a single
computer chip at an expected cost of $10 or less. A person will simply put their finger on
the chip itself to scan the fingerprint into the computer. Because the chip is so small and
thin, it can be mounted just about anywhere: on a computer keyboard, a doorknob, a car
ignition, or a cell phone. One firearms manufacturer is working on a gun that has a
fingerprint chip on the gun handle and a small computer inside the gun to authenticate a
27
fingerprint.32 The owner of the gun would touch the fingerprint sensor to activate the gun;
no one else could use it. The New Jersey legislature has been debating a bill that would
mandate a "child proof gun," which might use this technology.
Public acceptance
Most of today's biometric applications are restricted to small segments of the population.
Although biometrics have been well accepted in these cases, it is an open question as to
how the general public would react to biometrics in everyday life. Banks and credit card
companies are moving cautiously ahead with pilot studies to test public acceptance.
A national opinion survey of public attitudes on the use of fingerprints for personal
identification was done in 1996.33 The survey asked people about their personal
experience with fingerprinting, their awareness of identity fraud, their willingness to use
their fingerprint for identification, and the information policies they deemed important to
protect their privacy. The results showed that:
Over 75 percent approved the use of a fingerprint for check cashing or credit card
verification.
83 percent did not agree with the statement that ". . . finger imaging treats people
like presumed criminals."
28
Legality and Privacy
Federal and state governments have used fingerprints to identify people for many years,
both in criminal cases and for civil purposes, such as drivers' licenses and criminal
background checks prior to employment or licensing. These purposes have consistently
withstood legal challenge. 34 Similarly, government can require photographs for
identification. Courts have not extended any constitutionally based privacy right to
people who are required to prove their identity with a fingerprint, although government
may have to show that it has a reasonable public purpose for taking a fingerprint. New
biometrics, as for the iris or hand geometry, have not been tested in court, but many
authorities believe that fingerprints have set a precedent.
Privacy issues emerge when a government agency does something with a person's
fingerprint that goes beyond the original purpose for its collection. California requires a
fingerprint for a driver's license. The California Supreme Court approved taking
fingerprints but ruled that indiscriminate dissemination of fingerprint records by the state
violated individual privacy rights.35
States that require fingerprints of welfare recipients have put different restrictions on
access to the fingerprint data.36 New York prohibits any use of fingerprint data beyond
the prevention of multiple enrollment; it cannot be used in a civil or criminal
investigation. Connecticut limits the use of fingerprint records to the welfare system and
to prosecution of welfare fraud. Pennsylvania, however, permits access to fingerprints by
the Pennsylvania State Police, the Board of Probate and Parole, and local law
enforcement authorities to find people who are wanted by the police on outstanding
warrants.37
People have much less protection of their biometrics in the private sector than in
government. Privacy in this context can be defined as the ability to maintain control over
29
the uses and dissemination of one's personal information.38 The greatest threat to privacy
is that companies might use people's biometrics to link up information on them, creating
a fairly detailed picture of a person's life, or get access to information without their
knowledge or consent. Courts have ruled that if people voluntarily turn over information
about themselves to others they generally should have no legal expectation of privacy.39
At the same time, however, biometric identification offers substantial protection against
stolen identities.
Facial recognition, especially when combined with public video surveillance, is a special
problem because people might not be aware that they have been identified by a remote
camera. This could be done via a live camera or by scanning video tapes. Indeed, people
out in public can be photographed or come under video surveillance without it being a
violation of their legal rights to privacy.
A parliamentary committee of the Canadian House of Commons that studied public video
surveillance raised many concerns about its relation to privacy.40 Some of the committee's
questions were: To what extent should video surveillance be done live versus taped?
Once a tape is made, who is the owner and who is entitled access? How should the
balancing of privacy rights with the benefits of new technologies be tackled in the area of
video surveillance? How should government handle the commercialization of personal
information derived from video surveillance? And so on.
Governments around the world are actively working on guidelines and laws for the
privacy of biometric information. The provincial Information and Privacy Commissioner
of Ontario, Canada has been a leader. The office proposed a series of safeguards for
fingerprint identification records of the Ontario government in social assistance
programs.41 Recommended safeguards include:
30
Encrypting the biometric, making it impossible for anyone to use it without
authorization.
Ensuring that the encrypted finger scan cannot be used to identify an individual in
the manner that a fingerprint can.
In October 1998, the European Union put into effect a strong law restricting private-
sector use of personal information.43 The purpose is to bar companies from using
information about their customers in ways the customers never intended. The law bans
practices that are common in the U.S., such as selling information about customers for
marketing purposes. The law covers a wide range of information that companies collect
on customers, employees, and hospital patients, among others. It extends privacy
protections to information collected through credit cards, telephone records, magazine
subscriptions, and Internet usage. It includes the collection, recording, storage,
transmission, and erasure of personal data.
This law has the potential to disrupt electronic commerce between America and Europe
because no country in Europe will be allowed to transmit personal data to any country
that does not have comparable privacy protections. In contrast to Europe, the American
government has proposed that companies police themselves under self-regulatory
organizations. Negotiations between the U.S. and Europe are continuing on how to
resolve these very different philosophies on data privacy.
31
A clash of views on privacy and biometrics erupted in California in 1998 when the
California Senate debated a bill to limit private-sector use of biometrics.44 As introduced,
the bill would have prevented any person, business, or institution (including government)
from selling, transmitting, exchanging, or otherwise providing biometric identifiers to
third parties, with certain exceptions for law enforcement and welfare agencies.
Furthermore, biometrics and DNA data could not be used to discriminate against anyone.
The bill was amended in committee, however, to ban any requirement for a person's
biometric in the identification of persons cashing a check, or opening an account at a
financial institution. Financial institutions opposed the amended bill because they use
biometrics to verify non-customer payees, and because it would preclude facial scanning
in automated check cashing services.
Our review of the characteristics of biometrics systems and their applications leads to
these conclusions:
Technology on the market now can successfully identify and authenticate people with a
high degree of accuracy. If an application involves hundreds of thousands of people or
more, however, fingerprints are still the best choice. Minnesota has 20 years of successful
experience with automated fingerprint identification. Iris-based systems may equal or
exceed fingerprints in accuracy, but the limited number of vendors and lack of precedent
for iris recognition make them less attractive. Hand geometry systems have proved
themselves in physical access control, as in prisons, where high levels of accuracy and
security are required. Voice recognition is least accurate but might be the best alternative
when identity must be verified over a phone. Facial recognition systems create
opportunities to identify people unobtrusively and without their cooperation, as in video
32
surveillance, and they can be added to digital photo systems used for mugshots or drivers'
licenses.
Biometric systems have proved their cost-effectiveness in state welfare systems and
border control. In general, the cost of a biometric system is less than the on-going cost of
hiring a person to do the same type of activity, such as building access control. Table 4
compares the typical costs of biometric applications. In criminal identification, biometric
technology can save investigators many hours of work and solve crimes that might not be
solved by traditional police practices.
Application Cost
Single, stand-alone authentication system, $100- $3,000 for most biometrics
PC system, or network terminal $6,000 for iris-based system
Police car mobile fingerprint scanner $2,500 to $4,000
Single kiosk for authentication $50,000
Live scanning fingerprint terminal $55,000
Prison or building access control $10,000 for single terminal to $100,000 for
network of multiple terminals (hand
geometry or fingerprint readers); $500,000
for network of retinal readers.
Large kiosk network for probationers to $900,000
check in
Facial recognition and photo identification $1.4 million
system for prison system, multiple sites
State welfare identification $300,000 for a test site
$5 - $10 million for a large system
33
Current applications and a national opinion survey show that people are usually willing to
use their fingerprints and hands to identify themselves. Public acceptance of biometrics
for banking and credit cards, however, is still being tested.
Not only are different biometrics incompatible, most vendors have unique, proprietary
technology in their products even if they use the same biometric. Government agencies
may find advantages in adopting compatible systems, but compatibility also makes it
possible to share data on people across systems, which might infringe on people's
privacy.
Buyers need to make their own assessment about the accuracy and reliability of biometric
systems and not rely totally on claims of manufacturers. A system that works well for a
small number of people may not be satisfactory if thousands of people need to be
enrolled in the system. A system must be tested for its ability to reject counterfeit
biometrics. Human factors in a real-life setting can also have a great impact on the
viability of this technology. Most biometric systems need the cooperation of users. If a
system produces too many false rejections, or is difficult to use, it will not be successful.
Some people may have problems with their biometric being read; they must be
34
accommodated. For example, welfare recipients cannot be denied benefits because a
machine did not read their biometric correctly. Environmental conditions can also affect
the working of a biometric system.
Except for criminal identification, most uses of biometrics call for a person's biometric to
be put on an identification card. If a person's biometric is not put on a card, the system
must be able to retrieve the person's pre-recorded biometric from a central computer
database. Typically, cards use magnetic strips to hold data, but "smart cards" that have a
built-in computer chip may be a better option for a modest increase in cost. They can
hold more biometric data, as well as digitized photos and other useful information, and
they can be updated easily. Other types of cards are also coming on the market that
provide more security for the data. A study of biometrics for the European Commission
recommended that for the greatest security and to enhance individual privacy, cards
should be used to store biometrics whenever possible, rather than putting the biometric in
a central computer database.45
People are generally willing to use a biometric for identification, but many are concerned
about what might happen to data that is collected about them. Biometrics increase the
potential for abuse of personal privacy by making it easier for governments and
businesses to gather and connect information about a person. Video surveillance and face
recognition are particular concerns, because people may not be aware of being on
camera. States that use a biometric to verify recipients of government benefits have legal
safeguards against improper use, but existing laws put few other restrictions on the
collection or use of biometrics by governments or the private sector. While Canada and
Europe have been strengthening privacy rights in law, the U.S. has taken the path of self-
regulation by private organizations. The potential of biometric technology to protect
35
identities, solve crimes, safeguard computer databases and networks, and deter fraud will
not be realized, however, if people's privacy is compromised.
36
37
1
NOTES
Richard Wildes, "Iris recognition: An emerging biometric technology," Proceedings of the IEEE, 85 (September 1997):
1348-1363. Wiles states (p. 1349) that ". . . large-scale studies that specifically address the distinctiveness and stability of
the iris, especially as a biometric, have yet to be performed."
2
John Daugman, "The scientific basis for iris recognition — Recognizing persons by their iris pattern," IriScan Corp.,
http://www.iriscan.com/basis.htm
3
Juan Velasco, "Teaching the computer to recognize a friendly face," New York Times, October 15, 1998, p. D7.
4
"Report D 7.1 - CAVE SV Result and analysis of fieldtests in banking applications," http://www.ptt-
telecom.nl/cave/download.html. Research on speaker verification (SV) technology has been heavily supported by the
European Union and Swiss government as part of the CAVE (CAller VErification in Banking and Telecommunications)
and PICASSO projects.
5
Despina Polemi, "Final Report — Biometric techniques: Review and evaluation of biometric techniques for identification
and authentication, including an appraisal of the areas where they are most applicable," European Commission, April 1997:
17; http://www.cordis.lu/infosec/src/stud5fr.htm.
6
Polemi: 9.
7
A good source of information and links on all types of biometric systems is the Biometric Consortium,
http://www.biometrics.org/. See also the new book edited by Anil Jain, Ruud Bolle, and Sharath Pankanti, Biometrics,
Personal Indentification in Networked Society, Boston: Kluwer, 1999.
8
Stephen Coleman, "Minnesota's automated latent fingerprint identification system." Proceedings of the Fourth
International SEARCH Symposium, Washington, D.C., 1979.
9
"Los Angeles Sheriff's Department installs facial recognition software," press release from Viisage Technology, Inc.,
http://www.viisage.com.
10
"Candid camera for criminals," BBC News, Tuesday, October 13, 1998 at 18:48 GMT. See
http://news.bbc.co.uk/hi/english/uk/ ; and Robert Matthews, "Security camera can find a face in crowds," Electronic
Telegraph, UK News, Sunday, 6 July 1997; http://www.telegraph.co.uk:80/.
11
"West Virginia becomes first state to issue driver's licenses using facial recognition technology," press release from
Polaroid, Corp., March 24, 1998; http://digitalimage.polaroid.com/polinfo/press-releases/march98/032598a.html.
12
"Viisage technology, Inc. to implement facial recognition system for Illinois Secretary of State," press release, February
26, 1998; http://www.viisage.com/illfr.htm.
13
San Jose State University, "The Federal Highway Administration conducting biometrics standards development study,"
June 1997, http://www.engr.sjsu.edu/biometrics/fhwa.html.
14
General Accounting Office, "Electronic benefits transfer: Use of biometrics to deter fraud in the nationwide EBT
program," September 1995 (GAO/OSI-95-20).
15
GAO report.
16
Keith W. Strandgerg, "Biometric ID," Corrections Forum, 1997, http:www.prisons.com/cforum/id.html.
17
"Sarasota County detention center adopts IriScan's iris recognition technology," press release from IriScan, Inc.,
http://www.iriscan.com/sarasota.htm.
18
"Wisconsin department of corrections chooses Viisage," press release from Viisage Technology, Inc., November 18,
1998.
19
"New York City awards $925,000 contract to Pacer Infotek for electronic probation management systems," press release,
March 5, 1997; http://www.corrections.com/products/news/crad.htm.
20
"Kiosk check-in for probationers," Government Technology, May 1995, http://www.govtech.net/.
21
Laws 1993, Ch. 146, Art. 2, Sec. 28, Subd. 1. An evaluation report was also required by July 1, 1994.
22
"VoiceTrack," http://www.voicetrack.com/
23
U.S. Department of Transportation, "Volpe engineers use biometrics to help ease border crush," Volpe Transportation
Journal, Spring 1997; http://web1.volpe.dot.gov/pubs/journal/spring97/biomet.html.
24
U.S. Department of Justice, "Immigration and naturalization service passenger accelerated service system pilot program,"
Office of the Inspector General, Audit Division, Audit report 95-8 (March 1995);
http://www.usdoj.gov/oig/inspass1/inspass1.htm.
25
M.S. 256J.39, 256D.09, 256D.47.
26
GAO report.
27
Connecticut Department of Social Services, "Report to the General Assembly, DSS digital imaging project — An
overview of the DSS digital imaging project implementation and first year results," March 1998.
28
M.S. 256.9850.
29
"MasterCard wins another round against fraud," press release from MasterCard, May 11, 1998,
http://www.mastercard.com/.
30
"World's first PIN-less ATM hits Britain's High Street today," press release from NCR, April 23, 1998,
http://www3.ncr.com/.
31
Miquel Helft, "Digital fingerprints: A key of the future," Wired News, September 30, 1998; http://www.wired.com/.
32
David Kocieniewski, "Trenton debates requiring guns only owner can fire," New York Times, September 24, 1998.
33
Alan F. Westin, "Public attitudes toward the use of finger imaging technology for personal identification in commercial
and government programs," National Registry, Inc., August 1996.
34
John D. Woodward, "Biometric scanning, law & policy: Identifying the concerns — Drafting the biometric blueprint,"
University of Pittsburgh Law Review, 59 U. Pitt. L. Rev., Fall 1997. The Supreme Court has also ruled in United States v.
Dionisio (93 S. Ct. 764) that a grand jury witness can be compelled to furnish a voice exemplar, as it does not violate the
Fifth Amendment privilege against self-incrimination, and further that a voice exemplar is not protected by the Fourth
Amendment prohibition against "unreasonable searches" because the voice is a physical characteristic constantly exposed to
the public. In yet another important case, Whalen v. Roe (97 S. Ct. 869), the Supreme Court ruled that a state could collect
the identities of medical patients who got prescriptions for certain drugs: The patient identification requirement was the
product of rational legislative action and was a reasonable exercise of state police powers; it did not impair any privacy
interest protected by the Constitution.
35
Perkey v. Department of Motor Vehicles, 42 Cal. 3d 185 (1986).
36
Ann Cavoukian, "Privacy and biometrics: An oxymoron or time to take a 2nd look?" Office of the Information and Privacy
Commissioner, Ontario, Canada; http://www.ipc.on.ca/web_site.eng/matters/sum_pap/papers/cfp98.htm.
37
Woodward; Pennsylvania Act of June 30, 1995, ch. 71, 1995 Pa. Laws 20.
38
Cavoukian.
39
Smith v. Maryland, 99 S. Ct. 2577 (1979).
40
The Honorable Sheila Finestone, Chair, "Privacy: Where do we draw the line?" Report of the House of Commons
Standing Committee on Human Rights and the Status of Persons with Disabilities, April 1997.
http://www.parl.gc.ca/committees352/huso/reports/.
41
Cavoukian.
42
Statutes of Ontario, Bill 142, Chapter 25, 1997.
43
Edmund L. Andrews, "European law aims to protect privacy of data," New York Times, October 26, 1998, p.1. Fiona M.
Carlin, "EU to install data privacy standards," National Law Journal, October 27, 1997.
44
California Senate, SB 1622 (Peace), as amended July 6, 1998.
45
Polemi: 36.