{"id":734,"date":"2007-04-01T10:52:05","date_gmt":"2007-04-01T18:52:05","guid":{"rendered":"\/?p=734"},"modified":"2007-04-01T12:54:27","modified_gmt":"2007-04-01T20:54:27","slug":"a-sweep-of-their-tiny-fingers","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=734","title":{"rendered":"A sweep of their tiny fingers"},"content":{"rendered":"<p>My research into the state of child fingerprinting has led me to <a href=\"\/wp-content\/images\/2007\/03\/fingerscan.mpeg\"><strong>this extreme video<\/strong><\/a>&nbsp;&#8211; you will want to download it.&nbsp; Then let&#39;s look further at the technical issues behind fingerprinting.<\/p>\n<p>Here is a diagram showing how &#8220;templates&#8221; are created from biometric information in conventional fingerprint systems.&nbsp; It shows the level of informed discourse that is&nbsp;emerging on activist sites such as <a href=\"http:\/\/www.leavethemkidsalone.com\">LeaveThemKidsAlone.com<\/a>&nbsp;&#8211; dedicated to explaining and opposing child fingerprinting in Britain.<\/p>\n<p><img src=\"\/wp-content\/images\/2007\/03\/fingerprint-template.jpg\" \/><\/p>\n<p>Except in the most invasive systems, the fingerprint is not stored &#8211; rather, a &#8220;function&#8221; of the fingerprint is used.&nbsp; The function is normally &#8220;one-way&#8221;, meaning you can&nbsp;create the template from the fingerprint by using the correct algorithm, but cannot reconstitute the fingerprint from the template.<\/p>\n<p>The template is associated with some real-world individual (Criminal?&nbsp; Student?) During matching, the fingerprint reader again applies the&nbsp;one-way function to the fingerprint image, and produces a blob of data that&nbsp;matches the template &#8211; within some tolerance.&nbsp; Because of the tolerance issue, in most systems the template&nbsp;doesn&#39;t behave like a &#8220;key&#8221; that can simply be looked up in a table.&nbsp;&nbsp;&nbsp;Instead, the matching software is run against a series of templates and calculations are performed in search of a match.<\/p>\n<p>If the&nbsp;raw&nbsp;image of the fingerprint were stored rather than a template, and someone were to&nbsp;gain access to the database, the raw image could be harnessed to create a &#8220;gummy bear&#8221; finger&nbsp;that could&nbsp;potentially leave fake prints&nbsp;at the scene of a crime &#8211; or be applied to fingerprint sensors.<\/p>\n<p>Further, authorities&nbsp;with access to the data&nbsp;could also apply new algorithms to the image, and thus locate matches against emerging template systems not in use at the time the database was created.&nbsp; For both these reasons, it is&nbsp;considered safer to store&nbsp;a template than the actual biometric data.<\/p>\n<p>But by applying the algorithm, matching&nbsp;of a print to a person remains&nbsp;possible as long as the data is present and the algorithm is known.&nbsp; With the negligible cost of storage, this could clearly extend throughout the whole lifetime of a child.&nbsp; LeaveThemKidsAlone quotes Brian Drury, an IT security consultant who makes a&nbsp;nice point about the potential tyranny of the algorithm:<\/p>\n<blockquote><p>If a child has never touched a fingerprint scanner, there is zero probability of being incorrectly investigated for a crime. Once a child has touched a scanner they will be at the mercy of the matching algorithm for the rest of their lives.&#8221; (12th March 2007 &#8211; <a href=\"http:\/\/www.leavethemkidsalone.com\/backdoor.htm\">read more from Brian Drury<\/a>)<\/p><\/blockquote>\n<p>So it is disturbing to read <a href=\"http:\/\/www.tmcnet.com\/biomag\/articles\/5952-honest-truth-biometrics-schools.htm\" class=\"broken_link\">statements like the following <\/a>by&nbsp;Mitch Johns, President and Founder of <a href=\"http:\/\/www.foodserve.com\/vidiframe.htm\" class=\"broken_link\">Food Service Solutions<\/a> &#8211; whose company&nbsp;sells the system featured in the <a href=\"http:\/\/www.foodserve.com\/Fingerscan%20Solution.mpg\" class=\"broken_link\">full Fox news video<\/a> referenced above:<\/p>\n<blockquote><p>When school lunch biometric systems like FSS\u00e2\u20ac\u2122s are numerically-based and discard the actual fingerprint image, they cannot be used for any purpose other than recognizing a student within a registered group of students. Since there\u00e2\u20ac\u2122s no stored fingerprint image, the data is useless to law enforcement, which requires actual fingerprint images.<\/p><\/blockquote>\n<p>Mitch, this just isn&#39;t true.&nbsp; I hope your statement is the product of not having thought through the potential uses that could be made of templates.&nbsp;&nbsp;I can understand the mistake&nbsp;&#8211; as technologists, evil usages often don&#39;t occur to us.&nbsp;&nbsp; But I hope you&#39;ll start explaining what the risks really are.&nbsp;&nbsp;Or, better still,&nbsp;consider replacing this product with other based on more mature technology and exposing children and schools to&nbsp;less long term&nbsp;danger and&nbsp;liability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;As they munch their sloppy joes, these five and six year olds are happily ushering in the age of biometrics with a sweep of their tiny fingers&#8230;&#8221;  Fox News<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[21,6,17,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/734"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=734"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/734\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}