Aardvark Daily aardvark (ard'-vark) a controversial animal with a long probing nose used for sniffing out the facts and stimulating thought and discussion.

NZ's leading source of Net-Industry news and commentary since 1995
PAYBACK TIME! | WebStats | XML feed | Contact | New Sites | Archives | Forums | About
Note: This column represents the opinions of the writer and as such, is not purported as fact
Are biometrics a threat to security? 21 October 2004 Edition
Previous Edition | Archives

Please visit the sponsor!
Sponsor's Message
Biometrics are the key to bullet-proof identity verification -- or so we're told.

The US government tells us this, and is demanding that future passports contain computer-readable biometric information, so the rest of the world falls into line and prepares to update their travel documents accordingly.

Closer to home, the police already make significant use of fingerprints in their investigations and as the cornerstone of many legal cases.

But are we being fed a line?

Could it be that biometrics actually make it easier for clever, technically competent people to engage in identity theft?

Let's look at fingerprints for example...

There are already a growing number of security access-control systems that use a print-pad to authenticate identity. To gain access to restricted areas or information, a finger must be placed on the pad and the person's print is compared with one stored on computer record. Only if they match is access granted.

In the movies we see that this type of biometric access can easily be circumvented by simply cutting off the finger of the print's rightful owner and presenting the severed digit when requested.

In real life, the a much simpler and far less gruesome technique can be used, apparently with a high degree of success.

Can you imagine the potential security problems if a large database of fingerprint data were to be stolen by hackers who might then sell them to terrorists or other groups?

Now have your say
Got something to say about today's column, or want to see what others think?  Visit The Forums

While you're here, why not visit the Aardvark Hall of Shame and perhaps make your own nomination.

Using easily written software and something as simple as a modified ink-jet printer, it would then become a relatively trivial job to produce overlays that would become an exact match for any of those prints. Those overlays could then be used to circumvent any print-based biometric protection if it were being used.

I dare say that the production of an device, perhaps even a suitably printed contact lens, that mimicked retinal patterns could also be produced to match any data stolen from a database of that information as well.

And, as this report shows, there will always be opportunities for hackers to breach the security of supposedly secure databases, just as there are always new Windows security flaws to be discovered.

So, given the ease with which we can now produce artificial fingerprints, retinal-pattern simulators and other faux-body parts, we must consider whether biometric ID systems are actually going to open up gaping new security holes?

When you or I wander up to the immigration counter while visiting a foreign country, the person at the desk carefully compares the photo in our passport with the face we present. If there's too much difference, chances are we'll be taken to one side for questioning and further attempts to verify our ID.

But what happens when we begin to use biometrics?

I bet you any money you like that 99% of those immigration officers will simply defer to the biometric scan rather than closely scrutinise your picture and face.

Even if the person presenting the passport isn't a close match with the picture in their passport, passing the biometric check (possibly using a thin silicone veneer slipped over a finger or a carefully crafted contact lens) will probably be good enough.

Time and time again we've seen people rely too heavily on technology with disastrous results -- could we be headed down the same track with biometrics?

And what do you do when a huge biometric database is stolen?

Unlike credit-cards, you can't simply cancel the data and re-issue new numbers -- biometric information is, by its very nature, unchangeable and bound to an individual for life.

How would you feel if you found out that your fingerprints, face-scans and retinal patterns had fallen into terrorist hands?

Will biometrics give the terrorists an unmatched ability to assume the identity of almost anyone for whom they have the necessary biometric information?

Could you find yourself locked up for a very long time, without charge and with virtually no rights (like Ahmed Zaoui) simply because your prints and/or retinal scan supposedly link you to the scene of a terror attack?

Have your say on today's column

Yes, You Can Gift Money
I've published this website for the past nine years as a service to the local internet and IT industry and during all that time it has been 100% free to access. It is my intention to ensure that it remains completely free and free of charge and contains only the most sparse levels of advertising. Aardvark is not a business, it is a free resource.

If you feel that this is a good thing and/or you hold a "geniune affection" for yours truly -- then you are welcome to gift me some money using the buttons provided. In gifting this money you accept that no goods, service or other consideration is offered, provided, accepted or anticipated in return. Just click on the button to gift whatever you can afford. NOTE: PayPal bills in US dollars so don't accidentally gift more than what you were intending :-)

Contacting Aardvark
The Best of Aardvark Daily I'm always happy to hear from readers, whether they're delivering brickbats, bouquets or news tip-offs. If you'd like to contact me directly, please this form. If you're happy for me to republish your comments then please be sure and select For Publication.

Other media organisations seeking more information or republication rights are also invited to contact me.


Add Aardvark To Your Own Website!
Got a moment? Want a little extra fresh content for your own website or page?

Just add a couple of lines of JavaScript to your pages and you can get a free summary of Aardvark's daily commentary -- automatically updated each and every week-day.

Aardvark also makes a summary of this daily column available via XML using the RSS format. More details can be found here.

Contact me if you decide to use either of these feeds and have any problems.

Linking Policy
Want to link to this site? Check out Aardvark's Linking Policy.

Did you tell someone else about Aardvark today? If not then do it now!


Latest
Security Alerts
Flaw found in older Office versions (CNet - 8/10/2004)

Viral movies possible with RealPlayer flaw (ZDNet - 5/10/2004)

Symantec Holes Open Up Firewalls to Attacks
(eWeek - 23/09/2004)

WinZip Zaps Buffer Overflow Flaws (iNetNews - 2/09/2004)

Latest
Virus Alerts
Latest Netsky variant spreading fast (Vnunet - 18/10/2004)

Portuguese Netsky rates a medium risk (CNet - 14/10/2004)

Trojan pretends to do good (CNet - 1/10/2004)

New Worm Installs Network Traffic Sniffer (NetCraft - 13/09/2004)

Bookmark This Page Now!

 

OTHER GREAT TECH SITES
GeekZone (NZL)
SlashDot (USA)

 

MORE NEWS
NZL Sites
IDG.Net.nz
NZ Netguide
NZ Herald Tech
PC World NZ
Scoop
WordWorx

AUS Sites
ZDNet
The Age
Australian IT
AUS Netguide
NineMSN Tech
IT News

USA Sites
Wired.com
CNet
CNNfn Tech
TechWeb
Yahoo Tech
ZDNet Tech
USA Today Tech
7am.com SciTech

UK Sites
The Register
BBC SciTech

 

My Jet Engines
Check Out Me And My Jet Engines

Today's Top News Stories


Open in New Window = open in new window
New Zealand

Open in New Window Biometrics: privacy concerns over scope creep
Privacy Commissioner sees risk of fear, privacy invasion and identity theft, but wants to avoid regulation...
IDG

Open in New Window Aria Farm says hackers' product recall message was 'sabotage'
A Waikato food company, Aria Farm, faces potential ruin following industrial sabotage, says director Erik Arndt...
NZ Herald

Other

Open in New Window IE Exploit Lets Attackers Plant Programs on SP2
A security researcher has discovered a new exploit for Microsoft Corp.'s Windows XP Service Pack 2 that allows programs to be planted and executed on fully-patched systems...
eWeek

Open in New Window Sophos corrects 'theoretical' flaw
Security software maker updates antivirus engine to plug hole that lets virus writers manipulate compressed files and avoid detection...
CNet

Open in New Window Users face new phishing threats
Cyber criminals could soon be mounting sophisticated phishing attacks that are hard to detect warn experts...
BBC

Open in New Window Ballmer: We need a $100 PC
The Microsoft CEO says one way to stem growing piracy of Windows and Office in emerging markets is to offer low-cost computers...
CNet

Open in New Window When Robots Rule the World
Well, not the world maybe, but possibly your lawns and kitchens. The use of robots -- especially as domestic help -- is expected to increase sevenfold by 2007, according to the United Nations...
Wired

Australia

Open in New Window Vodafone rolls out virtual staff
Vodafone has introduced its latest voice recognition software and created its persona to match its pre-paid customers' stereotype ideal. 'Her' name is Lara, a 28-year-old brunette with a penchant for popular music. And naturally, she is single. Very single...
Computerworld

Open in New Window Aust journo saved by a Google search
The Australian journalist kidnapped by Iraqi militants, John Martinkus, never thought that the search engine Google would one day save his life...
ZDNet

Open in New Window Telstra mobile, IP revenue soar
TELSTRA today announced first quarter sales revenue had risen by 6.9 per cent to $5.381 billion compared to the previous corresponding quarter...
Australian IT

Other

Open in New Window Study shows Google on revenue fast track
A day before reporting earnings, the search company finds itself atop a ranking of the fastest-growing tech businesses...
CNet

Open in New Window Miniature jet engines could power cellphones
The silicon-based microengines, now one step closer, could replace standard batteries and may revolutionise mobile electronics...
New Scientist

Open in New Window Hacker hits UC-Berkeley computer
A computer hacker accessed names and Social Security numbers of about 1.4 million Californians after breaking into a University of California, Berkeley, computer system...
MSNBC

Open in New Window Freebies prove profitable for software companies
Kimball Diamond, a construction manager, often works thousands of miles from his office in California. So he did not mind paying $19.95 a month....
Boston Globe


Looking For More News or Information?

Google
Search WWW Search Aardvark

Privacy Policy | Copyright © 2003, Bruce Simpson, republication rights available on request

jet engine page