Top Banner
NOTHING TO HIDE NOTHING TO HIDE BIOMETRICS, IDENTITY AND PRIVACY EMILIO MORDINI, M.D. DIRECTOR OF THE CENTRE FOR SCIENCE, SOCIETY AND CITIZENSHIP- ROME (IT)
54

NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Jan 05, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

NOTHING TO HIDENOTHING TO HIDEBIOMETRICS, IDENTITY AND PRIVACY

EMILIO MORDINI, M.D.

DIRECTOR OF THE CENTRE FOR SCIENCE, SOCIETY AND CITIZENSHIP- ROME (IT)

Page 2: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

NOTHING TO HIDE

Acknowledgements: This work has been funded by a grant from the European Commission - DG Research – Contract 2008- 217762 HIDE (HOMELAND SECURITY, BIOMETRICS AND PERSONAL IDENTIFICATION ETHICS)BIOMETRICS AND PERSONAL IDENTIFICATION ETHICS).

Page 3: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

A Clinical CaseA Clinical Case

A h l t h h b As a psychoanalyst who has been working since early 1990s on ethical, political and social implications of emerging technologies I have often emerging technologies, I have often found helpful to use materials coming from my clinical practice to unravel certain aspects remained relatively certain aspects remained relatively underexplored by theoretical research and by standard empirical studies.

Of course clinical observations can hardly “prove” any argument, there is no escape from strong elements of is no escape from strong elements of subjectivity in psychoanalytic reports but there is also a core of hard facts to work with.

Page 4: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Kristine 1 Kristine 1

S K i ti l d ff i Some years ago Kristine, a young lady suffering from anorexia, came to my observation. She was a tiny, pale, girl , with slender legs, slim hips small waist who looked no older than hips, small waist, who looked no older than fifteen although she was almost twenty six.

She lived at home with her parents and her life was completely invaded by a complex was completely invaded by a complex system of psychopathological symptoms, included the typical starvation-induced physical and psychological signsphysical and psychological signs.

In addition Kritine reported to suffer from the unpleasant sensation that people around her were not able to recognize her that she was were not able to recognize her, that she was an “anonymous” person “lost in the crowd”.

Page 5: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Kristine 2Kristine 2

She claimed that she wo ld ha e been happ to She claimed that she would have been happy to eat only she did not feel sick.

Kristine was continuously fighting against unpleasant thoughts which prevented her unpleasant thoughts which prevented her eating, if she ate she felt immediately obliged to vomit by a violent revulsion of the stomach. She could eat only when she succeeded in blocking her thoughts.

When I asked her what kind of thoughts she felt unpleasant, she easily admitted that she was

f i h h i h l referring to thoughts with some sexual content. Kristine has never had a boy friend and her sexual experience was very limited, yet I discovered that she had no difficulty in yet I discovered that she had no difficulty in being totally explicit when she speaks of sexual matters.

Page 6: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Kristine 3Kristine 3

After some months of treatment Kristine told After some months of treatment, Kristine told me a bizarre story. She was around seven when she started having the odd impression that her parents were able to p pread her mind and to see her feelings. Such a conviction developed little by little.

At the beginning, when she started to suspect that her parents could understand her thoughts, she experienced a very pleasant and relaxing state because she pleasant and relaxing state because she felt that her wants could be always anticipated and met, and she was freed forever by the need to ask. But as time goes by, this experience became increasingly painful

Page 7: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Kristine 4Kristine 4

Kristine was slowl per aded b a mo nting Kristine was slowly pervaded by a mounting sensation of restlessness and anxiety thinking that her thoughts were somehow public. She did not want that her parents p pdiscovered such an uneasiness, she didn’t want that they worried about her, but what could she do? They could read her mind! mind!

Kristine therefore decided to ban any mental content when she was in the same room with her parents From that moment on all with her parents. From that moment on, all her efforts were focused on reaching a perfect mental emptiness. Like a child Zen master, the little Kristine developed a number of meditation techniques, which were totally private because no one ever suspected her uncanny and secret exercise exercise.

Page 8: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Kristine 5Kristine 5

With adolescence Kristine apparentl With adolescence Kristine apparently recovered from her delusive belief and she felt free to think again also in the face of her parents. But when she pwas around twenty she started suffering from “unpleasant thoughts”, which prevent her to eat, and her “anorexia” began anorexia began.

Any stupid psychoanalyst could realize that Kristine had turned her infantile fight against “public” thoughts into a fight against public thoughts into a fight against eating and that child mental emptiness has become a model for adult body emptiness. But the reason why Kristine was so afraid by her thoughts was still in the dark.

Page 9: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Kristine 6Kristine 6

P h l t b i l Psychoanalysts are obvious people and they always think of sexual fantasies or traumas but Kristine did not suffer from any sexual did not suffer from any sexual assault or seduction, and her child fantasies were the same of thousands of children. thousands of children.

Also the other card usually plaid by my colleagues – aggressive fantasies – led to nothing Kristine fantasies led to nothing. Kristine stubbornly repeated that there was no reason why she should fear that her parents understand fear that her parents understand her thoughts because she had nothing to hide.

Page 10: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Kristine 7Kristine 7

It t k l ti b f I It took a long time before I understood that she was literally right, the problem was indeed the she had nothing to hide not only she had nothing to hide, not only in a more obvious Freudian sense (she had no penis to hide) but in a deeper sense. Kristine was deeper sense. Kristine was suffering from a constitutive deficiency of her private sphere.

She was truly transparent and her She was truly transparent and her child effort to create mental emptiness was paradoxically her last resort to have something to last resort to have something to hide.

In a pun, she was desperately hiding that she had nothing to hide that she had nothing to hide.

Page 11: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

We need something to hideWe need something to hide

In order todevelop asautonomousautonomoussubjects, weneedsomething tohide say wehide, say, weneed to realisethat we are the master of ourmentalprocesses and that they can or cannot beor cannot becommunicatedexternally.

Page 12: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

The inner spaceThe inner space

The basic h man e perience that The basic human experience that generates the notion of a private realm is likely to be the experience that our mental life is pnot immediately understood by the others.

Metaphors which describe the mind as a inner space, like a container or a box or a room, are ubiquitous and pervasive.

A di h h According to these metaphors we have an “inside”, which includes all our mental contents, distinct from an “outside”, which include from an outside , which include the whole external world, other humans included.

Page 13: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

DependenceDependence

Humans are inherently social creatures they Humans are inherently social creatures, they live together with other humans and they develop in a social environment as all other primates.

Since infanthood - with the basic experience of being plunged into a linguistic network without being able of speaking - human beings face the acute p g gawareness of their dependence on other human beings.

Such a dependence is destined to last quite l ti b d th t d d a long time beyond the standard

mother-newborn dependence in other species. Anthropologists call neoteny the tendency of mammalians to remain d d h i di id l d dependant to other individuals and to exhibit juvenile characteristics. Human beings present a higher level of neoteny.

Page 14: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

AutonomyAutonomy

This is probably humans’ greatest resource, yet it is also an important reason for tension conflict and stresstension, conflict and stress.

Dependence in the sense of having one’s wants correctly anticipated and met may be a pleasant state for a short may be a pleasant state for a short period of life. But sooner or later frustrations and obligations entailed by dependence become too burdensome.

Humans develop awareness of the conflict between their dependence needs and the individual nature of their personal d i hi h i t i d desires, which require a certain degree of liberty and autonomy to be fulfilled.

Page 15: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

The birth of the private sphereThe birth of the private sphere

The unpleasant discovery that our want can be misunderstood or frustrated has a positive side as well. We realize that our thoughts are “private”, they cannot be immediately get by others if we don’t shape and articulate them into an intelligible, shared, scheme. These schemes are usually called a “language” (bodily, verbal, visual, g g ( y, , ,musical, artistic, etc.).Any language is then made up by a whole of symbols (say tokens which link whole of symbols (say, tokens which link the mental content to an externally defined object, fact, act, event, etc.).

Page 16: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Privacy and languages …are but the two sides of the same coin. We discoverthe private sphere when we discover that we can

t l th fl f i f ti th t t control the flow of information that we generate, say, that we may control our languages and that we can “hide” something in our mind.

Page 17: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Human LanguagesHuman Languages

Some languages are highly structured and formalized

h th j t schemes, others are just elementary and fluid sets of tokens. Different languages tokens. Different languages overlap each others and cannot be rigidly separated. E.g., we use gestures to emphasize, mitigate, or contradict, verbal communication.

Page 18: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Languages speakLanguages speakLanguages may “speak” independently from our conscious

ill I th d l will. In other words languages are:Redundant, say, they always transmit more information than we transmit more information than we expectOver determined say they always Over determined, say, they always convey some extra meanings and have different intentionsIndependent, say, we control our languages only in very limited sense.

Page 19: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

We are “spoken “by our languagesWe are spoken by our languages

As though there were something in us speaking on our behalf and of which we are hardly are hardly aware.

“IT SPEAKS” as J.Lacandescribes it.

Page 20: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Language and ReceiversLanguage and Receivers

L d i Languages need receivers, say, someone who is able to link the token with the meaning. Of l bOf course a language can benon- understandable for manydifferent contextual reasons(e g we don’t understand the (e.g., we don t understand the Greek linear A) but when wecall something a “language” we are implicitly assuming thatwe are implicitly assuming thatanyone, anytime, anywhere, was able to understand it. In other words, any languageother words, any languagemust have a potential receiver(be God, a martian, a dog, anexpert of criptography, etc. )p p g p y )

Page 21: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Receivers can be recognisedReceivers can be recognised

Thi i li th tThis implies that anylanguage somehowindentifies its receivers, ,say, if anyone hereeasily understoodLinear A she wouldLinear A, she wouldprobably be an AncientGreek living in 1200 BC, and those whounderstand whether I’m happy or sad from myhappy or sad from myodor are likely to bedogs.

Page 22: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Languages are identifiers

Don’t forget this point. We shall back to itsoonsoon.

Page 23: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Body NarrativesBody Narratives

Human beings continuously speaks. Biological and behavioural characteristic of an individual such as height individual such as height, weight, hair, skin color, gender, odors, gestures,

d d posture, prosody and so, send nonverbal messages during interaction. gEach body speaks, we are words made flesh.

Page 24: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Mother’s faceMother s face

Nonverbal communication is always mixed with identification processes as it is vividly illustrated by infant research that shows how, research that shows how, even moments after birth, the newborn seeks out the

th ' d f t mother's eyes and face not only for recognizing her but also as his initial source of information about the world.

Page 25: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Narratives about herselfNarratives about herself

Apart from any consciousintention and intention and awareness, ourcountless languagescountless languagesunavoidably speak of

l th t llourselves, they tellwhat we are.

Page 26: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Aliveness details: Aliveness details:

One is alive and physically present now physically present now and here, this is the first piece of first piece of information that one gives to the other by gives to the other by nonverbal communication communication.

Page 27: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Human details: Human details:

One also communicate that she is a human being. This is evident h h h d when one tries to communicate with other species and

sometime is obliged to mitigate signals about her belonging to the human species (e.g., body odor, posture, skin color, etc).

If we everhappened to live in a Blade Runner-like world, where biometrics is used to distinguish between humans and androids, the function of nonverbal language to communicate species g g pdetails could become still more evident.

Page 28: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Gender details: Gender details:

Another group of details communicated by using nonverbal communicated by using nonverbal languages concern gender identity. Human beings are a species with a low dimorphism.Our “social” gender is more a result of what we communicate to others than the effect of our genes.

Page 29: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Category details: Category details:

Nonverbal languages also transmit most information on culture, ethnicity, age, social groups to which the individual belongs.

N b l l b bl Nonverbal languages are probably the most powerful instrument the one has to inform others about the various real and virtual communities (networks and category of people) in which she category of people) in which she has grown up and lives.

Page 30: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Individual details: Individual details:

Finally nonverbal languages may also inform about i di id l l id titindividual personal identity.

Scars, wrinkles, body posture, voice prosody, p y,idiosyncratic behaviours, memories, all these elements tell about that particular person, her biography and then her oneness and specific pidentity.

Page 31: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Languages are a two ways identifierLanguages are a two ways identifier

But languages do not onlytell a lot on your identity(e g your prosody may(e.g., your prosody mayreaveal your geographicalorigin more faithfully thanyour passport) but also tellabout receiver identity, aswe have just illustratedwe have just illustrated(e.g., if one were able toget some light north Italiani t ti i d intonations in my prosody, she is likely to be anItalian native speaker).p )

Page 32: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Recognizing is negotiatingRecognizing is negotiating

Personal recognition processes are generated by the interplay between all these communicational levels these communicational levels .Any idenfication process is an ongoing negotiation between:

what one wants to communicate to others what one wants to communicate to others, what one actually communicates beyond

her voluntary control, what the other(s) – the receiver(s) – are what the other(s) the receiver(s) are

able to understand and interpret both at conscious and unconscious level,identifying information about the

( f d dreceiver (i.e., if you understand X, you are Y or you belong to the set of Zs)

Page 33: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Identification in the real worldIdentification in the real world

W ll d t thi ki We are all used to thinking of recognition as a process in which an p(active) subject recognises a (passive) individual by searching individual by searching for some identifiers.

This model is hardly ytenable. In real world, inter-humans recognition is closer to recognition is closer to a conversation rather than an investigation.

Page 34: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Automatic Identification SystemsAutomatic Identification Systems

S stems for a tomated recognition of Systems for automated recognition of individuals cannot adopt such a sophisticated scheme and they need to decrease variables. Most automated systems reach this objective by using electronic labels (e.g., smart tags, RFIDs, etc) which includes only those pieces of information required by the system to information required by the system to work. Biometric identification is based on the assumption that human beings can be assumption that human beings can be automatically recognised by using a scheme which is rather close to human interaction. This makes biometrics scientifically challenging and practically highly effective but this also the reason why biometrics can become troublesome troublesome.

Page 35: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Zoe and BiosZoe and Bios

Biometrics try to semplify the complex web of bodily languages by focusing only on those details which can allow to recognise an individual. In the last analysis, biometric technologies try to crystallize the human body and to remove from it any biographical remove from it any biographical dimension which is not relevant to recognition. Ideally biometrics aims to turn persons Ideally biometrics aims to turn persons into mere living beings, biographical life into pure biological existence, which can be measured and matched

ith th bi l i l bj t Thi with other biological objects. This leads to the dramatic distinction between zoe and bios, natural life and political life.and political life.

Page 36: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Agamben’s pointAgamben s point

A h l d d At this point one can also understand (NOT NECESSARILY SHARE, OF COURSE) the strong opposition against biometrics raised by political against biometrics raised by political philosophers such as Giorgio Agamben.Agamben draws our attention on g“bare life,” a state of existence which might be defined as life no longer cohering, no longer invested i f b t th b i in any form but the very basic component of being alive.This zombie-like condition is the extreme condition of people in Nazi extreme condition of people in Nazi concentration camps, or in the Guantanamo Bay prison, but it is also the potential condition of any electronic citizen, says Agamben.

Page 37: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Why Agamben is wrong?Why Agamben is wrong?

Agamben is wrong because heconfuses dreams (or nightmare) with reality As a matter of fact no with reality. As a matter of fact no biometric system is actually able toelicit only indentfying information (which would turn persons intobare bodies, as Agaben states).This is not due to imperfect technologies, or to procedures

h h ll d b f d b which still need to be refined, but it depends on the very nature of the human body. “Cl ” bi t i t t i t “Clean” biometrics cannot not exist because of the very “linguistic”, communicational, nature of human bodies.

Page 38: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Biometrics are closer to human recognitionBiometrics are closer to human recognition

Moreover as biometrics becomecloser to interhuman recognition ascloser to interhuman recognition, asthey are going to produce extra information.I d t i i i d t In order to increase precision and to avoid being spoofed, applications are increasingly eliciting physiological responses (as aliveness detection) and responses (as aliveness detection) and collecting soft biometrics.This makes biometrics far from Agaben’s nightmare but also much Agaben s nightmare, but also much more dangerous.

Page 39: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

As biometrics systems become…

closer to interhuman recognition, and more sophisticated they become also more ethically sophisticated, they become also more ethically and politically troublesome.

Page 40: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Two aspects of recognitionTwo aspects of recognition

When philosophers such as Agamben, argue that biometrics are akin to Nazi biometrics are akin to Nazi tattoos, they fail to appreciate that there are two different aspects involved in personal recognition 1) distinguishing recognition, 1) distinguishing between individuals, and 2) distinguishing between sets of people. The latter is likely to be the real issue.

Page 41: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Humans use setsHumans use sets

Humans usesets forhi ki

Alive, Human, Male

thinking.

Identificationresults from

Italian, middle age, MD, bold, fat

results fromcrossingdifferent setstill the point

Here in thisconference hall,

nowtill the pointwe recognisean indvidual

Emillio Mordini?

Page 42: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Ideal biometrics use unique identifiersIdeal biometrics use unique identifiers

Idealbiometrics

ld Alive, Human, Male

would target only elementswhich can allow to

Italian, middle age, MD, bold, fat

allow torecognise the single individual

Here in thisconference hall,

nowindividual.

BIOMETRICSEmillio Mordini?

BIOMETRICS

Page 43: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

In reality…In reality…

Actuallybiometrics can li i l

Alive, Human, Male

elicit alsoother detailsand they are increasingl

Italian, middle age, MD, bold, fat

increasinglydo it. Say, biometrics can be used to

Here in thisconference hall,

nowbe used tocategorisepeople, toinclude them Xinclude theminto pre-definite sets

X

Page 44: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Biometrics for individual recognitionBiometrics for individual recognition

General public and privacy advocates are often worried that large scale biometric systems can a ge sca e b o e c sys e s ca turn democratic states into states of police by creating the perfect unique indentifier. This is a urban myth.It is certainly true that biometric applications can be misused and I pphave illustrated why biometric systems tend to collect extra details that may infringe privacy. Yet till when biometric applications are used for individual recognition they are still rather save.y

Page 45: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Identity and RightsIdentity and Rights

Certainly, any process of personal identification implies that individual are recognized subjects of rights a e ecog ed subjec s o g s and obligations, and this could be seen as a limitation of individual liberty.

Yet there would be no right, no liberty without personal identities liberty, without personal identities. One can claim her rights, included the right to be left alone, and all privacy rights, only if she is an privacy rights, only if she is an identifiable subject, if she has a public identity.

Page 46: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

The virtous circleThe virtous circle

You are anindividualbecause you

RecognitionIndividualbecause youcan hidesomething, and you can hideyou can hidesomethingbecause youare recognised

APrivate as a single individual. Thisis the lesson weh l d

AutonomyPrivate Sphere

have learnedfrom the clinical case Language

Page 47: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Personal RecognitionPersonal Recognition

P l i i l Personal recognition always implies a certain respect for the law (of course a for the law (of course a law can be horrible, but this is a different issue) b i i li i l because it implicitly affirms the principle of personal responsibility. personal responsibility.

Even if one is recognised only for being unjustly arrested, this still means that there are some rules.

Page 48: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Identification and Police StateIdentification and Police State

“The chief principle of a well-regulated police state is this: That each citizen shall be at allThat each citizen shall be at alltimes and places ... recognizedas this or that particular person. No one must remainunknown to the policeunknown to the police.

This can be attained with certaintyonly in the following manner: Each one must always carry a

i h hi i d b hiy y

pass with him, signed by hisimmediate government official, in which his person is accuratelydescribed. There must be no exception to this rule ”exception to this rule.

Johann G. Fichte, THE SCIENCE OF RIGHTS.

Page 49: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

CategorizationCategorization

Very rarely individual recognition has been used to mass surveillance to mass surveillance because - apart from any other consideration - it would be too expensive would be too expensive and ineffective.When rulers want their subjects to humiliate subjects to humiliate themselves or their fellows, they create, or exploit the existence of, exploit the existence of, different sets of people.

Page 50: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Anonymous massesAnonymous masses

Concentration camps, mass deportations and executions, deportations and executions, which have caused the most horrible manslaughters, require the creation of require the creation of anonymous sets of individuals, classified according to some i l h d ib ( simple, shared, attributes (e.g.,

skin color, cultural or religious belonging, nationality, physical disabilities, social class, location, and so).

Page 51: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

… a single type… a single type

Biometrics can become an effective tool for ascribing individuals to sets of peoplepeople

In1929 Hitler saw the “great thing” ofhis movement in the fact that sixtyhis movement in the fact that sixtythousand men “have outwardlybecome almost a unit, that actuallythese members are uniform not onlyin ideas, but that even the facialexpression is almost the same. Lookat these laughing eyes, this fanaticalenthusiasm and you will discoverenthusiasm and you will discover ...how a hundred thousand men in amovement become a single type”.

Page 52: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Final considerationFinal consideration

There is then a certain irony in the fact that ethical and political concerns surrounding biometrics are partly

fjustified, but in a sense completly different f hfrom what privacy advocates usually think.

Page 53: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

16.15 Panel: the HIDE Project16.15 Panel: the HIDE Project

Structure of the ProjectsHIDE Focus GroupsHIDE Policy ForumHIDE Policy ForumHIDE WorkshopsThe PLATFORMGetting involved in gHIDE

Page 54: NOTHING TO HIDE - CSSC To Hide - Presentation For... · 2008-05-23 · NOTHING TO HIDE Acknowledgements: This work has been funded by a grant from the European Commission - DG Research

Thank you for your attention.

Emilio Mordini – Centre for Science, Society and Citizenship

emilio mordini@cssc eu

y y

[email protected]