StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometric Technology for Singapore: An Analysis - Essay Example

Cite this document
Summary
"Biometric Technology for Singapore: An Analysis" paper aims to analyze the relevance of using Biometric technologies in Singapore to collect, store and use this biometric information and personal particulars of its residents and foreigners for security and other purposes.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Biometric Technology for Singapore: An Analysis
Read Text Preview

Extract of sample "Biometric Technology for Singapore: An Analysis"

BIOMETRIC TECHNOLOGY FOR SINGAPORE: AN ANALYSIS INTRODUCTION Security scenario has drastically changed across the world over past few decades, andespecially after Sep 11 2001. Terrorist organisations across the world have capitalised on socio-cultural differences and conflicts prevailing in the world by playing one community or religion against another, and thereby seeking shelters in some countries with a view to targeting other countries under names of religious wars. Consequently most governments have had to re-think their security strategies and allocate special budgets to counter this potent threat of terrorism. Unfortunately, unlike in a conventional war where enemies were known, terrorism has brought conflicts to our very own neighbourhood, and made each and every citizen a potent soldier, victim or even aggressor to challenge, identify, report or fight any indication of a terrorist plot. Biometrics technology has emerged as an effective weapon in this game, and identification of each and every individual entering a state and safeguard own territory from becoming a terrorist breeding ground or a target has become a foremost priority for the governments today. Singapore too has planned to embrace biometric technology in a big way with some pioneering measures and some hesitant ones. With its diverse demography, Singapore too needs to study implications of implementing this technology in contemporary security scenario in its neighbourhood. AIM This study aims to analyse the relevance of using Biometric technologies in Singapore to collect, store and use this biometric information and personal particulars of its local residents and foreigners for security and other purposes. BIOMETRIC TECHNOLOGIES The two essential uses of Biometrics are verification and identification. While verification involves "one-to-one" matching to determine whether there is a match between the person's presented biometric and biometric templates in a database, identification involves "one-to-many" matching where available biometric is compared with a database to establish identity of a person. It could be positive, i.e. to establish biometric matching or negative, i.e. to establish biometric presented does not match with available database (Rosenzweig, Alane Kochems and Ari Schwartz, 2004). At present, there are about ten types of biometric technologies in use or under development. They are fingerprint scanning, iris scanning, facial scanning, voice recognition, hand and/or finger recognition, retina scanning, thermo scanning, signature recognition, keystroke dynamic recognition, and DNA comparison (Steve TAI, 2005). Some others being developed include hand veins, ear recognition, gait (way of walking), facial thermograms, odor and palm prints. The basic advantages for selection of biometrics technology include their uniqueness, permanence, collectivity, performance, acceptability and circumvention of techniques. The current preferred ones in Singapore are basic fingerprint, facial, and hand/finger scanning. STEPS ANALYSIS Now that we are aware of the basic characteristics of biometrics, let us now discuss the various pros and cons of implementing a system of recording and maintaining biometrics data. Social Aspects Following few aspects refer to social requirements of a society in regard to biometrics technology: Some quarters are apprehensive of likelihood of physical harm to individuals like ones due to unsanitary conditions of scans, danger due to secured items theft etc. Serious concerns about misuse, illegal tampering or selling of personal information in biometric data are also prevalent. The biometric information can be used in an unauthorised manner without consent of the individual causing personal or financial harm to an individual. Technology Technological aspects governing adoption of biometrics technology include the following concerns: For information security, preferred storage option should be reducing the biometric to a template than a stored image. While images are easier to encrypt, templates are difficult to tamper with (Paul Rosenzweig, Alane Kochems, and Ari Schwartz). It is necessary that people do not develop false sense of security about biometric systems. Inherent weaknesses of these systems must be addressed, publicised and taken into account. Rather biometrics is simply another tool in a layered approach to security. It can definitely play an important role in protecting homeland from known insurgents. Economics The economical aspects of the biometrics are of commercial value for businesses rather than the country. Following aspects need to be considered anyhow: Any business house going in for biometrics needs to evaluate the trade-off and carry out a reasonably accurate cost vs. benefit analysis. Universally, use of biometrics in private sector is yet to go beyond "access control systems" (Terry Hartmann, Director of secure identification and biometrics, Unisys Asia-Pacific). Further extension shall be implemented only after likel gaps in technology, economics and security are properly plugged. Besides basic access, biometrics may even replace the current PIN-based and password security systems. While it promises better security, the actual implementation and high equipment costs continue to be major considerations in the commercial world (Eileen Yu ). A PIN is only 4 charascters while face reading data can go upto 25,000 characters. This would require considerably more digital space in storing data for all its employees, therby incurring financial implications and added security requirements. Political/Legal Fallouts Any policy implementation needs to consider legal and political fallouts of adopting a system. Some such considerations are as given below: A genuine public concern exists that this technology can be misused to invade or violate privacy. Some fear that it will be gathered compulsorily without due permission, knowledge, or even reasons; and it will be circulated universally without explicit knowledge of the individual. Concerns also exist about tracking an individual's movements, profiling and reconstructing past activities which could be manipulated for vested interests by parties capable of obtaining this information. There are also legitimate concerns about identity fraud causing extensive damage or harm to an individual's interests and assets (Rosenzweig, Kochems and Schwartz). Any biometric system should have adequate audit and oversight programs to prevent abuse through appropriate privacy act. While it must limit the indiscriminate ability of governmental agencies to collect, use, or disclose personal information like biometric data, exceptions for national security and law enforcement purposes need to be provided for. While it looks like a delicate balance, it needs to be overcome so as to instill confidence among the population regarding relevance of the technology for larger benefit of national security. Security Considerations Now this is one area, where biometric technology has tremendous advantages. They have superb potential to make a difference in nation's security infrastructure, where anyone entering a country will be immediately recorded, verified against a database or identified. While setting up requisite database for the purpose will be an expensive proposition, but once in place, it will definitely make the security apparatus more potent and effective (Rosenzweig, Kochems and Schwartz). STEPS The overall STEPS analysis brings out that despite its all limitations and concerns, in contemporary security scenario, the biometrics technology needs to be embraced in a big way, at least for security purpose. All other concerns are primarily individual/commercial matters which cannot be allowed to overshadow a much larger cause of national security. SWOT ANALYSIS Strengths The strengths of biometrics lie in following aspects: This is one major universally acknowledged step forward in the fight against terrorism. If all nations agree to compile and share this database, terrorism and many other trans-border crimes can be monitored, detected and controlled effectively. The biometric identification is a permanent identification, and cannot be tampered with by individuals entering the country with an evil mindset. Once in place, the database can be easily used without much human effort or intervention and all records properly maintained for later use. Convenience to passengers at the port of entry will be a major positive development, as was evident during trials of FAST (Fully Automated Seamless Travel) system at Changi airport, Singapore during 2004-05 (Xinhua news). Another threat is security of the encrypted data. The most widely used encryption method is the Public Key Infrastructure (PKI) approach. This approach involves two keys, the public key and private key with a binary string ranging in size from 1024-bits to 2048-bits. However, since the PKI must also be stored, inherently it too can fall prey to the same authentication limitation of a password, PIN, or token. It can also be compromised through guessing, loss, theft, sharing or circumventing; which is even further justification for a biometric authentication system (Murali). Weaknesses More manufacturers of biometrics systems in future would lead to the technology being available openly, thereby increasing possibility of developments of a counter-measure by affected parties. Regulations controlling manufacture and distribution of biometric systems are largely non-existent. Compromising passwords and other security related data could prove suicidal for both nation's security and individual interests. It tends to give a false sense of security when breaches are not impossible, and have much greater magnitude than previously imagined. Non-permanent biometric details like face, gait, behavioural features etc would make the system unreliable to a large extent in the event of loss of permanent biometric features of fingerprints, iris, retina etc. Over reliance on such a system could be catastrophic under such circumstances. Loss of such data might lead to loss of individual's identity, leading to unnecessary complications for the individual. Most commercial organisations find the investment cost vs. benefit ratio unfavourable despite its undisputed efficacy in reducing identity theft and loss to an individual. Biometrics is less practicable and more problematic when used in a one-to-many situation like, for example, seeking access to a particular location. Opportunities Implementation of biometric passports would provide an excellent opportunity for redution of threat. It would be more effective if the system is implemented universally. Supplementing existing systems with biometric scanning like 'Sentinel' would facilitate in expediting trans-border immigration clearance as it has done so for thousands of Malaysian commuting daily for work to Singapore. Besides passports, Singaporean authorities have deployed a biometric system called "Sentinel" at its border checkpoints which links the republic to the neighbouring Malaysian state of Johor. Implemented last year, the iris-scanning system helps to expedite immigration clearance for thousands of Malaysian motorcyclists who commute daily to Singapore for work. (Eileen Yu, 2005) Biometrics are better and faster means for accurate and positive identification than most existing systems. Threats Biggest threat lies in the fact that once security of the unique features is compromised, for example fingerprints, then it is compromised for life. One cannot change his/her fingerprints. Once legitimate owner runs out of new biometric features to replace the old ones, it would be difficult and a sort of loss of identity for the end user. There have been instances of personal danger to secure item owners. For example, in 2005, Malaysian car thieves actually cut the finger of the owner to steal a Mercedes Benz S-Class car. The loss in such cases becomes more expensive than the secured property's value (BBC News). FUTURE TRENDS Continuous advancements in the field of biometrics is paving the way for newer and more accurate forms of recording, information security, ease of operations and convenience to customers. Some new forms of biometric technologies under development for use in future are Brainwave Biometrics, DNA identification, Vascular Pattern Recognition, Body Odor Recognition, Fingernail Bed Recognition, Gait Recognition, Handgrip Recognition, Ear Pattern Recognition, Body Salinity Identification, Infrared Fingertip Imaging & Pattern Recognition etc (Murali). While these may still not be fool proof, these dvelopments would definitely allow interested parties to have more and more alternate screening options. They can also be used to systematically back-up the already existing data. Singapore was the first country to adopt FAST system on trial basis at Changi airport between 2004-05. Future aim should be to include newer and untamperable biometrics in such locations/border entry points with a view to developing an international database of security related biometrics in future to credibly counter the universal threat of terrorism with a strong resolve. CONCLUSION The discussions above reveal that Singapore should continue its process of introducing biometrics technologies in collaboration with other countries on full swing. A well-documented biometric authentication database does not only help prevent and detect an impostor instantaneously, but it also keeps secured information about activities of impostors for later prosecution. (Murali) Its commercial angle too needs to be implemented with due caution such that identity theft and fraud aspects are looked after. Initially, the technology should be introduced as an add-on security feature, and once people get used to the system, it can be extended to gradually replace current methods of data encryption as and where so required. Further, new developments should be used to augment the present scheme of things and supplement prevailing biometric technologies thereby provide more back-ups and further strengthen the security potential of existing data security. BIBLIOGRAPHY 1. BBC News: Malaysia car thieves steal finger. 2005. Retrieved 14/12/2007 from http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm. 2. Paul Rosenzweig, Alane Kochems, and Ari Schwartz. 2004. Biometric Technologies: Security, Legal, and Policy Implications. Retrieved 14/12/2007 from http://www.heritage.org/Research/HomelandSecurity/ lm12.cfm. 3. Eileen Yu. 2005. Singapore pushes biometric uptake. Retrieved 14/12/2007 from http://software.silicon.com/security/0,39024655 ,39129141,00.htm. 4. Biometrics Market in Singapore http://commercecan.ic.gc.ca /scdt/bizmap/interface2.nsf/vDownload/ISA_3887/$file/X_4483838.DOC. 5. Breakthrough Technologies In Biometric Security For The Future. 2004 Retrieved 14/12/2007 from http://www.scealumni.ntu.edu.sg/infohub.net /media/upload/BiometricForumBrochure.pdf . 6. Singapore Changi Airport testing biometrics-based system. 2004. retrieved 14/12/2007 from http://news.xinhuanet.com/english/2004-11/25/content_2262101.htm. 7. Murali. 2004 Biometrics.Retrieved 14/12/2007 from http://www.streetdirectory.com/travel_guide/2167/computers_and_the_internet/biometrics.html. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Macro and Micro Analysis Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1504942-macro-and-micro-analysis
(Macro and Micro Analysis Essay Example | Topics and Well Written Essays - 2500 Words)
https://studentshare.org/miscellaneous/1504942-macro-and-micro-analysis.
“Macro and Micro Analysis Essay Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/miscellaneous/1504942-macro-and-micro-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometric Technology for Singapore: An Analysis

Model for Integrating Physical and Virtual Identity Management Systems

The researcher of this essay will make an earnest attempt at identifying and evaluating a model for integrating physical and virtual identity management systems.... The researcher of this essay aims to analyze suitable attributes for interoperable identity management systems.... ... ... It is evidently clear from the discussion that the framework of Global Interoperability Framework (GIF) has been developed on the basis of Identification, Authentication and Electronic Signature (IAS)....
39 Pages (9750 words) Thesis

Business and Marketing Management

Third is their technology and service infrastructure, since they aim to improve the infrastructure to reduce cost and time in order to focus more on customer satisfaction.... Third is their technology and service infrastructure, since they aim to improve the infrastructure to reduce cost and time in order to focus more on customer satisfaction....
8 Pages (2000 words) Essay

Manchester United Background, Pricing Strategy

The use of technology maximised all accessibility with products and services.... The paper "Manchester United Background, Pricing Strategy" states that Manchester United did build its strength on history, albeit disastrous one, and grow steadily as a brand icon representing undying devotion as well as admiration for both the players as well as the spirit they represent....
15 Pages (3750 words) Research Paper

Management of information technology

Advances in the field of information technology are accelerating rapidly and are having a profound impact on human lives.... Irrespective of its origination, almost any work or task can now be conducted anywhere facilitated by sophisticated information technology.... Businesses are facing fierce in this hostile environment and to cope with such dynamic environment brought by information technology, it is extremely important to keep pace with management, technological and organizational issues concerned with the development and use of information systems....
12 Pages (3000 words) Essay

What Is Electronic Authentication

The process of electronic authentication is known to require several proof measures depending on the relative assurance of the safety of the transaction, the reliability of the technology and the approach used, the legalities associated with the authentication parameters as well as the value of the transaction being made....
12 Pages (3000 words) Essay

Dominant Types and Seriality in Architectural Practices

The impact of globalization on the political agencies of different countries and consequently on their attitude towards the urban transformations will be evaluated taking the example of singapore.... During the last century, the architects were inclined towards imitating previous design solutions and patterns due to the lack of advanced tools and practices....
12 Pages (3000 words) Essay

Biometric Technology in Singapore

This coursework called "biometric technology in Singapore" describes the relevance of using Biometric technologies in Singapore to collect, store and use this biometric information and personal particulars of its local residents and foreigners for security and other purposes.... ingapore too has planned to embrace biometric technology in a big way with some pioneering measures and some hesitant ones.... With its diverse demography, singapore needs to study the implications of implementing this technology in contemporary security scenarios in its neighborhood....
8 Pages (2000 words) Coursework

Redevelopment of a Queenstown, Singapore

xternal AnalysisPESTLE analysis Political The political aspects associated with Singapore depict high signs of rigidity in terms of investments.... The paper 'Redevelopment of a Queenstown, singapore' is a brilliant example of a management business plan.... Queenstown is counted as one of the most pre-emptively built townships within singapore during the period of 1950 and thus, can be considered as a sufficing aspect for this management project....
11 Pages (2750 words) Business Plan
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us