U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Biometric Solutions to Identity-Related Cybercrime (From Crime Online, P 44-59, 2007, Yvonne Jewkes, ed. -- See NCJ-218881)

NCJ Number
218885
Author(s)
Russell G. Smith
Date Published
2007
Length
16 pages
Annotation
This chapter examines the various considerations in the reduction of identity-related cybercrime that need to be addressed in deciding whether to continue to use conventional systems of identification as evidence of identity, or whether to replace or supplement these conventional approaches with biometric systems.
Abstract
There is concern with the introduction of a new technology, such as biometric systems in that it may make matters worse, either with respect to the specific crime problem sought to be addressed or by creating new risks through the infringement of privacy or displacement to other forms of more serious crime. Careful thought must be given to what biometric technologies cannot do. Of greatest importance is the fact that they cannot validate identity upon initial enrollment. There is a wide range of factors to consider before implementing biometric technology, including the performance of the systems, their ability to be compromised, the ease of using such systems, and user concerns about issues such as privacy and security. In addition, the cost effectiveness of a biometric system should be determined. Evidence needs to be sought out and scrutinized concerning the range of other legal, social, and ethical considerations governing the use of any given system. Biometrics is defined as the automated means of recognizing a living person through the measurement of distinguishing physiological or behavioral traits. Biometric systems entail two processes: enrollment and matching. In recent years, biometrics has been used for a range of logical access control applications. Also, with ever-present concerns of terrorism, a number of countries have decided to issue compulsory identity cards, some of which include a biometric identifier. Table, references