SlideShare a Scribd company logo
Self authentication –
is it possible or plausible?
Katina Michael
Faculty of Engineering and Information Sciences
University of Wollongong
@katinamichael | www.katinamichael.com
#ID #LBS #biometrics #implants #uberveillance @UOWResearch @IEEESSIT
Self-authentication
• “The act of proving that something, usually a document, is genuine or
true without the use of extrinsic evidence. For example, notarized
documents and certified copies of public records are usually deemed
to be self-authenticating.”
The Guardian, Jan 24, 2017
The Guardian, Jan 24, 2017
Facial Body Modifications
The problem?
• Up to 50 per cent of Australians are already on the federal
government's facial recognition database through their passports
• According to the Australian Bureau of Statistics, 90 per cent of NSW
and Victorian residents have their driver's licence by their mid-30s,
while between 70-80 per cent have them in their 20s.
• So what happens if you don’t drive or don’t own a passport?
• Will the feds ask private corporations to do the rest?
• Will an exception equate to suspicion?
What does this mean?
• Multimodal biometrics
• Facial image
• Fingerprint image
• Two factor authentication
• Biometric plus PIN
• Biometric plus card
• Biometric plus phone
• Biometrics plus implant
• Three factor authentication?
• Face verification system
• compares an existing facial image with a
facial image held by the government.
• The matching is done on a “one to one”
process in an effort to verify an individual’s
identity, “often” with the consent of the
individual.
• Face identification system
• offers “one to many” identification, using
facial recognition software to compare a
facial image to a database of facial images.
• An agency can make a request if it has a
“legislative basis or authority” to do so
“Private companies can apply to use the facial recognition software in select circumstances to compare an
identity photo with the government’s database of photos.”
Facial recognition NOT foolproof
• False positive
• A false positive is when the
system incorrectly accepts a
biometric sample as being a
match.
• Same as false accept.
• Why can I withdraw money from
the ATM belonging to someone
else? Because my face has
somehow been confused with
another’s.
• False negative
• A false negative is when
biometric systems fail to
recognize an authentic
individual, which would lead to
something not happening.
• Same as false reject.
• Why can’t I withdraw money
from the ATM or pay for my food
with my face?
Technology Responses will just grow
Companies + Police + Military + Emergency Services + Transnational Corporations
Personal/ Org
Security
National
Security
International
Security
Responsibility for action taken by
• Cloud technologies
• Drones
• DropCams
• NEST-style devices
• eWallets, Apple Watch
• Facial recognition
• Wearable technologies
• FitBits
• Chip implants
• Nanotech; e-tattoos
• DNA – celluloid sample
• OpenMaps
• Open source
• Open data
• Mobile CCTV
• Crowdsourcing
• Social media
• Activity
monitoring
• Auto-tagging
• Drones
• Sensor-based
alert systems
• Emergency
warnings
• Crowd-sourcing
coordination platform
• Autonomous drones
• Pandemic response systems
• ID management systems
• Passport Biometrics
• DNA on a chip tech
• Amplified humans
• Uberveillance
• Virus detect
• Rapid health
assessment
• Autonomous
data
collection
robots
• Robot
soldiers
• Kill lists
The Uberveillance Reality
• Who? Where? When? What?
• If I know:
• who you are
• where you are
• what condition you are in
then I can denote what
you are doing
• “Human activity monitoring” of
all people has consequences
for human rights
Condition
Location
Identity
From Magnetic Stripe to Smart Card
PayWave - Paving the Way
• Chip stores more securely then
magnetic-stripe
• payWave is fast
• No need for PIN for purchases
<$100
• Exact money so you don’t need
to carry cash
• Card never leaves your hand
when you make a purchase
‘Tap and Go’ Mobile System
• Why carry a card at all?
• Most ubiquitous device is your
smart phone
BarclaycardPayBand
iWatch/PayBand Payment Form Factor
Piercing the skin…
Designer Apps
Control/ Freedom?
• When retailers begin to predict what you
will eat when you visit their store
• When insurance providers begin to make a
judgment on your habits and behaviours
and tell you how insurable you are?
• When your Facebook ID and photo
becomes your defacto ID and is cross-
matched to a government database?
• When biometrics fail because they are
spoofed?
• Then uberveillance will arrive in the form
of an embedded encrypted implantable
token that is allegedly not transferable
Conclusion
• Global “Trusted ID” is coming
• Universal unique lifetime identifier (ULI)
• Every person is enrolled into the system at birth
• The final guise of this “Trust Mark” is yet to be determined
• We are going through baby steps at the moment
• But it will require some form of a “mark” beyond your face
• Security is NEVER foolproof
• We will get better at catching exceptions
• Blockchain and bitcoin (among other xcoins) will play a major role
• But no matter what we do, the hackers are always one step ahead
• Auditability will be claimed to be better but for those who wish to cheat system they
will find a way and the digital realm will provide the perfect platform

More Related Content

Similar to Self authentication – is it possible or plausible?

BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptssuser7ec6af
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Jermaine Smith
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Biiometrics- India
  Biiometrics- India  Biiometrics- India
Biiometrics- Indiaiseutt
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacyJoshua Johnston
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasKevin Nevias
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021andygustafson
 
Evolution of identity Stoyan Kenderov - MAC 2014 conference
Evolution of identity   Stoyan Kenderov - MAC 2014 conferenceEvolution of identity   Stoyan Kenderov - MAC 2014 conference
Evolution of identity Stoyan Kenderov - MAC 2014 conferenceStoyan Kenderov
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Nicole Fucile-Borsian
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Identity Advocate
 

Similar to Self authentication – is it possible or plausible? (20)

BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.ppt
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Cyber Law (Identity Theft)
Cyber Law (Identity Theft)Cyber Law (Identity Theft)
Cyber Law (Identity Theft)
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Biiometrics- India
  Biiometrics- India  Biiometrics- India
Biiometrics- India
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Identity Theft.pptx
Identity Theft.pptxIdentity Theft.pptx
Identity Theft.pptx
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
The Microchip
The Microchip The Microchip
The Microchip
 
James Katz en MoRe
James Katz en MoReJames Katz en MoRe
James Katz en MoRe
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Evolution of identity Stoyan Kenderov - MAC 2014 conference
Evolution of identity   Stoyan Kenderov - MAC 2014 conferenceEvolution of identity   Stoyan Kenderov - MAC 2014 conference
Evolution of identity Stoyan Kenderov - MAC 2014 conference
 
Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021Privacy PPT by Axel Kloth_March 18 2021
Privacy PPT by Axel Kloth_March 18 2021
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 

More from Katina Michael

Beyond Brain on the Bench: Broader Implications
Beyond Brain on the Bench: Broader ImplicationsBeyond Brain on the Bench: Broader Implications
Beyond Brain on the Bench: Broader ImplicationsKatina Michael
 
Microchipping People - The Risks (Engineers Australia)
Microchipping People - The Risks (Engineers Australia)Microchipping People - The Risks (Engineers Australia)
Microchipping People - The Risks (Engineers Australia)Katina Michael
 
Internet of Us - RADCOMMS2017
Internet of Us - RADCOMMS2017Internet of Us - RADCOMMS2017
Internet of Us - RADCOMMS2017Katina Michael
 
Artificial Intelligence in Biodiversity and Citizen Science
Artificial Intelligence in Biodiversity and Citizen ScienceArtificial Intelligence in Biodiversity and Citizen Science
Artificial Intelligence in Biodiversity and Citizen ScienceKatina Michael
 
Robots for Aged Care: Socio-ethical Issues
Robots for Aged Care: Socio-ethical IssuesRobots for Aged Care: Socio-ethical Issues
Robots for Aged Care: Socio-ethical IssuesKatina Michael
 
Deep Brain Stimulation for Therapeutics: What is the prognosis?
Deep Brain Stimulation for Therapeutics: What is the prognosis?Deep Brain Stimulation for Therapeutics: What is the prognosis?
Deep Brain Stimulation for Therapeutics: What is the prognosis?Katina Michael
 
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?Katina Michael
 
Repurposing Medical Implants: from Therapeutics to Augmentation
Repurposing Medical Implants: from Therapeutics to AugmentationRepurposing Medical Implants: from Therapeutics to Augmentation
Repurposing Medical Implants: from Therapeutics to AugmentationKatina Michael
 
The Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesThe Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesKatina Michael
 
Methodological Approaches to Location-Based Social Networking Research
Methodological Approaches to Location-Based Social Networking ResearchMethodological Approaches to Location-Based Social Networking Research
Methodological Approaches to Location-Based Social Networking ResearchKatina Michael
 
The Pros and Cons of Implantables
The Pros and Cons of ImplantablesThe Pros and Cons of Implantables
The Pros and Cons of ImplantablesKatina Michael
 

More from Katina Michael (11)

Beyond Brain on the Bench: Broader Implications
Beyond Brain on the Bench: Broader ImplicationsBeyond Brain on the Bench: Broader Implications
Beyond Brain on the Bench: Broader Implications
 
Microchipping People - The Risks (Engineers Australia)
Microchipping People - The Risks (Engineers Australia)Microchipping People - The Risks (Engineers Australia)
Microchipping People - The Risks (Engineers Australia)
 
Internet of Us - RADCOMMS2017
Internet of Us - RADCOMMS2017Internet of Us - RADCOMMS2017
Internet of Us - RADCOMMS2017
 
Artificial Intelligence in Biodiversity and Citizen Science
Artificial Intelligence in Biodiversity and Citizen ScienceArtificial Intelligence in Biodiversity and Citizen Science
Artificial Intelligence in Biodiversity and Citizen Science
 
Robots for Aged Care: Socio-ethical Issues
Robots for Aged Care: Socio-ethical IssuesRobots for Aged Care: Socio-ethical Issues
Robots for Aged Care: Socio-ethical Issues
 
Deep Brain Stimulation for Therapeutics: What is the prognosis?
Deep Brain Stimulation for Therapeutics: What is the prognosis?Deep Brain Stimulation for Therapeutics: What is the prognosis?
Deep Brain Stimulation for Therapeutics: What is the prognosis?
 
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?
Artificial Intelligence & Machine Learning. Is it Planet Saving Tech?
 
Repurposing Medical Implants: from Therapeutics to Augmentation
Repurposing Medical Implants: from Therapeutics to AugmentationRepurposing Medical Implants: from Therapeutics to Augmentation
Repurposing Medical Implants: from Therapeutics to Augmentation
 
The Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesThe Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security Technologies
 
Methodological Approaches to Location-Based Social Networking Research
Methodological Approaches to Location-Based Social Networking ResearchMethodological Approaches to Location-Based Social Networking Research
Methodological Approaches to Location-Based Social Networking Research
 
The Pros and Cons of Implantables
The Pros and Cons of ImplantablesThe Pros and Cons of Implantables
The Pros and Cons of Implantables
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Self authentication – is it possible or plausible?

  • 1. Self authentication – is it possible or plausible? Katina Michael Faculty of Engineering and Information Sciences University of Wollongong @katinamichael | www.katinamichael.com #ID #LBS #biometrics #implants #uberveillance @UOWResearch @IEEESSIT
  • 2. Self-authentication • “The act of proving that something, usually a document, is genuine or true without the use of extrinsic evidence. For example, notarized documents and certified copies of public records are usually deemed to be self-authenticating.”
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. The Guardian, Jan 24, 2017
  • 12.
  • 13. The Guardian, Jan 24, 2017
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 25.
  • 26. The problem? • Up to 50 per cent of Australians are already on the federal government's facial recognition database through their passports • According to the Australian Bureau of Statistics, 90 per cent of NSW and Victorian residents have their driver's licence by their mid-30s, while between 70-80 per cent have them in their 20s. • So what happens if you don’t drive or don’t own a passport? • Will the feds ask private corporations to do the rest? • Will an exception equate to suspicion?
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. What does this mean? • Multimodal biometrics • Facial image • Fingerprint image • Two factor authentication • Biometric plus PIN • Biometric plus card • Biometric plus phone • Biometrics plus implant • Three factor authentication? • Face verification system • compares an existing facial image with a facial image held by the government. • The matching is done on a “one to one” process in an effort to verify an individual’s identity, “often” with the consent of the individual. • Face identification system • offers “one to many” identification, using facial recognition software to compare a facial image to a database of facial images. • An agency can make a request if it has a “legislative basis or authority” to do so “Private companies can apply to use the facial recognition software in select circumstances to compare an identity photo with the government’s database of photos.”
  • 34. Facial recognition NOT foolproof • False positive • A false positive is when the system incorrectly accepts a biometric sample as being a match. • Same as false accept. • Why can I withdraw money from the ATM belonging to someone else? Because my face has somehow been confused with another’s. • False negative • A false negative is when biometric systems fail to recognize an authentic individual, which would lead to something not happening. • Same as false reject. • Why can’t I withdraw money from the ATM or pay for my food with my face?
  • 35.
  • 36.
  • 37.
  • 38. Technology Responses will just grow Companies + Police + Military + Emergency Services + Transnational Corporations Personal/ Org Security National Security International Security Responsibility for action taken by • Cloud technologies • Drones • DropCams • NEST-style devices • eWallets, Apple Watch • Facial recognition • Wearable technologies • FitBits • Chip implants • Nanotech; e-tattoos • DNA – celluloid sample • OpenMaps • Open source • Open data • Mobile CCTV • Crowdsourcing • Social media • Activity monitoring • Auto-tagging • Drones • Sensor-based alert systems • Emergency warnings • Crowd-sourcing coordination platform • Autonomous drones • Pandemic response systems • ID management systems • Passport Biometrics • DNA on a chip tech • Amplified humans • Uberveillance • Virus detect • Rapid health assessment • Autonomous data collection robots • Robot soldiers • Kill lists
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. The Uberveillance Reality • Who? Where? When? What? • If I know: • who you are • where you are • what condition you are in then I can denote what you are doing • “Human activity monitoring” of all people has consequences for human rights Condition Location Identity
  • 44. From Magnetic Stripe to Smart Card
  • 45. PayWave - Paving the Way • Chip stores more securely then magnetic-stripe • payWave is fast • No need for PIN for purchases <$100 • Exact money so you don’t need to carry cash • Card never leaves your hand when you make a purchase
  • 46. ‘Tap and Go’ Mobile System • Why carry a card at all? • Most ubiquitous device is your smart phone
  • 49.
  • 50.
  • 51.
  • 53.
  • 55.
  • 56. Control/ Freedom? • When retailers begin to predict what you will eat when you visit their store • When insurance providers begin to make a judgment on your habits and behaviours and tell you how insurable you are? • When your Facebook ID and photo becomes your defacto ID and is cross- matched to a government database? • When biometrics fail because they are spoofed? • Then uberveillance will arrive in the form of an embedded encrypted implantable token that is allegedly not transferable
  • 57.
  • 58.
  • 59.
  • 60. Conclusion • Global “Trusted ID” is coming • Universal unique lifetime identifier (ULI) • Every person is enrolled into the system at birth • The final guise of this “Trust Mark” is yet to be determined • We are going through baby steps at the moment • But it will require some form of a “mark” beyond your face • Security is NEVER foolproof • We will get better at catching exceptions • Blockchain and bitcoin (among other xcoins) will play a major role • But no matter what we do, the hackers are always one step ahead • Auditability will be claimed to be better but for those who wish to cheat system they will find a way and the digital realm will provide the perfect platform

Editor's Notes

  1. Source: http://www.yourdictionary.com/self-authentication#ZkuZIP6rzC471uPE.99
  2. Source: http://www.bbc.com/news/technology-38731016
  3. https://www.theguardian.com/technology/2017/jan/24/biometric-recognition-at-airport-border-raises-privacy-concerns-says-expert
  4. https://www.theguardian.com/technology/2017/jan/24/biometric-recognition-at-airport-border-raises-privacy-concerns-says-expert
  5. https://twitter.com/hashtag/footballponse (boy: broken nose football) https://au.pinterest.com/pin/409616528578067256/ (girl: makeup)
  6. http://www.abc.net.au/news/2010-11-06/man-uses-elaborate-disguise-to-board-plane/2326708
  7. http://www.digitalspy.com/movies/feature/g24785/actor-celebrity-body-transformations/?slide=2
  8. http://www.digitalspy.com/movies/feature/g24785/actor-celebrity-body-transformations/?slide=11
  9. http://www.digitalspy.com/movies/feature/g24785/actor-celebrity-body-transformations/?slide=13
  10. https://imgur.com/gallery/s69R4ep
  11. Werewolf Syndrome – hypertrichosis http://keralitesblog.blogspot.com.au/2014/03/three-sisters-with-werewolf-syndrome.html
  12. https://www.fastcompany.com/1681422/ladies-and-gentlemen-see-two-faces-of-gender-identity-in-stunning-half-drag-photos
  13. Source: https://www.google.com.au/search?rlz=1C1GGRV_enAU751AU751&biw=1366&bih=613&tbm=isch&sa=1&q=facial+body+modification&oq=facial+body+modification&gs_l=psy-ab.3..0.42092.44540.0.44756.24.13.0.0.0.0.335.1724.0j1j5j1.7.0....0...1.1.64.psy-ab..17.7.1723...0i67k1.0.KezSVgaYioU
  14. http://www.raisetraining.com.au/images/driver_licence.jpg
  15. http://www.smh.com.au/federal-politics/political-news/turnbull-government-to-push-states-to-hand-over-all-drivers-licences-20171003-gytshq.html
  16. http://www.hindustantimes.com/rf/image_size_960x540/HT/p2/2017/07/02/Pictures/citizen-available-complaining-november-aadhar-village-friday_4b90f9f6-5eeb-11e7-a18d-042ec35e3331.jpg
  17. http://www.rediff.com/news/column/india-must-stop-further-roll-out-of-aadhaar/20170601.htm
  18. http://www.ibtimes.co.in/karnataka-drops-18th-rank-aadhaar-enrolment-674181 Aadhaar's all-India coverage today is 93 percent among adults, and 67 percent and 20 percent among children between 5-18 and 0-5 age groups, respectively, reported Business Standard. However, Karnataka, which houses the IT capital of the country and also holds a strong position in IT and e-governance, lagged behind with 84.4 per cent of its 6.45 crore population covered, said the ET report. 
  19. http://www.bbc.com/news/world-asia-india-41033954
  20. http://www.gao.gov/assets/680/677098.pdf
  21. http://www.innovationaus.com/2017/10/Face-biometric-backlash-begins DENHAM SADLER OCTOBER 9, 2017
  22. https://theintercept.com/2016/10/13/how-a-facial-recognition-mismatch-can-ruin-your-life/
  23. http://www.afr.com/news/politics/states-set-to-green-light-national-facial-recognition-system-20171003-gytsm1
  24. https://techcrunch.com/2017/06/27/facebook-2-billion-users/
  25. http://www.techtimes.com/articles/203717/20170401/samsung-galaxy-s8-facial-recognition-fooled-by-a-photo-but-lets-not-rush-a-verdict-yet-video.htm
  26. http://www.eventmagazine.co.uk/Events/article/1132192/Wireless-become-first-UK-festival-use-cashless-payment-system/ Wireless to become first UK festival to use cashless payment system Louise Ridley, 16 May 2012, 11:11amBe the first to comment Wireless is first UK festival to go cashless This year's Barclaycard Wireless Festival will be the first in the UK to offer contactless payments using electronic wristbands. Festivalgoers will be able to pay for goods and services costing up to £20 with a Barclaycard PayBand – a specially-designed wristband that allows the wearer to pay using contactless technology, without entering a PIN or signing their name. They will also be able to use a contactless card or Barclaycard PayTag - a sticker which can be attached to a mobile phone for cashless payments. Wireless is organised by Live Nation and takes place in Hyde Park in July with Deadmau5, Drake and Rihanna headlining. All vendors at the festival will accept contactless payments. Visitors can register online before the festival for a PayBand, which can be topped up on site using a Visa or MasterCard credit or debit card. Help points will be positioned around the site allowing wristband holders to top up or check balances. Attendees will also be among the first to be able to make contactless payments of up to £20, as the limit increases from £15 in June. Tom Gregory, head of digital payments at Barclaycard, said: "We are immensely proud to be the first to go completely contactless and offer the choice of a cashless experience at London’s largest music festival. We’re really excited by the possibilities Barclaycard PayBand offers as a wearable, secure and easy way to pay when you’re out and about at the festival." Cards from other banks and cash will also accepted at the festival. Will other UK festivals follow suit and go contactless? To leave a comment registerand let us know your thoughts. For more in-depth and print-only features, showcases and interviews with world-leading brands, don't miss the next issue of Event magazine by subscribing here. Wireless to become first UK festival to use cashless payment system Louise Ridley, 16 May 2012, 11:11amBe the first to comment Wireless is first UK festival to go cashless This year's Barclaycard Wireless Festival will be the first in the UK to offer contactless payments using electronic wristbands. Festivalgoers will be able to pay for goods and services costing up to £20 with a Barclaycard PayBand – a specially-designed wristband that allows the wearer to pay using contactless technology, without entering a PIN or signing their name. They will also be able to use a contactless card or Barclaycard PayTag - a sticker which can be attached to a mobile phone for cashless payments. Wireless is organised by Live Nation and takes place in Hyde Park in July with Deadmau5, Drake and Rihanna headlining. All vendors at the festival will accept contactless payments. Visitors can register online before the festival for a PayBand, which can be topped up on site using a Visa or MasterCard credit or debit card. Help points will be positioned around the site allowing wristband holders to top up or check balances. Attendees will also be among the first to be able to make contactless payments of up to £20, as the limit increases from £15 in June. Tom Gregory, head of digital payments at Barclaycard, said: "We are immensely proud to be the first to go completely contactless and offer the choice of a cashless experience at London’s largest music festival. We’re really excited by the possibilities Barclaycard PayBand offers as a wearable, secure and easy way to pay when you’re out and about at the festival." Cards from other banks and cash will also accepted at the festival. Will other UK festivals follow suit and go contactless? To leave a comment registerand let us know your thoughts. For more in-depth and print-only features, showcases and interviews with world-leading brands, don't miss the next issue of Event magazine by subscribing here. http://www.eventmagazine.co.uk/Events/article/1132192/Wireless-become-first-UK-festival-use-cashless-payment-system/
  27. Cashless payments at Rock in Rio
  28. http://www.smh.com.au/technology/sci-tech/microchip-implant-ahead-of-iphone-6-release-20140906-10cx9c.html
  29. https://thehackernews.com/2017/07/biohacking-microchip-implant.html
  30. https://thefinancialbrand.com/67810/biometric-banking-know-your-customer-kyc/
  31. https://www.techinasia.com/kfc-china-tests-facial-recognition-payment
  32. https://www.google.com.au/search?q=refugees+with+no+ID&tbm=isch&tbs=rimg:CdFpxUQlIv8oIjjfXgnBtka87oFS-KUVpUXnvKiKDS5SZsJEaMbsCitW2nO6N5UFgakAgRJzlZRUmVvUuzjurmACmyoSCd9eCcG2RrzuEWspV3XfGADsKhIJgVL4pRWlRecReG5ClGGDLwUqEgm8qIoNLlJmwhFxjN1J0pJ6XyoSCURoxuwKK1baEZpuh5Dw_1txlKhIJc7o3lQWBqQARqWGvjzQUs6gqEgmBEnOVlFSZWxFA-jzuZreFOyoSCdS7OO6uYAKbEXGS5zm5jivO&tbo=u&sa=X&ved=0ahUKEwiY6ZKe_eXWAhVTNbwKHXnpBnQQ9C8IHw&biw=1366&bih=613&dpr=1 Refugees with UNHCR ID card
  33. http://techgenmag.com/2014/07/digital-tattoo-offers-mobile-security-on-your-skin/