Biometric Database Law

Last updated
Inclusion of Means of Biometric Identification and Biometric Identification Data in Identification Documents and in a Database Act, 5770-2009
Emblem of Israel alternative blue-gold.svg
Knesset
CitationSĦ 5770 256
Amended by
SĦ 5770 418
Status: Amended

The Biometric Database Law [1] is an Israeli law which the Knesset passed in December 2009, determining that fingerprints and facial contours would be collected from all Israeli residents, that the collected data would be integrated onto the Israeli digital identity cards and digital passports, and that a biometric government database of all Israeli citizens and residents would be created which would be used for biometric identification that would allow the management of access control, identification of individuals and assist in locating individuals suspected of criminal activity by the law enforcement officials. When the law passed in December 2009 it was determined that the law be gradually applied and that at the first phase, the inclusion of one's biometric data in the central database would be voluntary. [2] [3]

Contents

Goals

The law's targets which are presented in its first section are:

  1. Determining the arrangements which would allow the identification and verification of the identity of Israeli residents by including biometric identification means and biometric identification data in passports and identity cards, to prevent forgery and the using of a false identity, and to determine the permitted uses of such data and measures;
  2. Establishment of a biometric database which would include biometric identification means which would be integrated onto identification documents, as described in paragraph (1), biometric identification data generated from them, and defining the permitted uses of the database by the Israel Police forces and the Israeli security authorities;
  3. Determining the necessary arrangements to protect the privacy of the residents who provided their biometric data, determining the means of access to the biometric database and securing the information in it.

The law addresses serious issues in identifying fake ID cards and passports, producing double records for the same person, and identity theft which are caused when using the documentation of a person from whom the identity was stolen. These examples, allow the misuse of identification documents for illegal immigration, criminal and economic offenses, and activities which harm Israel's national security. Nowadays identification documents are easily forged by criminals, who often try to get the assistance of state workers. From 2005 to 2007 the Interior Ministry reported the loss, theft and destruction of about 150,000 ID cards per year, for which submitted requests were handed in for new identity cards. In many cases, in question the loss, theft and destruction of the ID cards occurred several times for the same resident during these three years. The data of the Israeli Police indicates that about 52 percent of the individuals who submitted requests for new identity cards after theirs was lost, stolen and/or destroyed, between the years 1995 to 2006 had a criminal record, of which 10 percent have a criminal record of distribution of counterfeit documents.

Clauses

The employees of the Interior Ministry would be authorized to collect biometric identification data from the Israeli population, and to transfer the data to a database which would be managed by the biometric database management authority (הרשות לניהול המאגר הביומטרי). This data would be used to issue resident identification documents and for verification of an individual's identity, by the means of rechecking an individual's biometric identification data by authorized officials (police officer, an employee of the Shin Bet, an employee of the Mossad, etc.).

The biometric database would be stored separately from the government's older existing identity database, although selected government officials would be capable of linking between the two databases to retrieve additional data.

Opposition

Opponents of the law, including prominent Israeli scientists and security experts, warned that the existence of such a database could damage both civil liberties and state security, because any leaks could be used by criminals or hostile individuals against Israeli residents. [4] [5] [6]

See also

Related Research Articles

<span class="mw-page-title-main">Identity theft</span> Deliberate use of someone elses identity, usually as a method to gain a financial advantage

Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term identity theft was coined in 1964. Since that time, the definition of identity theft has been statutorily defined throughout both the U.K. and the U.S. as the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's disadvantages or loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.

Biometrics are body measurements and calculations related to human characteristics. Biometric authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

An identity document is any document that may be used to prove a person's identity. If issued in a small, standard credit card size form, it is usually called an identity card, or passport card. Some countries issue formal identity documents, as national identification cards that may be compulsory or non-compulsory, while others may require identity verification using regional identification or informal documents. When the identity document incorporates a person's photograph, it may be called photo ID.

<span class="mw-page-title-main">Identity Cards Act 2006</span> United Kingdom legislation

The Identity Cards Act 2006 was an Act of the Parliament of the United Kingdom that was repealed in 2011. It created national identity cards, a personal identification document and European Economic Area travel document, linked to a database known as the National Identity Register (NIR), which has since been destroyed.

Automatic identification and data capture (AIDC) refers to the methods of automatically identifying objects, collecting data about them, and entering them directly into computer systems, without human involvement. Technologies typically considered as part of AIDC include QR codes, bar codes, radio frequency identification (RFID), biometrics, magnetic stripes, optical character recognition (OCR), smart cards, and voice recognition. AIDC is also commonly referred to as "Automatic Identification", "Auto-ID" and "Automatic Data Capture".

<span class="mw-page-title-main">Biometric passport</span> Traditional passport that has an embedded electronic microprocessor chip

A biometric passport is a traditional passport that has an embedded electronic microprocessor chip which contains biometric information that can be used to authenticate the identity of the passport holder. It uses contactless smart card technology, including a microprocessor chip and antenna embedded in the front or back cover, or centre page, of the passport. The passport's critical information is printed on the data page of the passport, repeated on the machine readable lines and stored in the chip. Public key infrastructure (PKI) is used to authenticate the data stored electronically in the passport chip, making it expensive and difficult to forge when all security mechanisms are fully and correctly implemented.

A national identification number, national identity number, or national insurance number or JMBG/EMBG is used by the governments of many countries as a means of tracking their citizens, permanent residents, and temporary residents for the purposes of work, taxation, government benefits, health care, and other governmentally-related functions.

<span class="mw-page-title-main">Identity document forgery</span> Fake IDs and their production

Identity document forgery is the process by which identity documents issued by governing bodies are copied and/or modified by persons not authorized to create such documents or engage in such modifications, for the purpose of deceiving those who would view the documents about the identity or status of the bearer. The term also encompasses the activity of acquiring identity documents from legitimate bodies by falsifying the required supporting documentation in order to create the desired identity.

<span class="mw-page-title-main">Israeli identity card</span> National identity card of Israel

Teudat Zehut is the Israeli compulsory identity document issued by the Ministry of Interior, as prescribed in the Identity Card Carrying and Displaying Act of 1982: "Any resident sixteen years of age or older must at all times carry an Identity card, and present it upon demand to a senior police officer, head of Municipal or Regional Authority, or a policeman or member of the Armed forces on duty." According to a precedent from 2011, residents are entitled to refuse presenting the card, unless the state-official has a reason to suspect that they have committed an offence.

<span class="mw-page-title-main">Travel document</span> Identity document issued by a government or international entity

A travel document is an identity document issued by a government or international entity pursuant to international agreements to enable individuals to clear border control measures. Travel documents usually assure other governments that the bearer may return to the issuing country, and are often issued in booklet form to allow other governments to place visas as well as entry and exit stamps into them.

A government database collects information for various reasons, including climate monitoring, securities law compliance, geological surveys, patent applications and grants, surveillance, national security, border control, law enforcement, public health, voter registration, vehicle registration, social security, and statistics.

There are several identity documents used in Sweden. None are compulsory by law, meaning that there is no formal penalty for not possessing one. Certified identification cards are issued by the tax agency. The Swedish police issues passports and national identity cards for Swedish citizens. A Swedish driver's license, issued by the transport agency, is also accepted as an identity document. Banks sometimes issue identity cards for established customers or their children.

<span class="mw-page-title-main">National identity card (Sweden)</span> National identity card of Sweden

The Swedish national identity card is a non-compulsory biometric identity document issued in Sweden. It is one of two official identity documents issued by the Swedish Police, the other being the Swedish passport. It is only issued to Swedish citizens, and indicates the citizenship.

<span class="mw-page-title-main">Aadhaar</span> Indian national identification number

Aadhaar is a 12-digit unique identity number that can be obtained voluntarily by the citizens of India and resident foreign nationals who have spent over 182 days in twelve months immediately preceding the date of application for enrolment, based on their biometric and demographic data. The data is collected by the Unique Identification Authority of India (UIDAI), a statutory authority established in January 2009 by the Government of India, under the jurisdiction of the Ministry of Electronics and Information Technology, following the provisions of the Aadhaar Act, 2016.

Cyber crime, or computer crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

<span class="mw-page-title-main">Ghana Card</span> National identity card of Ghana

The Ghana Card is a national Identity card that is issued by the Ghanaian authorities to Ghanaian citizens – both resident and non-resident, and legally and permanently resident foreign nationals. It is proof of identity, citizenship and residence of the holder. The current version is in ID1 format and biometric.

The Lebanese identity card is a compulsory Identity document issued to citizens of the Republic of Lebanon by the police on behalf of the Lebanese Ministry of Interior or in Lebanese embassies/consulates (abroad) free of charge. It is proof of identity, citizenship and residence of the Lebanese citizens.

Biometrics refers to the automated recognition of individuals based on their biological and behavioral characteristics, not to be confused with statistical biometrics; which is used to analyse data in the biological sciences. Biometrics for the purposes of identification may involve DNA matching, facial recognition, fingerprints, retina and iris scanning, voice analysis, handwriting, gait, and even body odor.

This article is about Biometrics used by the South African government to combat fraud and corruption and to increase the efficiency of service delivery to the public.

Identity replacement technology is any technology that is used to cover up all or parts of a person's identity, either in real life or virtually. This can include face masks, face authentication technology, and deepfakes on the Internet that spread fake editing of videos and images. Face replacement and identity masking are used by either criminals or law-abiding citizens. Identity replacement tech, when operated on by criminals, leads to heists or robbery activities. Law-abiding citizens utilize identity replacement technology to prevent government or various entities from tracking private information such as locations, social connections, and daily behaviors.

References

  1. Hebrew: חוק הכללת אמצעי זיהוי ביומטריים ונתוני זיהוי ביומטריים במסמכי זיהוי ובמאגר מידע, התש"ע-2009.
  2. Marciano, Avi (2016). "A Critical Reflection on the Israeli Biometric Program". Theory and Criticism (in Hebrew). 46: 41–66.
  3. Marciano, Avi (2018). "The Politics of Biometric Standards: The Case of Israel Biometric Project". Science as Culture: 1–22. doi:10.1080/09505431.2018.1556628.
  4. Digital World: Getting to know all about you and me
  5. YNET: Biometric Database - A Danger to State Security
  6. Marciano, Avi (2018). "The Discursive Construction of Biometric Surveillance in the Israeli Press". Journalism Studies: 1–19. doi:10.1080/1461670X.2018.1468723.