2012
DOI: 10.1108/14779961211226985
|View full text |Cite
|
Sign up to set email alerts
|

How to abuse biometric passport systems

Abstract: Purpose -The purpose of this paper is to show that most, if not all RFID/biometric passports have clear technical and social problems in their intended use and that there are clear problems with the databases into which biometric data are being collected, due to use of this data for other (publicly), non-intended uses. Design/methodology/approach -The approach of this paper is both a meta-study of the flaws in the technological specifications as well as the social implementation of RFID/biometric passports. Fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…However, biometric technology is not infallible (Heimo et al 2012): biometric systems can be misled with falsified elements, for example, by means of spoofing: falsifying characteristics in order to assume a false identity temporarily. In this way German hackers showed that by using a couple of photos-such as those of a press conference-they could forge the German Minister of Defence's fingerprint (Hern 2014).…”
Section: Identity Fraudmentioning
confidence: 99%
“…However, biometric technology is not infallible (Heimo et al 2012): biometric systems can be misled with falsified elements, for example, by means of spoofing: falsifying characteristics in order to assume a false identity temporarily. In this way German hackers showed that by using a couple of photos-such as those of a press conference-they could forge the German Minister of Defence's fingerprint (Hern 2014).…”
Section: Identity Fraudmentioning
confidence: 99%
“…Massive amounts of pre-allocated resources [38] are wasted while the systems are either inoperable or end up being discarded [30,36,39,40,41]. Thus, when countries have been developing CGISs, the room for errors has been exceeded.…”
Section: Healthcare Information Systems As a Critical Servicementioning
confidence: 99%