Biometric Technology: Security Challenges and Mechanisms for Strengthening National Security

Authors

Fahad Alharby
Naif Arab University for Security Sciences, Riyadh, Saudi Arabia.
Maryam Ammi
Naif Arab University for Security Sciences
Adel El-Adawy
Naif Arab University for Security Sciences
Margherita Natali
United Nations Office of Counter-Terroris

Keywords:

National Security, Biometric Technology, Security Studies

Synopsis

Countries encounter a range of security challenges that extend beyond national borders, such as organized crime, drug trafficking, and terrorist threats. To address these challenges, security agencies depend on advanced technologies like biometrics, which are crucial elements of the security infrastructure. Biometrics encompass fingerprints, facial features, and iris scans. This technology is noted for its high accuracy and resistance to forgery, making it effective for identity verification, streamlining security processes, and improving operational efficiency, thereby enhancing national security at all levels.

 

Moreover, biometrics are vital in enhancing international security cooperation by facilitating the rapid and efficient exchange of security information between countries, reducing the likelihood of errors, and aiding in the fight against cross-border crime and the prevention of terrorist infiltration.

 

Biometrics are employed in several key sectors, including government services, intelligence and criminal investigations, law enforcement agencies, border control, and military applications. In government services, biometrics provide a reliable identity management system, facilitate registration for public services, and secure banking transactions. The technology is also used in criminal investigations to link individuals to forensic evidence and accurately identify perpetrators. In border control and military applications, biometrics enhance border security, prevent infiltration, and detect forged identities. Additionally, in military applications and access control, biometrics are essential for ensuring security in sensitive areas and facilities, guaranteeing access to authorized personnel, and securing confidential information and weapons.

 

Due to the varying economic and developmental levels and infrastructure advancements in the Arab region, the application of biometrics for national security has been implemented to different extents. This variation presents numerous challenges that may threaten the sustainable and effective use of biometric technology. This report aims to address these challenges by examining international standards, best practices, and case studies of prominent global experiences in this field.

المراجع عبد النبي. أحمد يوسف (2022). نشأة وتطور مفهوم الأمن القومي العربي. مجلة الأمن القومي، 156- 159.

العدوي، محمد أحمد. (2019). الأمن الوطني: المفاهيم والأطر النظرية والسياسات في ضوء التطورات العالمية والعربية. الرياض، السعودية: دار الشقري للنشر.

العموش، أحمد فلاح، وخالد، علي محمد . (يونيو 2022). الأمن الوطني: الأبعاد والمفهوم والنظريات. مجلة الآداب، ملحق العدد 133.

يوسف، نورة «تطور تقنيات القياسات الحيويَّة في تدابير الأمن الوطني». مجلة الأمن الوطني، العدد 25، السنة 2023، صفحات 45- 60.

Abd El - Gawad, A. A. H. M. M. (2009). The relationship between national security and democracy: A study on the impact of the September 11, 2001 crisis on democracy in the United States of America]. Cairo University, Faculty of Economics and Political Science, Department of Political Science.

Babuta, A., & Oswald, M. (2019). Data Analytics and Algorithmic Bias in Policing. Royal United Services Institute for Defense and Security Studies.

Blanchette, J. (2020). Ideological Security as National Security. Center for Strategic and International Studies (CSIS). Retrieved from https://www.jstor.org/stable/resrep27056.

Campbell, L. (2014). Organized Crime and National Security: A Dubious Connection? New Criminal Law Review, 17(2), 223- 254.

Ciuriak, D., & Ptashkina, M. (2020). Toward a Robust Architecture for the Regulation of Data and Digital Trade. Centre for International Governance Innovation. Retrieved from http://www.jstor.com/stable/resrep24300.

CTED. (2021). Analytical brief on biometrics and counter terrorism. chrome - extension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.un.org/securitycouncil/ctc/sites/www.un.org.securitycouncil.ctc/files/files/documents/2021/Dec/cted_analytical_brief_biometrics_0.pdf

Delac, K., & Grgic, M. (2004, June). A survey of biometric recognition methods. In Proceedings. Elmar - 2004. 46th International Symposium on Electronics in Marine (pp. 184-193). IEEE.

Bush, G.W. (2008, June 5). Directive on Biometrics for Identification and Screening to Enhance National Security. National Security Presidential Directive/NSPD–59, Homeland Security Presidential Directive/HSPD–24. [PDF file].

Global Justice Information Sharing Initiative. (2010). Privacy and Information Quality Risks: Justice Agency Use of Biometrics. U.S. Department of Justice. https://it.ojp.gov/biometricsprivacy

Grobman, S. (2020). Quantum Computing’s Cyber - Threat to National Security. PRISM, 9(1), 4-17.

Grizold, A. (1994). The concept of national security in the contemporary world. International Journal on World Peace, 11(3), 37- 53.

INTERPOL (n.d.). (2023). Biometrics for Frontline Policing. Retrieved October 10, 2023, from https://www.interpol.int/en/How - we - work/I - CORE - our - vision - for - change/Biometrics - for - Frontline - Policing.

INTERPOL, UNICRI, Netherlands Police, & World Economic Forum. (2021). A policy framework for responsible limits on facial recognition use case: Law enforcement investigations. Retrieved from https://www.interpol.int/content/download/16691/file/A%20Policy%20Framework%20for%20Responsible%20Limits%20on%20Facial%20Recognition%20Use%20Case%20 -%20Law%20Enforcement%20Investigations.pdf.

Jones, N., & Sullivan, J. P. (2020). Climate Change and Global Security. Journal of Strategic Security, 13(4), i - iv.

Khan, N., & Efthymiou, M. (2021). The use of biometric technology at airports: The case of customs and border protection (CBP). International Journal of Information Management Data Insights, 1(2), 100049.

Leffler, M. P. (1990). National Security. The Journal of American History, 77(1), 143- 152. https://doi.org/10.2307/2078646

NIST. (2023, March 8). A tool for evaluating the strength of biometric authentication systems. Retrieved from https://pages.nist.gov/SOFA/SOFA.html.

Porter, E. J. (2019). Biometrics: A Case Study into how Commander can Influence Biometrics in a Counterinsurgency Environment. Marine Corps Command and Staff College.

Privacy International. (2019). Briefing to the UN Counter - Terrorism Executive Directorate on the responsible use and sharing of biometric data to tackle terrorism.

Privacy International. (2021). Biometrics for counterterrorism: Case study of the US military in Iraq and Afghanistan. Retrieved from http://privacyinternational.org.

Pogoriler, E. R., Gilman, D., Drake, A. K., Atwood, D. W., Goins, A., Lajeunesse, G. C., & Hicks, J. T. (Eds.). (n.d.). Dimensions of National Security. In International Legal Developments Year in Review: 2009. The International Lawyer, 44(1), 535- 546. American Bar Association. https://www.jstor.org/stable/40708264.

Rao, U., & Nair, V. (2019). Aadhaar: Governing with Biometrics. South Asia: Journal of South Asian Studies, 42(3), 469 - 481. https://doi.org/10.1080/00856401.2019.1595343

Rickards, J. G. (2009). Economic Security and National Security. Strategic Studies Quarterly, 3(3), 27- 36.

Ries, C. P. (2016). How Did the National Security System Evolve? In Improving Decisionmaking in a Turbulent World (pp. 11- 13). RAND Corporation.

The Heritage Foundation. (2015). 2015 Index of U.S. Military Strength. [PDF file].

Ungerer, C. (2008). A new agenda for national security. Australian Strategic Policy Institute.

United Nations. (2019). Compendium of recommended practices for the responsible use and sharing of biometrics in counter terrorism. Retrieved from https://www.un.org/sc/ctc/wp - content/uploads/2019/06/Compendium - on - Biometrics.pdf.

United Nations. (n.d.). National security versus global security. United Nations Chronicle. Retrieved from https://www.un.org/en/chronicle/article/national - security - versus - global - security.

UNICEF. (2019, July). Faces, Fingerprints & Feet: Guidance on assessing the value of including biometric technologies in UNICEF - supported programs.

Weitzberg, K. (2021). Biometrics and Counterterrorism: Case Study of Somalia. Privacy International. Retrieved from https://privacyinternational.org/advocacy/4064/biometrics - and - counter - terrorism - case - study - somalia.

Wilson, L. E., Wright, K., Lennard, C., & Robertson, J. (2021). Australian biometric system to meet national security objectives – part I technical capabilities. Australian Journal of Forensic Sciences, 53(6), 640 - 651. https://doi.org/10.1080/00450618.2020.1766112

Woodward, J. D. (2001). Biometrics: Facing Up to Terrorism. RAND Corporation.

Wyrębek, H. (2022). National Security Challenges and Threats. Wiedza Obronna, 279(2).

Yalavarthy, A. S. (2023). Aadhaar: India’s National Identification System and Consent - Based Privacy Rights. Vanderbilt Journal of Transnational Law, 56(2), 619 - 676.

Cover Image

Published

01-July-2024

Online ISSN

1658-8770

Print ISSN

1658-8762

Details about this monograph

ISBN-13 (15)

978-603-8361-66-5

Date of first publication (11)

2024-07-01

Physical Dimensions