Possibilities of personal identification

The problem of personal identification. IT-based facial recognition technologies. Personal identification through biometric technology. Use of online administration, issue of secure e-signatures, e-authentication. Criminalistic means of identification.

Рубрика Государство и право
Вид статья
Язык английский
Дата добавления 23.01.2022
Размер файла 23,0 K

Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже

Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.

Размещено на http://www.allbest.ru

National University of Public Service Faculty of Law Enforcement

Possibilities of personal identification

Erzsebet Ballane Fuszter

The problem of personal identification has now grown far beyond the scope of criminalistics and has become a social issue. There are various situations in life in which somebody either cannot or does not want to reveal who they really are. Personal identification is possible because there are no two people in the world who possess the same biological characteristics (qauntiative and qualitative) and personal data at the same time. The identification procedures used today can be divided into three major groups: knowledge-based identification, property-based identification and biometric-based identification.

Key words: personal identification, biometric identifiers, active identification procedures, passive identification procedures, facial recognition

Introductions

The importance of personal identification is indisputable as it is essential to be able to distinguish one person from another.

The problem of personal identification has now grown far beyond the scope of criminalistics and has become a social issue. Recently, as the result of massive migration, the identification of masses has become a new challenge to deal with.

There are various situations in life in which somebody either cannot or does not want to reveal who they really are:

- criminals often consciously try to hide their identity, determining the identity of unknown corpses is an important duty of authorities, establishing the identity of persons who are unable to provide sufficient information about themselves (e..g. individuals suffering from intellectual disabilty, the elderly, the severely ill, children, etc.) is also an important issue.

Screening people who may pose as a threat to the security of a certain nation (e.g. to prevent terrorist attacks at airports) is something that has become primordial and of public interest since September 11, 2001.

With the intensification of migration, the only possible way to determine whether a person who crossed the border is eligible for a refugee status or not (i.e. the person is really from the region where they claim to come from) is to establish their identity and nationality.

Even in our everyday lives, personal identification is necessary to prove access rights in order to utilize our bank accounts, personal data storages, IT systems and financial systems. To have physical acces to certain places (e.g. vaults in banks, closed wards in psychiatric hospitals, laboratoires, etc.), accurate identification is required to filter unauthorisezd people. Without proving one's identity, further rights may not be possible either e.g. driving a car or possessing an arm. Proof of affiliation to various organizations, the authorities or certain companies (e.g. healthcare officers of the Red Cross, police officer in civilian clothes, etc.) is equally of social importance.

In healthcare, the identification of patients, especially in case of patients who are unable to communicate or are delirous, is of paramount importance to prevent “patient exchanges”, not the mention the situation of finding patients that have absconded. personal identification authentication criminalistic

The growing use of online administration raises the urgent issue of secure e-signatures, e-identification (eID) and e-authentication.

Personal identification is possible because there are no two people in the world who possess the same biological characteristics (qauntiative and qualitative) and personal data at the same time.

The issue of identity is almost as old as human society. It took a long time to develop our current methods of identification; the previous procedures were much less effective or humane.

In slaveholding societies, it was natural for the slaves to be stigmatized, i.e. to simply punch the name of the person to whom they belonged to in their skin. Protecting the property of the slaveholder was far more important than establishing the identity of the slaves themselves.

Countless forms of stigma were used in the Middle Ages and even the New Age. In France, the Bourbon lily was burned on the convicts' shoulders and galley slaves were marked with fiery iron. Stigma often served not only as recognition but also as punishment.

The old Hungarian codes applied almost all types of mutilation. The laws of King Saint Stephen condemned sinners by cutting off their hand and slanderers by cutting off their tongue. In early feudal law, the objectif of punishment was to stigmatize servants who had stolen. The first theft resulted in cutting off the nose, while the second theft was proceded by cutting off an ear.

By the beginning of the 19th century, the significant increase of the population of large cities and the growing prevalence of crime made it impossible to identify reoffenders, fraudsters and conmen due to the common use of pseudonyms. Personal descriptions of criminals and criminal records including photos (after the discovery of photography) soon became and unmanageable pile of miscallenous information.

The first scientific method of identification was based on anthropometric foundations. The theoretical basis of the identification and registration system set up in 1879 by a French police officer, Alphonse Bertillon, was the well- known biological fact that after the age of 21 (with the exception of some very rare cases), the size of human bones did not undergo any significant change.

The method called bertillonage was based on 11 dimensions taken from the human body: 1) height; 2) distance between arms spread; 3) sitting height; 4) head length; 5) head width; 6) length of the right ear; 7) face width; 8) length of the left leg; 9) length of the left middle finger; 10) left little toe, and 11) length of the left forearm. These measurements were registered for each individual and could be retrived from the records later on if necessary.

Bertillon's method, despite being relatively difficult, was revolutionary and very useful as it temporarily resolved one of the most important issue law enforcement faced at the time: the effective identification of offenders and the recording of their data. The system also included a two-way photograph (mugshot) of the suspects.

The reason for the temporaly nature of this method was basically due to two factors. Firstly, it arose from the mathematically predictable fact that, if 11 sizes were included, the statistical probability of finding two persons whose 11 sizes were the same was 1: 286 435 456. That is, in a population bigger than 286 435 456, two individuals may have the same paramteres. Secondly, as there are only a few countries with an adult population larger than 286 435 456, a more significant obstacle has been the fact that records containing too many personal data became hard to manage.

The identification procedures used today can be divided into three major groups:

- knowledge-based identification: the individual is in possession of an information that can be verified during the identification process. Such information can be a password, a PIN code, etc.

- property-based identification: the person owns an object that proves their identity (e.g. identity document, barcode wristband, badge) or which allows them to access, enter or claim certain rights (e.g. magnetic cards and keys).

However, an infallible determination of the affiliation between the document and the person using the document in question is only possible based on biometric data and the use of biometric identifiers. In only these cases can we speak of clear identification.

- biometric-based identification: based on the philosophical finding now accepted as a fact, that all things that exist, and as such every person, is unique and unrepeatable.

Biometric identifiers can be defined as a set of physical and/or behavioral traits that can be examined to verify one's identity. The primary purpose of biometric identification is to develop security systems and personal identification documents that recognize an individual based on their personal characteristics.

The so-called active identification procedures require the active participation of the person in order to be identified (e.g. saying or describing a specific text). In so-called passive identification procedures, the involvement of the person is only necessary to allow sampling (e.g. the use of a fingerprint scanner for fingerprint identification).

Nowadays, the most commonly used biometric-based procedures are: voice/speech identification, handwriting identification, gait dynamics examination, hand and face geometry examination, facial thermography examination, retinal identification and iris recognition, tooth identification, fingerprint examination and palmprint identification, as well as genetic fingerprinting which is the current “miracle weapon” in forensics (i.e. identification based on the comparison of DNA profiles by expert examination of the oral mucosal swab taken from a person). The aforementioned biometric features may be suitable to create a registry database that can be used for identification purposes based on the comparison with the stored data.

Identification on the basis of teeth (dental status) takes place primarily when establishing the identity of unknown corpses, provided that the deceased person's dental records are available. The shape of different body parts, e.g. ears, forehead, lips can also be suitable for determining the identity of a person; in forensic practice, perpetrators are often identified this way. Identification based on X-rays is required primarily in case of unknown corpses, provided that there is access to X-rays taken earlier.

The so-called special criminalistic means of identification should be also mentioned, including procedures that are used exclusively for criminal purposes. The electronic Modus Operandi Register (eModus) includes mugshots, a photographic and descriptive register of tattoos, a personal description including information on the location and characteristics of special features and a register of pseudonyms and nicknames.

During classical identification based on a photo, it is also possible to involve an expert (forensic expert) to decide whether the two different photographs were taken of the same person or whether a photograph had been taken of a person of unknown identity.

Video and IT-based facial recognition technologies used by the police and other authorities to monitor the population have only existed in science fiction in the last century. Today, this has become a reality in many countries around the world. With the development of infocommunication, a person can be picked out from a crowd of thousands with the use of appropriate cameras, specific softwares and facial recognition algorithms. According to a survey by Algorithm Watch, the authorities in most EU member states are already using this technology and if they are not already using it, they plan to introduce it in the near future.

Using facial recognition software, you can quickly and safely identitify individuals who are unable or unwilling to identify themselves during a police identity check. The photo taken during the verification process can be checked right away in the electronic face recognition system by the police officer.

Face recognition can be used to find a missing child or to spot violent supporters in a football stadium. Using drones equipped with cameras, large areas and masses can be checked relatively quickly. By analyzing the images, it is possible to find certain people and determine the identity of unknown or suspicious persons.

Face recognition as a biometric identification method is showing great development in Hungary. The main field of activity of the Section for Facial Recognition Analysis operating within the Hungarian Institute for Forensic Sciences is image analysis performed on the basis of official requests to identify unknown persons

Face recognition is not exclusively used in criminal investigation or for law enforcement purposes. Unlocking smartphones and laptops with biometric sensors is already a reality today.

Conclusions

Finally, it is important to state that this technology is far from perfect, there are a lot of false identifications, not to mention the emerging of so-called “deepfake”, i.e. the production of manipulated videos and images.

References

1. E. Ballane Fuszter: Kriminalisztika, Dialog Campus Kiado, Budapest, 2019.

2. C.V. Hurst, A. Soler, T.W. Fenton: Personal Identification in Forensic Anthropology, December 2013

3. D. J. Haas PhD: Personal Identification: Its Modern Development and Security Implications, ASIS International, 2009.

4. E. Kita, Y. Zuo, F. Saito and X. Feng: Personal Identification with Face and Voice Features Extracted through Kinect Sensor, 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), Barcelona, 2016, pp. 545-551

5. H. M. L-Bakry, N. Mastorakis: Personal Identification Through Biometric Technology, Proceedings of the 9th WSEAS International Conference on Applied Informatics And Communications (Aic '09), Available at: http://www.wseas.us/e-library/conferences/2009/moscow/AIC/AIC54.pdf, Accessed: 09.25.2020.

6. J. Kietzmann, L. W. Lee, I. P. McCarthy, T. Kietzmann: Deepfakes: Trick or treat? December 2019. Business Horizons

7. J. Thorwald: A detektivek evszazada, 2011. EPUB

8. L. Hong, A Jain: Automatic personal identification using fingerprints, Michigan State University Computer Laboratory, United States

9. E. Nyitrai: A dronok alkalmazasanak lehetosegei a rendorsegi feladatok ellatasa soran, Rendorsegi Tanulmanyok, 2020/1., 94-119, pp.

10. R. Bolle, S. Pankanti: Biometrics, Personal Identification in Networked Society: Personal Identification in Networked SocietyOctober 1998, Kluwer Academic Publishers, United States.

11. A. Rucska: Felderites es bizonyitas uj kriminaltechnikai eszkozok segitsegevel, Ugyeszek Lapja, 6., Publicitas Art Media Kft., Budapest, 2018, pp.65.

Размещено на Allbest.ru

...

Подобные документы

  • The principles of personal safety in the application of physical restraint. Improving the practice of physical restraint in the activities of the tax police to enhance personal safety. Legal protection of the tax police in applying physical effects.

    курсовая работа [0 b], добавлен 08.10.2012

  • General characteristics of the personal security of employees. Bases of fight against a corruption in the tax service of Ukraine. Personal safety of the tax police, concept, content, principles. Legislative regulation of non-state security activity.

    реферат [24,7 K], добавлен 08.10.2012

  • The concept of special tools and equipment. Implementation of technical means in the work of the Interior. Organizational-methodical and tactical basics of using technology in law enforcement agencies. Methods of the active defense, personal protection.

    реферат [35,6 K], добавлен 08.10.2012

  • The constitution, by the definition of K. Marx, the famous philosopher of the XIXth. Real purpose of the modern Constitution. Observance and protection of human rights and a citizen. Protection of political, and personal human rights in the society.

    реферат [19,2 K], добавлен 10.02.2015

  • The article covers the issue of specific breaches of international law provisions owed to Ukraine by Russia. The article also examines problems in the application of international law by Russia. In the course of the Russian aggression against Ukraine.

    статья [42,0 K], добавлен 19.09.2017

  • "E-democracy" is a public use of Internet technologies Analysis of the problems dialogue information and of the notional device, uniform and available for specialists, facilities of the electronic constitutional court, on-line participation of citizens.

    реферат [17,1 K], добавлен 14.02.2015

  • Legislation regulating the application of administrative law enforcement termination. Types of special rules of administrative. Improving the practice of special means of administrative cease-duty law enforcement. Special means of administrative.

    реферат [16,0 K], добавлен 08.10.2012

  • Placing the problem of human rights on foreground of modern realization. The political rights in of the Islamic Republic Iran. The background principles of vital activity of the system of judicial authorities. The executive branch of the power in Iran.

    реферат [30,2 K], добавлен 14.02.2015

  • Понятие кредитных денег и денежных суррогатов. Основные преимущества традиционных дорожных чеков международных платежных систем. Сущность расчетных чеков Сбербанка. Юридическая природа дорожных чеков, их функции. Сберегательные чеки Secure Funds.

    реферат [15,3 K], добавлен 15.02.2009

  • The issue of freedom of the individual and their normative regulation in terms of constitutional democracy in post-Soviet republics. Stages of formation of the rights and freedoms of man and citizen. Socio-economic, ideological and political conditions.

    реферат [24,9 K], добавлен 14.02.2015

  • The government possesses monopoly for legal use of means of compulsion and formally plays a role of the arbitrator in distribution of the blessings. What general principles govern the origins and organizations of the community?

    реферат [9,4 K], добавлен 12.10.2004

  • Proclaiming and asserting the principles of democracy, democratic norms of formation of the self-management Kabardin-Balkar Republic. Application and synthesis of regional experiences as a problem to be solved in the process of administrative reforms.

    реферат [19,0 K], добавлен 07.01.2015

  • Development in Ukraine of democratic, social, lawful state according to the constitutional development. The feature of the new democratic constitutionalism. Constitutionalism - introduction of the system of government based on the current Constitution.

    реферат [24,7 K], добавлен 14.02.2015

  • The violation of the Minsk agreements achieved in the result of the Minsk process by Russia and latter’s interpretation of the agreements as imposing the obligations of fulfilment exclusively on Ukraine. Steps to implement of the Minsk agreements.

    статья [28,5 K], добавлен 19.09.2017

  • The overall architecture of radio frequency identification systems. The working principle of RFID: the reader sends out radio waves of specific frequency energy to the electronic tags, tag receives the radio waves. Benefits of contactless identification.

    курсовая работа [179,1 K], добавлен 05.10.2014

  • Consideration of a systematic approach to the identification of the organization's processes for improving management efficiency. Approaches to the identification of business processes. Architecture of an Integrated Information Systems methodology.

    реферат [195,5 K], добавлен 12.02.2016

  • The essence of the problem of personal security tax police officer. Precautions when making an attack on a person or employee of the tax police. The acquisition and improvement of the service experience, combat, operational training for its skillful use.

    реферат [23,4 K], добавлен 08.10.2012

  • Features market forms of managing in the conditions of a rigid competition. Analysis a problem of internal diagnostics of the company and definition her strong and weaknesses, as well as the general characteristics of stages and role of his carrying out.

    реферат [17,4 K], добавлен 13.09.2010

  • Identification of the main features of a subject in the sentence which is based on theoretical and scientific works of Russian, English, American and Romanian authors. Research of a subject and its features in works of the American and English fiction.

    курсовая работа [59,5 K], добавлен 05.05.2011

  • Общие сведения о предприятии. Организационная структура, функции и основные задачи Минздрава. Полномочия и ответственность министра здравоохранения. Исследование программной среды Personal Brain для формирования онтологической базы знаний для документов.

    отчет по практике [169,7 K], добавлен 27.12.2013

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу.