Face prints and iris scans on the rise in the US

Personal privacy is always a top concern at Sovereign Man, however in a high-tech world, biometrics are becoming an increasingly popular way to track people. Fingerprints have been used as identifiers for a long time but now DNA and iris scans are becoming common, primarily for criminals or immigrants. According to a recent whitepaper from the Electronic Frontier Foundation (EFF):

“There is a growing push to link biometric collection with immigration enforcement. The U.S. Department of Homeland Security (DHS) takes approximately 300,000 fingerprints per day from non-U.S. citizens crossing the border into the United States, and it collects biometrics from noncitizens applying for immigration benefits and from immigrants who have been detained. In addition, state and local law enforcement officers regularly collect fingerprints and DNA, as well as face prints and even iris scans. All of these government databases are growing and are being increasingly interconnected. For example, the Secure Communities program takes the fingerprints of people booked into local jails, matches them to prints contained in large federal immigration databases, and then uses this information to deport people.

‘Some people believe biometrics and databases are the silver-bullets that will solve the immigrant enforcement dilemma. But biometrics are not infallible, and databases contain errors. These problems can result in huge negative consequences for U.S. citizens and legal immigrants mistakenly identified,’ said Michele Waslin, Senior Policy Analyst at the IPC.

‘Biometric data collection can lead to racial profiling and can disproportionately affect immigrants,’ said EFF Staff Attorney Jennifer Lynch. ‘it also gives the government a new way to find and track people throughout the United States. The government needs to act now to limit unnecessary biometric collection and address the serious privacy issues regarding the amount and type of data collected, as well as what triggers that data collection, with whom the data is shared, and the security of that data.’”

Continue to the full article…

 

Share this article

About the author

Stay in the loop

Get our new Articles delivered Straight to your inbox, right as we publish them...

0 Shares
Share via
Copy link