Professional Documents
Culture Documents
Emilio Mordini
Centre for Science, Society & Citizenship
Andrew P. Rebera
Centre for Science, Society & Citizenship
Abstract
The human species is again becoming nomadic. Each year, about two billion persons move across large
geographic distances (not to mention people in virtual mobility through information and communication
technology). Many of these people have weak or unreliable identification documentsand many poorer
people in developing countries do not even have these documents. In 2000, the United Nations Childrens
Fund (UNICEF) calculated that 50 million babies (41% of births worldwide) were not registered at birth.
In this scenario, a personal identification scheme based on birth registration and state-issued passports is less
and less tenable. Biometrics appears to offer a viable technological solution. However, the technology itself
is subject to popular critique, warning of dystopian futures of overwhelming surveillance and loss of
privacy. The best answer to those who fear an Orwellian future is to engage with the technology and seek
to ensure that biometric identification systems are developed in positive ways. We suggest that identification
schemes become problematic when the reciprocity of identification goes unnoticed, forgotten, or (what is
worse) is intentionally bypassed. The dynamics of identification should be reciprocal, dialogical, and
involving mutual recognition. In the traditional political domain, this is the recognition by the state of a
citizen and by the citizen of the state. In the digital age, identification systems must increasingly transcend
geopolitical borders. A globally recognized identification scheme is therefore a necessity. However, it is merely
the nature of the borders that has changed herenot the nature of identification. Our call will be: no
identification without representation.
KEY WORDS: biometrics, identification, globalization, civil liberties, fundamental rights, reciprocity,
political representation
1. Introduction
Of course it remains true that the major interventions of the state into the lives
of its subjectse.g., taxation, conscription, and the administration of authority/
justiceneed not proceed at the level of the individual. The necessity for individual
identification is less severe when taxes, conscription, and so on are imposed collec-
tively (Caplan & Torpey, 2001, p. 1). Specific individual identification has been more
closely tied up with mass literacy and increased state bureaucracy (Goody, 1986).
The Roman Empire, which was the first cosmopolitan society in the West, provided
the first example of a universal identification system through a tripartite codified
name scheme. In Europe during the Middle Ages, individuals were chiefly identi-
fied through passes and safe conducts issued by religious and civil authorities. Seals
and handwriting mainly enforced the authenticity of these documents. The Modern
era, which saw increased mobility associated with urbanization and industrializa-
tion, required more effective recognition schemes. These were administered by
nation states. Indeed, the development of more robust identification schemes has
to some extent progressed in parallel with the development of post-Westphalian
polities, marking the passage from feudal to industrial society. Thus, as Valentin
Groebner (2001, p. 16) notes: by the beginning of the eighteenth century, the
failure to carry [documents of origin and identity] while travelling was already an
offense that could attract considerable penalties.
After World War I, most European countries introduced systems of identity
cards, incorporating facial photography (and, in some cases, also fingerprinting), as
a tool for identifying people within their state borders. Yet even in countries where
identity cards did not become mandatory, a new powerful driver for personal
identification emerged: the need to identify and authenticate people entitled to
receive social benefits. The welfare state, which first emerged in Northern Europe
after World War II, is based on the provision of services via redistributionist
taxation. Taxation and welfare provision both rely on robust and reliable systems of
personal identification.
Following the agricultural, industrial, and welfare revolutions, we are now
on the verge of a new epochal transition. The human species is again becoming
nomadic. Each year, about two billion persons move across large geographic dis-
tances (not to mention people in virtual mobility through information and com-
munication technology); approximately half cross international boundaries. The
International Air Transport Association reported that their members carried 1.6
billion passengers in 2007, among which 699 million flew internationally (Inter-
national Air Transportation Association, 2010). The United Nations World Tourism
Organization (2009) estimated 924 million international tourist arrivals in 2008.
International movements for permanent resettlement by immigrants, refugees, or
asylum seekers, and temporary movement by migrant workers and others augment
the total international movements each year. The International Labour Organiza-
tion stated that in 2004, an estimated 175 million persons (3% of the worlds
population) lived permanently outside their country of birth and that there were
81 million migrant workers (excluding refugees) globally (International Labour
Organization, 2004).
Globalization has been characterized by the development of technologies dra-
matically transcending national control and regulation. This is not without conse-
quence for traditional identification schemes. The globalized world is confronted
Constraints on the Use of Biometric Identification Systems 7
with a huge mass of people with weak or absent identities. Most developing coun-
tries have weak or and unreliable documentsand many poorer people in these
countries do not even have these documents. In 2000, UNICEF calculated that 50
million babies (41% of births worldwide) were not registered at birth. In Pakistan,
Bangladesh, and Nepal, child registration at birth is not even mandatory. In this
scenario, a personal identification scheme based on birth registration and state-
issued passports is less and less tenable.
The tourist hoping to use her credit card in any part of the globe, the asylum
seeker hoping to access social benefits in her host country, the banker hoping to
move money from one stock market to another in real timeall have the same need.
They must prove their identities and be certain of others. Traditional means of
proving identities are not dependable enough in most parts of the world and hence
unfit for global digital networks. In this context, biometrics appears to offer a viable
technological solution. However, the technology itself is subject to popular critique,
warning of dystopian futures of overwhelming surveillance and loss of privacy.
For better or worse, biometric technologies are, it would seem, here to stay.
The best answer to those who fear an Orwellian future is not merely to provide
optimistic reassurances (which rarely reassure anyone) but rather to engage with
the technology and seek to ensure that biometric identification systems are devel-
oped in positive ways. Our aim in this article is to articulate the positive potential of
biometric identification schemes.
Orwellian fears are not unjustified, as we shall discuss. However, we will suggest
that identification schemes become problematic when the reciprocity of identification
goes unnoticed, forgotten, or (what is worse) is intentionally bypassed. The dynam-
ics of identification should be reciprocal, dialogical, and involving mutual recog-
nition. In the traditional political domain, this is the recognition by the state of a
citizen and by the citizen of the state. In the digital age, identification systems must
increasingly transcend geopolitical borders. A globally recognized identification
scheme is therefore a necessity. However, it is merely the nature of the borders
that has changed here, not the nature of identification. In this article, we will set
out a framework for a system of identification. We begin in the following section by
considering some objections to biometric identification systems. We will argue that
where the objections are reasonable, this is not specifically attributable to the use of
biometrics. We then (section 3) offer a partial defense of biometrics as a desirable
candidate for a global identification system in the digital age. We do so by diag-
nosing the cause of the undesirable consequences associated with biometrics, dis-
cussed in section 2. Having identified the root problem, we conclude by proposing
a guiding principle for the implementation of a global biometric identification
system: no identification without representation.
2. Biometric Identification
Let us suppose that there is a grouprelatively small in numberwho would
prefer that biometric systems of identification were not employedthat the tech-
nology had not been developed, or that other less intrusive forms of identification
were more robustly suited to the digital age. For the sake of having a name, call this
group the anti-biometrics camp. (We are speaking hypothetically here but it is not
8 Emilio Mordini and Andrew P. Rebera
unreasonable to suppose that such a group exists.1) The anti-biometrics camp calls
for the outlawing of biometric identification systems, or at least for such severe
restrictions as to amount to a de facto outlawing of the technology. We will consider
two arguments in the anti-biometrics camps arsenal: (i) that the technology is
inherently demeaning and (ii) that the technology is a tool of the surveillance
society.2
had articulated biopower as a set of mechanisms through which the basic biological
features of the human species became the object of a political strategy, of a general
strategy of power (Foucault, 2009, p. 1). However, he also pointed out that his
analysis of the mechanisms of power involved, inter alia, investigating between
whom (Foucault, 2009, p. 2) power is appliedthat is to say (although Foucault
may not have put it this way) that the power relations here are, in the final analysis,
personal.5 So what is objectionable about U.S. immigration procedure is not, pace
Agamben, the use of biometrics per se; rather, it is the way that they are deployed as
an arbiter and medium of interpersonal relations.
tion and protection and to ensure balance, responsibility, and transparency in the
employment of surveillance technologies (Secretary of State for the Home Depart-
ment, 2008). This was a welcome pronouncement in the light of Privacy Interna-
tionals findings. (By 2010, the United Kingdoms ranking had been downgraded
from endemic to merely extensive surveillance [Privacy International, 2010].
This is better but still not good.)
Orwellian fears of all-pervasive surveillance are exacerbated by a number of
factors. As mentioned above, developments in biometric technologies mean that
identification can increasingly take place at a distance, via gait, for example (BBC
News, 2010b). Second, biometrics and surveillance are increasingly commercial
domains and, through publicprivate interaction, this can give rise to the impres-
sion that responsibility for good practice is passed from directly elected, and hence
accountable, public officials, to businessmen and executives, whose primary goals
are not best practice but profit, and whose responsibilities are to shareholders first,
citizens second. (Note that this is not an objection to commercialization or the
private sector in general; we merely note that different structures of accountability
apply in the public and private sectors.) A further concern is with the speed with
which new surveillance technologies are implementedthe worry being that insuf-
ficient consultation takes place. Examples include the case of the Visionics Corpo-
ration, which offered their facial recognition systems to the Tampa Police
Department for a year free of charge in an effort to build a market among
municipalities, prompting the American Civil Liberties Union of Florida to
comment that This is yet another example of technology outpacing the protection
of peoples civil liberties (Canedy, 2001). While in the United Kingdom, biometrics
and CCTV in schools have been a cause of consternation. The Guardian, to give just
one example, recently carried a story reporting various problematic cases of CCTV
in schools (not only in classrooms but also in the bathrooms). A teachers union
officer is reported to have commented: There are lots of schools that install CCTV
and dont know the rulesand the companies who supply it dont feel the need to
tell them (Harris, 2011).
Whatever may be the facts of the cases mentioned above, the fears are real. And
the retort that if you have nothing to hide you have nothing to fear does not hold water.
Privacy, secrecy, and freedom from surveillance have no necessary connection with
shame or wrongdoing (Bok, 1989). Moreover, as the example of Brandon Mayfield
(who was wrongly connected to the 2004 Madrid bombings on the basis of a
false-positive fingerprint match) attests, it may well happen that you have nothing
to hide but everything to fear; Mayfield was arrested, imprisoned, and claims to
have been threatened with the death penalty. Eventually the U.S. government
agreed to compensate him to the tune of $2 million (Eggen, 2006).
Fears of a surveillance society are not, then, unjustified. However, to reiterate, as
with the objection in section (i), there is no necessary connection between biometrics
and surveillance. The anti-biometrics camp is, we argue, misguided. Their position
is vulnerable to two telling objections. First, in practical terms, their proposal is
extremely unrealistic. The biometrics industry is well established: it has gained much
support at governmental level (if not at public level), and although the technology is
not flawless, it is advancing rapidly and appears to be the most likely candidate for
a global identification system in the digital age. Second, the anti-biometrics camp
12 Emilio Mordini and Andrew P. Rebera
misconstrues the conceptual link between biometrics and the potential undesirable
consequences (individuals being demeaned and subject to surveillance) mentioned
above. The source of the trouble is not, we will claim, biometric identification systems
themselves but the way in which they are implemented.
(i) Symmetry
In identifying B, A must bestow rights upon B, of which B is aware (or of which she
can reasonably be expected to come to be aware).9 The system of registering
14 Emilio Mordini and Andrew P. Rebera
children at birth is a fine example of this imperative. The child is registered and in
that very act is documented as a bearer of rights. The provision of birth certificates
may be thought of as the initial bestowal of rights. Subsequent identification trans-
actions between A and B cannot, in general, be thought of as bestowing rights
(although some may: e.g., As issuing B a driving license could be thought of as A
bestowing the legal right to driveidentifying B as a legal driver). However, these
subsequent transactions may be thought of as As acknowledging (explicitly or implic-
itly) the rights previously bestowed upon B (alternatively they might be thought of
as premised upon As earlier bestowal of rights upon B10).
(iii) Transparency
Case 2: The Afghan VillagerThe New York Times reports that information on 1.5
million Afghans and 2.2 million Iraqis is now held in databases administered by
U.S., NATO, and local forces (Shanker, 2011). In general, militarycivilian identi-
fication transactions are liable to be problematic. This is evidenced by the prima facie
double standards reported in the story: While the systems [employed in Afghani-
stan and Iraq] are attractive to American law enforcement agencies, there is serious
legal and political opposition to imposing routine collection on American citizens
(Shanker, 2011). We do not wish to comment on the specifics of the Afghan or Iraqi
cases but speak, rather, about identification transactions between military forces and
civilians in general, taking as inspiration the arresting image that accompanies the
New York Times article.
The photograph shows an aged, grey-bearded Afghan villager having his iris
scanned. His right eye is shut, while the left is held open by the gloved hand of an
American soldier. There are three soldiers in the picture: one holds the eye open,
one holds the camera capturing the iris scan, and the other holds his hand above the
villagers forehead for shade. This shading hand is the only American flesh we see,
all else is khaki, and we see no faces. It seems somehow significant that the
uncovered hand casts a shadow not for the benefit of the villager, but in order that
the iris camera is not blinded by the sunlight. It is a poignant image. What makes
it so striking is the imbalance it portrays: they are soldiers, he is a civilian; they are
three, he is one; his one eye is shut, the other held open.
Leaving aside the politics of the war in Afghanistan, as well as the particulars of
the actual facts depicted in the photograph, this imageas a symbolic evocation
can only sound warning bells to those who are wary of biometrics. They will view it,
not unreasonably, as a representation of the individual utterly overcome by faceless
forces he is powerless to resist. Viewed in this way, what is objectionable about the
image can be understood in terms of requirements (i)(iii). First, this identification
16 Emilio Mordini and Andrew P. Rebera
Case 3: Bio-Political TattooingRecall that Agamben claims that the biometric enroll-
ment required by the US-VISIT program is part of an attempt to convince us to
accept as the humane and normal dimensions of our existence, practices of control
that had always been properly considered inhumane and exceptional (Agamben,
2008, p. 201). We suggested that, in and of itself, biometric identification is neither
inhumane nor exceptional. Rather, what is objectionable about U.S. immigration
procedure is the manner in which it functions as an arbiter and medium of inter-
personal relations. We are now in a position to make this a little clearer, with
reference to requirements (i)(iii).
Transparency does not appear to be an issue here. The procedures required as
a condition of entry were sufficiently transparent that Agamben could consider
them, judge them unreasonable, and decline to enter (although of course it is
inconvenient not to enter a country having crossed the Atlantic to reach it). One
could also make a case that symmetry is respected. The heart of the problem is
requirement (ii), the bestowal and acknowledgment of rights.
Agamben is correct that there is something exceptional about the US-VISIT
program. In broad terms, US-VISIT is simply an identification scheme: visitors
must have their identities recorded upon entry. That is not exceptional: travel to
almost any country and you will be identified as you cross the border. What is
exceptionalwhat is not common to all border crossingsis that US-VISIT is not
satisfied with the standard identity documents issued by other states but wishes to
enrol individuals in a database wholly unconnected with their home state. This is
an additional identification transaction, distinct from the presentation of a passport
or visa. (We acknowledge of course that the United States is not the only state to
request additional documentation or information to enter.) As such, if we are
correct that identification should be governed by reciprocity as per requirements
(i)(iii), one ought to have some rights bestowed or acknowledged in the course of
this additional identification transaction. But what rights does the entrant receive?
She receives the privilege of entering the United States and enjoys the protection of
the laws. However, that is something that, in pre-US-VISIT times, she would have
received by virtue of the standard passport-based identification transaction; and
(mutatis mutandis) it is something she still receives in most other countries by virtue
of nothing more than a passport-based identification transaction. In this way,
requirement (ii) is not met in the case of the additional biometric identification
transaction that US-VISIT demands. However, pace Agamben, what is objectionable
Constraints on the Use of Biometric Identification Systems 17
Notes
1 We intend no reference to any actual group of that name, should such exist.
2 We do not discuss the other major concern, namely that the technology could be highly invasive of
privacy and has the potential to reveal a huge amount of sensitive personal information regarding,
say, health, background, lifestyle, and others. In this regard, there is some overlap with the issues
discussed in section 2(ii).
3 See, e.g., Kaluszynski (2001), Joseph (2001), as well as Project Bertillon at http://www.crimino
corpus.cnrs.fr/bertillon/enter_uk.html.
4 In all cases bar the first of the following, biometrics is fairly obviously incidental. Even in the first
(concerning Agamben) we feel that, ultimately, what is objectionable does not pertain to biometrics.
5 We are here using the word personal (and cognates) in a very wide sense, according to which
relations between the state and an individual may be described as personal.
18 Emilio Mordini and Andrew P. Rebera
6 In the spirit of the (tongue in cheek) adage that 88.5% of statistics are made up, the veracity of these
statistics is explored in Aaronovitch (2009) and Channel 4 News (2008).
7 There are of course a variety of issues at play in this controversy. Our point is merely that there is a
prima facie case to be answered. Whether it can be answered and how is not a point of interest here.
8 It is of course the case that if the primary goal of bearing arms is not to shoot people but, say, to shoot
targets for sport, or to have something nice to hang above the mantelpiece, then we might construe
the analogy differently. As mentioned in an earlier note, we are not really concerned with the rights
and wrongs of gun ownership here.
9 How strongly one reads bestow here is likely to depend upon ones answers to antecedent questions
in political philosophy. A certain variety of social contract theorist might suppose that the citizen
is, in some sense, born of identification by the state; in which case bestowal here is more or less literal:
the state creates the citizen as a bearer of rights. Alternatively, if one holds that rights accrue to the
individual independently of the state, identification by the state will involve less of a bestowal and
more of an acknowledgment of rights. Our use of bestow is not intended to prejudge any of these
foundational matters in political ontology and philosophy.
10 In the Kantian mode: the initial bestowal of rights serves as a condition of the possibility of all
subsequent legitimate identification transactions between A and B, state and citizen.
11 The use of CCTV in classes would still be objectionable on the grounds of data minimization. What
need is there for cameras in classes? If it is for discipline, or for teacher-training, these ends could be
met by less intrusive methods. We will not explore the issues.
12 The soldiers appear in the photograph as anonymous. In reality they are (presumably) not, but have
at least their names or numbers shown on their uniforms. Let us emphasize again that we are not
discussing what or who is literally depicted in the photo, but its wider symbolic significance as an
iconic image of the dark side of biometric identification transactions.
13 Again, the facts in Afghanistan may be different, but we are not discussing Afghanistan.
14 Once more: we are not discussing Afghanistan. Perhaps the actual soldiers in the photograph speak
the villagers languageperhaps he speaks theirs. Perhaps there has been a huge publicity campaign
about the identification system.
15 This work has been funded by two European Commission research grants, RISERising panEuro-
pean and International Awareness of Biometrics and Security Ethics (GA230389), and TABULA
RASATrusted Biometrics under Spoofing Attacks (GA 257289).
References
Aaronovitch, D. (2009). The strange case of the surveillance cameras. The Times. Retrieved from http://
www.timesonline.co.uk/tol/comment/columnists/david_aaronovitch/article5834725.ece (accessed August 1,
2011; subscription required).
Constraints on the Use of Biometric Identification Systems 19
Agamben, G. (2008). No to bio-political tattooing. Communication and Critical/Cultural Studies, 5(2), 201202.
Reproduced from Le Monde (2004, January 10).
BBC News. (2010a). EU warns France of action over Roma. Retrieved from http://www.bbc.co.uk/news/world-
europe-11437361 (accessed August 1, 2011).
BBC News. (2010b). Walk could track down criminals, researchers claim. Retrieved from http://www.bbc.co.uk/
news/uk-england-hampshire-11025318 (accessed August 1, 2011).
Bloxham, A., & Bingham, B. (2011). Cruise passengers tell of seven-hour security revenge nightmare. The
Daily Telegraph. Retrieved from http://www.telegraph.co.uk/travel/travelnews/8559732/Cruise-passengers-
tell-of-seven-hour-security-revenge-nightmare.html (accessed August 1, 2011).
Bok, S. (1989). Secrets. New York: Vintage Books.
Canedy, D. (2001). Tampa scans the faces in its crowds for criminals. New York Times. Retrieved from http://
www.nytimes.com/2001/07/04/us/tampa-scans-the-faces-in-its-crowds-for-criminals.html (accessed August
1, 2011).
Caplan, J., & Torpey, J. (Eds.) (2001). Documenting individual identity. Princeton, NJ: Princeton University Press.
Channel 4 News. (2008). FactCheck: How many CCTV cameras? Retrieved from http://www.channel4.com/news/
articles/society/factcheck+how+many+cctv+cameras/2291167.html (accessed August 1, 2011).
Childe, V. G. (1950). The urban revolution. The Town Planning Review, 21, 317.
Davies, G. A. (2011). Amir Khan furious at overzealous US immigration. The Daily Telegraph. Retrieved from
http://www.telegraph.co.uk/sport/othersports/boxingandmma/amir-khan/8566662/Amir-Khan-furious-at-
overzealous-US-immigration.html (accessed August 1, 2011).
Devarajan, S., & Giugale, M. (2011). How Africa can extract big benefits for everyone from natural resources.
The Guardian. Retrieved from http://www.guardian.co.uk/global-development/poverty-matters/2011/jun/
29/africa-extracting-benefits-from-natural-resources?INTCMP=SRCH (accessed August 2, 2011).
Eggen, D. (2006). U.S. settles suit filed by Ore. lawyer. The Washington Post. Retrieved from http://www.washington
post.com/wp-dyn/content/article/2006/11/29/AR2006112901179.html (accessed August 2, 2011).
Foucault, M. (2009). Security, territory, population: Lectures at the College de France 19771978. Translated by
Graham Burchell. Basingstoke: Palgrave Macmillan.
Fraser, C. (2010). France fingerprints Roma deportees to prevent return. Retrieved from http://www.bbc.co.uk/news/
world-europe-11450831 (accessed August 1, 2011).
Gelb, A., & Decker, C. (2012). Cash at your fingertips: Biometric technology for transfers in developing
countries. Review of Policy Research, 29(1) 89115.
Giroday, S. B. (2010). ID WORLD Abu Dhabi 2010. Retrieved from: http://www.idworldabudhabi.com/
index.php?id=records10ad (accessed August 23, 2011).
Goody, J. (1986). The logic of writing and the organization of society. Cambridge: Cambridge University Press.
Groebner, V. (2001). Describing the person, reading the signs in late medieval and Renaissance Europe:
Identity papers, vested figures, and the limits of identification, 14001600. In J. Caplan & J. Torpey (Eds.),
Documenting individual identity (pp. 1527). Princeton, NJ: Princeton University Press.
Harris, J. (2011). School surveillance: How big brother spies on pupils. The Guardian. Retrieved from http://
www.guardian.co.uk/uk/2011/jun/09/schools-surveillance-spying-on-pupils?INTCMP=SRCH (accessed
August 1, 2011).
Home Affairs Committee. (2008). A surveillance society? Retrieved from http://www.publications.parliament.uk/
pa/cm200708/cmselect/cmhaff/58/58ii.pdf (accessed August 1, 2011).
International Air Transportation Association. (2010). Fact sheet: IATAInternational air transport association.
Retrieved from http://www.iata.org/pressroom/facts_figures/fact_sheets/iata.htm (accessed August 18,
2011).
International Labour Organization. (2004). Towards a fair deal for migrant workers in the global economy. International
labour conference, 92nd session, report VI. Retrieved from http://www.ilo.org/global/publications/ilo-bookstore/
order-online/books/WCMS_PUBL_9221130436_EN/langen/index.htm (accessed August 18, 2011).
Izzard, E., Jordan, L., & Swanson, C. (Producers), Jordan, L. (Director). (2004). Dress to kill [DVD]. United
Kingdom: Universal Pictures UK.
Joseph, A. M. (2001). Anthropometry, the police expert, and the Deptford murders: The contested introduction
of fingerprinting for the identification of criminals in Late Victorian and Edwardian Britain. In J. Caplan
& J. Torpey (Eds.), Documenting individual identity (pp. 164183). Princeton, NJ: Princeton University
Press.
Kaluszynski, M. (2001). Republican identity: Bertillonage as government technique. In J. Caplan & J. Torpey
(Eds.), Documenting individual identity (pp. 123138). Princeton, NJ: Princeton University Press.
Mordini, E., & Massari, S. (2008). Body, biometrics and identity. Bioethics, 22, 488498.
Muzzi, M. (2010). UNICEF good practices in integrating birth registration into health systems (20002009). Retrieved
from http://www.unicef.org/protection/Birth_Registration_Working_Paper(2).pdf (accessed August 2,
2011).
20 Emilio Mordini and Andrew P. Rebera
Privacy International. (2007). Leading surveillance societies in the EU and the world 2007. Retrieved from https://
www.privacyinternational.org/article/leading-surveillance-societies-eu-and-world-2007 (accessed August
1, 2011).
Privacy International. (2010). European privacy and human rights. Retrieved from https://www.privacy
international.org/ephr (accessed August 1, 2011).
Ramakumar, R. (2010). The unique ID project in India: A skeptical note. In A. Kumar & D. Zhang (Eds.), Ethics
and policy of biometrics: ICEB 2010 (pp. 153167). Berlin: Springer.
Secretary of State for the Home Department. (2008). Government response to the home affairs committee: A surveillance
society? Retrieved from http://www.official-documents.gov.uk/document/cm74/7449/7449.pdf (accessed
August 1, 2011).
Shanker, T. (2011). To track militants, U.S. has system that never forgets a face. New York Times. Retrieved
from http://www.nytimes.com/2011/07/14/world/asia/14identity.html?_r=2&scp=1&sq=biometrics&st=
cse (accessed August 3, 2011).
United Nations World Tourism Organization. (2009). UNWTO world tourism barometer, 2009. Retrieved from http://
unwto.org/facts/eng/pdf/barometer/UNWTO_Barom09_1_en_excerpt.pdf (accessed 18 August, 2011).