
Accountability
Biometrics are excellent technologies when trans-
ferability is of concern. Instead of relying on force or
compulsion, fraudsters achieve success thr ough convinc-
ing, coercion, and deception designed to encourage vic-
tims to surrender, or provide access to, a privilege, right,
or item of value. Sophisticated scams, for example,
can lead victims consciously and willingly to hand over
precious access cards or passwords to perpetrators of
fraud.
Biometric characteristics, however, are distinct and
very personal. Their transference from one individual
to another can be, as mentioned earlier, extremely
challenging. This can contribute markedly to account-
ability, in addition to deterring and inhibiting fraud. If
it is difficult for a fraudster to trick an individual into
giving up their biometric, then any action taken that
can be linked to that biometric is likely to have been
undertaken by the legitimate possessor of the biomet-
ric in question. This makes it difficult to believe
excuses in which a misdeed was allegedly committed
by another who fraudulently obtained one’s biometric
characteristics.
With more traditional authentication/identifica-
tion technologies, however, transferability can translate
into reduced accountability. One fraudster could
borrow access cards or passwords that allow him to
take advantage of services or privileges intended for
another. There could even be complicity in this effort –
something that would take a high degree of per sonal
sacrifice if biometrics were involved.
Biometrics can also add an element of accountabil-
ity by deterring and inhibiting fraudulent attempts at
establishing or relying on multiple identities. In the
past, for instance, certain fraudsters with notorious
histories of cashing bad checks would assume several
identities so as to avoid the stigma and troubles accom-
panying their negative transactional histories. The in-
troduction of biometric technologies and systems,
however, has helped identify and address problems of
multiple registrations by linking pers onal, biometric
characteristics, rather than just nominal identities, to
transactional histories and other historical records.
This has also aided in the combating of fraudulent
acts including multiple civil ID registrations and visa
shopping.
Additionally, in some case, biometr ics deter and
mitigate acts of fraud by encouraging or necessitating
the leaving behind of distinct, personal characteristics.
For example, some prospective culprits may think
twice before acting if they are aware that their criminal
and fraudulent activity could potentially result in the
leaving behind of biometric markers, such as their
latent fingerprints. Those who proceed anyway and
ignore the concern of enrolling in a biometric system
and leaving behind an image or template of a distinct,
personal characteristic could possibly be identified
later and tracked by the biometrics they previously
presented, a potential advantage for law enforcement
and means of mitigating the severity and impact of a
fraudulent act (e.g., by catching fraudsters before they
are able to take advantage of the captured item of value
or privilege).
Security
As described above, biometrics offers security and anti-
fraud advantages over more traditional authentication/
identification technologies with respect to identity
transference, establishment of multiple fake identities,
and loss or forgetting of credentials. They can render
certain fraudulent activities – like phishing – almost
irrelevant.
Biometric characteristics also provide additional
anti-fraud security benefits thanks to their inherent
nature; compared with passwords/PINs and cards/
fobs/tokens, biometric characteristic is generally more
difficult to capture, steal, replicate, and fake. Cards, for
instance, are often designed to be robust, yet flexible
enough that, in case they are lost, a replacement can
be relatively easily created. PINs can be sniffed out
through tracking or hidden monitoring technologies.
They can also be readily discovered, in several cases,
through brute force and trial-and-error techniques.
Replication of a compromised PIN is then no more
complicated than re-entering the newly revealed PIN.
It can be challenging, however, to create a replica of
a biometric characteristic that has sufficient enoug h
fidelity to work with a targeted biometric system. Cre-
ating a plausible fake iris, for example , often requires
more effort than just copying electronic data onto a
new smart card or retyping a password (in which cases
the artifact will be identical to the genuine sample).
This is due in part to liveness detection, a security
function that is built into several biometric systems.
Liveness detection, a fraud countermeasure, deters or
586
F
Fraud Reduction, Overview