Skip to content
Search

Latest Stories

Cyber Initiatives Group Fall Summit
cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Biometrics: Not a Panacea

Last fall brought news that the victims of the OPM fingerprint breach expanded to over five million prints. It’s for this reason that the safety of biometric data should be questioned and discounted as a viable means for authentication. Multiple techniques are available for using this type of information to create fake fingerprints to bypass biometric scanners, plant false fingerprints, or even falsify applications that need fingerprint data using traditional ink techniques. While vendors gather around biometrics as a holy grail for authentication, it is breaches like this that put the entire concept of biometrics-based security in jeopardy for the masses. Therefore, what is needed to solve this problem is a clear definition of when biometrics should be used for authorization, authentication, and to support two-factor authentication. While these may sound like similar terms, in reality, biometrics should only be used for authorization and never authentication alone.

Authorization, in the simplest terms, is the permission to perform a task. It is the ability to proceed without verifying who you are, or who you say you are. The most common form of biometric authorization used today is Apple Pay. When placing your finger on the touch identification sensor, you are authorizing payment. It is just a permission. Authentication, however, is the verification of you as a person, and who you say you are. It does not authorize you to perform any tasks; it just proves your identity. Authentication is primarily performed today by usernames and passwords, two-factor authentication, smart cards, and other techniques like one-time-passwords. They generally tie secret knowledge to a second physical media or to the creation of a unique code that only you have knowledge of.  The various components of an authentication system are designed to prove your identity, but they do not authorize you as a person to anything.

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.
Threat Con 2025

Related Articles

Sabotage Without Warning: ​Why the Gray Zone Could Be America’s Biggest Blind Spot

Sabotage Without Warning: ​Why the Gray Zone Could Be America’s Biggest Blind Spot

EXPERT BRIEFING — Polish Prime Minister Donald Tusk announced this week that 32 people have been detained since the start of Moscow’s war with [...] More

Ukraine's Defense Export Pivot Is A Game-Changer

EXPERT PERSPECTIVE/OPINION -- Ukraine may have just fundamentally shifted the global defense landscape. On June 21st, Ukraine unleashed its "Build [...] More

Security will be a Critical Aspect of New AI Center

EXPERT PERSPECTIVE — The recent signing of an agreement between the United Arab Emirates and the United States to create a large scale joint center [...] More

Counter-AI May be the Most Important AI Battlefront

EXPERT PERSPECTIVE — Artificial intelligence (AI) has truly captivated the American imagination, with increasing attention focused on the latest AI [...] More

How the U.S. is Tapping a Much Bigger Well in The Middle East

EXPERT DEEP DIVE – President Donald Trump’s first official trip to the Middle East during his current administration may have tapped a well that runs [...] More

U.S. Mission in Space: Maintaining Credibility to Deter

OPINION — “Space is a warfighting domain. Therefore, the Space Force cannot simply be a support element. It is our job to contest and control the [...] More