Wednesday 19 August 2015

HUMAN BIOMETRIC EVIDENCE IN FORENSIC INVESTIGATION: THE NIGERIA CHALLENGE


HUMAN BIOMETRIC EVIDENCE IN FORENSIC INVESTIGATION, THE CHALLENGES OF NIGERIA
(Richard Mayungbe, PhD, CPFA, Member ACFE Advisory Council)
Introduction:
Biometrics refers to metrics related to human characteristics. Essentially, biometrics is the science and technology of measuring and statistically analyzing human biological data. In information technology, biometrics usually refers to technologies for measuring and analyzing human body characteristics such as:
  • fingerprints
  • eye retinas and irises
  • voice patterns,
  • facial patterns and
  • hand measurements, especially for authentication purposes
Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point of sale (POS) applications. In addition to security, the driving force behind biometric verification has been convenience.
Biometric devices, such as finger scanners, consist of:
·         A reader or scanning device
·         Software that converts the scanned information into digital form and compares match points
·         A database that stores the biometric data for comparison
To prevent identity theft, biometric data is usually encrypted when it's gathered. Here's how biometric verification works on the back end: To convert the biometric input, a software application is used to identify specific points of data as match points. The match points in the database are processed using an algorithm that translates that information into a numeric value. The database value is compared with the biometric input the end user has entered into the scanner and authentication is either approved or denied.

Types of Biometrics

DNA Matching

Chemical Biometric: The identification of an individual using the analysis of segments from DNA.

Ear

Visual Biometric: The identification of an individual using the shape of the ear.

Eyes - Iris Recognition

Visual Biometric: The use of the features found in the iris to identify an individual.

Eyes - Retina Recognition

Visual Biometric: The use of patterns of veins in the back of the eye to accomplish recognition.

Face Recognition

Visual Biometric: The analysis of facial features or patterns for the authentication or recognition of an individual’s identity. Most face recognition systems either use eigen faces or local feature analysis.

Fingerprint Recognition

Visual Biometric: The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.

Finger Geometry Recognition

Visual/Spatial Biometric: The use of 3D geometry of the finger to determine identity.

Gait

Behavioural Biometric: The use of an individuals walking style or gait to determine identity.

Hand Geometry Recognition

Visual/Spatial Biometric: The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.

Odor

Olfactory Biometric: The use of an individual’s odor to determine identity.

Signature Recognition

Visual/Behavioral Biometric: The authentication of an individual by the analysis of handwriting style, in particular the signature. There are two key types of digital handwritten signature authentication, Static and Dynamic. Static is most often a visual comparison between one scanned signature and another scanned signature, or a scanned signature against an ink signature. Technology is available to check two scanned signatures using advances algorithms. Dynamic is becoming more popular as ceremony data is captured along with the X,Y,T and P Coordinates of the signor from the signing device. This data can be utilised in a court of law using digital forensic examination tools, and to create a biometric template from which dynamic signatures can be authenticated either at time of signing or post signing, and as triggers in workflow processes.

Typing Recognition

Behavioral Biometric: The use of the unique characteristics of a person’s typing for establishing identity.

Vein Recognition

Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.

Voice / Speaker Recognition

There are two major applications of speaker recognition:

Voice - Speaker Verification / Authentication

Auditory Biometric:  The use of the voice as a method of determining the identity of a speaker for access control.
If the speaker claims to be of a certain identity and the voice is used to verify this claim. Speaker verification is a 1:1 match where one speaker's voice is matched to one template (also called a "voice print" or "voice model"). Speaker verification is usually employed as a "gatekeeper" in order to provide access to a secure system (e.g.: telephone banking). These systems operate with the user's knowledge and typically require their cooperation.
For example, presenting a person’s passport at border control is a verification process - the agent compares the person’s face to the picture in the document.

Voice - Speaker Identification

Auditory Biometric:  Identification is the task of determining an unknown speaker's identity. 
Speaker identification is a 1:N (many) match where the voice is compared against N templates. Speaker identification systems can also be implemented covertly without the user's knowledge to identify talkers in a discussion, alert automated systems of speaker changes, check if a user is already enrolled in a system, etc.
For example, a police officer compares a sketch of an assailant against a database of previously documented criminals to find the closest match(es). 
In forensic applications, it is common to first perform a speaker identification process to create a list of "best matches" and then perform a series of verification processes to determine a conclusive match.

Note: There is a difference between speaker recognition (recognising who is speaking) and speech recognition (recognising what is being said). These two terms are frequently confused, as is voice recognition. Voice recognition is a synonym for speaker, and thus not speech, recognition. In addition, there is a difference between the act of authentication (commonly referred to as speaker verification or speaker authentication) and identification.

CHARACTERISTICS OF BIOMETRIC SYSTEMS
These are the important factors necessary for any effective biometric system:
·         accuracy,
·         speed and throughput rate,
·         acceptability to users,
·         uniqueness of the biometric organ and action,
·         resistance to counterfeiting,
·         reliability,
·         data storage requirements,
·         enrollment time,
·         intrusiveness of data collection, and
·         subject and system contact requirements.
Accuracy
Accuracy is the most critical characteristic of a biometric identifying verification system. If the system cannot accurately separate authentic persons from impostors, it should not even be termed a biometric identification system.
False Reject Rate
The rate, generally stated as a percentage, at which authentic, enrolled persons are rejected as unidentified or unverified persons by a biometric system is termed the false reject rate. False rejection is sometimes called a Type I error. In access control, if the requirement is to keep the “bad guys” out, false rejection is considered the least important error. However, in other biometric applications, it may be the most important error. When used by a bank or retail store to authenticate customer identity and account balance, false rejection means that the transaction or sale (and associated profit) is lost, and the customer becomes upset. Most bankers and retailers are willing to allow a few false accepts as long as there are no false rejects.
False rejections also have a negative effect on throughput, frustrations, and unimpeded operations, because they cause unnecessary delays in personnel movements. An associated problem that is sometimes incorrectly attributed to false rejection is failure to acquire. Failure to acquire occurs when the biometric sensor is not presented with sufficient usable data to make an authentic or impostor decision. Examples include smudged prints on a fingerprint system, improper hand positioning on a hand geometry system, improper alignment on a retina or iris system, or mumbling on a voice system. Subjects cause failure to acquire problems, either accidentally or on purpose.
False Accept Rate
The rate, generally stated as a percentage, at which unenrolled or impostor persons are accepted as authentic, enrolled persons by a biometric system is termed the false accept rate. False acceptance is sometimes called a Type II error. This is usually considered to be the most important error for a biometric access control system.
Crossover Error Rate (CER)
This is also called the equal error rate and is the point, generally stated as a percentage, at which the false rejection rate and the false acceptance rate are equal. This has become the most important measure of biometric system accuracy.
All biometric systems have sensitivity adjustment capability. If false acceptance is not desired, the system can be set to require (nearly) perfect matches of enrollment data and input data. If tested in this configuration, the system can truthfully be stated to achieve a (near) zero false accept rate. If false rejection is not desired, this system can be readjusted to accept input data that only approximate a match with enrollment data. If tested in this configuration, the system can be truthfully stated to achieve a (near) zero false rejection rate. However, the reality is that biometric systems can operate on only one sensitivity setting at a time.
The reality is also that when system sensitivity is set to minimize false acceptance, closely matching data will be spurned, and the false rejection rate will go up significantly. Conversely, when system sensitivity is set to minimize false rejects, the false acceptance rate will go up notably. Thus, the published (i.e., truthful) data tell only part of the story. Actual system accuracy in field operations may even be less than acceptable. This is the situation that created the need for a single measure of biometric system accuracy.
The crossover error rate (CER) provides a single measurement that is fair and impartial in comparing the performance of the various systems. In general, the sensitivity setting that produces the equal error will be close to the setting that will be optimal for field operation of the system. A biometric system that delivers a CER of 2% will be more accurate than a system with a CER of 5%.
Speed and Throughput Rate
The speed and throughput rate are the most important biometric system characteristics. Speed is often related to the data processing capability of the system and is stated as how fast the accept or reject decision is annunciated. In actuality, it relates to the entire authentication procedure: stepping up to the system; inputting the card or PIN (if a verification system); input of the physical data by inserting a hand or finger, aligning an eye, speaking access words, or signing a name; processing and matching of data files; annunciation of the accept or reject decision; and, if a portal system, movement through and closing the door.
Generally accepted standards include a system speed of 5 seconds from startup through decision annunciation. Another standard is a portal throughput rate of 6 to 10/minute, which equates to 6 to 10 seconds/person through the door. Only in recent years have biometric systems become capable of meeting these speed standards, and, even today, some marketed systems do not maintain this rapidity. Slow speed and the resultant waiting lines and movement delays have frequently caused the removal of biometric systems and even the failure of biometric companies.
Acceptability to Users
System acceptability to the people who must use it has been a little noticed but increasingly important factor in biometric identification operations. Initially, when there were few systems, most were of high security and the few users had a high incentive to use the systems; user acceptance was of little interest. In addition, little user threat was seen in fingerprint and hand systems.
Biometric system acceptance occurs when those who must use the system — organizational managers and any union present — all agree that there are assets that need protection, the biometric system effectively controls access to these assets, system usage is not hazardous to the health of the users, system usage does not inordinately impede personnel movement and cause production delays, and the system does not enable management to collect personal or health information about the users. Any of the parties can effect system success or removal. Uncooperative users will overtly or covertly compromise, damage, or sabotage system equipment. The cost of union inclusion of the biometric system in their contracts may become too costly. Moreover, management has the final decision on whether the biometric system benefits outweigh its liabilities
COMPARISON of the advantages and disadvantages of biometric technologies

    1. What are the goodness and weakness about the current technology?
      1. Facial recognition:
      2. Voice recognition:
      3. Signature recognition:
      4. DNA:
      5. Retinal scanning:
      6. Iris recognition:
      7. Fingerprint:
      8. Hand Geometry:



What are the goodness and weakness about the current technology?


Each one of the Technologies used in our days bring us a manner to restrict the access to a system, allowing the entrance only to those persons who know a specific code, own a card or have determined physic marks. The more complex is the system, the most difficult is to be attacked, although it will be more expensive and will require more software and hardware resources. When a new authentication system is implanted, it is essential a judgement between simplicity, price and efficiency, as well as social acceptability.

The password method is the cheapest and simplest technology, because it only requires elementary software resources.
On the other hand, this system is easily attackable, since he is quite simple to obtain the data from a person, either extracting the information to the person itself using deceits, or attacking the software of the system. For example, it can be easily installed in the computer, a program that simulates the “user name and password” window, so that when the user introduces his data in that window, that will be collected by the “Spy” program. Immediately after this, it appears the true window, identical, and the user will simply believe that he has been mistaken. So, this method, in spite of being usually used, for example, to access banking accounts, is not at all the most indicated if we want a safe system, and in a short-time future is tried to be changed by most immune methods.

The Smart Cards are very useful since they can be easily combined with other authentication systems, serving as storage system. Self-containment of smart card makes it resistant to attack as it does not need to depend upon potentially vulnerable external resources. But its small size and bend requirements (which are designed to protect the card physically), limits the memory and processing resources. And used like the only identification system, is not excessively trustworthy, since it can be easily stolen, lost or simply forgotten at home. Besides, sometimes they are combined with cryptography methods, which makes them more difficult (more expensive) to implement.

The Digital Signature is very difficult to falsify, since is encrypted by complicated mathematic operations. It is considered that is even less falsifiable than the manual signature recognition (although this last is already enough trustworthy).

The advantage that Biometrics presents is that the information is unique for each individual and that it can identify the individual in spite of variations in the time (it does not matter if the first biometric sample was taken year ago).The pillars of e-learning security are: authentication, privacy (data confidentiality) authorization (access control), data integrity and non-repudiation. Biometric is a technique that can provide all this requirements with quite lot reliability.

Although biometrics is considered the most effective and safe method (is very difficult to falsify), we have to bear in mind its disadvantages, for example, that since it is a relative new technology, it is not still integrated in PC, so IT departments need to make a conscious decision before making the purchase and change its structure.
We also have to consider the advantages and disadvantages of each individual system. In the next paragraphs, we will make an enumeration of the problems that these techniques can present:

Facial recognition:


Advantages:

a. Non intrusive
b. Cheap technology.

Disadvantages

a. 2D recognition is affected by changes in lighting, the person’s hair, the age, and if the person wear glasses.
b. Requires camera equipment for user identification; thus, it is not likely to become popular until most PCs include cameras as standard equipment.

Voice recognition:


Advantages:

a. Non intrusive. High social acceptability.
b. Verification time is about five seconds.
c. Cheap technology.

Disadvantages:

a. A person’s voice can be easily recorded and used for unauthorised PC or network.
b. Low accuracy.
c. An illness such as a cold can change a person’s voice, making absolute identification difficult or impossible.


Signature recognition:


Advantages:

a. Non intrusive.
b. Little time of verification (about five seconds).
c. Cheap technology.

Disadvantages:

a. Signature verification is designed to verify subjects based on the traits of their unique signature. As a result, individuals who do not sign their names in a consistent manner may have difficulty enrolling and verifying in signature verification.
b. Error rate: 1 in 50.

DNA:


Advantages:

a. Very high accuracy.
b. It impossible that the system made mistakes.
c. It is standardized.

Disadvantages:

a. Extremely intrusive.
b. Very expensive.

Retinal scanning:


Advantages:

a. Very high accuracy.
b. There is no known way to replicate a retina.
c. The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being.

Disadvantages:

a. Very intrusive.
b. It has the stigma of consumer's thinking it is potentially harmful to the eye.
c. Comparisons of template records can take upwards of 10 seconds, depending on the size of the database.
d. Very expensive.

Iris recognition:


Advantages:

a. Very high accuracy.
b. Verification time is generally less than 5 seconds.
c. The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being.

Disadvantages:

a. Intrusive.
b. A lot of memory for the data to be stored.
c. Very expensive

Fingerprint:


Advantages:
a. Very high accuracy.
b. Is the most economical biometric PC user authentication technique.
c. it is one of the most developed biometrics
d. Easy to use.
e. Small storage space required for the biometric template, reducing the size of the database memory required
f. It is standardized.

Disadvantages:

a. For some people it is very intrusive, because is still related to criminal identification.
b. It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).
c. Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytes approximately → Compression required (a factor of 10 approximately).

Hand Geometry:


Advantages:
a. Though it requires special hardware to use, it can be easily integrated into other devices or systems.
b. It has no public attitude problems as it is associated most commonly with authorized access.
c. The amount of data required to uniquely identify a user in a system is the smallest by far, allowing it to be used with SmartCards easily.

Disadvantages:
a. Very expensive
b. Considerable size.
c. It is not valid for arthritic person, since they cannot put the hand on the scanner properly.

Creation of Human Biometric Data Base in Nigeria

As at the time of writing this paper, almost 4 times had Nigeria engaged in biometric capture exercise under different name and purpose viz:
  1. GSM Telecommunication biometric sim registration
  2. National Identity biometric registration
  3. INEC Voters Card biometric registration
  4. Bank Verification Number biometric registration
In all the above cases, security is the primary purpose of the exercise while the secondary purpose is convenience and efficiency.

Biometric Data are useful in:

·         Airport security
·         Building Access
·         Cars
·         Blood Banks
·         Schools and Colleges, even Universities
·         ATM
·         Payroll
·         Government
·         Aviation
·         Military
·         Healthcare
·         Welfare
·         Workers Attendance
·         POS
·         Border Control and Immigration
·         Voting
·         Students Attendance
·         Student Examination
·         KYC as in Banking
·         Internet Banking
·         Crime Control
·         Forensic Investigation
The usage is endless
Forensic Investigation

An investigation is a
·         scrutiny,
·         exploration
·         examination,
·         inquiry,
·         research
·         an active effort to find out something
·         a systematic and thorough attempt to learn the facts about something complex or hidden
·         it is often formal and official     
·         an orderly attempt to obtain information about or to make a test of something
When forensic is involved in the letters of the investigation, it simply means that the end product of such investigation is intended for litigation or judicial purpose, Tribunal or Panel or public discussion.

Most investigative tasks follow this sequence:

·         definition and establishment of objectives,
-       identifying customers for outputs
-       determining what outputs customers want
-       defining specifications for desired outputs
·         planning work flows to achieve those objectives,
-       selecting a process to produce the outputs
-       defining tasks, cost, schedules required by the process
-       assuring resources to the process
-       defining the process controls needed
·         staffing the work with capable personnel
-       establishing personnel specifications
-       selecting competent personnel
-       preparing personnel for tasks
-       providing needed support
-       ensuring proper staff compensation
·         directing implementation of the planned process
-       assuring supervision of work
-       implementing monitoring plan
-       adapting process to inputs, changes
-       tracking progress
·         ensuring that deliverables achieve desired objectives.
-       verifying specified quality of work products
-       ensuring timely delivery
-       soliciting customer feedback
-       satisfying problems, complaints
Synergy of Biometric Data bases in Nigeria

As we have seen here, Nigeria could deploy a synergy of all the captured biometric data in the four instances mentioned above to build a robust biometric data base for the purpose of forensic investigation.
It is a common fact that the greatest task before the investigator is ‘to connect to the clue’. Biometric data creates the roadmap to arriving at the elusive clue in most of the criminal investigations all over the world.
This is an area in our investigative expertise that has not been adequately harnessed and should as a matter of importance be looked into.
Another important point is how to collect the fingerprint specimen from the scene of crime, given that in white collar crime, it is a bit easier, while in violent crime a different procedure is required.

The challenge before most African countries is how to build and deploy the all important biometric data base for crime control and forensic investigation. It should not be impossible to identify the bad eggs in our midst if most European countries and indeed America is able to do it.
In conclusion, biometric database is crucial and indispensable in forensic investigation and evidence collection.

References:
  1. Margaret Rouse (whatls.com) Tech Target
  2. https://en.wikipedia.org/wiki/Biometric
  3. www.wired.com/2013/01/biometrics/
  4. www.biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies