IF11783
IF11783
https://crsreports.congress.gov
Biometric Technologies and Global Security
already deployed biometric surveillance systems that are Some U.S. defense agencies are seeking to develop
capable of autonomously tracking foreign military biometric presentation attack detection technologies. For
personnel and intelligence operatives. Some estimates example, the Intelligence Advanced Research Projects
suggest that China alone has exported components of these Agency program Odin seeks to provide an automated
systems to over 80 countries, including authoritarian means of both detecting known presentation attacks and
regimes, such as Venezuela, and U.S. allies, such as the identifying unknown vectors of attack.
United Kingdom.
Recent legislative activities
Fully integrated, large-scale biometric surveillance Congress has considered the implications of biometric—
networks have not yet been realized; however, as specifically facial recognition—technologies in a number of
component technologies continue to mature and proliferate, recent legislative provisions. For example, Section 5104 of
such networks could threaten the privacy or jeopardize the the FY2021 National Defense Authorization Act (NDAA)
safety of targeted individuals or disrupt U.S. clandestine (P.L. 116-283) tasks the National AI Advisory Committee
operations or human intelligence gathering. As a result, with advising the President on “whether the use of facial
U.S. military and intelligence agencies may continue to recognition by government authorities ... is taking into
develop alternative tradecraft and concepts of operation. account ethical considerations and ... whether such use
should be subject to additional oversight, controls, and
How could biometric technologies fail? limitations.” In addition, Section 5708 of the FY2020
Biometric technologies have a number of vulnerabilities NDAA (P.L. 116-92) expresses the sense of Congress that
that underscore the ethical concerns over their employment the discriminatory use of facial recognition technologies “is
and could result in the failure of the technology to perform contrary to the values of the United States” and that “the
as anticipated. For example, researchers have repeatedly United States Government should not engage in the sale or
found that AI-trained facial recognition programs fail transfer of facial recognition technology to any country that
disproportionately when used for women and people of is using such technology for the suppression of human
color due to both the models and the data on which the rights.” The section also tasks the Director of National
programs were trained. Data poisoning, in which an Intelligence with submitting to the congressional
adversary or bad actor seeks to surreptitiously mis-train an intelligence committees a report on the intelligence
opponent’s AI, could present additional challenges for AI- community’s use of facial recognition technologies. Other
trained biometric technologies. If unaddressed, these biometric technologies are not addressed.
challenges could result in system failure, potentially leading
to violations of civil liberties or international humanitarian Potential questions for Congress
law.
How should the potential national security benefits of
biometric technologies be balanced with civil liberties
Biometric technologies are also vulnerable to presentation
and the requirements of international humanitarian law?
attacks (or spoofing), in which a targeted individual uses
What domestic or international limits, if any, should be
makeup, prosthetics, or other measures to prevent a
placed on the use of biometric technologies or biometric
biometric system from accurately capturing their biometric
data collection?
identifiers or adjudicating their identity (see Figure 1). This
could enable individuals such as terrorists or foreign Are biometric technologies being sufficiently tested to
intelligence operatives to thwart biometric security systems. ensure their accuracy and to ward against presentation
attacks and other countermeasures?
Figure 1. Facial Recognition Technologies:
How Do They Work?
To what extent are potential U.S. adversaries developing
biometric technologies? Are U.S. military and
intelligence agencies sufficiently addressing the
implications of biometric technologies for tradecraft and
concepts of operations?
https://crsreports.congress.gov
Biometric Technologies and Global Security
Disclaimer
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff to
congressional committees and Members of Congress. It operates solely at the behest of and under the direction of Congress.
Information in a CRS Report should not be relied upon for purposes other than public understanding of information that has
been provided by CRS to Members of Congress in connection with CRS’s institutional role. CRS Reports, as a work of the
United States Government, are not subject to copyright protection in the United States. Any CRS Report may be
reproduced and distributed in its entirety without permission from CRS. However, as a CRS Report may include
copyrighted images or material from a third party, you may need to obtain the permission of the copyright holder if you
wish to copy or otherwise use copyrighted material.