Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

   Ranked #1 Think Tank in U.S. by Global Go To Think Tank Index

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
Blog Post - Technology Policy Blog
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

The Need for Biometrics Goes Beyond Banks

July 5, 2016

This post originally appeared on The New York Times.

Passwords are a leftover from the stone age of computing. They survive because people prefer convenience to security. But it's time to get rid of them, because they are unavoidably insecure — the most commonly used password is 12345, followed closely by 123456 — and easily stolen or spoofed. 

People tend to forget complex passwords, and two-factor authentication (usually, confirming a log-in from another device) is better, but even that method can still be defeated. Plus, it's inconvenient. 

The need for biometric security goes well beyond banks. But of course, there is resistance to it. Biometrics, on the other hand, can provide authentication that is both secure and convenient. Some uniquely identifying personal feature — eyes, face, fingerprints, voice — is converted by the computer into a unique code, which is then used to identify the individual to a network or device. The code is a complex identifier, harder to spoof than a password, and as we move to an internet where people connect using mobile devices loaded with sensors, biometrics are a logical next step for authentication of identity. Best of all, consumers don’t need to remember anything other than to carry their phones.

New technology is often greeted with nervous dystopian projections (think “frankenfish” or “spy chips”) — an irrational, but not unexpected, fear that what we create will undercut privacy or displace humans, that we will build tools we cannot control. But we already live in a networked society, and biometrics offer a chance to better secure our place within it. Just because the pace of technological change is fast doesn't mean we should fear or reject it. 

Biometric technology is not perfect — no technology is ever perfect — but it has significantly improved in the last five years and it is better than what we have now. Let companies and consumers choose where they will use it, and we will be better off. 

Written By
James Andrew Lewis
Senior Vice President and Director, Strategic Technologies Program
Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

Related
Cybersecurity, Cybersecurity and Governance, Cybersecurity and Technology, Other Projects on Cybersecurity, Strategic Technologies Program, Technology and Innovation

More from this blog

Blog Post
The Evolving Role of Artificial Intelligence and Machine Learning in US Politics
In Technology Policy Blog
December 21, 2020
Blog Post
No One is Immune: The Spread of Q-anon Through Social Media and the Pandemic
In Technology Policy Blog
December 17, 2020
Blog Post
Assessing the Impact of U.S.-China Technology Competition and Decoupling: Focusing on 5G
In Technology Policy Blog
December 16, 2020
Blog Post
Covid-19 and the Trajectory of US Venture Capital and Technology Innovation
In Technology Policy Blog
December 3, 2020
Blog Post
Managing U.S.-China Technology Competition and Decoupling
In Technology Policy Blog
November 24, 2020
Blog Post
Applications of Synthetic Aperture Radar Satellites to Environmental Monitoring
In Technology Policy Blog
November 9, 2020
Blog Post
The Goldilocks Porridge Problem with Section 230
By Zhanna Malekos Smith
In Technology Policy Blog
November 3, 2020
Blog Post
Notes from a CSIS Virtual Event: Innovation in the Intelligence Community
In Technology Policy Blog
October 20, 2020

Related Content

Blog Post
Fear, Uncertainty, and Doubt about Human Microchips
By Zhanna Malekos Smith
In Technology Policy Blog
June 23, 2020
Transcript
Mitigating Security Risks to Emerging 5G Networks
February 6, 2019
Report
The Collection Edge: Harnessing Emerging Technologies for Intelligence Collection
By Brian Katz
July 13, 2020
Blog Post
Coming into Focus: China’s Facial Recognition Regulations
In Trustee China Hand
May 4, 2020
Report
Trust Your Eyes? Deepfakes Policy Brief
By James Andrew Lewis
October 23, 2019
Commentary
Digital in the Time of the Coronavirus: Data Science and Technology as a Force for Inclusion
By Aleem Walji
July 28, 2020
Report
Partners, Not Proxies: Capacity Building in Hybrid Warfare
By Melissa Dalton
May 27, 2020
Blog Post
AI Export Controls for National Security
In Technology Policy Blog
May 15, 2020
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2020. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions