Home » News » Use of Biometric Data to Identify Terrorists: Best Practice or Risky Business?
Use of Biometric Data to Identify Terrorists: Best Practice or Risky Business?
PUBLISHED: JULY 2020
In 2017, the United Nations Security Council adopted resolution 2396, requiring States to “develop and implement systems to collect biometric data” in order to “responsibly and properly identify terrorists, including foreign terrorist fighters.” The availability of new technologies and the Covid-19 pandemic have increased both State interest in and capacity to collect and use biometric data for trans-border law enforcement and intelligence gathering, border management, and counter-terrorism.
Despite the increased use of biometric technology, human rights analysis and guidance remains limited and underdeveloped. There are growing concerns that biometric data application in domestic contexts may be adversely affecting human rights and civil society actors.
In realizing this issue, the United Nations Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism, developed this comprehensive report to address human rights implications of states and the United Nations use of biometric data and tools, especially for counterterrorism. The report also notes the exclusion of civil society from the sites and processes in which counter-terrorism law, policy and practice governing the use of biometric data are developed and consolidated.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.