Israeli Intelligence to Be Granted Full Access to National Biometric Database

TECHNOLOGY, 27 Nov 2023

Ken Macon | Reclaim the Net – TRANSCEND Media Service

Expanding Data Collection and Use

21 Nov 2023 – The Israeli government is implementing significant amendments in the usage and access of biometric data, which could have profound implications for privacy rights, per recent reports from the Calcalist.

This move demonstrates a radical shift in the control of civilian and private biometric data, especially during the country’s wartime.

The series of altered data permissions are presently making their way through the Knesset, the country’s legislative body, taking the form of regulatory modifications and legislative memos. This proposes a scenario where, barring judicial resistance, the Israeli military, intelligence agencies, and law enforcement could acquire increased surveillance authority.

The Knesset-approved shift in data access is far-reaching and profound, seeking to overturn previous government resolutions. Central to these changes is the all-encompassing access granted to the National Biometric Database. The Israeli government maintains that the purpose of this database is “to protect the identity of the Israeli citizens and to ensure that every person has only one set of official documentation and one unique identity — the person’s true identity.”

This massive data repository will now play a part in identifying victims of crime as well as locating kidnapped or missing civilians. However, the retooled regulations allow for the biometric information to be handed over to security forces for simple identity verification, provided conditions within the nation are declared a “special situation.”

Another notable aspect is the absence of any oversight by other government entities for this new scope of data access. Logically, the national database could evolve into a distinct biometric database not governed by earlier or updated regulations.

_____________________________________________

Ken Macon is a teacher and contributor who focuses on researching and reporting on mass surveillance and privacy rights across the world. ken.macon@reclaimthenet.org

 

Go to Original – reclaimthenet.org


Tags: , , , , , , , ,

Share this article:


DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

There are no comments so far.

Join the discussion!

We welcome debate and dissent, but personal — ad hominem — attacks (on authors, other users or any individual), abuse and defamatory language will not be tolerated. Nor will we tolerate attempts to deliberately disrupt discussions. We aim to maintain an inviting space to focus on intelligent interactions and debates.

× 7 = 28

Note: we try to save your comment in your browser when there are technical problems. Still, for long comments we recommend that you copy them somewhere else as a backup before you submit them.

This site uses Akismet to reduce spam. Learn how your comment data is processed.