{"id":1405,"date":"2022-05-03T14:36:07","date_gmt":"2022-05-03T14:36:07","guid":{"rendered":"https:\/\/law.temple.edu\/ilit\/?p=1405"},"modified":"2024-12-17T23:23:48","modified_gmt":"2024-12-17T23:23:48","slug":"to-the-white-house-office-of-science-and-technology-policy","status":"publish","type":"post","link":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/","title":{"rendered":"iLIT &amp; NYU Response to White House AI Bill of Rights Initiative Draws on Global Practice"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" style=\"text-transform:capitalize\">Response to Request for Information from the White House Office of Science and Technology Policy on a Bill of Rights for an AI-Powered World<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-theme-palette-3-background-color has-background wp-element-button\" href=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/CHRGJ_iLIT_OSTP_RFI_Biometrics_Response-January-2022.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download pdf<\/a><\/div>\n<\/div>\n\n\n\n<p>We are writing on behalf of the Digital Welfare State &amp; Human Rights Project, Center for Human Rights and Global Justice (CHRGJ), NYU School of Law,<sup class=\"modern-footnotes-footnote \" data-mfn=\"1\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-1\">1<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-1\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"1\"><sup>1<\/sup> The Digital Welfare State and Human Rights Project at the Center for Human Rights and Global Justice at NYU School of Law aims to investigate systems of social protection and assistance in countries worldwide that are increasingly driven by digital data and technologies. From NYU, Katelyn Cioffi (katelyn.cioffi@nyu.edu), Victoria Adelmant (victoria.adelmant@law.nyu.edu), and Christiaan van Veen (cvv221@nyu.edu) contributed to this response. <\/span> and the Institute for Law, Innovation &amp; Technology (iLIT), Temple University, Beasley School of Law,<sup class=\"modern-footnotes-footnote \" data-mfn=\"2\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-2\">2<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-2\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"2\">&nbsp;<sup>2<\/sup> The Temple University Institute for Law, Innovation &amp; Technology, pursues research, instruction, and advocacy with a mission to deliver equity and inform&nbsp;new approaches to innovation in the public interest. Contributors: Laura Bingham (laura.bingham@temple.edu), Ed DeLuca (edward.deluca@temple.edu),&nbsp;Sarbjot Kaur Dhillon (sarbjotkd@temple.edu), and Bianca Evans (bianca.evans@temple.edu).&nbsp;<\/span> as well as a group of international legal experts and civil society representatives with extensive experience studying the impacts of biometric technologies.<sup class=\"modern-footnotes-footnote \" data-mfn=\"3\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-3\">3<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-3\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"3\"><sup>3 <\/sup>This response benefited from invaluable input from a group of international experts with deep knowledge of the impact of AI and biometric identification&nbsp;technologies on human rights, including Gautam Bhatia, Yussuf Bashir (Haki na Sheria Initiative), Olga Cronin (Irish Council for Civil Liberties), Reetika&nbsp;Khera, Matthew McNaughton (Slashroots), Grace Mutung\u2019u, Usha Ramanathan, and Anand Venkatanarayanan.&nbsp;<\/span> <\/p>\n\n\n\n<p>We welcome the focus on human and civil rights within the Bill of Rights for an AI-Powered World (\u201cAI Bill of Rights\u201d) initiative and the focus on the impacts of biometric technologies.<sup class=\"modern-footnotes-footnote \" data-mfn=\"4\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-4\">4<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-4\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"4\"><sup>4 <\/sup>Eric Lander &amp; Alondra Nelson, <em>Americans Need a Bill of Rights for an AI-Powered World<\/em>, WIRED, Aug. 10, 2021, https:\/\/www.wired.com\/story\/opinion bill-of-rights-artificial-intelligence\/. <\/span><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/04\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI-1024x683.jpg\" alt=\"\" class=\"wp-image-1258\" \/><figcaption class=\"wp-element-caption\">2020_02_21 IDEAS Hub Opening and Ribbon Cutting<\/figcaption><\/figure>\n\n\n\n<p>Where industry has long pushed for ethical principles, this is an opportunity to protect rights through binding regulations, an essential step given the existential threats such technologies pose to human rights, democracy, and rule of law. OSTP should reflect on both the substance of rights and potential barriers for enforcement. This includes striving to distinguish\u2014as many new technology developers fail to do\u2014between the need for innovation, new laws and new rights, and the need to fix what is broken in existing laws, rules, policies, practices, and institutions.<\/p>\n\n\n\n<p>This response provides international and comparative information to inform OSTP\u2019s understanding of the social, economic, and political impacts of biometric technologies,<sup class=\"modern-footnotes-footnote \" data-mfn=\"5\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-5\">5<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-5\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"5\"><sup>5 <\/sup>Rashida Richardson &amp; Amba Kak, <em>Suspect Development Systems: Databasing Marginality and Enforcing Discipline<\/em>, UNIV. MICH. J. L. REF., Vol. 55&nbsp;(forthcoming), https:\/\/ssrn.com\/abstract=3868392. (highlighting \u201ccounterproductive siloes between the Global South and Global North\u201d)<\/span> in research and regulation.&nbsp;Biometrics fuel automation globally,<sup class=\"modern-footnotes-footnote \" data-mfn=\"6\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-6\">6<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-6\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"6\"><sup>6 <\/sup><em>Id<\/em>.<\/span> often at an accelerated, reckless pace, and these concerns transcend&nbsp;both political and geographic boundaries. Other powerful political actors\u2014perceived as both peers and&nbsp;competitors\u2014are attempting to understand and regulate in this area. This is an opportunity for the United States to be a world leader in ensuring that innovation is pursued in a way that safeguards human rights, both at home and abroad.&nbsp;<\/p>\n\n\n\n<p>While we look forward to a consultative and transparent process for the AI Bill of Rights, we also note&nbsp;that the speed with which such technologies are being deployed requires urgent action. OSTP should&nbsp;work to establish immediate checks on the deployment of some of the most high-risk and contested tools,&nbsp;including an immediate moratorium on mandatory use in critical sectors such as health, education, and welfare, allowing time and space for democratic oversight before further intractable harms emerge. Our&nbsp;complete recommendations can be found in Section V.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>I. The need for a comprehensive federal government response&nbsp;<\/strong><\/h4>\n\n\n\n<p>There is already significant evidence that use of biometric identification in the United States can lead to&nbsp;harm, disproportionately impacting communities already discriminated against on the basis of, <em>inter alia<\/em>,&nbsp;race, sex, and national origin. For example, facial recognition technology disproportionately misidentifies&nbsp;people of color; use in law enforcement thus perpetuates racial bias, false arrests, and police brutality.<sup class=\"modern-footnotes-footnote \" data-mfn=\"7\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-7\">7<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-7\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"7\"><sup>7<\/sup> <em>See <\/em>Joy Adowaa Buolamwini, <em>Gender shades: intersectional phenotypic and demographic evaluation of face datasets and gender classifiers<\/em>, 2017, https:\/\/dspace.mit.edu\/handle\/1721.1\/114068; Patrick Grother, Mei Ngan &amp; Kayee Hanaoka, <em>Face recognition vendor test part 3: demographic effects, <\/em>NIST IR 8280, 2019, https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2019\/NIST.IR.8280.pdf.<\/span>Moreover, the Department of Homeland Security\u2019s (DHS) transnational network of biometric records,&nbsp;tracking, and automated profiling consistently evades scrutiny, but shows evidence of arbitrary, discriminatory, and harmful practices.<sup class=\"modern-footnotes-footnote \" data-mfn=\"8\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-8\">8<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-8\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"8\"><sup>8<\/sup>&nbsp;Ryan Calo &amp; Danielle K. Citron, <em>The Automated Administrative State: A Crisis of Legitimacy<\/em>, 70 EMORY L. J. 797, 830, 2021,&nbsp;https:\/\/scholarlycommons.law.emory.edu\/cgi\/viewcontent.cgi?article=1418&amp;context=elj (finding that no-fly algorithms are unable to distinguish names,&nbsp;and that rules are not disclosed under executive and state secrets privileges); Sam Biddle &amp; Maryam Saleh, <em>Little-Known Federal Software Can Trigger&nbsp;Revocation of Citizenship<\/em>, INTERCEPT, Aug. 25, 2021, https:\/\/theintercept.com\/2021\/08\/25\/atlas-citizenship-denaturalization-homeland-security\/;&nbsp;Richardson &amp; Kak, <em>supra <\/em>note 5.<\/span><\/p>\n\n\n\n<p>Despite evidence of the harms of biometric technologies, regulation is woefully lacking,<sup class=\"modern-footnotes-footnote \" data-mfn=\"9\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-9\">9<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-9\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"9\"><sup>9 <\/sup>Todd Feathers, <em>Why It\u2019s So Hard to Regulate Algorithms<\/em>, MARKUP, Jan. 4, 2022, https:\/\/themarkup.org\/news\/2022\/01\/04\/why-its-so-hard-to-regulate algorithms.<\/span> with the&nbsp;exception of some cities and states.<sup class=\"modern-footnotes-footnote \" data-mfn=\"10\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-10\">10<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-10\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"10\"><sup>10 <\/sup>Facial recognition has been banned or restricted across many cities and several states: <em>see <\/em>Fight for the Future, <em>Map<\/em>, Ban Facial Recognition , https:\/\/www.banfacialrecognition.com\/map\/ (last visited Jan. 13, 2022). <em>See also <\/em>No Biometric Barriers to Housing Act of 2021, H.R. 4360, 117th Cong.&nbsp;(2021\u201322).<\/span> A significant part of the population is not covered by this patchwork of prohibitions,<sup class=\"modern-footnotes-footnote \" data-mfn=\"11\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-11\">11<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-11\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"11\"><sup>11 <\/sup>Tom Simonite, <em>Face Recognition is Being Banned\u2014But It\u2019s Still Everywhere<\/em>, WIRED, Dec. 22, 2021, https:\/\/www.wired.com\/story\/face-recognition banned-but-everywhere\/.<\/span> and while litigation and local regulation provide some oversight, the federal&nbsp;government and its contractors are not held accountable even to these inadequate standards.<sup class=\"modern-footnotes-footnote \" data-mfn=\"12\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-12\">12<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-12\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"12\"><sup>12 <\/sup>Calo &amp; Citron, <em>supra <\/em>note 8, at 815 (citing the APA\u2019s restrictions on challenging federal agency action).<\/span> The&nbsp;absence of, for instance, guidance for development and use of AI by the federal government and its agencies, as well as common binding standards for private actors, risks perpetuating fragmented and&nbsp;insufficient rights protection. Further, the federal government has a vital role to play in regulating <em>all <\/em>biometric technologies, including those which have been in place for decades, such as fingerprint&nbsp;scanning in the law enforcement and immigration contexts, as well as the extraterritorial application of technologies developed, produced, sold, and promoted by U.S. government agencies and corporations.&nbsp;<\/p>\n\n\n\n<p>Two initial, fundamental concerns with a \u201cBill of Rights\u201d approach must be highlighted, based on expert&nbsp;comparative legal analysis from several constitutional democracies. First, such an approach, if taken at face value as an effort to amend or modernize textually anchored rights, may exclude structural constitutional questions, such as separation of powers, the scope and quality of judicial review, and standing. Adoption of biometrics and predictive technologies increasingly concentrates power in executive agencies, inviting structural, slow-onset forms of injury.<sup class=\"modern-footnotes-footnote \" data-mfn=\"13\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-13\">13<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-13\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"13\"><sup>13 <\/sup><em>See, e.g.<\/em>, <em>id. <\/em>at 845; Marielle Debos, <em>Biometrics and the Disciplining of Democracy: Technology, Electoral Politics, and Liberal Interventionism in&nbsp;Chad<\/em>, DEMOCRATIZATION 1, Mar. 31, 2021, https:\/\/doi.org\/10.1080\/13510347.2021.1907349.<\/span> Yet, unlike most constitutional systems, U.S. judicial review of administrative actions is structurally divorced from constitutional law and rights protection. Much relevant technology is predicated on \u201cimproving\u201d or \u201cmodernizing\u201d the&nbsp;administrative state, but \u201cadministrative law in the USA is not concerned primarily with basic rights.\u201d<sup class=\"modern-footnotes-footnote \" data-mfn=\"14\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-14\">14<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-14\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"14\"><sup>14<\/sup> Vicki C. Jackson &amp; Mark Tushnet (eds.), PROPORTIONALITY: NEW FRONTIERS, NEW CHALLENGES 111, 2017. <em>See also <\/em>David Engstrom et al.,&nbsp;<em>Government By Algorithm: Artificial Intelligence in Federal Administrative Agencies<\/em>, 2020, https:\/\/www-cdn.law.stanford.edu\/wp <\/span>Rights, however formulated, therefore risk being effectively unenforceable as executive discretion&nbsp;continues its extra-constitutional expansion.&nbsp;<\/p>\n\n\n\n<p>Second, the absence of a cause of action for indirect discrimination (\u201cdisparate impact\u201d) that applies generally across different sectors and to state, local, and federal departments, as well as private actors, is concerning in this context. In contrast to proportionality tests applied in the majority of constitutional frameworks,<sup class=\"modern-footnotes-footnote \" data-mfn=\"15\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-15\">15<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-15\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"15\"><sup>15 <\/sup>Jackson &amp; Tushnet, <em>Id.<\/em>, at 111.<\/span> U.S. constitutional balancing tests are rigid and rules-driven, restricting serious scrutiny&nbsp;to the most obvious and intentional instances of racial discrimination.<sup class=\"modern-footnotes-footnote \" data-mfn=\"16\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-16\">16<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-16\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"16\"><sup>16 <\/sup><em>Id.<\/em><\/span> Though disparate impact exists&nbsp;as a theory of liability under some federal civil rights statutes,<sup class=\"modern-footnotes-footnote \" data-mfn=\"17\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-17\">17<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-17\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"17\"><sup>17 <\/sup><em>See Texas Dep&#8217;t of Hous. &amp; Cmty. Affs. v. Inclusive Communities Project, Inc.<\/em>, 576 U.S. 519 (2015). <em>See <\/em>Cass R. Sunstein, <em>Algorithms, Correcting&nbsp;Biases<\/em>, 86 SOC. RES.: INT\u2019L Q. 499, 510, 2019 (noting disparate impact liability presents some of the most important issues for challenging algorithmic&nbsp;discrimination in the future), http:\/\/eliassi.org\/sunstein_2019_algs_correcting_biases.pdf.<\/span> even here the availability of disparate&nbsp;impact claims is at executive agencies\u2019 discretion in their enforcement of federal anti-discrimination laws.<sup class=\"modern-footnotes-footnote \" data-mfn=\"18\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-18\">18<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-18\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"18\"><sup>18 <\/sup><em>See, e.g.<\/em>, <em>HUD\u2019s New Rule Paves the Way for Rampant Algorithmic Discrimination in Housing Decisions<\/em>, NEW AM., Oct. 1, 2020, http:\/\/newamerica.org\/oti\/blog\/huds-new-rule-paves-the-way-for-rampant-algorithmic-discrimination-in-housing-decisions. On disparate impact generally,&nbsp;see <em>Tex. Dep&#8217;t of Hous. &amp; Cmty. Affairs v. Inclusive Cmtys. Project, Inc.<\/em>, 576 U.S. 519 (2015). <em>See also Griggs v. Duke Power Co.<\/em>, 401 U.S. 424 (1971).<\/span> In most other jurisdictions, and under international treaties like the Convention on the Elimination of All Forms of Racial Discrimination, ratified by the United States in 1994, the term \u201cindirect&nbsp;discrimination\u201d is used to denote liability for discrimination based on the <em>effect <\/em>of laws and practices.<sup class=\"modern-footnotes-footnote \" data-mfn=\"19\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-19\">19<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-19\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"19\"><sup>19<\/sup>&nbsp;<em>See <\/em>Audrey Daniel, <em>The Intent Doctrine and CERD: How the United States Fails to Meet Its International Obligations in Racial Discrimination&nbsp;Jurisprudence<\/em>, 4 DEPAUL J. SOC. JUST. 263, 2011, https:\/\/via.library.depaul.edu\/jsj\/vol4\/iss2\/3. <em>See also <\/em>EU Council Directive 2000\/43\/EC of 29 June 2000&nbsp;implementing the principle of equal treatment between persons irrespective of racial or ethnic origin, 2000 O.J. (L 180) 22 (requiring EU Member States to&nbsp;prohibit direct and indirect discrimination on the basis of racial or ethnic origin); <em>D.H. and Others v. the Czech Republic<\/em>, App. No. 57325\/00, 47 EUR. H.R.&nbsp;REP. 3, 2008.<\/span><\/p>\n\n\n\n<p>The limited availability and lax enforcement of disparate impact leaves the equal protection clause gutted&nbsp;and insufficient to deal with AI-enabled biometric discrimination.<sup class=\"modern-footnotes-footnote \" data-mfn=\"20\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-20\">20<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-20\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"20\"><sup>20 <\/sup><em>See, e.g.<\/em>, Mark MacCarthy, <em>Fairness in algorithmic decision-making<\/em>, BROOKINGS, 2019, https:\/\/www.brookings.edu\/research\/fairness-in-algorithmic decision-making\/.<\/span><sup> <\/sup>Without providing for disparate impact claims, rights protections in the U.S. fall beneath international equality standards that the&nbsp;government has pledged to uphold and are not fit for purpose in an automated society which already&nbsp;exhibits structural bias and discrimination.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>II. International evidence provides a critical resource&nbsp;<\/strong><\/h4>\n\n\n\n<p>There is now a significant body of evidence that illuminates both the potential benefits and harms of biometric technologies in different contexts.<sup class=\"modern-footnotes-footnote \" data-mfn=\"21\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-21\">21<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-21\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"21\"><sup>21 <\/sup>A 2013 survey found at least 230 instances of developmental programs using biometric identification tech. <em>See <\/em>Alan Gelb &amp; Julia Clark, <em>Identification for&nbsp;Development: The Biometrics Revolution<\/em>, SSRN J., 2013, http:\/\/www.ssrn.com\/abstract=2226594.<\/span><sup> <\/sup>This response reflects input from leading experts who have&nbsp;worked in India, Jamaica, Kenya, and Ireland,<sup class=\"modern-footnotes-footnote \" data-mfn=\"22\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-22\">22<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-22\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"22\"><sup>22 <\/sup><em>See supra <\/em>note 3.<\/span> where governments, international organizations, and&nbsp;private actors have used a combination of biometrics, data sets, and machine learning to mediate access to fundamental rights.<sup class=\"modern-footnotes-footnote \" data-mfn=\"23\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-23\">23<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-23\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"23\"><sup>23 <\/sup>Biometrics must be evaluated in conjunction with related algorithms, data sets, and institutional arrangements, sometimes called the \u2018biometric&nbsp;assemblage\u2019. <em>See <\/em>Mirca Madianou, <em>The Biometric Assemblage: Surveillance, Experimentation, Profit, and the Measuring of Refugee Bodies<\/em>, 20&nbsp;TELEVISION &amp; NEW MEDIA 581\u2013599, 2019, https:\/\/doi.org\/10.1177\/1527476419857682.<\/span> With cities and states in the United States poised to follow suit, <sup class=\"modern-footnotes-footnote \" data-mfn=\"24\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-24\">24<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-24\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"24\"><sup>24 <\/sup><em>See generally<\/em>, Mizue Aizeki &amp; Rashida Richardson, eds., <em>Smart-City Digital ID Projects: Reinforcing Inequality and Increasing Surveillance through&nbsp;Corporate \u201cSolutions\u201d<\/em>, Dec. 2021, https:\/\/www.immigrantdefenseproject.org\/wp-content\/uploads\/smart-city-digital-id-products.pdf.<\/span><sup> <\/sup>this research&nbsp;provides an invaluable resource, allowing for proactive actions that anticipate and mitigate known harms.&nbsp;<\/p>\n\n\n\n<p>Most critically, evidence now extends beyond frequently raised concerns about surveillance and privacy&nbsp;in the context of law enforcement and national security, to encompass concerns about social rights such&nbsp;as health, social security, education<sup class=\"modern-footnotes-footnote \" data-mfn=\"25\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-25\">25<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-25\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"25\"><sup>25 <\/sup>Sally Weale, <em>ICO to Step in After Schools use Facial Recognition to Speed up Lunch Queue<\/em>, GUARDIAN, Oct. 18, 2021, https:\/\/www.theguardian.com\/education\/2021\/oct\/18\/privacy-fears-as-schools-use-facial-recognition-to-speed-up-lunch-queue-ayrshire-technology payments-uk.<\/span><sup> <\/sup>housing, and employment<sup class=\"modern-footnotes-footnote \" data-mfn=\"26\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-26\">26<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-26\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"26\"><sup>26 <\/sup><em>See, e.g.<\/em>, Center for Human Rights and Global Justice [CHRGJ] et al., <em>Chased Away and Left to Die: How a National Security Approach to Uganda\u2019s&nbsp;National Digital ID Has Led to Wholesale Exclusion of Women and Older Persons, <\/em>2021, https:\/\/chrgj.org\/wp-content\/uploads\/2021\/06\/CHRGJ-Report Chased-Away-and-Left-to-Die.pdf; Karthik Muralidharan et al., <em>Identity Verification Standards in Welfare Programs: Experimental Evidence from India,&nbsp;<\/em>NBER WORKING PAPER SERIES 26744, 2020, http:\/\/www.nber.org\/papers\/w26744.pdf.; Jean Dr\u00e8ze, <em>There is an urgent need for safeguards against unfair&nbsp;discontinuation of social benefits<\/em>, INDIAN EXPRESS, Apr. 20, 2021, https:\/\/indianexpress.com\/article\/opinion\/columns\/aadhaar-linking-public-welfare schemes-pds-system-7280621\/; Reetika Khera, ed., <em>Dissent on Aadhaar: Big Data Meets Big Brother, <\/em>2018.<\/span><\/p>\n\n\n\n<p><sup> <\/sup>A recurring finding is that biometrics have potential to generate and exacerbate patterns of social exclusion, as well as direct and indirect&nbsp;discrimination. These technologies thus increasingly affect access, availability, affordability, and quality of fundamental public services.&nbsp;<\/p>\n\n\n\n<p><strong>A. How do AI and biometric technologies generate exclusion and discrimination?&nbsp;<\/strong><\/p>\n\n\n\n<p>Exclusion can be caused by innate problems with biometric technology. While much recent critique has focused on facial recognition and mass surveillance, the difficulties of mitigating the harmful effects of&nbsp;\u201clower-tech\u201d solutions<sup class=\"modern-footnotes-footnote \" data-mfn=\"27\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-27\">27<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-27\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"27\"><sup>27 <\/sup>Shoshana Amielle Magnet, <em>Criminalizing Poverty: Adding Biometrics to Welfare<\/em>, WHEN BIOMETRICS FAIL: GENDER, RACE, AND THE TECHNOLOGY OF&nbsp;IDENTITY 23, 2011.<\/span> such as fingerprinting, should be both a warning and opportunity for learning as&nbsp;\u201cnovel,\u201d more advanced technologies emerge. As with most biometrics, specific notions of \u201cnormality\u201d are built into fingerprinting systems; \u201chand scanners have particular sizes and shapes, with designated&nbsp;places to put the fingers,\u201d and anyone falling outside of this \u201cnorm\u201d will struggle to authenticate.<sup class=\"modern-footnotes-footnote \" data-mfn=\"28\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-28\">28<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-28\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"28\"><sup>28 <\/sup>Sanneke Kloppenburg &amp; Irma van der Ploeg, <em>Securing Identities: Biometric Technologies and the Enactment of Human Bodily Difference<\/em>, 29(1) SCI. AS&nbsp;CULTURE 57, 62, 2020, https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09505431.2018.1519534.<\/span><sup> <\/sup>Failure&nbsp;rates are significantly higher among people of color as systems are \u201cinfrastructurally calibrated to&nbsp;whiteness.&#8221;<sup class=\"modern-footnotes-footnote \" data-mfn=\"29\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-29\">29<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-29\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"29\"><sup>29 <\/sup><em>See <\/em>Shoshana Magnet, <em>When Biometrics Fail: Gender, Race, and the Technology of Identity<\/em>, 2011, at 49, https:\/\/www.dukeupress.edu\/when-biometrics fail; Simone Brown, <em>Dark Matter: On the Surveillance of Blackness<\/em>, 2015, https:\/\/read.dukeupress.edu\/books\/book\/147\/Dark-MattersOn-the-Surveillance of-Blackness; Grother et. al, <em>supra <\/em>note 7.<\/span><sup> <\/sup>Further, as biometric systems are probabilistic and are often designed to tolerate significant exclusion errors, relying on them to definitively identify or verify will inevitably lead to exclusion.<sup class=\"modern-footnotes-footnote \" data-mfn=\"30\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-30\">30<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-30\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"30\"><sup>30 <\/sup>Jeremy Wickins, <em>The Ethics of Biometrics: the Risk of Social Exclusion from the Widespread use of Electronic Identification<\/em>, 13 SCI &amp; ENGINEERING&nbsp;ETHICS 45\u201354, 2007, http:\/\/link.springer.com\/10.1007\/s11948-007-9003-z.<\/span><\/p>\n\n\n\n<p>Moreover, while laboratory-based testing of biometric technologies might show relatively high success&nbsp;rates, as was shown in a challenge to a nationwide digital ID system reliant on fingerprint authentication&nbsp;in Kenya, \u201cthe real-world data is very different.<sup class=\"modern-footnotes-footnote \" data-mfn=\"31\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-31\">31<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-31\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"31\"><sup>31 <\/sup>Nubian Rights Forum &amp; 2 others v. Attorney General &amp; 6 others, 2020, eKLR 37 [Kenya], at para. 37, http:\/\/kenyalaw.org\/caselaw\/cases\/view\/189189\/.<\/span><sup> <\/sup>Environmental conditions, including humidity, temperature, and light exposure, impact the quality of biometric data capture.<sup class=\"modern-footnotes-footnote \" data-mfn=\"32\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-32\">32<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-32\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"32\"><sup>32 <\/sup><em>See e.g.<\/em>, UNITED KINGDOM GOVERNMENT OFFICE FOR SCIENCE, BIOMETRICS: A GUIDE<em>, <\/em>June 15, 2018:&nbsp;https:\/\/www.gov.uk\/government\/publications\/biometrics-a-guide; Ann Livingston et al., <em>Upholding the Rights of Children: Special Considerations on the&nbsp;Use of Biometrics in Identity Systems<\/em>, 2019, https:\/\/www.id4africa.com\/2019\/almanac\/UNICEF-Ann-Livingston-Kristen-Wenz-Nicola-Richards.pdf.<\/span><sup> <\/sup>Biometrics are not&nbsp;immutable, as they can alter over time and degrade with age. Capture and authentication often depend on fragile, expensive hardware, as well as quality internet and electricity. Thus, digital divides\u2014which map onto other disadvantages\u2014can be exacerbated through AI-enabled biometrics.<sup class=\"modern-footnotes-footnote \" data-mfn=\"33\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-33\">33<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-33\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"33\"><sup>33 <\/sup>Silvia Masiero, <em>Biometric Infrastructures and the Indian Public Distribution System<\/em>, S. ASIA MULTIDISCIPLINARY ACAD. J. 11 (2020), https:\/\/journals.openedition.org\/samaj\/6459.This remains a significant issue in the United States, see Emily A. Vogels, <em>Digital Divide Persists Even As Americans With Lower Incomes Make Gains In Tech Adoption<\/em>, 2021, https:\/\/www.pewresearch.org\/fact-tank\/2021\/06\/22\/digital-divide-persists-even-as americans-with-lower-incomes-make-gains-in-tech-adoption\/.<\/span><\/p>\n\n\n\n<p>Consequently, when biometrics are yoked to essential services such as social security or health care,&nbsp;marginalization and exclusion may arise. This in turn results in decreased access to numerous fundamental entitlements, damaging physical and mental health, and impacting dignity. This has been&nbsp;extensively documented in India, home to the world\u2019s largest biometric identification system, Aadhaar.<sup class=\"modern-footnotes-footnote \" data-mfn=\"34\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-34\">34<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-34\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"34\"><sup>34 <\/sup>Over 1.2 billion people have enrolled in the Aadhaar system. Swetha Totapelly et al., <em>State of Aadhaar Report<\/em>, 2019, https:\/\/stateofaadhaar.in\/download reports.php.<\/span>&nbsp;<\/p>\n\n\n\n<p>Persistent failures to authenticate fingerprints through Aadhaar at the point of service for welfare&nbsp;programs, including food rations depended on by four-fifths of Indian families, has resulted in numerous&nbsp;deaths by starvation, families cut off from rations for weeks, and a system that increasingly punishes the&nbsp;poor.<sup class=\"modern-footnotes-footnote \" data-mfn=\"35\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-35\">35<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-35\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"35\"><sup>35 <\/sup><em>See, e.g.<\/em>, Reetika Khera, <em>These digital IDs have cost people their privacy \u2014 and their lives<\/em>, WASH. POST, Aug. 9, 2018, https:\/\/www.washingtonpost.com\/news\/theworldpost\/wp\/2018\/08\/09\/aadhaar\/, last visited Jan. 14, 2022; <em>India\u2019s High-Tech Governance Risks Leaving&nbsp;Behind its Poorest Citizens<\/em>, ECONOMIST, Oct. 16 2021, https:\/\/www.economist.com\/asia\/2021\/10\/16\/indias-high-tech-governance-risks-leaving-behind-its poorest-citizens; Ursula Rao, <em>Biometric Bodies, Or How to Make Electronic Fingerprinting Work in India<\/em>, 24 BODY &amp; SOC. 68\u201394, 2018, https:\/\/doi.org\/10.1177\/1357034X18780983.<\/span><sup> <\/sup>In Uganda, card readers were unable to read older persons\u2019 fingerprints or match their biometric profile to an accurate birth date in the national ID database. Although eligible to access certain social&nbsp;protection programs, such as cash transfers, older persons were consistently denied access to life-saving&nbsp;grants because of their inability to identify and authenticate biometrically.<sup class=\"modern-footnotes-footnote \" data-mfn=\"36\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-36\">36<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-36\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"36\"><sup>36 <\/sup>CHRGJ et al., <em>supra <\/em>note 26, at 31\u201333.<\/span><\/p>\n\n\n\n<p>Even where such technologies operate as intended, their use can facilitate other forms of indirect&nbsp;discrimination. They can sit atop existing barriers, while introducing further requirements, and access&nbsp;becomes contingent on digital literacy, specific forms of personal identification<sup class=\"modern-footnotes-footnote \" data-mfn=\"37\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-37\">37<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-37\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"37\"><sup>37 <\/sup><em>See <\/em>Vivek Maru et al., <em>Digital IDs Make Systemic Bias Worse<\/em>, WIRED, Feb. 5, 2020, https:\/\/www.wired.com\/story\/opinion-digital-ids-make-systemic bias-worse\/.<\/span><sup> <\/sup>reliable access to basic&nbsp;ICT services, or fees related to travel, administration, and lost time spent navigating the system. For&nbsp;instance, in India, the use of Aadhaar in public services requires networks of data operators who&nbsp;continuously collect and verify biometric data. Without oversight, such operators become bureaucratic&nbsp;bottlenecks, sites of harassment and intimidation, and an insurmountable barrier to accessing services.<sup class=\"modern-footnotes-footnote \" data-mfn=\"38\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-38\">38<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-38\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"38\"><sup>38 <\/sup>Vyom Anil &amp; Jean Dr\u00e8ze, <em>Without Aadhaar, Without Identity<\/em>, INDIAN EXPRESS, July 5, 2021, https:\/\/indianexpress.com\/article\/opinion\/columns\/flaw-in aadhaar-architecture-uidai-card-enrolment-7389133\/.<\/span><\/p>\n\n\n\n<p><strong>B. Civil death and other cumulative, systemic impacts of biometric systems&nbsp;<\/strong><\/p>\n\n\n\n<p>Taken individually, instances of exclusion may already constitute indirect discrimination. But the&nbsp;persistence of biometric information also means that the effects of exclusion replicate quickly, locking individuals out of multiple services. In Kenya, the United Nations High Commissioner for Refugees&nbsp;(UNHCR) collected biometric information to distribute food aid during a period of famine. Consequently,&nbsp;many Kenyans who were registered as children are victims of \u2018double registration\u2019: since their biometric data appears in a refugee database, the government denies them national ID cards, restricting access to services including employment, health care, and social security.<sup class=\"modern-footnotes-footnote \" data-mfn=\"39\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-39\">39<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-39\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"39\"><sup>39 <\/sup>Haki na Sheria Initiative, <em>Biometric Purgatory: How the Double Registration of Vulnerable Kenyan Citizens in the UNHCR Database Left Them at Risk&nbsp;of Statelessness<\/em>, 2021, http:\/\/citizenshiprightsafrica.org\/wp-content\/uploads\/2021\/11\/Haki-na-Sheria_Double-Registration_Nov2021.pdf.<\/span><sup> <\/sup>In Ireland, the Public Services Card&nbsp;(PSC), which includes collection of biometric data, rapidly expanded beyond its original role in the welfare system, with other government agencies requiring it as the sole form of ID.<sup class=\"modern-footnotes-footnote \" data-mfn=\"40\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-40\">40<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-40\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"40\"><sup>40 <\/sup><em>DPC welcomes resolution of proceedings relating to the Public Services Card<\/em>, Dec. 10, 2021, https:\/\/www.dataprotection.ie\/news-media\/latest news\/dpc-welcomes-resolution-proceedings-relating-public-services-card.<\/span><sup> <\/sup>This expansion was&nbsp;introduced without transparency, democratic debate, or adequate review of its necessity and&nbsp;proportionality. The use of biometrics can therefore quickly become <em>de facto <\/em>mandatory, even when not&nbsp;formally required.&nbsp;<\/p>\n\n\n\n<p>Any failure to authenticate or ensure that data is consistent across different systems can therefore lead to \u201ccivil death,&#8221;<sup class=\"modern-footnotes-footnote \" data-mfn=\"41\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-41\">41<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-41\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"41\"><sup>41 <\/sup>Usha Ramanathan, <em>Aadhaar is Like Drone Warfare Versus Hand to Hand Combat, Profiling Becomes All That More Easier<\/em>, BUSINESS STANDARD, Apr.&nbsp;1, 2016, https:\/\/www.business-standard.com\/article\/economy-policy\/aadhaar-is-like-drone-warfare-versus-hand-to-hand-combat-profiling-becomes-all that-more-eaiser-usha-ramanathan-116033101394_1.html.<\/span><sup> <\/sup>where an individual is cut off from <em>all <\/em>fundamental services. This is the case in Pakistan,&nbsp;where the government has unilaterally blocked certain individuals\u2019 biometric digital IDs, forcing them&nbsp;into a vetting process to \u2018prove\u2019 aspects of their identity such as citizenship or gender.<sup class=\"modern-footnotes-footnote \" data-mfn=\"42\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-42\">42<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-42\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"42\"><sup>42 <\/sup>Alizeh Kohari, <em>Life in Pakistan without a digital ID<\/em>, CODA STORY, Nov. 3, 2021, https:\/\/www.codastory.com\/authoritarian-tech\/pakistan-biometrics stateless\/.<\/span><sup> <\/sup>In Assam, India, the government recently conducted a mass citizenship verification process,<sup class=\"modern-footnotes-footnote \" data-mfn=\"43\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-43\">43<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-43\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"43\"><sup>43 <\/sup>Siddhartha Deb, <em>\u2018They Are Manufacturing Foreigners\u2019: How India Disenfranchises Muslims<\/em>, N.Y. TIMES, Sept. 15, 2021, https:\/\/www.nytimes.com\/2021\/09\/15\/magazine\/india-assam-muslims.html.<\/span><sup> <\/sup>placing approximately 2.7&nbsp;million people on a \u2018doubtful list\u2019 of those whose citizenship is called into question. Many on this list&nbsp;have had their biometric profiles frozen; this means that they cannot use their Aadhaar record to receive&nbsp;health care, access food rations, get a drivers\u2019 license, or register a SIM card.<sup class=\"modern-footnotes-footnote \" data-mfn=\"44\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-44\">44<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-44\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"44\"><sup>44 <\/sup><em>Two Years Since NRC, Lakhs Still Remain in Limbo<\/em>, HINDU, Aug. 31, 2021, https:\/\/www.thehindu.com\/news\/national\/two-years-since-nrc-lakhs-still remain-in-limbo\/article36201266.ece.<\/span><\/p>\n\n\n\n<p>This civil death phenomenon is especially concerning since use of biometric technologies can coincide with entrenchment of structural racism and discrimination. While the broad use of these technologies in&nbsp;public service delivery will ultimately affect everyone, at present harms disproportionately impact already marginalized communities; across many biometric systems, those unable to identify and verify are often those in poor, rural communities, ethnic and religious minorities, women, and older persons.<sup class=\"modern-footnotes-footnote \" data-mfn=\"45\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-45\">45<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-45\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"45\"><sup>45 <\/sup>Totapelly et al., <em>supra <\/em>note 34.<\/span><\/p>\n\n\n\n<p>Widespread deployment may thus exacerbate and deepen structural and institutional patterns of harm.<sup class=\"modern-footnotes-footnote \" data-mfn=\"46\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-46\">46<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-46\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"46\"><sup>46 <\/sup>Virginia Eubanks, <em>Automating Inequality<\/em>, 9, 2018.<\/span> <\/p>\n\n\n\n<p>Beyond exclusion, the extensive use of biometrics can also fundamentally affect democracy, the rule of law, accountability and transparency,<sup class=\"modern-footnotes-footnote \" data-mfn=\"47\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-47\">47<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-47\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"47\"><sup>47 <\/sup><em>See <\/em>S\u00e9verine Awenengo Dalberto &amp; Richard Ban\u00e9gas (eds.), <em>Identification and Citizenship in Africa: Biometrics, the Documentary State and Bureaucratic&nbsp;Writings of the Self<\/em>, https:\/\/www.taylorfrancis.com\/books\/9781000380033.<\/span><sup> <\/sup>while entrenching private sector control over public functions.<sup class=\"modern-footnotes-footnote \" data-mfn=\"48\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-48\">48<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-48\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"48\"><sup>48 <\/sup><em>See generally <\/em>Linnet Taylor, <em>Public Actors Without Public Values: Legitimacy, Domination and the Regulation of the Technology Sector<\/em>, PHIL. &amp; TECH. (2021), https:\/\/doi.org\/10.1007\/s13347-020-00441-4; Julie Cohen, <em>Between Truth and Power: The Legal Constructions of Informational Capitalism<\/em>, 2019.<\/span> After alleged election rigging in the 2017 Kenyan presidential election, government officials were unable to comply with judicial orders to grant access to election results data tied to a biometric voter registration&nbsp;system, as the vendor\u2019s servers were in France.<sup class=\"modern-footnotes-footnote \" data-mfn=\"49\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-49\">49<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-49\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"49\"><sup>49 <\/sup>Ken Flottman, <em>Kenya\u2019s IEBC announced 18 months ago that it would finally open its vote tally servers to public, but has failed to do so<\/em>, AFRICOMMONS,&nbsp;Aug. 29, 2020, https:\/\/africommons.com\/tag\/france\/; Duncan Miriri, <em>Kenyan opposition leader targets Safaricom staff over election<\/em>, REUTERS, Sept. 27,&nbsp;2017, https:\/\/www.reuters.com\/article\/kenya-election-safaricom-idUSL8N1M81HK; Dalberto &amp; Banegas (eds.), <em>supra <\/em>note 52.<\/span><sup> <\/sup>In South Africa, the introduction of biometric&nbsp;technologies into welfare payment systems resulted in one company\u2019s disastrous monopoly while&nbsp;weakening the government\u2019s power to maintain any control over the welfare system.<sup class=\"modern-footnotes-footnote \" data-mfn=\"50\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-50\">50<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-50\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"50\"><sup>50 <\/sup><em>See e.g.<\/em>, Keith Breckenridge, <em>The Global Ambitions of the Biometric Anti-Bank: Net1, Lockin and the Technologies of African Financialisation<\/em>, 33 INT\u2019L&nbsp;REV. OF APP. ECON<em>. <\/em>93\u2013118, 2019, https:\/\/wiser.wits.ac.za\/content\/global-ambitions-biometric-anti-bank-net1-lockin-and-technologies-african financialization; Robyn Foley &amp; Mark Swilling, <em>How One Word Can Change the Game: Case Study of State Capture and the South African Social Security&nbsp;Agency, Stellenbosch: State Capacity Research Project<\/em>, 2018, https:\/\/www0.sun.ac.za\/cst\/publication\/how-one-word-can-change-the-game-a-case-study of-state-capture-and-the-south-african-social-security-agency-sassa\/.&nbsp;<\/span><sup> <\/sup>Use of biometrics&nbsp;can thus augment powerful market-based interests that do not reflect human rights and democratic&nbsp;principles.<sup class=\"modern-footnotes-footnote \" data-mfn=\"51\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-51\">51<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-51\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"51\"><sup>51 <\/sup>Amba Kak, ed., <em>Regulating Biometrics: Global Approaches and Urgent Questions<\/em>, 2020, https:\/\/ainowinstitute.org\/regulatingbiometrics.html.<\/span>&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>III. Comparative efforts to mitigate the exclusionary impact of biometric identification&nbsp;<\/strong><\/h4>\n\n\n\n<p>While a data protection and privacy framework should be seen as a necessary condition to safeguard&nbsp;human rights in the context of biometrics, such measures are not sufficient to combat broader effects.&nbsp;Regulatory efforts that fail to include specific remedies for exclusion nor accessible accountability&nbsp;mechanisms render it extremely difficult to safeguard rights. For instance, India\u2019s Aadhaar Act stipulates that children shall not be denied access to any subsidy, benefit, or service as a result of failed biometric authentication, but does not provide any specific cause of action or remedy.<sup class=\"modern-footnotes-footnote \" data-mfn=\"52\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-52\">52<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-52\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"52\"><sup>52 <\/sup><em>Id.<\/em><\/span><sup> <\/sup>Most efforts to regulate the use of biometrics\u2014and AI more broadly\u2014have also failed to adequately engage affected communities in a meaningful, continuous way.<sup class=\"modern-footnotes-footnote \" data-mfn=\"53\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-53\">53<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-53\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"53\"><sup>53 <\/sup>Christopher Wilson, <em>Public Engagement and AI: A Values Analysis of National Strategies<\/em>, GOV\u2019T INFO. Q. 101652, 2021, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0740624X21000885.&nbsp;<\/span> In Ireland, this was a core complaint about the expansion of the PSC\u2019s scope.&nbsp;<\/p>\n\n\n\n<p>Blocked by the lack of remedies, civil society organizations have resorted to litigation to challenge&nbsp;biometric identification systems. A series of such court cases highlights impacts on equality, dignity,&nbsp;autonomy, health, and social security, and demonstrates some ways in which legal frameworks and norms&nbsp;can be applied to biometric technologies.<sup class=\"modern-footnotes-footnote \" data-mfn=\"54\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-54\">54<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-54\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"54\"><sup>54 <\/sup><em>See <\/em>Nubian Rights Forum, <em>supra <\/em>note 31; <em>Justice K.S. Puttaswamy (Retd.) and Anr. vs. Union of India and Ors. Writ Petition (Civil) No. 494 of 2012 and&nbsp;Connected Matters <\/em>[India] (26 September 2018); Press Release: Civil Society Drags Government to Court Over Requirement to Have National ID Card&nbsp;Before Receiving Covid-19 Vaccine (2021), https:\/\/iser-uganda.org\/images\/downloads\/COVID19_vaccine_and_IDs-ISER_Press_Briefing.pdf<\/span><sup> <\/sup>However, litigation is not an ideal mechanism, and challenges&nbsp;within litigation reflect broader difficulties regulating AI.<sup class=\"modern-footnotes-footnote \" data-mfn=\"55\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-55\">55<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-55\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"55\"><sup>55 <\/sup><em>See, e.g.<\/em>, Reetika Khera, \u201cThe poor are left to themselves,\u201d THE HINDU, Sept. 28, 2018, https:\/\/www.thehindu.com\/opinion\/lead\/the-poor-are-left-to themselves\/article25074493.ece, last visited Jan. 14, 2022.<\/span><sup> <\/sup>For instance, biometric identification projects&nbsp;often involve proprietary technology and are implemented quickly and with little transparency; litigants&nbsp;therefore face significant barriers to accessing information necessary to challenge these systems. Judicial timelines also mean that harms may continue, and often replicate and deepen, while awaiting review.&nbsp;<\/p>\n\n\n\n<p>Pushback from civil society and affected communities has also demonstrated the limitations of a purely individual rights framework that does not sufficiently recognize disparate impact; many of the impacts&nbsp;of biometric technology are structural, dispersed, and affect groups collectively. For instance, the legal challenge to the national ID system in Kenya required individual plaintiffs to show that they, as a member of a particular <em>group<\/em>, had been directly disadvantaged through the disparate impacts of biometric&nbsp;technologies.<sup class=\"modern-footnotes-footnote \" data-mfn=\"56\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-56\">56<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-56\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"56\"><sup>56 <\/sup>Amnesty International, <em>Ban the Scan NYC<\/em>, https:\/\/banthescan.amnesty.org\/nyc\/, last visited Jan 13, 2022. <em>See also <\/em>Section II.<\/span><sup> <\/sup>Similar issues have emerged in the United States,<sup class=\"modern-footnotes-footnote \" data-mfn=\"57\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-57\">57<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-57\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"57\"><sup>57 <\/sup>Mutale Nkonde, <em>Automated Anti-Blackness: Facial Recognition in Brooklyn, New York<\/em>, HARV. KENNEDY SCH. J. AFR. AMER. POL., 2019\u201320. https:\/\/pacscenter.stanford.edu\/wp-content\/uploads\/2020\/12\/mutalenkonde.pdf; Lola Fadulu, <em>Facial Recognition Technology in Public Housing Prompts&nbsp;Backlash<\/em>, N.Y. TIMES, Sept. 24, 2019, https:\/\/www.nytimes.com\/2019\/09\/24\/us\/politics\/facial-recognition-technology-housing.html.<\/span><sup> <\/sup>where victims of biased surveillance&nbsp;systems are left without constitutional protections.<sup class=\"modern-footnotes-footnote \" data-mfn=\"58\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-58\">58<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-58\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"58\"><sup>58 <\/sup><em>United States v. Tuggle<\/em>, 4 F. 4th 505, 513 (7th Cir. 2021).<\/span><sup> <\/sup>Thus, it is crucial to establish definitions of group&nbsp;harms and indirect discrimination, as well as evidentiary standards for demonstrating disparate impact.&nbsp;<\/p>\n\n\n\n<p>Each application of biometric technology deserves its own legal assessment of harm, as well as of its&nbsp;legitimacy, necessity, and proportionality. However, some have concluded that, on the evidence, such&nbsp;technologies pose such serious risks to human rights and democracy that the potential benefits are outweighed, necessitating a ban on the sale and use of these technologies.<sup class=\"modern-footnotes-footnote \" data-mfn=\"59\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-59\">59<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-59\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"59\"><sup>59 <\/sup>UN High Commissioner for Human Rights, <em>The Right to Privacy in the Digital Age<\/em>, Sept. 13, 2021, A\/HRC\/48\/31,&nbsp;https:\/\/www.ohchr.org\/EN\/HRBodies\/HRC\/RegularSessions\/Session48\/Documents\/A_HRC_48_31_AdvanceEditedVersion.doc; <em>Amnesty International&nbsp;and more than 170 organisations call for a ban on biometric surveillance<\/em>, June 7, 2021, https:\/\/www.amnesty.org\/en\/latest\/news\/2021\/06\/amnesty international-and-more-than-170-organisations-call-for-a-ban-on-biometric-surveillance\/.<\/span><sup> <\/sup>Any steps taken by the U.S. government should seriously consider the gravity of these concerns.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>IV. An international and comparative perspective is also necessary to reflect the global environment in which such technologies are being developed, used, and regulated&nbsp;<\/strong><\/h4>\n\n\n\n<p>The United States plays a major role in the development and uptake of biometric technologies globally,&nbsp;through foreign investment, foreign policy, and development aid, as well as the activities of U.S. companies. The U.S. government has participated in <em>mandating <\/em>creation of biometric identification systems, such as through UN Security Council Resolution 2396, requiring states to \u201cimplement systems to collect biometric data\u201d in order to \u201cproperly identify terrorists.&#8221;<sup class=\"modern-footnotes-footnote \" data-mfn=\"60\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-60\">60<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-60\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"60\"><sup>60 <\/sup>United Nations Security Council (UNSC) Res. 2396, Dec. 21, 2017, UN Doc S\/RES\/2396, https:\/\/undocs.org\/S\/RES\/2396(2017). <em>See also <\/em>Krisztina&nbsp;Huszti-Orb\u00e1n &amp; Fionnuala N\u00ed Aol\u00e1in, <em>Use of Biometric Data to Identify Terrorists: Best Practice or Risky Business? <\/em>2020,&nbsp;https:\/\/law.umn.edu\/sites\/law.umn.edu\/files\/2020\/07\/21\/hrc-biometrics-report-july2020.pdf.<\/span><sup> <\/sup>USAID provides active support for&nbsp;foreign governments\u2019 collection of biometric data, while the World Bank finances the development of biometric systems in dozens of countries.<sup class=\"modern-footnotes-footnote \" data-mfn=\"61\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-61\">61<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-61\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"61\"><sup>61 <\/sup>US Agency for International Development (USAID), <em>Introducing Biometric Data at Refugee Settlements in Uganda<\/em>, 2019, https:\/\/www.usaid.gov\/news information\/videos\/introducing-biometric-data-refugee-settlements-uganda; USAID, <em>Good Governance &amp; Public Administration Strengthening Project (GGPAS)<\/em>, 2021, https:\/\/www.usaid.gov\/kyrgyz-republic\/fact-sheets\/good-governance-public-administration-strengthening-project-ggpas; <em>USAID pilots&nbsp;biometrics to track youth health in Kenya<\/em>, Identity Week 2015, https:\/\/identityweek.net\/usaid-pilots-biometrics-to-track-youth-health-in-kenya\/.<\/span><sup> <\/sup>U.S. government actors and companies influence critical&nbsp;decisions in standard setting bodies about specifications for biometric data collection devices and&nbsp;biometric data analysis.<sup class=\"modern-footnotes-footnote \" data-mfn=\"62\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-62\">62<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-62\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"62\"><sup>62 <\/sup>Joseph N. Pato and Lynette I. Millett, <em>The Biometrics Standards Landscape<\/em>, (National Research Council (US) Whither Biometrics Committee, 2010, https:\/\/www.ncbi.nlm.nih.gov\/books\/NBK219888\/.<\/span><sup> <\/sup>Further, the Taliban\u2019s seizure of U.S. military biometric devices and data in Afghanistan demonstrates the immense ramifications of U.S. actions abroad.<sup class=\"modern-footnotes-footnote \" data-mfn=\"63\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-63\">63<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-63\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"63\"><sup>63 <\/sup>Ken Klippenstein &amp; Sara Sirota, <em>The Taliban Have Seized U.S. Military Biometrics Devices<\/em>, INTERCEPT, Aug. 18, 2021, https:\/\/theintercept.com\/2021\/08\/17\/afghanistan-taliban-military-biometrics\/; Eileen Guo &amp; Hikmat Noori, <em>This is the Real Story of the Afghan Biometric Databases Abandoned to the Taliban<\/em>, MIT TECHNOLOGY REVIEW, Aug. 30, 2021, https:\/\/www.technologyreview.com\/2021\/08\/30\/1033941\/afghanistan biometric-databases-us-military-40-data-points\/; Ver\u00f3nica Arroyo &amp; Donna Wentworth, <em>We Need to Talk About Digital ID: Why the World Bank Must&nbsp;Recognize the Harm in Afghanistan and Beyond, <\/em>ACCESS NOW, Oct. 14, 2021, https:\/\/www.accessnow.org\/digital-id-world-bank\/.<\/span><sup> <\/sup>The widespread use of&nbsp;biometric recognition at entry points at the Mexico border<sup class=\"modern-footnotes-footnote \" data-mfn=\"64\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-64\">64<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-64\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"64\"><sup>64 <\/sup><em>See, e.g.<\/em>, UN Special Rapporteur on contemporary forms of racism, racial discrimination, xenophobia and related intolerance, <em>Racial and Xenophobic&nbsp;Discrimination, Emerging Digital Technologies, and Border and Immigration Enforcement<\/em>, 2020, UN Doc A\/75\/590, para. 47, https:\/\/antiracismsr.org\/wp content\/uploads\/2020\/11\/A_75_590_Advance-Unedited-Version.pdf. Immigrant Defense Project et al., <em>Factsheet: Freeze Expansion of the Hart Defense<\/em>,&nbsp;Apr. 2021, https:\/\/justfutureslaw.org\/wp-content\/uploads\/2021\/04\/HART-Appropriations-2022.pdf; Todd Miller, <em>More than a Wall<\/em>, 2, 2019,&nbsp;https:\/\/www.tni.org\/files\/publication-downloads\/more-than-a-wall-report.pdf.<\/span><sup> <\/sup>further influences other governments around&nbsp;the world to follow suit.<sup class=\"modern-footnotes-footnote \" data-mfn=\"65\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-65\">65<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-65\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"65\"><sup>65 <\/sup>Petra Molnar, <em>Technological Testing Grounds: Migration Management Experiments and Reflections from the Ground Up<\/em>, 2020.<\/span><\/p>\n\n\n\n<p>Meanwhile, the United States is one of the largest exporters of biometric surveillance technologies.<sup class=\"modern-footnotes-footnote \" data-mfn=\"66\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-66\">66<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-66\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"66\"><sup>66 <\/sup>Steve Feldstein, <em>The Global Expansion of AI Surveillance<\/em>, 2019, https:\/\/carnegieendowment.org\/files\/WP-Feldstein-AISurveillance_final1.pdf; Valentin&nbsp;Weber and Vasilis Ververis, <em>China\u2019s Surveillance State: A Global Project<\/em>, 2021, https:\/\/www.nspirement.com\/2021\/09\/01\/chinas-digital-surveillance.html;&nbsp;Liza Lin &amp; Josh Chin, <em>U.S. Tech Companies Prop Up China\u2019s Vast Surveillance Network<\/em>, WALL ST. J., Nov. 26, 2019, https:\/\/www.wsj.com\/articles\/u-s tech-companies-prop-up-chinas-vast-surveillance-network-11574786846;<\/span> U.S. company L1 Identity Solutions was instrumental in the introduction of India\u2019s Aadhaar system, for&nbsp;example;<sup class=\"modern-footnotes-footnote \" data-mfn=\"67\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-67\">67<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-67\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"67\"><sup>67 <\/sup>Unique Identification Authority of India, <em>Device Drivers, <\/em>https:\/\/uidai.gov.in\/index.php?option=com_content&amp;view=article&amp;id=149&amp;Itemid=189<\/span><sup> <\/sup>and U.S. companies such as Apple have also normalized the everyday use of biometric&nbsp;authentication.<sup class=\"modern-footnotes-footnote \" data-mfn=\"68\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-68\">68<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-68\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"68\"><sup>68 <\/sup><em>Face Biometrics Month: The Apple Effect and the Mainstreaming of Face Authentication<\/em>, FindBiometrics, 2019, https:\/\/findbiometrics.com\/face biometrics-month-the-mainstreaming-of-face-authentication-611140\/.<\/span><sup> <\/sup>These companies have been largely unfettered by legal or regulatory constraints in their&nbsp;experimentation with biometrics.<sup class=\"modern-footnotes-footnote \" data-mfn=\"69\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-69\">69<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-69\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"69\"><sup>69 <\/sup>Kate Crawford et al., <em>AI Now 2019 Report<\/em>, 2019, https:\/\/ainowinstitute.org\/AI_Now_2019_Report.html.<\/span><sup> <\/sup>In large part, such initiatives have been paused only after public backlash and coordinated advocacy have forced companies to change course.<sup class=\"modern-footnotes-footnote \" data-mfn=\"70\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-70\">70<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-70\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"70\"><sup>70 <\/sup><em>See <\/em>Rebecca Heilweil, <em>Big tech companies back away from selling facial recognition to police. That\u2019s progress.<\/em>, VOX, June 10, 2020, https:\/\/www.vox.com\/recode\/2020\/6\/10\/21287194\/amazon-microsoft-ibm-facial-recognition-moratorium-police.<\/span><sup> <\/sup>Meta\u2019s recent decision to&nbsp;shut down its facial recognition system and delete facial templates was explicitly driven by \u201csocietal&nbsp;concerns,&#8221;<sup class=\"modern-footnotes-footnote \" data-mfn=\"71\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-71\">71<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-71\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"71\"><sup>71 <\/sup>Jerome Pesenti, <em>An Update On Our Use of Face Recognition<\/em>, META, Nov. 2021, https:\/\/about.fb.com\/news\/2021\/11\/update-on-use-of-face-recognition\/.<\/span><sup> <\/sup>but this came after Meta had been unconstrained in creating a database of over one billion&nbsp;faces; the company retains its DeepFace software and can resume use at any point.<sup class=\"modern-footnotes-footnote \" data-mfn=\"72\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-72\">72<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-72\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"72\"><sup>72 <\/sup>Rebecca Heilweil, <em>Facebook is backing away from facial recognition. Meta isn\u2019t<\/em>. Vox, Nov. 3, 2021, https:\/\/www.vox.com\/recode\/22761598\/facebook facial-recognition-meta.<\/span><sup> <\/sup>Further, existing&nbsp;models of self-regulation are insufficient and do not provide meaningful constraints on the development&nbsp;and deployment of biometric technologies.<sup class=\"modern-footnotes-footnote \" data-mfn=\"73\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-73\">73<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-73\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"73\"><sup>73 <\/sup><em>See <\/em>Ben Wagner, <em>Ethics As An Escape From Regulation: From \u201cEthics-Washing\u201d To Ethics-Stopping<\/em>? in Emre Bayamlio\u011flu et al. (eds.), <em>Being&nbsp;Profiled: Cogitas Ergo Sum: 10 years of Profiling the European Citizen<\/em>, 2018, https:\/\/www.cohubicol.com\/assets\/uploads\/being-profiled-cogitas-ergo sum.pdf.<\/span>&nbsp;<\/p>\n\n\n\n<p>Reticence in constraining U.S. technology companies\u2019 advancements has been driven by a dominant&nbsp;narrative of an \u201cAI arms race\u201d with China.<sup class=\"modern-footnotes-footnote \" data-mfn=\"74\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-74\">74<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-74\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"74\"><sup>74 <\/sup><em>See <\/em>Crawford et al<em>.<\/em>, <em>supra <\/em>note 69; Daniel F. Runde, Romina Bandura, &amp; Sundar Ramanujam, <em>The United States Has an Opportunity to Lead in Digital Development<\/em>, 2021, https:\/\/www.csis.org\/analysis\/united-states-has-opportunity-lead-digital-development; Amanda Macias &amp; Kayla Tausche, <em>U.S. Needs to&nbsp;Work with Europe to Slow China\u2019s Innovation rate, Raimondo says<\/em>, CNBC, Sept. 28, 2021, https:\/\/www.cnbc.com\/2021\/09\/28\/us-needs-to-work-with europe-to-slow-chinas-innovation-rate-raimondo-says.html.<\/span><sup> <\/sup>The National Security Commission on Artificial Intelligence&nbsp;(NSCAI) notes that China is setting a \u201cchilling precedent.&#8221;<sup class=\"modern-footnotes-footnote \" data-mfn=\"75\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-75\">75<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-75\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"75\"><sup>75 <\/sup>National Security Commission on Artificial Intelligence [NSCAI], <em>Final Report<\/em>, 2021, https:\/\/www.nscai.gov\/wp-content\/uploads\/2021\/03\/Full-Report Digital-1.pdf.<\/span><sup> <\/sup>Indeed, shocking reports detail the Chinese&nbsp;State\u2019s use of biometrics to facilitate surveillance and persecution of Uyghurs in Xinjiang.<sup class=\"modern-footnotes-footnote \" data-mfn=\"76\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-76\">76<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-76\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"76\"><sup>76 <\/sup><em>See <\/em>Maya Wang, <em>The Robots Are Watching Us, Human Rights Watch<\/em>, 2020, https:\/\/www.hrw.org\/news\/2020\/04\/06\/robots-are-watching-us; Olivia Shen,&nbsp;<em>AI Dreams and Authoritarian Nightmares<\/em>, in Jane Golley et al. (eds.), <em>China Story Yearbook: China Dreams<\/em>, 2020.<\/span><\/p>\n\n\n\n<p>Yet U.S. government officials lament that technology companies in China can develop AI aided by&nbsp;unconstrained biometric data collection, claiming it is \u201cnot a level playing field.&#8221;<sup class=\"modern-footnotes-footnote \" data-mfn=\"77\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-77\">77<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-77\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"77\"><sup>77 <\/sup><em>See <\/em>Macias &amp; Tausche, <em>supra <\/em>note 74 .<\/span><sup> <\/sup>This furthers the idea&nbsp;that \u201cglobal AI leadership\u201d requires low regulation, private sector access to troves of personal data, and expansive security use.<sup class=\"modern-footnotes-footnote \" data-mfn=\"78\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-78\">78<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-78\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"78\"><sup>78 <\/sup>Crawford et al<em>.<\/em>, <em>supra <\/em>note 69.<\/span><sup> <\/sup>The NSCAI urges that the United States \u201cmust win the AI competition&#8221;<sup class=\"modern-footnotes-footnote \" data-mfn=\"79\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-79\">79<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-79\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"79\"><sup>79 <\/sup>NSCAI, <em>supra <\/em>note 75.<\/span><sup> <\/sup>and&nbsp;identifies, somewhat uncritically, \u201csurveillance,\u201d \u201cclearing of regulatory barriers,\u201d and \u201cenormous&nbsp;government stores of data\u201d as factors enabling China \u201cto leap ahead.&#8221;<sup class=\"modern-footnotes-footnote \" data-mfn=\"80\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-80\">80<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-80\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"80\"><sup>80 <\/sup>National Security Commission on Artificial Intelligence [NSCAI], <em>Chinese Tech Landscape Overview: NSCAI Presentation<\/em>, May 2019,&nbsp;https:\/\/epic.org\/wp-content\/uploads\/foia\/epic-v-ai-commission\/EPIC-19-09-11-NSCAI-FOIA-20200331-3rd-Production-pt9.pdf. <em>See also <\/em>Ryan Fedasiuk,&nbsp;<em>Chinese Perspectives on AI and Future Military Capabilities<\/em>, (Center for Security and Emerging Technology, 2020).<\/span><sup> <\/sup>Viewing the development of AI&nbsp;enabled biometric technologies through this competitive, national security paradigm risks that law,&nbsp;regulation, and human rights are sacrificed in efforts to \u201cwin.&#8221;<sup class=\"modern-footnotes-footnote \" data-mfn=\"81\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-81\">81<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-81\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"81\"><sup>81 <\/sup>Crawford et al., <em>supra <\/em>note 69; Kelsey Piper, <em>Why an AI Arms Race with China Would be Bad for Humanity<\/em>, VOX, Aug. 10, 2019, https:\/\/www.vox.com\/future-perfect\/2019\/8\/10\/20757495\/peter-thiel-ai-arms-race-china.<\/span><sup> <\/sup>The U.S. government must not allow a&nbsp;perceived AI arms race to dictate its approach to regulating biometric technologies.&nbsp;<\/p>\n\n\n\n<p>Further, an arms race narrative simplifies complex realities around regulation in China itself.<sup class=\"modern-footnotes-footnote \" data-mfn=\"82\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-82\">82<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-82\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"82\"><sup>82 <\/sup>Maya Wang, <em>China\u2019s Techno-Authoritarianism Has Gone Global<\/em>, FOREIGN AFFAIRS, Apr. 8 2021, https:\/\/www.foreignaffairs.com\/articles\/china\/2021- 04-08\/chinas-techno-authoritarianism-has-gone-global.<\/span> Growing&nbsp;public controversy around facial recognition, combined with tensions with Chinese Big Tech companies,&nbsp;have led the Chinese government to introduce regulations, including regarding the use of biometric&nbsp;technologies.<sup class=\"modern-footnotes-footnote \" data-mfn=\"83\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-83\">83<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-83\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"83\"><br \/><br \/>\n\n\n\n<sup>83 <\/sup><em>China Rebukes 43 Apps including Tencent\u2019s WeChat for Breaking Data Transfer Rules<\/em>, REUTERS, Aug. 18, 2021,&nbsp;https:\/\/www.reuters.com\/business\/retail-consumer\/china-ministry-targets-43-apps-including-tencents-wechat-2021-08-18\/; Josh Horwitz, <em>China Steps up&nbsp;Tech Scrutiny with Rules over Unfair Competition, Critical Data<\/em>, REUTERS, Aug. 17, 2021, https:\/\/www.reuters.com\/business\/media-telecom\/china-issues draft-rules-banning-unfair-competition-internet-sector-2021-08-17<\/span><sup> <\/sup>The Supreme People\u2019s Court of China has issued regulations requiring companies to&nbsp;obtain consent before collecting and processing facial biometric data.<sup class=\"modern-footnotes-footnote \" data-mfn=\"84\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-84\">84<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-84\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"84\"><sup>84 <\/sup>Supreme People\u2019s Court of China, Provisions on Relevant Issues on the Application of Laws in Hearing Civil Cases Related to the Application of Facial Recognition Technology in Processing Personal Information, July 28, 2021. <em>See also <\/em>Ananaya Agrawal, <em>China Supreme Court Issues Regulations Against&nbsp;Misuse of Facial Recognition Technology<\/em>, JURIST, Aug. 2021, https:\/\/www.jurist.org\/news\/2021\/08\/china-supreme-court-issues-regulations-against misuse-of-facial-recognition-technology\/.<\/span><sup> <\/sup>China\u2019s recent Personal&nbsp;Information Protection Law mandates data minimization and user consent across the private sector when&nbsp;processing \u201csensitive personal information\u201d including biometric data. China appears to be taking&nbsp;seriously the need to regulate biometric technologies.&nbsp;<\/p>\n\n\n\n<p>Meanwhile, the European Union (EU) is claiming a leadership role in regulating biometric technologies&nbsp;and protecting human rights. For instance, the EU seeks to prohibit outright some uses of mass biometric&nbsp;surveillance by law enforcement.<sup class=\"modern-footnotes-footnote \" data-mfn=\"85\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-85\">85<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-85\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"85\"><sup>85 <\/sup>EU Member States are also taking steps to curb biometric technologies. <em>See <\/em>Koalitionsvertrag Zwischen SPD, B\u00fcndnis 90\/Die Gr\u00fcne, und FDP, Mehr Fortschritt Wagen: B\u00fcndnis f\u00fcr Freiheit, Gerechtigkeit und Nachhaltigkeit, 2021, https:\/\/cms.gruene.de\/uploads\/documents\/Koalitionsvertrag-SPD GRUENE-FDP-2021-2025.pdf.<\/span><\/p>\n\n\n\n<p>The United States should view such attempts not as a ceiling, but rather a challenge to set standards even&nbsp;higher. Indeed, the EU\u2019s proposed AI Act has been critiqued for its overly-broad exceptions;&nbsp;unnecessarily restricting prohibition of remote biometric identification to law enforcement; and applying&nbsp;prohibitions only to \u201creal-time\u201d uses rather than continuing or post-hoc uses.<sup class=\"modern-footnotes-footnote \" data-mfn=\"86\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-86\">86<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-86\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"86\"><sup>86 <\/sup><em>See An EU Artificial Intelligence Act for Fundamental Rights: A Civil Society Statement<\/em>, Nov. 30, 2021, https:\/\/edri.org\/wp content\/uploads\/2021\/12\/Political-statement-on-AI-Act.pdf [Hereinafter EU Civil Society Statement]; Nathalie A. Smuha et al., <em>How the EU Can Achieve&nbsp;Legally Trustworthy AI: A Response to the European Commission\u2019s Proposal for an Artificial Intelligence Act <\/em>(2021), https:\/\/papers.ssrn.com\/abstract=3899991; Michael Veale &amp; Frederik Zuiderveen Borgesius, <em>Demystifying the Draft EU Artificial Intelligence Act. <\/em>22&nbsp;COMP. L. REV. INT., 2021, 97, https:\/\/ssrn.com\/abstract=3896852.<\/span><sup> <\/sup>Further, the EU\u2019s proposed Act gives providers significant discretion to assess the risks of their own technologies;<sup class=\"modern-footnotes-footnote \" data-mfn=\"87\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-87\">87<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-87\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"87\"><sup>87 <\/sup>Smuha et al., <em>Id<\/em>.<\/span><sup> <\/sup>it also&nbsp;fails to confer individual rights to those impacted by AI systems, or to provide for effective remedies&nbsp;where harms occur.<sup class=\"modern-footnotes-footnote \" data-mfn=\"88\" data-mfn-post-scope=\"000000000000385e0000000000000000_1405\"><a href=\"javascript:void(0)\"  role=\"button\" aria-pressed=\"false\" aria-describedby=\"mfn-content-000000000000385e0000000000000000_1405-88\">88<\/a><\/sup><span id=\"mfn-content-000000000000385e0000000000000000_1405-88\" role=\"tooltip\" class=\"modern-footnotes-footnote__note\" tabindex=\"0\" data-mfn=\"88\"><sup>88 <\/sup><em>See <\/em>EU Civil Society Statement, <em>supra <\/em>note 86<em>; <\/em>Smuha et al., <em>supra <\/em>note 86.<\/span><sup> <\/sup>We encourage OSTP to look to these parallel efforts and strive to go further still.&nbsp;<\/p>\n\n\n\n<p>The U.S. government must also take account of the far-reaching impacts that its decisions and regulation of U.S. companies already have worldwide: the extraterritorial application of technologies developed, produced, sold, and promoted by U.S. government agencies and U.S. corporations must come into the&nbsp;remit of the AI Bill of Rights.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>V. Recommendations&nbsp;<\/strong><\/h4>\n\n\n\n<p>The outcome of this RFI and the AI Bill of Rights should be a comprehensive governance framework,&nbsp;including relevant laws, policies, and plans for implementation, which emphasizes human rights, regulatory oversight, and effective enforcement. In order to achieve this, OSTP should therefore work towards the following recommendations:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>Impose an immediate moratorium for critical sectors<\/strong>: Define, classify, and enact a moratorium&nbsp;on the use of mandatory AI-enabled biometric identification technology.<\/li>\n<\/ol>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Response to Request for Information from the White House Office of Science and Technology Policy on a Bill of&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1926,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[38,42,45,43],"tags":[],"class_list":["post-1405","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-collaboration","category-digital-surveillance","category-publications","category-students"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>iLIT &amp; NYU Response to White House AI Bill of Rights Initiative Draws on Global Practice - Temple iLIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iLIT &amp; NYU Response to White House AI Bill of Rights Initiative Draws on Global Practice - Temple iLIT\" \/>\n<meta property=\"og:description\" content=\"Response to Request for Information from the White House Office of Science and Technology Policy on a Bill of...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Temple iLIT\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-03T14:36:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-17T23:23:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1313\" \/>\n\t<meta property=\"og:image:height\" content=\"876\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Edward Myers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Edward Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"27 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/\"},\"author\":{\"name\":\"Edward Myers\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/c823a300c62ed9482de1842c407acd3f\"},\"headline\":\"iLIT &amp; NYU Response to White House AI Bill of Rights Initiative Draws on Global Practice\",\"datePublished\":\"2022-05-03T14:36:07+00:00\",\"dateModified\":\"2024-12-17T23:23:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/\"},\"wordCount\":6887,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg\",\"articleSection\":[\"Collaboration\",\"Digital Surveillance\",\"Publications\",\"Students\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/\",\"url\":\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/\",\"name\":\"iLIT &amp; NYU Response to White House AI Bill of Rights Initiative Draws on Global Practice - Temple iLIT\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg\",\"datePublished\":\"2022-05-03T14:36:07+00:00\",\"dateModified\":\"2024-12-17T23:23:48+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#primaryimage\",\"url\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg\",\"contentUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg\",\"width\":1313,\"height\":876,\"caption\":\"2020_02_21 IDEAS Hub Opening and Ribbon Cutting\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#website\",\"url\":\"https:\/\/law.temple.edu\/ilit\/\",\"name\":\"Temple iLIT\",\"description\":\"Institute for Law, Innovation &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/law.temple.edu\/ilit\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\",\"name\":\"Temple iLIT\",\"url\":\"https:\/\/law.temple.edu\/ilit\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png\",\"contentUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png\",\"width\":1465,\"height\":704,\"caption\":\"Temple iLIT\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/c823a300c62ed9482de1842c407acd3f\",\"name\":\"Edward Myers\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d9edf6aee10ace416a6d5f977c466bdf4581af8133110e943d53d4bb58c436c0?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d9edf6aee10ace416a6d5f977c466bdf4581af8133110e943d53d4bb58c436c0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d9edf6aee10ace416a6d5f977c466bdf4581af8133110e943d53d4bb58c436c0?s=96&d=mm&r=g\",\"caption\":\"Edward Myers\"},\"url\":\"https:\/\/law.temple.edu\/ilit\/author\/tub51301\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"iLIT &amp; NYU Response to White House AI Bill of Rights Initiative Draws on Global Practice - Temple iLIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/","og_locale":"en_US","og_type":"article","og_title":"iLIT &amp; NYU Response to White House AI Bill of Rights Initiative Draws on Global Practice - Temple iLIT","og_description":"Response to Request for Information from the White House Office of Science and Technology Policy on a Bill of...","og_url":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/","og_site_name":"Temple iLIT","article_published_time":"2022-05-03T14:36:07+00:00","article_modified_time":"2024-12-17T23:23:48+00:00","og_image":[{"width":1313,"height":876,"url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg","type":"image\/jpeg"}],"author":"Edward Myers","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Edward Myers","Est. reading time":"27 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#article","isPartOf":{"@id":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/"},"author":{"name":"Edward Myers","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/c823a300c62ed9482de1842c407acd3f"},"headline":"iLIT &amp; NYU Response to White House AI Bill of Rights Initiative Draws on Global Practice","datePublished":"2022-05-03T14:36:07+00:00","dateModified":"2024-12-17T23:23:48+00:00","mainEntityOfPage":{"@id":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/"},"wordCount":6887,"commentCount":0,"publisher":{"@id":"https:\/\/law.temple.edu\/ilit\/#organization"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg","articleSection":["Collaboration","Digital Surveillance","Publications","Students"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/","url":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/","name":"iLIT &amp; NYU Response to White House AI Bill of Rights Initiative Draws on Global Practice - Temple iLIT","isPartOf":{"@id":"https:\/\/law.temple.edu\/ilit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#primaryimage"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg","datePublished":"2022-05-03T14:36:07+00:00","dateModified":"2024-12-17T23:23:48+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/ilit\/to-the-white-house-office-of-science-and-technology-policy\/#primaryimage","url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg","contentUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg","width":1313,"height":876,"caption":"2020_02_21 IDEAS Hub Opening and Ribbon Cutting"},{"@type":"WebSite","@id":"https:\/\/law.temple.edu\/ilit\/#website","url":"https:\/\/law.temple.edu\/ilit\/","name":"Temple iLIT","description":"Institute for Law, Innovation &amp; Technology","publisher":{"@id":"https:\/\/law.temple.edu\/ilit\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/law.temple.edu\/ilit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/law.temple.edu\/ilit\/#organization","name":"Temple iLIT","url":"https:\/\/law.temple.edu\/ilit\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/","url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png","contentUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png","width":1465,"height":704,"caption":"Temple iLIT"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/c823a300c62ed9482de1842c407acd3f","name":"Edward Myers","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d9edf6aee10ace416a6d5f977c466bdf4581af8133110e943d53d4bb58c436c0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d9edf6aee10ace416a6d5f977c466bdf4581af8133110e943d53d4bb58c436c0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d9edf6aee10ace416a6d5f977c466bdf4581af8133110e943d53d4bb58c436c0?s=96&d=mm&r=g","caption":"Edward Myers"},"url":"https:\/\/law.temple.edu\/ilit\/author\/tub51301\/"}]}},"jetpack_featured_media_url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/05\/20200221_IDEASHub_021-Web-Res-JPEG-150-DPI.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts\/1405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/comments?post=1405"}],"version-history":[{"count":24,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts\/1405\/revisions"}],"predecessor-version":[{"id":2508,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts\/1405\/revisions\/2508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/media\/1926"}],"wp:attachment":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/media?parent=1405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/categories?post=1405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/tags?post=1405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}