Report: Biometric ID Card For U.S. Workers Could Cost $40 Billion

A mandatory biometric employment verification card for all U.S. workers could cost at least $40 billion, infringe on Americans’ civil liberties and fail to stop the employment of undocumented immigrants, according to a new report. Hard to BELIEVE: The High Cost of a Biometric Identity Card finds that a biometric ID card would not only have a hefty initial price tag, but it will also cost $3 billion in ongoing annual expenditures.

The report, released by the Chief Justice Earl Warren Institute on Law & Social Policy at UC Berkeley School of Law, is a first-ever in-depth analysis of the costs of establishing a biometric employment identity card. The mandatory card, containing a worker’s fingerprints or a hand vein scan, would replace various forms of ID, such as a driver’s license, social security card and passport, during the hiring process.

Republican presidential candidates Mitt Romney and Newt Gingrich have supported a version of a biometric employment card as part of immigration reform during campaign debates. The idea was first raised in 2010 by Senators Charles Schumer (D-NY) and Lindsay Graham (R-SC), among others, but it was never proposed as legislation. According to Schumer’s plan, job seekers and employees would apply for the government biometric card and then present it to an employer or third-party verifier.

“The idea of a biometric ID card failed to gain political traction on Capitol Hill and for good reason: It can’t deliver all that it promises to U.S. taxpayers who will be footing the bill,” said Aarti Kohli, director of immigration policy at the Berkeley Law Warren Institute.

“A biometric employment verification system would require setting up a large new bureaucracy to create a master database with information relating to every worker in the country -- an enormous and expensive project,” said Jonathan Weinberg, co-author of the report and professor of law at Wayne State University. “It would involve collecting biometric data from, verifying the identity of, and issuing secure ID cards to more than 150 million people -- and that’s just the beginning.” The program would also require every company across the country, from mom and pop shops to global corporations, to verify each worker’s identity with a card–verification reader.

“The biometric worker ID would have to rely on current government databases that still have significant errors. Even a one percent error rate could cause 1.5 million citizens to be flagged as unemployable,” said Michael Froomkin, co-author and professor of law at the University of Miami. “Each of them would then have to go through an appeals process before they could legally work. Bottom line, this plan will disproportionately hurt people who most need work: the poor, short-term and temporary employees, the homeless, and the unemployed.” Froomkin said.

As part of the study, the authors analyzed the program’s costs to government agencies, employers, and workers, and calculated losses to U.S. economic production. To compute start-up and ongoing costs, they applied budget estimates from the Congressional Budget Office and the Government Accountability Office for various government programs. The data assumes 150 million US workers in the labor pool, based on Bureau of Labor Statistics 2010 numbers.

“We examined two core issues: the financial impact of the program and its potential effectiveness. In both cases, the program failed to deliver,” said Kohli. “Not only that, it opened up a Pandora’s box of civil liberty violations.”

Findings of Hard to BELIEVE: The High Cost of a Biometric Identity Card include:

  • A comprehensive biometric ID for over 150 million workers could cost US taxpayers up to $45 billion, about four times higher than other estimates.
  • Errors in current databases could delay the employment of at least 1.5 million people.
  • The black market for fraudulent documents such as birth certificates and passports would increase.
  • The biometric ID cards and national database would be vulnerable to a data breach resulting in large-scale identity theft.
  • The widespread collection of fingerprints or vein scans will face legal challenges as a violation of the 4th Amendment protection against unreasonable searches and seizures.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3