In expedited legislation last week, the Knesset approved full access to the
biometric database to the IDF, the police, the Shin Bet, and the Mossad. In a
legal memorandum prepared by the government, it also seeks to grant them
access to private security cameras and change the content of their
recordings.

  Israel’s police and security agencies will now be able to create a
  derivative of the national biometric database without adequate
  supervision and protection mechanisms, the IDF and the Shin Bet will be
  able to penetrate private security cameras without the need for court
  approval and without a mechanism to prevent the misuse of information.
  In addition, the cyber system and the Shin Bet will be able to order
  private businesses to carry out various actions in response to a cyber
  attack. Against the backdrop of the war with Hamas and in the name of
  real security needs, the government ministries have promoted and
  approved a series of laws, memoranda of law, and emergency regulations
  that threaten to change consolidated orders in a way that can harm the
  privacy and protection of information of all of us. Some of them may
  create irreversible situations, and all this without proper supervision
  by the judiciary or the Knesset.

  The first move deals with the national biometric database, where facial
  images, and in some cases also fingerprints, of approximately 7 million
  Israelis are stored. On Wednesday, the Knesset approved in a second and
  third reading an amendment to the biometric database law that will
  allow the database data to be leveraged to help identify murdered,
  kidnapped, and missing persons. The law was approved in an expedited
  procedure only a week after the law memorandum on the subject was
  published to the public. The speed is jarring in light of the many
  years it took to enact and operate the database.

  1 View gallery
  צילומי טלוויזיה במעגל סגור מראה אחד משני חמושים אסלאמיסטים של חמאס
  נכנסים לקיבוץ בארי כשנוסעי מכוניות פצועים אנושות יושבים במכונית
  מתגלגלת, לאחר שנורה לעבר השער, בדרום ישראל, 7 באוקטובר 2023 בתמונת
  סטילס זו מתוך וידאו

  צילומי טלוויזיה במעגל סגור מראה אחד משני חמושים אסלאמיסטים של חמאס
  נכנסים לקיבוץ בארי כשנוסעי מכוניות פצועים אנושות יושבים במכונית
  מתגלגלת, לאחר שנורה לעבר השער, בדרום ישראל, 7 באוקטובר 2023 בתמונת
  סטילס זו מתוך וידאו

  CCTV footage showing Hamas terrorists in Kibbutz Beeri on October 7

  (Photo: South First Responders via Telegram)

  The explanatory notes to the memorandum of law described an urgent need
  to change these procedures. "In view of the lack of a full response to
  the needs of identification in the police and IDF databases, an
  essential and urgent need has arisen for the possibility of
  transferring information from the biometric database in the Ministry of
  the Interior to both the police, and the General Security Service, the
  Intelligence and Special Task Force, and the IDF, for the purpose of
  identifying the murdered, the missing, the unknown, and the captives,
  as well as allowing the police to receive information from other
  sources," it said.

  Emergency regulations from the first week of the war allowed the
  biometric authority to transfer biometric data to the security bodies
  for the purpose of verifying or clarifying a person's identity, "as
  much as they are required as a result of the events in which a special
  situation was declared on the home front." The legal memorandum sought
  to regulate the issue as part of a one-year temporary order.

  According to the amendment to the law, at the request of the police,
  the Authority for the Management of the Biometric Database will provide
  them with means or biometric data that are necessary to verify or
  ascertain the identity of a person, living or dead, in the context of
  the war. This is a fundamental change in the way the biometric database
  works, since according to the law that regulates its activity, the data
  itself is kept in the database only and it is authorized to give the
  police only identification results (that is, the police can transfer a
  facial image or fingerprints to the database, and receive information
  about their suitability, but cannot receive the biometric data itself).

  The law also makes another change in the way the database operates and
  states that the fingerprints, which only a year ago were determined to
  no longer be added to the biometric database, will actually be kept
  from now until the expiration of the temporary order. This is a change
  that returns to the database information that it was decided is no
  longer necessary for its current functioning for its main purpose
  (verifying a person's identity), and that its contribution to
  identification will be zero (the number of citizens who will submit
  their fingerprints to the database in the coming year and then it will
  also be necessary to identify them using them will surely be marginal).

  More worrisome is the permission to extract data from the database,
  which will actually lead to the creation of a kind of new biometric
  database, but without all the protections and precautions that
  currently exist around the national biometric database. In this
  context, there is a concern that even after the temporary order
  expires, the data will not be deleted from the new biometric database,
  and in fact another permanent biometric database will be created, this
  time in the hands of the police, who can use it without adequate
  supervision.

  "During the discussion, it was made clear that the security authorities
  are interested in making the law a permanent law in the future,” Zvi
  Dvir from the Movement for Digital Rights told Calcalist. “The decision
  that during the period of the temporary order, fingerprints of citizens
  renewing biometric documentation will not be deleted proves the true
  purpose of the law. The data is not used for the biometrics of citizens
  who come to the population office for the stated purposes of the law.
  Therefore, the hidden purpose of the law, which is no longer so hidden,
  is to reverse past decisions, according to which the biometric database
  will be based on facial images only, and that the fingerprint data will
  be deleted from it. In the words of the explanation, it is stated that
  'according to the data of the Biometric Database Authority, the current
  situation resulted in the deletion of approximately one million
  fingerprints from the database in the last year'. The goal of the law
  is to stop the process of emptying the database, and to suppress the
  hidden purpose behind the terrible tragedy of the families of the
  kidnapped and missing."

  The second move is a memorandum of law promoted by the Ministry of
  Defense, which seeks to give the IDF and Shin Bet the ability to
  access, retrieve, and delete information from private security cameras
  that are connected to the network. Access to these cameras is often not
  secure enough (there is no access password or the manufacturer's
  default password has not been changed), and often they overlook public
  areas or sensitive facilities and can be used by the enemy to gather
  intelligence.

  The memorandum, which is intended to legislate emergency regulations
  that were approved in the first two weeks of the war, will allow a
  qualified officer to authorize an IDF soldier to break into a computer
  that is used to operate a stationary camera and to perform actions such
  as deleting, changing, or disrupting the visual information collected
  by the camera if there is any information to endanger the security of
  the state or the operational activity of the army, and the action is
  required in an "immediate and urgent" manner. The law allows this
  operation to be carried out even without the knowledge of the owner of
  the computer material, and without the need to obtain a court order. A
  similar authority is granted to the Shin Bet, which can also receive
  information from communications between computers without it being
  considered wiretapping. According to the memorandum, the law will be in
  effect for six months, when the Minister of Defense, with the consent
  of the Prime Minister and the approval of the Foreign Affairs and
  Defense Committee, may extend it for up to six additional months.

  Although this is a vital need, the lack of oversight mechanisms is a
  significant cause for concern. The procedure is done without any need
  to obtain a court order, or even retrospective supervision by the
  court. There are no mechanisms in the memorandum to ensure that this
  authority will not be misused (for example, to track people) or to
  protect the security of information or the privacy of information that
  will be retrieved, except for the statement that "the IDF and the Shin
  Bet will not use or retain information, including knowledge of private
  affairs of a person."

  Supervision on the part of the Knesset and the government is also
  extremely limited and amounts to a monthly report to the Foreign
  Affairs and Security Committee and the Attorney General on the number
  of soldiers or service workers who are authorized to carry out
  intrusion operations and the number of computers against which
  operations were carried out as well as the types of activity. The
  reports themselves will be confidential.

  Along with these two memos, the government is also formulating
  emergency regulations that will expand the powers of the National Cyber
  Directorate and give it the authority to issue binding instructions to
  certain businesses in the event of a cyberattack. According to the
  draft regulations, which were revealed last week in Calcalist, the
  Cyber Directorate, the Shin Bet or Director of Security of the Defense
  Establishment has the authority to issue binding instructions to
  certain computer service providers in the event of a cyber attack. In
  addition, the provider of these services will be obligated to report a
  cyberattack within four hours at the most from the moment it is
  detected.

  The Cyber Directorate explained that the regulations were not intended
  to replace the cyber law and that they only apply to one sector.
  However, privacy experts have warned that the choice of granting this
  authority by means of law and not in primary legislation is wrong since
  this is a broader arrangement in relation to other emergency
  regulations laws that have been passed since the beginning of the war,
  and that there is no reason not to resort to primary legislation since
  the Knesset is functioning. In addition, the wording of the regulations
  gives them a very broad applicability and they may apply to a large
  number of businesses. The reporting obligation contained in these
  regulations is very broad and may create a burden on the Cyber
  Directorate which will be flooded with requests that it will have
  difficulty dealing with.