This article was posted by CrystalWind.ca

A+ A A-

Just Because We Can, Should We?

Just Because We Can, Should We?

(Q) I read your recent article on 5G and am wondering how biometrics fits in? A friend works in a related field where the advances he describes are both fascinating and frightening. We don’t always see eye-to-eye on subjects that involve privacy. I would appreciate your thoughts.

(A) Even if we are not familiar with the term, Biometrics, most of us have direct interacti with it on a daily basis. We use it to open smart phones, unlock doors, access medical records, and more. Simply put, biometrics authenticates us. It answers questions like, “Who are you?” and “Are you really who you say you are?”

Biometric data is not new. The earliest accounts of biometric use have been dated as far back as 500 BCE in the Babylonian empire. Always interested in measurements, they developed a system for the classification and comparison of specific body parts. Fingerprint and photographic identification have been used to solve crimes for over one-hundred years. The database grew slowly at first, then accelerated as advances in technology made it more accessible.

fingerscan

One of the many challenges we face today includes issues of privacy and protection. We want our individual right to privacy protected by law. We also want to quickly expose those who would do harm. Problem: Terrorism and cybercrime are daily occurrences; document fraud and identity theft continue to skyrocket. Answer: Biometrics is a suitable means of identifying and authenticating individuals in a (mostly) fast and reliable way using unique biological characteristics.

Biometric data allows a person to be identified based on recognizable and verifiable data. Authentication data currently includes fingerprint registers, facial recognition, hand shape, vein pattern, iris and retina recognition, facial configuration, DNA, blood, saliva, and urine. A biometric template is then stored for future use. And that’s where the problems begin: where should the data be stored? Who should have access to it and under what circumstances?

Historically, the use of biometric data was restricted to military and criminal investigations under a tightly regulated legal and technical framework. That is no longer true. Today, many sectors including banking, retail, mobile commerce, healthcare, and civil identification are all interested in biometric data; they are interested in all of us. In fact, they want to know as much about us as possible – and given recent advances in technology, that is a lot!

You can probably list many of the benefits of biometric data off the top of your head, but there are more you may not have thought of such as a potential solution to the one-person-one-vote issue. And how Live face recognition can find a person-of-interest in a crowd in time to avert a potential disaster in an airport, stadium, or place of worship.

face biometric

Biometric data is a great way to implement security solutions in an increasingly insecure world. Beyond that, it starts to feel invasive and creepy. For instance, retailers now leverage facial recognition (in-person or online) to identify a premium customer as soon as they enter. Casinos do the same, so do restaurants. And once a person’s characteristics have been identified, they can easily be linked (or sold) to other databases. Using today’s language this is called, function creep, and refers to information that is collected for one purpose but is then used for another. This is how a surprising amount of information finds its way into the hands of third parties and fraudsters.

For better and worse, Science and Technology are today’s ruler gods. We are fascinated by the “gifts” they bring but frightened too. Although widely in use, biometric data is still flawed. The bugs are being worked out in the test kitchen, on us. For instance, a false acceptance rate, or FAR, is the likelihood of a system accepting a wrong person (unauthorized user). A false rejection rate, or FRR, is the likelihood that a system will incorrectly reject access to an authorized user. In certain situations, biometric systems have summoned the authorities.

Just Because We Can, Should We?

We could study this subject in more detail, pick it apart, tear it down, say the world is not responsible enough yet, but as your friend indicated to you, we have already gone much further. I wish we had not gone this far, this soon. I wish we had used the world’s finest minds to render every weapon inert. I wish our interests might benefit nature’s issues before our own. I am not for or against technology, or the gods that feed it – but I do wonder who will feed it once it has consumed everything that nature created.

Credit

©2020 Pepper Lewis and The Peaceful Planet.  All of the information presented is for your reading and enjoyment. It can be shared in whole or in part with others who may find it of value as long as it is for personal use. In so doing, we ask that you always include the copyright notice located at the bottom of each document. This ensures our ability to make this information available to those who do not have access to the Internet. All other reprints including electronic transmissions designed for commercial use must receive permission from the author. Publications and websites interested in carrying this information as monthly columns or special features are encouraged to do so. If the material must be shortened in length, please clearly state that it is an edited version and refer the readers to the original full-length version.

Source Here


CrystalWind.ca is free to access and use.
Please support us with a small gift of $11.11 or $22.22 or $33.33. 

or
Please buy us a coffee!
Thank you!
ॐ Namasté - Blessings!
"Life is an echo, what you send out comes back."
© 2008-2021 crystalwind.ca. All rights reserved.
Pin It

Featured Articles: Awakening

  • Do you see 11:11? Open or Close
    Do you see 11:11?

    11:11 Do you see it?

    For many years the numbers 11:11 have been mysteriously appearing to millions of people all over the world. Often appearing on digital clocks, the sightings of 11:11 tend to occur during time of heightened awareness, having a most powerful effect on those seeing them.

    Read More
  • The Four Agreements Open or Close
    The Four Agreements

    1. Be Impeccable with Your Word

    Speak with integrity.  Say only what you mean.  Avoid using the word to speak against yourself or to gossip about others.  Use the power of your word in the direction of truth and love.

    Impeccable means “without sin” and a sin is something you do or believe that goes against yourself.  It means not speaking against yourself, to yourself or to others.  It means not rejecting yourself.  To be impeccable means to take responsibility for yourself, to not participate in “the blame game.”

    Read More
  • The Rise of 144,000 Warriors of Light Open or Close
    The Rise of 144,000 Warriors of Light

    The 144,000 Lightworkers and Lightwarriors were mentioned in the book of Revelation, on the Esmeralda tablets, by the Ashtar Command, Sananda, Native Americans and many others. A great call was sent to all lightworkers in the known universes to come here to help and guide this planet through the process of Ascension. They are one of the most mysterious groups mentioned in the Bible. 

    Read More

In order to view this object you need Flash Player 9+ support!

Get Adobe Flash player

Who is Online Now

We have 1443 guests and no members online

Featured This Month

Page:

Kunzite

Kunzite

The Love Commitment Stone Kunzite has a pronounced calming effect on the he... Read more

Litha Sabbat - The Summer Solstice

Litha Sabbat - The Summer Solstice

Gardens are blooming, and summer is in full swing. Fire up the barbeque, turn ... Read more

The Time of No Time: Beltane!

The Time of No Time: Beltane!

Around the medicine wheel of life we go, from season to season (solstice to ... Read more

Bright Beltane Blessings!

Bright Beltane Blessings!

The wheel turns to Beltane, also known as Mayday, marking the beginning of S... Read more

Jade

Jade

The Heart Path Stone Jade has an overall balancing effect on the heart. It ... Read more

Rhodonite

Rhodonite

The Hate Remedy Stone Rhodonite symbolizes self-realization. It is known as... Read more

Emerald

Emerald

The Heart And Love Stone Emerald brings soothing harmony to ... Read more

Beltane

Beltane

Beltane Ritual Celebrated May 1st Beltane is also known as May Day, Walpurg... Read more

The Willow Tree - April 15th - May 12th

The Willow Tree - April 15th - May 12th

The Fire Festival Of Beltane Celtic Symbol : The Sea Serpent Zodiac Degree... Read more

Taurus Mythology

Taurus Mythology

The Taurus Myth The Taurus myth is most often interpreted as the story of Z... Read more

Taurus

Taurus

TAURUS April 20 - May 20 Spirit: Conservation, methodical, to enjoy comfor... Read more

Rose Quartz

Rose Quartz

The Self Love Stone Rose quartz is an effective stone for reducing all aggr... Read more

Frogs Return Moon

Frogs Return Moon

Beaver – Chrysocolla - Blue Camas – Blue April 20 – May 20 The Frogs Retur... Read more

Sun in Taurus

Sun in Taurus

Sun in Taurus April 21 through May 21 An Overview of Sun Sign Characteristi... Read more

Birth Totem - Beaver

Birth Totem - Beaver

Birth Totem Beaver Birth dates: April 20 - May 20 Birth Totem is: Beaver ... Read more

© 2008-2021 CrystalWind.ca. Site Creation by CreativeInceptions.com.
X

Right Click

No right click