Are biometric ID tools evil?
Fingerprint readers, iris scanners, palm vein scanners, facial recognition systems and more -- biometric ID tools are going mainstream. But will the mainstream go biometric?
Computerworld - Moss Bluff Elementary School in Lake Charles, La., wanted to speed up the cafeteria line and reduce errors in lunch accounting. So the school bought a Fujitsu PalmSecure biometric ID system, which has a scanner that reads the unique patterns of blood vessels in a human palm, enabling a positive ID, much like a fingerprint would.
The parents had concerns centering around the belief that all forms of biometric ID constitute what the Christian Bible calls "the mark of the beast."
Here's what it says in Revelation 13:15-18: "And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, OR the name of the beast, or the number of his name ... and his number is six hundred threescore and six."
I was surprised to learn while researching this column that opposition to any sort of biometric ID systems for payment might be widespread among some Christian groups.
A Christian blogger named Elwood Sanders summed up the biblical case for rejection of biometric ID like this: "Let me state my position clear: NO BIOMETRIC ID CARD! PERIOD! Every evangelical Christian needs to say NO to this kind of thing."
The case of Moss Bluff Elementary highlights our current reality with biometric ID technology: It's becoming so mainstream that schools are using it in their cafeterias. But some people are rejecting it based on religious grounds.
So will pervasive biometric ID be adopted? Or rejected? The answer is less clear than you might think.
How evil is biometric ID?
Opposition to biometric ID is pretty widespread, and most of that opposition is based not on prophecy, but on concerns about privacy.
A Senate hearing last month revealed the U.S. government's own concerns about the use of facial-recognition technology, both by government law enforcement agencies and private companies like Facebook.
A professor from Spain's Universidad Autonoma de Madrid told the Black Hat conference recently that researchers there have come up with a way to hack iris recognition systems that fools the systems into identifying one person as another, raising fears that the main benefit of biometrics -- certainty -- may not be as reliable as promised.
There are many privacy organizations and advocates with serious reservations about the use of biometric identification technology of any kind.
Moreover, many people associate fingerprinting with criminality, and they just don't like the idea of it.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have. All Privacy White Papers | Webcasts