Are biometric ID tools evil?
Fingerprint readers, iris scanners, palm vein scanners, facial recognition systems and more -- biometric ID tools are going mainstream. But will the mainstream go biometric?
Computerworld - Moss Bluff Elementary School in Lake Charles, La., wanted to speed up the cafeteria line and reduce errors in lunch accounting. So the school bought a Fujitsu PalmSecure biometric ID system, which has a scanner that reads the unique patterns of blood vessels in a human palm, enabling a positive ID, much like a fingerprint would.
The parents had concerns centering around the belief that all forms of biometric ID constitute what the Christian Bible calls "the mark of the beast."
Here's what it says in Revelation 13:15-18: "And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, OR the name of the beast, or the number of his name ... and his number is six hundred threescore and six."
I was surprised to learn while researching this column that opposition to any sort of biometric ID systems for payment might be widespread among some Christian groups.
A Christian blogger named Elwood Sanders summed up the biblical case for rejection of biometric ID like this: "Let me state my position clear: NO BIOMETRIC ID CARD! PERIOD! Every evangelical Christian needs to say NO to this kind of thing."
The case of Moss Bluff Elementary highlights our current reality with biometric ID technology: It's becoming so mainstream that schools are using it in their cafeterias. But some people are rejecting it based on religious grounds.
So will pervasive biometric ID be adopted? Or rejected? The answer is less clear than you might think.
How evil is biometric ID?
Opposition to biometric ID is pretty widespread, and most of that opposition is based not on prophecy, but on concerns about privacy.
A Senate hearing last month revealed the U.S. government's own concerns about the use of facial-recognition technology, both by government law enforcement agencies and private companies like Facebook.
A professor from Spain's Universidad Autonoma de Madrid told the Black Hat conference recently that researchers there have come up with a way to hack iris recognition systems that fools the systems into identifying one person as another, raising fears that the main benefit of biometrics -- certainty -- may not be as reliable as promised.
There are many privacy organizations and advocates with serious reservations about the use of biometric identification technology of any kind.
Moreover, many people associate fingerprinting with criminality, and they just don't like the idea of it.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
- Agility & Scalability for Oracle EBS R12 and RAC on VMware vSphere 5 This white paper outlines extensive performance and scalability testing of Oracle EBS applications on a Vblock™ Systems with vSphere 5.
- Oracle and VCE: The Next Step in Integrated Computing Platforms In this ESG Lab review you will learn how a VCE system driven by Oracle, delivers the perfect blend of high performance and...
- Migrate Oracle Apps from RISC/UNIX to Virtualized x86 Ready to move Oracle to a virtualized environment? This brief explains how true converged infrastructure can help you migrate from a RISC/UNIX environment...
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!