Are biometric ID tools evil?
In general, privacy advocates view biometric tools -- especially those that can operate from a distance, such as facial recognition systems -- as grease on the slippery slope toward an Orwellian future in which the government can track everyone at all times with perfect accuracy.
So we find ourselves in a strange position in which some religious conservatives and some secular liberal privacy advocates both agree that biometric identification is evil.
Both groups can be vocal and influential. I predict that general opposition to biometrics will grow strong over the next few years.
But so will support for the technology.
Your body is the credit card
The cashless society is coming. The first step is the use of smartphones to make wireless payments.
The idea is that you'll walk into a store, transfer money from your account to the store, then walk out. No wallet necessary.
But without your wallet, how do they know it's really you?
Apple is buying the fingerprint company AuthenTec. It's likely that Apple will use the acquisition to build fingerprint ID into its products so you can use your Apple ID to buy anything.
Android phones are expected to increasingly offer fingerprint ID systems and other biometric tools.
It's just a matter of time before a majority of Americans are carrying biometric ID scanners in their own pockets.
Florida schools are talking about using biometric ID technology not only in the cafeteria, but also in the library and on the bus.
Japan is looking at using facial-recognition systems and other tools to speed up immigration procedures at two major airports.
A day care center in Minnesota is using fingerprint ID to make sure people picking up children are authorized to do so.
Biometric technology is even being proposed as the solution for cloud-computing security.
The people who accept and approve of biometric ID technology do so because it adds security and convenience to our everyday lives.
So it appears we're headed for a clash. On the one hand, you have a huge push for biometrics to replace signatures, passwords and photo IDs.
On the other, you have a large number of people who consider biometrics an unparalleled evil, and they will refuse to participate.
Who's right and who's wrong? Is biometric technology the answer to our security problems? Or is it just plain evil?
Mike Elgan writes about technology and tech culture. You can contact Mike and learn more about him at Elgan.com, or subscribe to his free email newsletter, Mike's List. You can also see more articles by Mike Elgan on Computerworld.com.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
Read more about Privacy in Computerworld's Privacy Topic Center.
- Agility & Scalability for Oracle EBS R12 and RAC on VMware vSphere 5 This white paper outlines extensive performance and scalability testing of Oracle EBS applications on a Vblock™ Systems with vSphere 5.
- Oracle and VCE: The Next Step in Integrated Computing Platforms In this ESG Lab review you will learn how a VCE system driven by Oracle, delivers the perfect blend of high performance and...
- Migrate Oracle Apps from RISC/UNIX to Virtualized x86 Ready to move Oracle to a virtualized environment? This brief explains how true converged infrastructure can help you migrate from a RISC/UNIX environment...
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!