Are biometric ID tools evil?
In general, privacy advocates view biometric tools -- especially those that can operate from a distance, such as facial recognition systems -- as grease on the slippery slope toward an Orwellian future in which the government can track everyone at all times with perfect accuracy.
So we find ourselves in a strange position in which some religious conservatives and some secular liberal privacy advocates both agree that biometric identification is evil.
Both groups can be vocal and influential. I predict that general opposition to biometrics will grow strong over the next few years.
But so will support for the technology.
Your body is the credit card
The cashless society is coming. The first step is the use of smartphones to make wireless payments.
The idea is that you'll walk into a store, transfer money from your account to the store, then walk out. No wallet necessary.
But without your wallet, how do they know it's really you?
Apple is buying the fingerprint company AuthenTec. It's likely that Apple will use the acquisition to build fingerprint ID into its products so you can use your Apple ID to buy anything.
Android phones are expected to increasingly offer fingerprint ID systems and other biometric tools.
It's just a matter of time before a majority of Americans are carrying biometric ID scanners in their own pockets.
Florida schools are talking about using biometric ID technology not only in the cafeteria, but also in the library and on the bus.
Japan is looking at using facial-recognition systems and other tools to speed up immigration procedures at two major airports.
A day care center in Minnesota is using fingerprint ID to make sure people picking up children are authorized to do so.
Biometric technology is even being proposed as the solution for cloud-computing security.
The people who accept and approve of biometric ID technology do so because it adds security and convenience to our everyday lives.
So it appears we're headed for a clash. On the one hand, you have a huge push for biometrics to replace signatures, passwords and photo IDs.
On the other, you have a large number of people who consider biometrics an unparalleled evil, and they will refuse to participate.
Who's right and who's wrong? Is biometric technology the answer to our security problems? Or is it just plain evil?
Mike Elgan writes about technology and tech culture. You can contact Mike and learn more about him at Elgan.com, or subscribe to his free email newsletter, Mike's List. You can also see more articles by Mike Elgan on Computerworld.com.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
Read more about Privacy in Computerworld's Privacy Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have. All Privacy White Papers | Webcasts