It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Biometric scanning and the New World Identification System

page: 1
0

log in

join
share:

posted on Aug, 13 2011 @ 09:50 PM
link   
There has been a ton of news recently about biometric scanning and i haven't really seen anyone piecing together what's happening. I believe we are in the middle of a roll-out of a world wide identification system that will ultimately control people's personal finance, travel, net access and more. The unique identifier tied to each person will ultimately be associated with ALL levels of personal information and activity (physical and electronic activity).

The technology is Biometric scanning. And specifically, high tech, super accurate face scanning. The technology will generate a unique hash(id) based on measurements of a person face. An associated standardized algorithm will generate a unique ID for each person in the world, who is actively participating in the modern system.

Every time your face is scanned the same hash is generated. This becomes your ID. The hash can be generated from a picture or a video frame. It is extremely accurate. Age, beards, hair do not effect the calculation. But like trying to cover your face in an airport, purposefully attempting to avoid an accurate scan will be obvious.

The rollout is happening now. Anywhere photo ID is required the face scan can easily replace or augment. the tech can be centralized. Meaning a regular camera taking your driver's license picture can both be a source for generating a hash as well as finding a match to an existing hash, ie: used to identify you.

Most of these articles are from the last 2 months, although if you research it the real race to implement began about 5 years ago with a huge push in 2009.

Google:
www.cbc.ca...
www.techradar.com...

Google tech used to id rioters, Proposed for UK 2012 Olympics:
www.news24.com...

Facebook:
www.guardian.co.uk...
online.wsj.com...

Apple:
face scan to login to iPhone:
www.fastcompany.com...
www.fiercemobilecontent.com...

Police in 40 countries rolling out in next 2 months:
www.npr.org...

Passports:
www.ppt.gc.ca...
www.swissinfo.ch...

Homeland security:
www.globalsecurity.org...

The number of articles is in the thousands. The issue is not face scanning tech which has been around for ages. It is the application of applying a unique HASH based on a person's face and making that hash or ID THEIR GLOBAL IDENTIFIER. No chip, no tattoo needed. Just a camera or an existing clear picture like those used by governments already for licensing and passports.

People will accept this kind of identification out of convenience and safety. No more credit card fraud, easy tracking of "terrorists" they might tell us. The fact is, with an open standard for calculating hashes.. this tech literally is the icing on the cake of a one-world financial control grid. It requires no hardware, no card.. nothing to break, nothing to carry or lose. Just your face and a camera. A camera to log into your phone, to buy some shoes, to get on a plane, to drive your car, to transfer funds.

www.technologyreview.com...
www.thirdfactor.com...

The amount of money and the logistical nightmare of managing physical cards, chips etc has pushed this technology to where it is right now. Your face is your identification. Seems obvious right? Say goodbye to anonymity.



posted on Aug, 13 2011 @ 10:09 PM
link   
Interesting...what about as the person ages.....their face changes over time.....and then there is always plastic surgery......what about that?



posted on Aug, 13 2011 @ 10:57 PM
link   

Originally posted by caladonea
Interesting...what about as the person ages.....their face changes over time.....and then there is always plastic surgery......what about that?


"Biometric identification is the process by which a person can be identified by his characteristics. To do this, data about the defining characteristic, for example the points where the ridges of a fingerprint split or end, is usually enrolled and stored in a database. Then, when the person wishes to be identified, the characteristic is scanned so that the computer can compare it to the data already stored in the database. Using biometric identification is a more secure method of identifying a person because the characteristic in question is a part of that person. This means that it cannot be easily shared, traded, or stolen by another.

There are mainly two categories of biometrics identification: physiological characteristics and behavioral characteristics. Physiological biometrics has to do with the physical traits of a person, and behavioral biometrics has to do with the things that can change with the environment. For example, a fingerprint, a physiological characteristic, does not usually change except for accident or illness, but a signature, a behavioral characteristic, can change as a person ages. Examples of physiological biometrics include fingerprinting, retinal scans and handprint scans."



posted on Aug, 14 2011 @ 12:04 AM
link   
I bet you own a cell phone. No one really realizes what they really are.



posted on Aug, 14 2011 @ 12:11 AM
link   

Originally posted by sabbathcrazy
I bet you own a cell phone. No one really realizes what they really are.


Indeed i do and indeed i do.. Unfortunately.




top topics
 
0

log in

join