Home › Forums › Political Corner › Would You Submit To Everyday Biometric Identification?
This topic contains 15 replies, has 14 voices, and was last updated by
uchibenkei 2 years, 10 months ago.
- AuthorPosts
Would You Submit To Everyday Biometric Identification?
What would you do when it becomes mandatory to be tagged so you can be identified and tracked wherever you go and whatever you do – without your consent.
It’s already happening. There are passports and fingerprinting which most everyone accepts. Eye-scanning and voiceprint identification for secure facilities. Society has accepted the first step of the ‘Big Brother’ programme.
Biometric identifiers are distinctive, measurable characteristics that are used to label and describe individuals. There are both physiological and behavioral characteristics. ‘
Physiological characteristics are related to the shape of the body. Examples include fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour-scent identification.
Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait and voice. Some researchers have coined the term behaviometrics to describe this.
In some areas of the world, payment systems that require palm scanning or face scanning are already being tested. We have entered an era where biometric security is being hailed as the “solution” to the antiquated security methods of the past.
We are being promised that the constant problems that hackers are causing with our credit cards, bank accounts, ATM machines and Internet passwords will all go away once we switch over to biometric identification.
Really? Or is this just a ruse to get everyone tagged?
Citizens worldwide are growing accustomed to the collection of two biometric characteristics, i.e. fingerprints and biometric pictures, as these are implemented in machine readable travel documents (MRTD) issued according to ICAO standards.
Private companies have been developing new services concerning biometrics too. For more than 3,000 diseases, among them breast cancer, Alzheimer’s disease, mucoviscidosis, and Huntington’s chorea, genetic reasons are known and companies offer genetic tests to detect genetic loading with regards to such diseases.
In a well-known case, Italian philosopher Giorgio Agamben refused to enter the United States in protest at the United States Visitor and Immigrant Status Indicator (US-VISIT) program’s requirement for visitors to be fingerprinted and photographed. Agamben argued that gathering of biometric data is a form of bio-political tattooing, akin to the tattooing of Jews during the Holocaust.
According to Agamben, biometrics turn the human persona into a bare body. Agamben refers to the two words used by Ancient Greeks for indicating “life”. Zoe – which is the life common to animals and humans as just life; and bios, which is life in the human context, with meanings and purposes.
Agamben envisages the reduction to bare bodies for the whole humanity or even to a sub-human level as was the case for the Jews. For him, a new bio-political relationship between citizens and the state is turning citizens into pure biological life or less (zoe) depriving them from their humanity (bios); and biometrics would herald this new world.
With biometric information available to those who would be able to get it without consent, genetic profiling would be possible. Think of the film ‘Gattica’. It bears watching.
As a new service, companies have also started to offer genealogical research based on DNA tests. The aim is to determine the geographical origin of customers and to find other descendants of joint ancestors. These new emerging social or rather genetic networks revolve around the common interest of shared ancestry and pre-dispositions.
While in these cases the use of DNA as identifying information cannot be changed by the user, social networks usually offer the possibility to create a partial identity: a profile describing the user, interests and often – social contacts.
Privacy and identity theft should also be a major concern for operators and users of websites offering information on persons, in particular the wide variety of emerging social networks, as the availability of detailed personal information provides ground for a wide range of actions with criminal intent.
Databases containing biometric data are themselves a threat to privacy. Such data may be used as a unique identifier and thus enables linking of a wide number of existing databases and profiling for many purposes.
Biometric raw data may even be extended to identify health risks which may raise a desire for access to these data by insurance companies, banks or for health related advertising.
In essence when does identification stop and profiling start? Although to us these are different things – to the security services, industry and banking system the distinction does not exist as the profiling is an extension of the biometric identification process. That is how it is justified.
For example this data is obtained as ‘security’ information by insurance companies which impose the contractual duty for their customers to report previous diseases, known dispositions and other circumstances allowing conclusions regarding future illnesses.
It may be argued individuals may benefit from lower insurance rates from such data, or in reality may not find a company willing to offer them insurance coverage based on their genetic predisposition.
In short – genetic discrimination.
This can be applied to the community at large – in which your biometeric information is used to define your purpose in life – a neo-caste system of have and have-nots.
A polarised world where biometric markers define you from the type of food you are supposed to eat – to what grades you should aspire to (and no more) – to the work you will be good at and what will be beneficial for you. Plus you get marketing and advertising and banking choices just for your type of person (that is – the type they say you are).
Plus the real catch – can you be a closet murderer or rapist? It may be in your genes you know. To protect society you may have to be locked up for good. How do you cure a genetic pre-disposition?
Again if you do not conform to your biometric ‘norms’ – could it be you are somehow ‘sick’ and in need of ‘treatment’? Exactly how does that work when someone tells you how you are supposed to be?
There are categories of privacy concerns:
Unintended functional scope: The authentication goes further than authentication, such as finding a tumor.
Unintended application scope: The authentication process correctly identifies the subject when the subject did not wish to be identified.
Covert identification: The subject is identified without seeking identification or authentication, i.e. a subject’s face is identified in a crowd
Identification profiling : The linking of the individual’s biometric markers to a database of related DNA profiles that provide generic and systemic risks that can be identified with this type of marker.
Social profiling : The linking of the biometric data to others’ data that have been associates or in close relationships with the individual;s marker.
Yumbo’s future shocks
- Mike has been at the kindergarten for one month. To pick him up David usually uses his MyComm device to open the kindergarten gate. Today, however, he forgot it on his desk. The backup system would use his biometric data instead but David refused to provide this data, as the kindergarten was not able to prove that they implemented Privacy Enhancing Technologies to avoid misuse of the data.
- As Mike is still new at the kindergarten the replacement nursery teacher did not know David personally and had to check his biometric data and the files before he allowed David to take Mike with him. Initially the kindergarten did not plan to keep the old-fashioned file system logging the parent’s entitlement. However, a parent initiative successfully fought for it, as not everyone was willing to provide a raw-data photo.
- Even if David can avoid their biometric data being spread widely, it does not seem likely that they can prevent Mike’s data from being collected. A new programme of the local government envisages taking biometric pictures of every child and using the raw data to identify possible health risks and to automatically check for suspicious signs of child abuse or neglect by their parents.
- This, so argued a government spokesman to David’s fury, should provide pre-indications for the school doctor programme enabling the focus to be set on suspicious children and saving tax money on the service. But rumours spread that the acquired data will also be fed into the governmental databases on children, evaluating the likelihood of future criminal or offending behaviour and the possible need for assistance by social workers.
- When such databases were first introduced for convicted criminals nobody would have ever thought of registering children at kindergarten-age within such a database. But as pupils have been surveyed in this way for many years and intervention of social workers, and juvenile authorities is more effective the younger the children are, the step to include data collected at pre-schools and kindergartens was just a question of time.
- While waiting for the passport to be checked against the files, David thinks of a case in another kindergarten where a divorced mother not having received the right of custody managed to have somebody access the kindergarten’s Wi-Fi and the verification reference database. By injecting her reference data in the profile of her authorised ex-husband she received the desired entitlement. She then picked up her daughter and left for her country of origin. As everyone thought the girl was with her father no one was suspicious until it was too late.
- After finally accrediting David to pick up his son, the nursery teacher uses a display to locate Mike. All children are tracked throughout the day by cameras using face recognition. Other parents even use the online-service to watch the movements of their children on a floor plan of the kindergarten viewed on their MyComm. Some parents has their children bio-chipped to make sure they were always safe. The bio-chip was a new technology that not only provided information about the child but also who they were with, what was said and how the children reacted.
- David knows of another mother who uses the kindy’s filter function. Using this, the system defined which areas her daughter could go to and which other children she could play with using profiling software.
- Having given it much thought, David gets concerned with all the tracking and exclusions. He does not want Mike to get too accustomed to tracking or being told whom he can play with by the school and currently considers another kindergarten for Mike.
Many countries, including the United States, are planning to share biometric data with other nations
Certain members of the civilian community are worried about how biometric data is used but full disclosure may not be forthcoming. In particular, the Unclassified Report of the United States’ Defense Science Board Task Force on Defense Biometrics states that it is wise to protect, and sometimes even to disguise, the true and total extent of national capabilities in areas related directly to the conduct of security-related activities. This also potentially applies to Biometrics. It goes on to say that this is a classic feature of intelligence and military operations. In short, the goal is to preserve the security of ‘sources and methods’.
Countries using biometrics include Australia, Brazil, Canada, Cyprus, Greece, China, Gambia, Germany, India, Iraq, Israel, Italy, Malaysia, Netherlands, New Zealand, Nigeria, Norway, Pakistan, Saudi Arabia, Tanzania,[59] Ukraine, United Arab Emirates, United Kingdom, United States and Venezuela.
Among low to middle income countries, roughly 1.2 billion people have already received identification through a biometric identification program.
Young people tend to be less alarmed by this technology, and so that is where it is being pushed.
For now, biometric security is not being forced on people. If you want to avoid it, you can.
Are there other ways that do not invade our freedoms? We don’t know. We have seldom asked and have never given real thought to the problem – or been given real answers. Society’s trust in the wisdom of its leaders – in some ways – is absolute.
This technology is going to keep spreading, and it is going to become harder and harder to avoid it.
And it is easy to imagine what governments could do with this kind of technology. If it wanted to, it could use it to literally track the movements and behavior of everyone.
We are already starting to see the establishment of massive biometric databases. One of these is the FBI’s facial recognition database that is a part of their “Next Generation Identification” program. It is being projected that the FBI have compiled 52 million of “face images”. Given enough time, eventually they would have all of our faces in their computers.
And one day, this kind of technology will likely be so pervasive that you won’t be able to open a bank account, get a credit card or even buy anything without having either your hand or your face scanned first. And don’t forget that chip in your hand – or head.
But eventually, once it has been adopted on a widespread basis, banks and government agencies will start requiring it. Then lives change – and there can be no going back.
When that day arrives, what will you do?
Can you live like that? Would you live like that?
That is something to think about.
They will implant chips in you next.
http://www.leavemeansleave.eu
If it happens ,goverments will pay the price … with their lives … i am sure
.
No. I’m a person not chattle of the state.
Sounds like the bible.
Love is just alimony waiting to happen. Visit mgtow.com.
Elijah and John the Baptist both lived simple lives without relying on government.approval.
Elijah had the whore wife of Ahab, Jezabel. Doing everything in her power to murder Elijah. She drummed up false accusations against another man and stole.his land. She believed she could do it with Elijah as well. He lived blessing a widow outside of his native culture. Then was taken to heaven in a bronze circular chariot (UFO)?
John the Baptist lived on locusts and wild.honey. Herodias’ wife wanted him dead. It took her cucking her governor husband to put his head on a plate.
So in my mind, the question is what will I endure and still survive? What hardships will I face and live to ensure my soul is intact?
I really don’t know at this point, I sure as hell won’t blindly rollover to get airconditioning in hell.
The supreme art of war is to subdue the enemy without fighting. --Sun Tsu
“We shall have world government, whether or not we like it. The question is only whether world government will be achieved by consent or by conquest.”
-James Warburg
February 17, 1950 in an appearance before the U.S. Senate Committee on Foreign Relations.
I will not submit willingly. The technologies (facial scans, body scans) will force active participation even without consent.
Orwell’s 1984 would have been easier than what’s approaching.
They will implant chips in you next.
Why would they have to implant it? Most sheeple can’t go anywhere without their cell phones these days.
They will implant chips in you next.
Why would they have to implant it? Most sheeple can’t go anywhere without their cell phones these days.
Parole papers, yellow stars, scarlet A, microchip invading body. These have a common theme of an authority placing a mark on you forever.
Then, thinking does that mark signify the beast? Reflecting in life won’t stop. I think it’s good to assess and not be on the side of tyrants.
The supreme art of war is to subdue the enemy without fighting. --Sun Tsu

Anonymous42They can chip up my dead body after I kill a few of them first!

Anonymous43as someone who was tracked, followed and chased, this is the worst feeling in the world.
It felt so good selling the car that had been tracked. I felt free for the first time in years. I think there was still an active tracking device in the car.

Would I submit? No, not unless I want to get on an airplane, access my bank account, use my credit card, use my cell phone, surf the internet, or do any number of normal activities that the surveillance state is sticking its long nose into.
In all fairness, it’s not as bad as full biometric ID just yet, but I don’t see things swinging back toward a degree of privacy and freedom from government interference that our grandparents took for granted.
Society asks MGTOWs: Why are you not making more tax-slaves?
I will not willingly allow myself to be chipped.
In the future it may be necessary to go to great lengths to remove the stuff they are putting in our vehicles and devices.
I’m trying to move toward a simpler life myself. I was already planning on reducing my internet usage, then the Vault 7 thing dropped. So now I am actually putting that into action.
Prepare for the Coming Times.
I will not willingly allow myself to be chipped.
In the future it may be necessary to go to great lengths to remove the stuff they are putting in our vehicles and devices.
I’m trying to move toward a simpler life myself. I was already planning on reducing my internet usage, then the Vault 7 thing dropped. So now I am actually putting that into action.
Prepare for the Coming Times.
Me too.
"Our virtues and our failings are inseparable, like force and matter. When they separate, man is no more." -Nikola Tesla
If Trump and the rest of administration (or Congress for that matter) decides to implement something like this, I can guarantee that I will adamantly reject this s~~~, even if I have to move South America. And that’s if some red-blooded Patriots don’t revolt.
"Our virtues and our failings are inseparable, like force and matter. When they separate, man is no more." -Nikola Tesla
I would resist it as best i could for as long as i could.
I bathe in the tears of single moms.
- AuthorPosts
You must be logged in to reply to this topic.

921526
921524
919244
916783
915526
915524
915354
915129
914037
909862
908811
908810
908500
908465
908464
908300
907963
907895
907477
902002
901301
901106
901105
901104
901024
901017
900393
900392
900391
900390
899038
898980
896844
896798
896797
895983
895850
895848
893740
893036
891671
891670
891336
891017
890865
889894
889741
889058
888157
887960
887768
886321
886306
885519
884948
883951
881340
881339
880491
878671
878351
877678
