Biometric technologies

In what follows there is a brief description of the principal biometric technologies, whose respective proponents - producers, research laboratories, think tanks - mostly tend to claim superiority over the others. A frequently used definition of "biometric" is that of a "unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity" (http://www.icsa.net/services/consortia/cbdc/bg/introduction.shtml); biometrics is the study and application of such measurable characteristics. In IT environments, biometrics are categorised as "security" technologies meant to limit access to information, places and other resources to a specific group of people.

All biometric technologies are made up of the same basic processes:

1. A sample of a biometric is first collected, then transformed into digital information and stored as the "biometric template" of the person in question.

2. At every new identification, a second sample is collected and its identity with the first one is examined.

3. If the two samples are identical, the persons identity is confirmed, i.e. the system knows who the person is.

This means that access to the facility or resource can be granted or denied. It also means that information about the persons behaviour and movements has been collected. The system now knows who passed a certain identification point at which time, at what distance from the previous time, and it can combine these data with others, thereby appropriating an individual's data body.

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611729/100438658188
 
Identity vs. Identification

It has become a commonplace observation that the history of modernity has been accompanied by what one might call a general weakening of identity, both as a theoretical concept and as a social and cultural reality. This blurring of identity has come to full fruition in the 20th century. As a theoretical concept, identity has lost its metaphysical foundation of "full correspondence" following the destruction of metaphysics by thinkers such as Nietzsche, Heidegger, Witgenstein or Davidson. Nietzsche's "dead god", his often-quoted metaphor for the demise of metaphysics, has left western cultures not only with the problem of having to learn how to think without permanent foundations; it has left them with both the liberty of constructing identities, and the structural obligation to do so. The dilemmas arising out of this ambivalent situation have given rise to the comment that "god is dead, and men is not doing so well himself". The new promise of freedom is accompanied by the threat of enslavement. Modern, technologically saturated cultures survive and propagate and emancipate themselves by acting as the gatekeepers of their own technological prisons.

On the social and cultural levels, traditional clear-cut identities have become weakened as traditional cultural belonging has been undermined or supplanted by modern socio-technological structures. The question as to "who one is" has become increasingly difficult to answer: hybrid identities are spreading, identities are multiple, temporary, fleeting rather than reflecting an inherited sense of belonging. The war cry of modern culture industry "be yourself" demands the impossible and offers a myriad of tools all outcompeting each other in their promise to fulfil the impossible.

For many, identity has become a matter of choice rather than of cultural or biological heritage, although being able to chose may not have been the result of a choice. A large superstructure of purchasable identification objects caters for an audience finding itself propelled into an ever accelerating and vertiginous spiral of identification and estrangement. In the supermarket of identities, what is useful and cool today is the waste of tomorrow. What is offered as the latest advance in helping you to "be yourself" is as ephemeral as your identification with it; it is trash in embryonic form.

Identity has become both problematic and trivial, causing modern subjects a sense of thrownness and uprootedness as well as granting them the opportunity of overcoming established authoritarian structures. In modern, technologically saturated societies, the general weakening of identities is a prerequisite for emancipation. The return to "strong" clear-cut "real" identities is the way of new fundamentalism demanding a rehabilitation of "traditional values" and protected zones for metaphysical thought, both of which are to be had only at the price of suppression and violence.

It has become difficult to know "who one is", but this difficulty is not merely a private problem. It is also a problem for the exercise of power, for the state and other power institutions also need to know "who you are". With the spread of weak identities, power is exercised in a different manner. Power cannot be exercised without being clear who it addresses; note the dual significance of "subject". A weakened, hybrid undefined subject (in the philosophical sense) cannot be a "good" subject (in the political sense), it is not easy to sub-ject. Without identification, power cannot be exercised. And while identification is itself not a sufficient precondition for authoritarianism, it is certainly a necessary one.

Identities are therefore reconstructed using technologies of identification in order to keep the weakened and hence evasive subjects "sub-jected". States have traditionally employed bureaucratic identification techniques and sanctioned those who trying to evade the grip of administration. Carrying several passports has been the privilege of spies and of dubious outlaws, and not possessing an "ID" at all is the fate of millions of refugees fleeing violence or economic destitution. Lack of identification is structurally sanctioned by placelessness.

The technisised acceleration of societies and the weakening of identities make identification a complicated matter. On the one hand, bureaucratic identification techniques can be technologically bypassed. Passports and signatures can be forged; data can be manipulated and played with. On the other hand, traditional bureaucratic methods are slow. The requirements resulting from these constraints are met by biometric technology.

TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611729/100438658075
 
It is always the others

Disinformation is supposed to be something evil, something ethically not correct. And therefore we prefer to connect it to the past or to other political systems than the ones in the Western hemisphere. It is always the others who work with disinformation. The same is true for propaganda.
Even better, if we can refer it to the past: Adolf Hitler, supposedly one of the world's greatest and most horrible propagandists (together with his Reichsminister für Propaganda Josef Goebbels) did not invent modern propaganda either. It was the British example during World War I, the invention of modern propaganda, where he took his knowledge from. And it was Hitler's Reich, where (racist) propaganda and disinformation were developed to a perfect manipulation-tool in a way that the consequences are still working today.
A war loses support of the people, if it is getting lost. Therefore it is extremely important to launch a feeling of winning the war. Never give up emotions of victory. Governments know this and work hard on keeping the mood up. The Germans did a very hard job on that in the last months of World War II.
But the in the 1990s disinformation- and propaganda-business came back to life (if it ever had gone out of sight) through Iraq's invasion of Kuwait and the reactions by democratic states. After the war, reports made visible that not much had happened the way we had been told it had happened. Regarded like this the Gulf War was the end of the New World Order, a better and geographically broader democratic order, that had just pretended to having begun.

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611661/100438658640
 
Internet Architecture Board

On behalf of the Internet Society, the Internet Architecture Board oversees the evolution of the architecture, the standards and the protocols of the Net.

Internet Society: http://www.isoc.org/iab

http://www.isoc.org/
INDEXCARD, 1/3
 
Internet Research Task Force

Being itself under the umbrella of the Internet Society, the Internet Research Task Force is an umbrella organization of small research groups working on topics related to Internet protocols, applications, architecture and technology. It is governed by the Internet Research Steering Group.

http://www.irtf.org

http://www.irtf.org/
INDEXCARD, 2/3
 
CIA

CIA's mission is to support the President, the National Security Council, and all officials who make and execute U.S. national security policy by: Providing accurate, comprehensive, and timely foreign intelligence on national security topics; Conducting counterintelligence activities, special activities, and other functions related to foreign intelligence and national security, as directed by the President. To accomplish its mission, the CIA engages in research, development, and deployment of high-leverage technology for intelligence purposes. As a separate agency, CIA serves as an independent source of analysis on topics of concern and works closely with the other organizations in the Intelligence Community to ensure that the intelligence consumer--whether Washington policymaker or battlefield commander--receives the adaequate intelligence information.

http://www.cia.gov

INDEXCARD, 3/3