Biometric technologies In what follows there is a brief description of the principal biometric technologies, whose respective proponents - producers, research laboratories, think tanks - mostly tend to claim superiority over the others. A frequently used definition of "biometric" is that of a "unique, measurable characteristic or trait of a human being for automatically recognizing or verifying identity" ( All biometric technologies are made up of the same basic processes: 1. A sample of a biometric is first collected, then transformed into digital information and stored as the "biometric template" of the person in question. 2. At every new identification, a second sample is collected and its identity with the first one is examined. 3. If the two samples are identical, the persons identity is confirmed, i.e. the system knows who the person is. This means that access to the facility or resource can be granted or denied. It also means that information about the persons behaviour and movements has been collected. The system now knows who passed a certain identification point at which time, at what distance from the previous time, and it can combine these data with others, thereby appropriating an individual's data body. |
|
0 - 1400 A.D. 150 A The Roman smoke signals network consisted of towers within a visible range of each other and had a total length of about 4500 kilometers. It was used for military signaling. For a similar telegraph network in ancient Greece see About 750 In Japan block printing is used for the first time. 868 In China the world's first dated book, the Diamond Sutra, is printed. 1041-1048 In China moveable types made from clay are invented. 1088 The first of the great medieval universities was established in Bologna. At the beginning universities predominantly offered a kind of do-it-yourself publishing service. Books still had to be copied by hand and were so rare that a copy of a widely desired book qualified for being invited to a university. Holding a lecture equaled to reading a book aloud, like a priest read from the Bible during services. Attending a lecture equaled to copy a lecture word by word, so that you had your own copy of a book, thus enabling you to hold a lecture, too. For further details see History of the Idea of a University, |
|
Face recognition In order to be able to recognize a person, one commonly looks at this persons face, for it is there where the visual features which distinguish one person from another are concentrated. Eyes in particular seem to tell a story not only about who somebody is, but also about how that persons feel, where his / her attention is directed, etc. People who do not want to show who they are or what is going on inside of them must mask themselves. Consequently, face recognition is a kind of electronic unmasking. "Real" face-to-face communication is a two-way process. Looking at somebody's face means exposing ones own face and allowing the other to look at oneself. It is a mutual process which is only suspended in extraordinary and voyeuristic situations. Looking at somebody without being looked at places the person who is visually exposed in a vulnerable position vis-à-vis the watcher. In face recognition this extraordinary situation is normal. Looking at the machine, you only see yourself looking at the machine. Face biometrics are extracted anonymously and painlessly by a mask without a face. Therefore the resistance against the mass appropriation of biometrical data through surveillance cameras is confronted with particular difficulties. The surveillance structure is largely invisible, it is not evident what the function of a particular camera is, nor whether it is connected to a face recognition system. In a protest action against the face recognition specialist According to |
|
Palm recognition In palm recognition a 3-dimensional image of the hand is collected and compared to the stored sample. Palm recognition devices are cumbersome artefacts (unlike fingerprint and iris recognition devices) but can absorb perform a great amount of identification acts in a short time. They are therefore preferably installed in situations where a large number of people is identified, as in airports. |
|
Content as Transport Medium for Values and Ideologies With the dissemination of their content commercial media are among other things also able to transport values and ideologies. Usually their programming reflects society's dominant social, political, ethical, cultural and economical values. A critical view of the prevalent ideologies often is sacrificed so as not to offend the existing political elites and corporate powers, but rather satisfy shareholders and advertisers. With most of the worlds content produced by a few commercial media conglomerates, with the overwhelming majority of companies (in terms of revenue generation) concentrated in Europe, the U.S., Japan and Australia there is also a strong flow of content from the 'North-West' to the 'South-East'. Popular culture developed in the world's dominant commercial centers and Western values and ideologies are so disseminated into the most distant corners of the earth with far less coming back. |
|
Iris recognition Iris recognition relies upon the fact that every individuals retina has a unique structure. The iris landscape is composed of a corona, crypts, filaments, freckles, pits radial furrows and striatations. Iris scanning is considered a particularly accurate identification technology because the characteristics of the iris do not change during a persons lifetime, and because there are several hundred variables in an iris which can be measured. In addition, iris scanning is fast: it does not take longer than one or two seconds. These are characteristics which have made iris scanning an attractive technology for high-security applications such as prison surveillance. Iris technology is also used for online identification where it can substitute identification by password. As in other biometric technologies, the use of iris scanning for the protection of privacy is a two-edged sword. The prevention of identity theft applies horizontally but not vertically, i.e. in so far as the data retrieval that accompanies identification and the data body which is created in the process has nothing to do with identity theft. |
|
Racism on the Internet The internet can be regarded as a mirror of the variety of interests, attitudes and needs of human kind. Propaganda and disinformation in that way have to be part of it, whether they struggle for something good or evil. But the classifications do no longer function. During the last years the internet opened up a new source for racism as it can be difficult to find the person who gave a certain message into the net. The anarchy of the internet provides racists with a lot of possibilities to reach people which they do not possess in other media, for legal and other reasons. In the 1980s racist groups used mailboxes to communicate on an international level; the first ones to do so were supposedly the A complete network of anti-racist organizations, including a high number of websites are fighting against racism. For example: |
|
Biometrics applications: physical access This is the largest area of application of biometric technologies, and the most direct lineage to the feudal gate keeping system. Initially mainly used in military and other "high security" territories, physical access control by biometric technology is spreading into a much wider field of application. Biometric access control technologies are already being used in schools, supermarkets, hospitals and commercial centres, where the are used to manage the flow of personnel. Biometric technologies are also used to control access to political territory, as in immigration (airports, Mexico-USA border crossing). In this case, they can be coupled with camera surveillance systems and artificial intelligence in order to identify potential suspects at unmanned border crossings. Examples of such uses in remote video inspection systems can be found at A gate keeping system for airports relying on digital fingerprint and hand geometry is described at An electronic reconstruction of feudal gate keeping capable of singling out high-risk travellers from the rest is already applied at various border crossing points in the USA. "All enrolees are compared against national lookout databases on a daily basis to ensure that individuals remain low risk". As a side benefit, the economy of time generated by the inspection system has meant that "drug seizures ... have increased since Inspectors are able to spend more time evaluating higher risk vehicles". However, biometric access control can not only prevent people from gaining access on to a territory or building, they can also prevent them from getting out of buildings, as in the |
|
fingerprint identification Although fingerprinting smacks of police techniques used long before the dawn of the information age, its digital successor finger scanning is the most widely used biometric technology. It relies on the fact that a fingerprint's uniqueness can be defined by analysing the so-called "minutiae" in somebody's fingerprint. Minutae include sweat pores, distance between ridges, bifurcations, etc. It is estimated that the likelihood of two individuals having the same fingerprint is less than one in a billion. As an access control device, fingerprint scanning is particularly popular with military institutions, including the Pentagon, and military research facilities. Banks are also among the principal users of this technology, and there are efforts of major credit card companies such as Visa and MasterCard to incorporate this finger print recognition into the bank card environment. Problems of inaccuracy resulting from oily, soiled or cracked skins, a major impediment in fingerprint technology, have recently been tackled by the development a contactless capturing device ( As in other biometric technologies, fingerprint recognition is an area where the "criminal justice" market meets the "security market", yet another indication of civilian spheres becomes indistinguishable from the military. The utopia of a prisonless society seems to come within the reach of a technology capable of undermining freedom by an upward spiral driven by identification needs and identification technologies. |
|
Copyright Management and Control Systems: Metering Hardware Devices Those have to be acquired and installed by the user. For example under a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes copyrighted works. Digital Certificates Hereby a certification authority issues to a user an electronic file that identifies the user as the owner of a public key. Those digital certificates, besides Centralized Computing Under this approach all of the executables remain at the server. Each time the executable is used, the user's computer must establish contact with the server, allowing the central computer to meter access. Access Codes Access code devices permit users to "unlock" protective mechanisms (e.g. date bombs or functional limitations) embedded in copyrighted works. Copyright owners can meter the usage of their works, either by unlocking the Copyright Clearinghouses Under this approach copyright owners would commission "clearinghouses" with the ability to license the use of their works. A user would pay a license fee to obtain rights concerning the intellectual property. |
|
Electronic Messaging (E-Mail) Electronic messages are transmitted and received by computers through a network. By E-Mail texts, images, sounds and videos can be sent to single users or simultaneously to a group of users. Now texts can be sent and read without having them printed. E-Mail is one of the most popular and important services on the Internet. |
|
Artificial Intelligence Artificial Intelligence is concerned with the simulation of human thinking and emotions in information technology. AI develops "intelligent systems" capable, for example, of learning and logical deduction. AI systems are used for creatively handling large amounts of data (as in data mining), as well as in natural speech processing and image recognition. AI is also used as to support Yahoo AI sites: MIT AI lab: |
|
Kessler Marketing Intelligence (KMI) KMI is the leading source for information on fiber-optics markets. It offers market research, strategic analysis and product planning services to the opto-electronics and communications industries. KMI tracks the worldwide fiber-optic cable system and sells the findings to the industry. KMI says that every fiber-optics corporation with a need for strategic market planning is a subscriber to their services. |
|
Digital Subscriber Line (DSL) DSL connections are high-speed data connections over copper wire telephone lines. As with cable connections, with DSL you can look up information on the Internet and make a phone call at the same time but you do not need to have a new or additional cable or line installed. One of the most prominent DSL services is ISDN (integrated services digital network, for more information click here ( |
|
NSFNet Developed under the auspices of |
|
Expert system Expert systems are advanced computer programs that mimic the knowledge and reasoning capabilities of an expert in a particular discipline. Their creators strive to clone the expertise of one or several human specialists to develop a tool that can be used by the layman to solve difficult or ambiguous problems. Expert systems differ from conventional computer programs as they combine facts with rules that state relations between the facts to achieve a crude form of reasoning analogous to |
|
America Online Founded in 1985, America Online is the world's biggest Internet service provider serving almost every second user. Additionally, America Online operates CompuServe, the Netscape Netcenter and several AOL.com portals. As the owner of Netscape, Inc. America Online plays also an important role in the Web browser market. In January 2000 America Online merged with Time Warner, the worlds leading media conglomerate, in a US$ 243,3 billion deal, making America Online the senior partner with 55 percent in the new company. |
|
Internet Protocol Number (IP Number) Every computer using IP numbers are divided into three classes. Class A is restricted for big-sized organizations, Class B to medium-sized ones as universities, and Class C is dedicated to small networks. Because of the increasing number of networks worldwide, networks belonging together, as |
|
Alexander Graham Bell b., March 3, 1847, Edinburgh d. Aug. 2, 1922, Beinn Bhreagh, Cape Breton Island, Nova Scotia, Canada American audiologist and inventor wrongly remembered for having invented the telephone in 1876. Although Bell introduced the first commercial application of the telephone, in fact a German teacher called Reiss invented it. For more detailed information see the Encyclopaedia Britannica: http://www.britannica.com/bcom/eb/article/1/0,5716,15411+1+15220,00.html |
|
Adolf Hitler Adolf Hitler (1889-1945) was the head of the NSdAP, the National Socialist Workers' Party. Originally coming from Austria, he started his political career in Germany. As the Reichskanzler of Germany he provoked World War II. His hatred against all non-Aryans and people thinking in a different way killed millions of human beings. Disinformation about his personality and an unbelievable machinery of propaganda made an entire people close its eyes to the most cruel crimes on human kind. |
|
Wide Area Network (WAN) A Wide Area Network is a wide area proprietary network or a network of local area networks. Usually consisting of computers, it may consist of cellular phones, too. |
|
Optical communication system by Aeneas Tacitus, 4th century B.C. Aeneas Tacitus, a Greek military scientist and cryptographer, invented an optical communication system that combines water and beacon telegraphy. Torches indicated the beginnings and the ends of message transmissions while water jars were used to transmit the messages. These jars had a plugged standard-size hole drilled on the bottom side and were filled with water. As those who sent and those who received the message unplugged the jars simultaneously, the water drained out. Because the transmitted messages corresponded to water levels, the sender indicated by torch signal that the appropriate water level has been reached. It is a disadvantage that the possible messages are restricted to a given code, but as this system was mainly used for military purposes, this was offset by the advantage that it was almost impossible for outsiders to understand these messages unless they possessed the codebook. With communication separated from transportation, the distant became near. Tacitus' telegraph system was very fast and not excelled until For further information see Joanne Chang & Anna Soellner, Decoding Device, |
|
The Flesh Machine This is the tile of a book by the |
|
Internet Software Consortium The Internet Software Consortium (ISC) is a nonprofit corporation dedicated to the production of high-quality reference implementations of Internet standards that meet production standards. Its goal is to ensure that those reference implementations are properly supported and made freely available to the Internet community. http://www.isc.org |
|
Citizens for a Sound Economy Since 1984, Citizens for a Sound Economy has advocated market-based solutions to public policy problems. Uniting its 250,000 members is the fundamental belief that a strong and vibrant free-market economic system offers the best hope for creating opportunity and improving the quality of life for every American. |
|
Moral rights Authors of copyrighted works (besides |
|
DMCA The DMCA (Digital Millennium Copyright Act) was signed into law by U.S. President Clinton in 1998 and implements the two 1996 |
|
Royal Dutch/Shell Group One of the world's largest corporate entities in sales, consisting of companies in more than 100 countries, whose shares are owned by NV Koninklijke Nederlandsche Petroleum Maatschappij (Royal Dutch Petroleum Company Ltd.) of The Hague and by the "Shell" Transport and Trading Company, PLC, of London. Below these two parent companies are two holding companies, Shell Petroleum NV and the Shell Petroleum Company Limited, whose shares are owned 60 percent by Royal Dutch and 40 percent by "Shell" Transport and Trading. The holding companies, in turn, hold shares in and administer the subsidiary service companies and operating companies around the world, which engage in oil, petrochemical, and associated industries, from research and exploration to production and marketing. Several companies also deal in metals, nuclear energy, solar energy, coal, and consumer products. |
|
Citizens for Tax Justice Citizens for Tax Justice was formed in 1979 to give people a "greater voice" in the development of the tax laws at the national, state and local levels. CTJ efforts are based on the idea that people should pay taxes according to their ability to pay them. |
|
RTMark RTMark is a group of culture jammers applying a brokerage-system that benefits from "limited liability" like any other corporation. Using this principle, RTMark supports the sabotage (informative alternation) of corporate products, from dolls and children's learning tools to electronic action games, by channelling funds from investors to workers. RTMark searches for solutions that go beyond public relations and defines its "sbottom line" in improving culture. It seeks cultural and not financial profit. |
|
Transmission Control Protocol/Internet Protocol (TCP/IP) TCP and IP are the two most important protocols and communication standards. TCP provides reliable message-transmission service; IP is the key protocol for specifying how packets are routed around the Internet. More detailed information can be found |
|