Facial Recognition ID Moves from Planes and Trains to Conferences and Events
4 Aug 2017 – The use of biometric identification is becoming a real-time case study in how the public is incrementally conditioned to accept the total erosion of privacy for supposed convenience and security.
As I’ve been covering over the last several months, a 15-year-old mandate from the federal government to implement biometric ID for airline travel is finally being implemented at various airports throughout the United States. Meanwhile, countries like Australia and the UK also have airport biometrics programs rolling out, with Australia seeking to make it a requirement nationwide by 2020. The UK has gone even one step further and has been testing a system to be used on trains as well, also with a target date somewhere around 2020.
People have been acclimatized to biometric ID in various forms, with increasing frequency in the areas of banking and personal computing, but only now is it being rolled out into the wider world. In some cases, the use of facial recognition for targeted advertising and even to monitor political views and for pre-crime policing has been done in public spaces without any consent whatsoever.
According to MassPrivateI, a company called Zenus is at the forefront of spreading facial recognition even wider into conferences and events. It heralds the next step toward increasingly pervasive biometric ID requirements to function in modern society.
Zenus a startup company based in Texas, claims their facial recognition software can speed up check-ins at conferences and events.
Attendees have registered for a conference ahead of time, providing pertinent personal information and uploading a photo. On-site at the conference, that person steps up to a device—usually a tablet—where a camera scans the person’s face, using the image to call up her information and completing the check-in process digitally. (Source)
At the Zenus website we find the video below, which makes a direct appeal to convenience and security by databasing attendees with facial recognition as well as social media log-ins, illustrating how the virtual world and the real are melding into one and the same thing.
Step by step, people are being transformed into digital organisms made easier for scanning and processing. The political will is there, the databases exist, and the technology is clearly being rolled out across every meaningful area of human activity.
This article may be freely republished in part or in full with author attribution and source link.
DISCLAIMER: The statements, views and opinions expressed in pieces republished here are solely those of the authors and do not necessarily represent those of TMS. In accordance with title 17 U.S.C. section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. TMS has no affiliation whatsoever with the originator of this article nor is TMS endorsed or sponsored by the originator. “GO TO ORIGINAL” links are provided as a convenience to our readers and allow for verification of authenticity. However, as originating pages are often updated by their originating host sites, the versions posted may not match the versions our readers view when clicking the “GO TO ORIGINAL” links. This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.
Click here to go to the current weekly digest or pick another article:
BIG BROTHER - SPYING - SURVEILLANCE - WHISTLEBLOWING: