Premium Only Content

The Role Of Utility Meters In Mass Surveillance
The Role Of Utility Meters In Mass Surveillance
Biometrics
Technologies: Biometric technologies refer to automated methods that are able to identify or recognise the identity of a living person, after analysing some of his/her characteristics (e.g., physiological and/or behavioural characteristics) (Mordini and Petrini 2007; Nwatu 2011). Examples of biometric technologies that consider the physiological characteristics of a person are these of face recognition, facial thermogram, recognition of fingerprints, the geometry of hands, iris or retina scanning, etc. In addition, behavioural oriented biometric technologies include those that can recognise someone’s manner of walking (i.e., gait recognition), analyse the way people type using a keyboard (i.e., keystroke analysis), how they operate a pointing device (e.g., mouse dynamics in the case of a mouse), signature analysis, or even performing a waveform analysis of people’s voices to verify their identity. Finally, another category of biometrics is that of multimodal biometric systems, which refer to systems that include multiple sources in order to establish the identity of an individual (Ross and Jain 2004).
Application areas: The main objective of biometric technologies is to identify, verify, or authorise an individual. That objective is mainly accomplished through the application of pattern-matching algorithms on a set of collected data (usually kept in database systems). Therefore, some of the domains in which biometric technologies find a use are systems applicable to immigration and border control (e.g., use of biometric ‘chipped’ passports (nidirect 2014)); to criminal justice systems and profiling systems (e.g., the Combined DNA Index System (CODIS) (FBI 2011) used by the FBI and U.S. Department of Justice); national identity systems, etc. (Bellanova et al. 2012). Despite the wide spectrum of applications of biometric technologies, their capabilities are mostly restricted to the monitoring of people through identification or verification operations.
Challenges: Despite the high effectiveness of biometric technologies, there are recognised challenges that should be considered when using them. In most of the examined studies, security and privacy concerns are identified as key challenges. Another interesting challenge is that of the reliability level offered by biometric technologies (e.g., reliability with regard to DNA comparison), or even vulnerabilities that might exist in a system operating with biometric technologies (FBI 2006).
-
8:19
joegecko's Proxy Channel
1 day agoOMG! $793 Billion STOLEN! My Cousin Vinny Exposes The Fraud! Scam Of The Century!
1691 -
3:43:51
Alex Zedra
6 hours agoLIVE! Come Play WoT with me!
38.4K9 -
5:22:49
Drew Hernandez
15 hours agoDOGE EXPOSES $2 BILLION SCHEME LINKED TO STACEY ABRAMS?!
65.4K40 -
1:27:59
Kim Iversen
10 hours agoRFK Jr Declares No More Cheetos on Welfare? | Yale Confirms Long Covid Is Actually Vaccine Injury!
82.9K106 -
1:08:43
The Charlie Kirk Show
7 hours agoTHOUGHTCRIME Ep. 74 — Charlie's Campus Return? Robo-Butlers? Garden of American Heroes?
81K18 -
1:09:53
Slightly Offensive
7 hours ago $6.68 earnedIs the US Headed for MORE WAR Under TRUMP? | Guest: Scott Horton
41.9K9 -
58:29
The StoneZONE with Roger Stone
7 hours agoRoger Stone Hails Confirmation of Kash Patel, Trashes Schiff for Attacks On Patel | The StoneZONE
53.4K19 -
48:44
Man in America
12 hours agoA MASSIVE Global Financial Reset Is Coming—Are You Ready?
41.6K12 -
1:15:42
Precision Rifle Network
1 day agoS4E5 Guns & Grub - The Best Rifle Under $2000
69K6 -
1:02:54
Glenn Greenwald
1 day agoSouth Korean Economist Ha-Joon Chang on the Economic World Order, Trump's Tariffs, China & More | SYSTEM UPDATE #410
89.2K50