Sunday, September 2, 2012

Biometrics: Gatekeeper of the MOB System

Today I want to discuss how Biometrics will link followers of the Anti-Christ to the world economic system. As discussed in previous posts the elimination of anonymity is required to control all buying and selling. In my original research “Missed the Mark”, I discuss how systems are being put in place to reduce any anonymity on the internet. These same systems will also eliminate anonymity during point of sale transactions. It is important to note the excuses for implementation of these systems will always be” to reduce fraud and theft as well as provide added security”. What those who are implementing these systems don’t realize is this system is only as safe as those who control it. Under the Anti-Christ, these ID systems will be used to control all who take the Mark. These systems are being implemented in virtually every major country in one form or another. The 2 components of these systems that make them work are the use of Biometrics as the primary form of identification, and the creation of interoperable databases to house the biometric data. One country that is working to lead the way for the rest of the world is India.

By far the most ambitious of all of the countries regarding the creation of national ID’s that use biometric data India’s Planning Commission has been tasked to implement the Unique Identification Authority of India or UIDAI. This system generates a random 12 digit number that is backed up by a complete set of biometric data such as “10 finger biometrics, 2 iris scans, and photograph” which “establishes the identity of the person with over 99.5% accuracy. This system will accommodate more than 12 billion fingerprints, 2.4 billion iris scans, and 1.2 billion photographs.” This system is built with open source web technologies making it an open system (interoperable) that other systems will be able to tie in to. According to Rai “once established and stored, a person’s identity can easily be verified and authenticated using a cell phone, smart phone, tablet or any other device hooked to the internet”. (Rai, 2012) Rai also points out several pilot programs that are accessing the UIDAI system. These pilot programs allow Indians to open bank accounts after receiving a unique ID, which allow them to use a smartphone to authenticate in to the system, allowing the transfer and withdrawal of money from their accounts. (Rai, 2012) For more information you can go directly to the UIDAI site at http://uidai.gov.in. If India successfully pulls this off and registers all 1.2 billion of its citizens it will not be hard to transfer these lessons learned and best practices to accommodate the remaining 6 billion inhabitants of this planet.

For information on how the United States is secretly working to implement this system see my initial post “Missing the Mark”. Information regarding National Strategy for Trusted Identities in Cyberspace (NSTIC) can be found under the section titled “Internet Transactions”. What is not in my initial research that all who read should consider is the realization by the US Commerce Department that the only way to make this ID scheme work is the implementation of biometrics associated with the online ID. For more information regarding biometrics and NSTIC read “Is the NSTIC Strategy for a Passwordless System Viable?” For additional information  read "Thumbs Up for NSTIC".

Before I finish I would like to name additional countries which are currently working to tie biometric data to their national ID’s. These countries are Argentina, Kenya, and France. It won’t be long before additional countries with mandatory national ID’s will follow the lead of India and implement their ID’s with this data.


References:
Rai, Saritha. "Why India's Identity Scheme Is Groundbreaking." BBC News. BBC, 06 June 2012. Web. 02 Sept. 2012. http://www.bbc.co.uk/news/world-asia-india-18156858.

Shenoy, Gurudatt. "Is the NSTIC Strategy for a Passwordless System Viable?" Is the NSTIC Strategy for a Passwordless System Viable? Infosecisland, n.d. Web. 02 Sept. 2012. <http://www.infosecisland.com/blogview/13161-Is-the-NSTIC-Strategy-for-a-Passwordless-System-Viable.html>.

"Thumbs Up for NSTIC" Security Document World. N.p., n.d. Web. 02 Sept. 2012. <http://www.securitydocumentworld.com/index.cfm>.

No comments:

Post a Comment