SlideShare a Scribd company logo
1 of 36
Download to read offline
BIG BROTHER
TECHNOLOGIES
THIS MONTH’S ISSUE
Why we chose…
Big Brother Technologies
We chose to examine forecasts for surveillance technologies
for this month’s STEEP Report because the technologies are
without precedent and the social implications could change
the future of our entire civilization.
Dramatic? Yes. Hysterical and paranoid?
We wish.
There is surprisingly little discussion in the media about the
rapid development of information technologies that will be
used to track individuals anywhere on the globe in real time.
These technologies will not be implemented as part of some
government scheme to control citizens, but all for useful
commercial and government applications – marketing,
logistics, health policy, human resources, and security.
This doesn’t change the gravity of the ethical (and business!)
implications of what’s next for surveillance technologies.
A portfolio of surveillance technologies will soon be able to
track most of the world’s population in real time.
Do not underestimate the consequences or possibilities
from this development.
Through technologies such as GPS, RFID, IPv6, and facial recognition,
we are rapidly developing the capacity to track billions of people in
real time.
The power of ubiquitous computing and sensing will give your
company dramatic new powers and significant liabilities.
Our societies may never be the same.
Talk to your employees, your lawyers, and your elected officials
The world is investing in cameras, RFID, GPS, remote sensing and powerful internet
architectures to measure, store, and correlate trillions of points of data around the world
Big Brother Tech: The Global View
HOLLYWOOD:
Movie posters
scan facial
features to
examine which
images evoke the
most response
WASHINGTON:
Global climate
change
monitoring tracks
individual
factories
CHINA: One
billion Chinese
citizens issued
radio-frequency
identification
cards that
broadcast family
history, marital
status, prison
records
LONDON:
Advertisements
coordinated with GPS
positioning in cell
phones to show
businesses within
walking distance
AFRICA: Refugee
movements tracked
by satellite to
coordinate
humanitarian efforts
The Trends
Radio Frequency
Identification Tags
(RFID)
Global Positioning
Systems (GPS)
IPv6 Internet
networking
Facial recognition
software
A portfolio of information technologies is converging in the near future (2010+)
with dramatic social consequences, and plenty of business opportunities, too:
We are entering, willingly or not, into the era of Big Brother Technologies.
Iris scanning
Biometrics
Ubiquitous video
surveillance
RFID Tags – unlimited applications for “talking barcodes”
In usage since 1955, radio-frequency identification chips are essentially barcodes that
talk. With a tiny chip and an antenna to broadcast its unique code, short-range radio
signals broadcast a limited amount of information to any device capable of listening.
The technology is maturing, having dropped in price over the last eight years to begin to
find applications in the logistics industry.
The RFID market is set to explode: US $1 trillion by 2017?
• From 1955 to 2005, total sales of RFID tags
were $2.4 billion.
• Last year alone, 2.24 billion tags were sold
worldwide. and analysts project that by 2017
the annual sales could reach $25 billion.
With a variety of maturing applications, from
improving global logistics to preventing
pharmaceutical counterfeiting, the market for
RFID tags will explode in the next ten years.
(“Microchips Everywhere: A Future Vision.” Todd Lewan. Seattle Times.
January 29, 2008. )
RFID tags: headed to the item level
Until recently, the high price of RFID has
kept it on pallets, monitoring of batches
of products in transit. It has been too
expensive to have one on each unit.
In the coming decades , as the
price continues to fall, RFID tags
will finally be incorporated on
individual items
“[RFID] is like having an expert with a clipboard sitting next to every of your trucks, manufacturing
lines, pallets with goods, and they can tell you at any time what is happening, where,”
- Ken Douglas, global director of technology at BP.
Tracking shampoo bottles is great, but applications for the future surely won’t stop there.
Now companies are selling RFID tags to help identify and track pets, children and the elderly.
RFID tags: headed to the individual citizen
level
RFID chip
Plus, save time and
money if you have
employees in sensitive
areas – many companies
are choosing to implant
RFID chips, increasing
security and dispensing
with messy ID cards.
In the future, anything with these tags could be scanned at increasing distances without a
person’s knowledge.
Market researchers could scan items in your car from five feet away or a police officer
could scan your ID as you pass on the street.  
RFID tags: mass data collection at a distance
NOTE: The Chinese government just ordered one billion RFID-loaded chips to identify its
citizens.
GPS chips: Surveillance at a serious distance
GPS chips, computer chips that record and broadcast their location via satellite, are now
commonly used in navigation, telecommunications, tracking almost anything in real time.
The market for these devices is poised for exponential growth.
GPS sales predicted to hit one billion units per year by 2012
Between real-time navigation, geo-tagging of images in digital cameras, emergency rescue, and
more, there are seemingly limitless applications for GPS.
If market forecasts are correct, then billions of digital devices will begin streaming out digital
information about their position. The era of losing track of things may be over…
GPS will lead to the advertising of the future:
100 million Europeans will subscribe to “location-based services”
As all advertisers know, we are in an arms-race when it comes to capturing the
attention Businesses are using GPS for new and creative ways to advertise:
Pictured at left Yell.com has
installed digital billboards fitted
with GPS technology on the sides of
London buses to create location-
specific advertisements.
Facial recognition software: the end of anonymity?
1. A tiny camera projects an invisible light pattern onto the
subject’s face, revealing the face's surface geometry, which is
captured on streaming video at 30 frames per second.
2. This 3-D measurement allows point-to-point measurement, such
as forehead to cheekbone.
3. The face pattern is plugged into an algorithm to generate a 3-D
"mesh" created from measurements smaller than a millimeter.
4. A biometric template -- based on bone structures that don't
change over time -- is created from the image and is stored in
the database.
5. The database stores the images, comparing them to locate
matches.
Combining software analysis, cameras, and
databases facial recognition software could be
the nosy neighbor of the future. This cutting-
edge software can quickly scan faces at a
distance and compare results to any database –
domestic or international
Facial recognition:
The billboard of tomorrow will watch YOU
Worried about your latest ad campaign? With facial recognition software, billboards like this one
analyze who looks at the advertisement, where they focus, and for how long. Unlike biometrics, it
requires ZERO consent from those observed.
Advertisers measuring:
• Age
• Gender
• Race
Located in:
• McDonald’s
(Singapore)
• Ikea (Europe)
• A&E (New York)
• 30 more locations in
US
Biometrics: check on employee productivity
without the need for managerial skill
• Monitor employee activity through PC and
laptop computers, mobile phones, and
blackberries
• Monitor employees’ heart rate, breathing, body
temperature, facial expressions and blood
pressure
• Record and analyze words and numbers used
and websites visited
• Measure workload and test for honesty
Microsoft recently filed a patent application for “Monitoring System 500” a “virtual
middle manager” that uses to:
Biometrics to meet the talent crunch
The “Monitoring System 500” is designed to replace middle managers by:
• Measuring speed of task completion
• Identifying areas of assistance
• Offering assistance (prompts) when employees need it
AND…
• Nothing like invasive surveillance to motivate productivity!
• Eliminating human interaction!
Video surveillance: an old technology expands as
governments become more interested in security
Where there is little data correlating surveillance and public safety, governments on both
sides of Atlantic are increasing their investments in Big Brother Technologies.
The United States has approximately 30 million surveillance cameras in operation, mostly
in cities – roughly one for every 10 people.
Nearly every block of Manhattan under camera surveillance
London monitors every neighborhood. “Every Briton can expect to be caught on camera on
average some 300 times a day.”
“Learning to live with Big Brother.” The
Economist. Sept 27, 2007.
IPv6 Internet networking: faster and more secure
Internet Protocol version 6 (IPv6) is an Internet Layer protocol
for packet-switched internetworks. It is designated as the
successor of IPv4, the first and still dominant version of the
Internet Protocol, for general use on the Internet.
IPv6 has a much larger address space, which allows flexibility
in allocating addresses and routing traffic. The extended
address length eliminates the need to use network address
translation to avoid address exhaustion, and also simplifies
aspects of address assignment and renumbering when
changing Internet connectivity providers.
The IPv6 address space is extremely large: IPv6 supports 2128
(about 3.4×1038) addresses, or approximately 5×1028
(roughly 295) addresses for each of the roughly 6.5 billion
(6.5×109) people alive today.[1] In a different perspective, this
is 252 addresses for every observable star in the known
universe[2] – more than ten billion billion billion times as many
addresses as IPv4 supported.
IPv6 is an updated internet system, greatly expanding the
number of potential IP addresses, therefore the number of
possible internet users.
Under the current system, IPv4, the overall pool of IP
addresses is expected to be depleted by 2012, leading to the
necessity for IPv6.
IPv6 Internet
IPv6 uses a 128-bit address size compared with the 32-bit system
used in the IPv4, allowing for as many as 3.4x1038 possible
addresses, enough to cover every person on the planet several times
over.
The 128-bit system also provides for multiple levels of hierarchy
and flexibility in hierarchical addressing and routing, an
improvement over the IPv4-based Internet.
The Whole is Greater…
The combination of surveillance techniques and
advanced technology is greater than the sum of its
parts.
Combining all of the parts: China’s Golden Shield
Golden Shield – a nationwide digital surveillance network, linking national,
regional, and local security agencies through a web of surveillance technologies,
featuring:
• Speech recognition
• Facial recognition
• Closed circuit TV
• National ID cards
• Credit records
• Internet surveillance
Building China’s surveillance society
The police will be able to coordinate vast amounts of
data
RFID-implanted
national ID cards –
scanned without
owner’s knowledge
Closed-circuit TV:
monitoring public
spaces
Database - instantly
comparing
fingerprints
Nationwide database:
tracking
citizens since birth
Speech recognition:
monitoring telephone
conversations
Facial recognition –
capturing and
matching facial
images in a crowd
How the technology works in Shenzhen
• This web of cameras will be
linked to the country’s national ID
system, tracking citizens by RFID
tags.
• Anyone who does not get the ID
card cannot live in Shenzhen and
cannot get government benefits.
• It allows the government to
control the movement of political
and religious dissidents and
control the population of the
future.
In the rapidly-growing city of Shenzhen, police are installing over 20,000
surveillance cameras in the streets, guided by American-made facial recognition
software.
Implications
RFID: Implications for the Future
• ADVERTISING – to the individual level!!!!
• Theft prevention
• Pets, elderly, kids
• Shipping industry
• Sales – locate desired product in remote warehouse
• Medical – speed lifesaving when seconds count, anti-
counterfeiting
• IDs – immigration (passports)
• Political/population monitoring – eye on troublemakers
• Market research!!!!!
Implications for the Future
Biometric applications combined to improve security for:
• Travel speed/border security
• Purchases by credit card
• Secure access to buildings
• Security for high-volume events
•Computer passwords
•National or state identification
Questions
Broad issues:
• Right to privacy
•Does consent exist anymore? Limitations?
•Who “owns” this info? What if the info “they” have is somehow
wrong (like on credit reports)? How do you know, how do you
correct it if it’s not public?
•What does the credit report of tomorrow look like?
•Is it inevitable that we are headed for a system like China where all
info is tracked on each individual since birth?
•Can a person ever make a mistake?
• Will there eventually be some sort of international data standard?
Shared data? Will the Chinese call the shots?
Questions
Broad issues (cont):
•Is there a way for laws to guide the development of these
technologies? Can we overturn the PATRIOT Act, ect…
• If all of this information is available on everyone, what is the
future of hackers?
• How to balance enormous benefits and positive uses of this
technology with its far-reaching, scarring impacts?
What To Do Today
Addendum: Big Brother Tech - By the Numbers
Figure Source
There are approximately 30 million surveillance cameras in the
U.S. – roughly one for every ten people.
“Learning to live with Big Brother.” The Economist. Sept 27,
2007.
Analysts project that by 2017 cumulative sales of RFID tags will
top $1 trillion - generating more than $25 billion in annual
revenues for the industry.
“Microchips Everywhere: A Future Vision.” Todd Lewan.
Seattle Times. January 29, 2008.
GPS sales are expected to hit $1 billion by 2012. "GPS chipset sales to approach one billion by 2012 according
to market research firm," Digitimes, April 19th, 2008.
100 million Europeans will subscribe to location-based
services.
"Euro LBS users to top 100 million by 2012." GPS World. April
9, 2008.
Facial recognition software used behind the billboards. Ads for
McDonalds in Singapore, Ikea in Europe, A&E in New York, and
30 different locations in malls across the U.S.
“Billboards with facial recognition software trickling out.” Nilay
Patel. June 4, 2008. http://www.engadget.com/2008/06/04/
billboards-with-facial-recognition-software-trickling-out/
“Every aspect of computer users’ lives — from their heartbeat
to a guilty smile — could be monitored and immediately
analysed under the futuristic system detailed in Microsoft’s
patent application.”
“How computer spy in the office will monitor everything you
do.” David Brown and Elizabeth Judge. London Times. January
16, 2008.
In the rapidly-growing city of Shenzhen, police are installing
over 20,000 surveillance cameras in the streets, guided by
American-made facial recognition software.
Find out more: Books
1984. By George Orwell.
(Why not have another look? The technology is there.)
The Transparent Society: Will Technology Force Us to Choose Between
Privacy and Freedom? By David Brin.
RFID Applied. By Jerry Banks.
Find out more: Books
Loving Big Brother: Performance, Privacy and Surveillance Space.
By John McGrath.
No Place to Hide: Behind the Scenes of Our Emerging Surveillance Society.
By Robert O’Harrow.
Handbook of Biometrics. By Anil K. Jain, Patrick Flynn and
Arun A. Ross.
Find out more: Articles
“Big Brother gets bigger, says global privacy study.” Elinor Mills. CNET News. January 2, 2008.
http://news.cnet.com/8301-10784_3-9838743-7.html
“Big Brother in China – via U.S. technology.” Warren Mass. The John Birch Society. August 16, 2007.
http://www.jbs.org/node/5153
“Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society.” Jay Stanley and Barry Steinhardt.
ACLU. January 2003. http://www.aclu.org/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf
“Biometrics – the future for flying bliss?” Nick Heath. February 21, 2008.
http://www.silicon.com/retailandleisure/0,3800011842,39170130,00.htm
“Do Americans Care About Big Brother?” Massimo Calabresi. Time. February 14, 2008.
http://www.time.com/time/nation/article/0,8599,1722537,00.html?xid=feed-cnn-topics
"Euro LBS users to top 100 million by 2012." GPS World. April 9, 2008. http://lbs.gpsworld.com/gpslbs/LBS+News/
Euro-LBS-Users-to-Top-100M-by-2012/ArticleStandard/Article/detail/509169
"GPS chipset sales to approach one billion by 2012 according to market research firm," Digitimes.
April 19th, 2008.
http://www.digitimes.com/news/a20080419PR200.html
Find out more: Articles
“How computer spy in the office will monitor everything you do.” David Brown and Elizabeth Judge. London Times.
January 16, 2008.
http://technology.timesonline.co.uk/tol/news/tech_and_web/article3193223.ece
“Japan’s teenage smokers face wrinkle test.” Justin McCurry. The Guardian. May 13, 2008.
http://www.guardian.co.uk/world/2008/may/13/japan.health
“Learning to live with Big Brother.” The Economist. Sept 27, 2007.
http://www.economist.com/world/international/displaystory.cfm?story_id=9867324
“Microchips Everywhere: A Future Vision.” Todd Lewan. Seattle Times. January 29, 2008.
http://seattletimes.nwsource.com/html/businesstechnology/2004151388_apchippingamericaiii29.html?syndication=rss
“New security camera can ‘see’ through clothes.” CNN. April 16, 2008.
http://www.cnn.com/2008/WORLD/europe/04/16/camera.england/index.html
“RFID Tags: Big Brother in Small Packages.” Declan McCullagh. CNET News.
http://news.cnet.com/2010-1069-980325.html

More Related Content

What's hot

History of IoT: Timeline of Major Events.
History of IoT: Timeline of Major Events.History of IoT: Timeline of Major Events.
History of IoT: Timeline of Major Events.HQSoftware
 
The Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key PlayersThe Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key PlayersCM Research
 
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...Dr. Mazlan Abbas
 
Technology trends for 2016
Technology trends for 2016 Technology trends for 2016
Technology trends for 2016 albert joseph
 
Internet of Things: How To Start
Internet of Things: How To StartInternet of Things: How To Start
Internet of Things: How To Startmsyukor
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 
Internet of Things the future is now - Frederic Lhostte
Internet of Things the future is now - Frederic LhostteInternet of Things the future is now - Frederic Lhostte
Internet of Things the future is now - Frederic LhostteNRB
 
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran GSTF
 
Application scenarios and real-world deployments for IoT and Smart Cities
Application scenarios and real-world deployments for IoT and Smart CitiesApplication scenarios and real-world deployments for IoT and Smart Cities
Application scenarios and real-world deployments for IoT and Smart CitiesMàrius Montón
 
InternetofSpace_SatelliteMagazine
InternetofSpace_SatelliteMagazineInternetofSpace_SatelliteMagazine
InternetofSpace_SatelliteMagazineNaro09
 
XR and the Future of Immersive Technology
XR and the Future of Immersive TechnologyXR and the Future of Immersive Technology
XR and the Future of Immersive TechnologyVincent Lau
 
Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Dr. Mazlan Abbas
 
Global IoT Managed Services – Competitive Intelligence
Global IoT Managed Services – Competitive IntelligenceGlobal IoT Managed Services – Competitive Intelligence
Global IoT Managed Services – Competitive IntelligenceNetscribes
 
Are We Ready for IoT Now? Or Risk Being Left Behind
Are We Ready for IoT Now? Or Risk Being Left BehindAre We Ready for IoT Now? Or Risk Being Left Behind
Are We Ready for IoT Now? Or Risk Being Left BehindDr. Mazlan Abbas
 
Internet 2020: The Future Connection
Internet 2020: The Future ConnectionInternet 2020: The Future Connection
Internet 2020: The Future ConnectionChristine Nolan
 
BII The Internet Of Everything 2015
BII The Internet Of Everything 2015 BII The Internet Of Everything 2015
BII The Internet Of Everything 2015 BI Intelligence
 

What's hot (20)

L17 Internet of Things
L17 Internet of ThingsL17 Internet of Things
L17 Internet of Things
 
Internet of Things
Internet of Things Internet of Things
Internet of Things
 
History of IoT: Timeline of Major Events.
History of IoT: Timeline of Major Events.History of IoT: Timeline of Major Events.
History of IoT: Timeline of Major Events.
 
The Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key PlayersThe Internet of Things - Industry Trends and Key Players
The Internet of Things - Industry Trends and Key Players
 
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
How Internet of Things Shape Better Outlook for Your Business in the 21st Cen...
 
Technology trends for 2016
Technology trends for 2016 Technology trends for 2016
Technology trends for 2016
 
Internet of Things: How To Start
Internet of Things: How To StartInternet of Things: How To Start
Internet of Things: How To Start
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
Internet of Things the future is now - Frederic Lhostte
Internet of Things the future is now - Frederic LhostteInternet of Things the future is now - Frederic Lhostte
Internet of Things the future is now - Frederic Lhostte
 
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
 
Application scenarios and real-world deployments for IoT and Smart Cities
Application scenarios and real-world deployments for IoT and Smart CitiesApplication scenarios and real-world deployments for IoT and Smart Cities
Application scenarios and real-world deployments for IoT and Smart Cities
 
InternetofSpace_SatelliteMagazine
InternetofSpace_SatelliteMagazineInternetofSpace_SatelliteMagazine
InternetofSpace_SatelliteMagazine
 
XR and the Future of Immersive Technology
XR and the Future of Immersive TechnologyXR and the Future of Immersive Technology
XR and the Future of Immersive Technology
 
Trends in IoT 2017
Trends in IoT 2017Trends in IoT 2017
Trends in IoT 2017
 
Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Global IoT Managed Services – Competitive Intelligence
Global IoT Managed Services – Competitive IntelligenceGlobal IoT Managed Services – Competitive Intelligence
Global IoT Managed Services – Competitive Intelligence
 
Are We Ready for IoT Now? Or Risk Being Left Behind
Are We Ready for IoT Now? Or Risk Being Left BehindAre We Ready for IoT Now? Or Risk Being Left Behind
Are We Ready for IoT Now? Or Risk Being Left Behind
 
Internet 2020: The Future Connection
Internet 2020: The Future ConnectionInternet 2020: The Future Connection
Internet 2020: The Future Connection
 
BII The Internet Of Everything 2015
BII The Internet Of Everything 2015 BII The Internet Of Everything 2015
BII The Internet Of Everything 2015
 

Viewers also liked

Ain Beni Mathar: Conventional and Renewable Energy in Morocco
Ain Beni Mathar: Conventional and Renewable Energy in MoroccoAin Beni Mathar: Conventional and Renewable Energy in Morocco
Ain Beni Mathar: Conventional and Renewable Energy in MoroccoAbengoa
 
WTF is up with the economy
WTF is up with the economyWTF is up with the economy
WTF is up with the economyEric Garland
 
How Four Cognitive Biases Deceive Analysts and Destroy Actionability
How Four Cognitive Biases Deceive Analysts and Destroy ActionabilityHow Four Cognitive Biases Deceive Analysts and Destroy Actionability
How Four Cognitive Biases Deceive Analysts and Destroy ActionabilityEric Garland
 
The Future of Forecasting
The Future of ForecastingThe Future of Forecasting
The Future of ForecastingEric Garland
 
Why HR is a PR Disaster (infographic)
Why HR is a PR Disaster (infographic)Why HR is a PR Disaster (infographic)
Why HR is a PR Disaster (infographic)Alan See
 
The Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health InformaticsThe Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health InformaticsIris Thiele Isip-Tan
 
Firma Willy Sommers opnieuw winstgevend
Firma Willy Sommers opnieuw winstgevendFirma Willy Sommers opnieuw winstgevend
Firma Willy Sommers opnieuw winstgevendThierry Debels
 
The Multiplier Effect
The Multiplier EffectThe Multiplier Effect
The Multiplier EffectBob Asken
 
Sorry, but marketing is your job too
Sorry, but marketing is your job tooSorry, but marketing is your job too
Sorry, but marketing is your job tooChristine Cawthorne
 
Keyword Strategie: Do's & Don'ts bei der Keyword Recherche - SMX München 2017
Keyword Strategie: Do's & Don'ts bei der Keyword Recherche - SMX München 2017Keyword Strategie: Do's & Don'ts bei der Keyword Recherche - SMX München 2017
Keyword Strategie: Do's & Don'ts bei der Keyword Recherche - SMX München 2017Bastian Grimm
 
RSA暗号運用でやってはいけない n のこと #ssmjp
RSA暗号運用でやってはいけない n のこと #ssmjpRSA暗号運用でやってはいけない n のこと #ssmjp
RSA暗号運用でやってはいけない n のこと #ssmjpsonickun
 
Original investors idea ; startup level survival education funding strategy, ...
Original investors idea ; startup level survival education funding strategy, ...Original investors idea ; startup level survival education funding strategy, ...
Original investors idea ; startup level survival education funding strategy, ...www.securitysystems.best
 
UX made in China @UXRepublic
UX made in China @UXRepublicUX made in China @UXRepublic
UX made in China @UXRepublicUX REPUBLIC
 
go-thumber-imagick
go-thumber-imagickgo-thumber-imagick
go-thumber-imagickYo Ya
 
The Breakout Sales Startups of 2017
The Breakout Sales Startups of 2017The Breakout Sales Startups of 2017
The Breakout Sales Startups of 2017Troops
 
The Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer InterviewsThe Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer InterviewsGood Funnel
 
Data, Trends, and Social Change
Data, Trends, and Social ChangeData, Trends, and Social Change
Data, Trends, and Social ChangeEric Garland
 
Fragrant Bouquet Of Lilacs (Nikos ignatiadis - Greek-Medley.)
Fragrant Bouquet Of Lilacs    (Nikos ignatiadis - Greek-Medley.)  Fragrant Bouquet Of Lilacs    (Nikos ignatiadis - Greek-Medley.)
Fragrant Bouquet Of Lilacs (Nikos ignatiadis - Greek-Medley.) Makala D.
 

Viewers also liked (20)

Ain Beni Mathar: Conventional and Renewable Energy in Morocco
Ain Beni Mathar: Conventional and Renewable Energy in MoroccoAin Beni Mathar: Conventional and Renewable Energy in Morocco
Ain Beni Mathar: Conventional and Renewable Energy in Morocco
 
WTF is up with the economy
WTF is up with the economyWTF is up with the economy
WTF is up with the economy
 
How Four Cognitive Biases Deceive Analysts and Destroy Actionability
How Four Cognitive Biases Deceive Analysts and Destroy ActionabilityHow Four Cognitive Biases Deceive Analysts and Destroy Actionability
How Four Cognitive Biases Deceive Analysts and Destroy Actionability
 
The Future of Forecasting
The Future of ForecastingThe Future of Forecasting
The Future of Forecasting
 
Why HR is a PR Disaster (infographic)
Why HR is a PR Disaster (infographic)Why HR is a PR Disaster (infographic)
Why HR is a PR Disaster (infographic)
 
Horse Therapy Stables
Horse Therapy StablesHorse Therapy Stables
Horse Therapy Stables
 
The Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health InformaticsThe Librarian Reloaded: Evolving Roles in Health Informatics
The Librarian Reloaded: Evolving Roles in Health Informatics
 
Firma Willy Sommers opnieuw winstgevend
Firma Willy Sommers opnieuw winstgevendFirma Willy Sommers opnieuw winstgevend
Firma Willy Sommers opnieuw winstgevend
 
The Multiplier Effect
The Multiplier EffectThe Multiplier Effect
The Multiplier Effect
 
Sorry, but marketing is your job too
Sorry, but marketing is your job tooSorry, but marketing is your job too
Sorry, but marketing is your job too
 
Keyword Strategie: Do's & Don'ts bei der Keyword Recherche - SMX München 2017
Keyword Strategie: Do's & Don'ts bei der Keyword Recherche - SMX München 2017Keyword Strategie: Do's & Don'ts bei der Keyword Recherche - SMX München 2017
Keyword Strategie: Do's & Don'ts bei der Keyword Recherche - SMX München 2017
 
RSA暗号運用でやってはいけない n のこと #ssmjp
RSA暗号運用でやってはいけない n のこと #ssmjpRSA暗号運用でやってはいけない n のこと #ssmjp
RSA暗号運用でやってはいけない n のこと #ssmjp
 
Original investors idea ; startup level survival education funding strategy, ...
Original investors idea ; startup level survival education funding strategy, ...Original investors idea ; startup level survival education funding strategy, ...
Original investors idea ; startup level survival education funding strategy, ...
 
UX made in China @UXRepublic
UX made in China @UXRepublicUX made in China @UXRepublic
UX made in China @UXRepublic
 
go-thumber-imagick
go-thumber-imagickgo-thumber-imagick
go-thumber-imagick
 
The Breakout Sales Startups of 2017
The Breakout Sales Startups of 2017The Breakout Sales Startups of 2017
The Breakout Sales Startups of 2017
 
The Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer InterviewsThe Marketer's Guide To Customer Interviews
The Marketer's Guide To Customer Interviews
 
Data, Trends, and Social Change
Data, Trends, and Social ChangeData, Trends, and Social Change
Data, Trends, and Social Change
 
final project report
final project reportfinal project report
final project report
 
Fragrant Bouquet Of Lilacs (Nikos ignatiadis - Greek-Medley.)
Fragrant Bouquet Of Lilacs    (Nikos ignatiadis - Greek-Medley.)  Fragrant Bouquet Of Lilacs    (Nikos ignatiadis - Greek-Medley.)
Fragrant Bouquet Of Lilacs (Nikos ignatiadis - Greek-Medley.)
 

Similar to 2007 Forecast on the Future of Surveillance Technologies

What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.Techugo
 
201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014Francisco Calzado
 
Digital Intox, Digital Detox
Digital Intox, Digital DetoxDigital Intox, Digital Detox
Digital Intox, Digital DetoxAndré Blavier
 
"Big Data" by Steve Bryan, Vigillo
"Big Data" by Steve Bryan, Vigillo"Big Data" by Steve Bryan, Vigillo
"Big Data" by Steve Bryan, VigilloTisha Keller
 
Digital Transformation trends - 2018
Digital Transformation trends - 2018Digital Transformation trends - 2018
Digital Transformation trends - 2018Khalid Rahiel
 
Profiling the City With IOT
Profiling the City With IOTProfiling the City With IOT
Profiling the City With IOTDr. Mazlan Abbas
 
Future of Technology | 2020
Future of Technology | 2020Future of Technology | 2020
Future of Technology | 2020Social Friendly
 
Predicting the Future of Technology: 2017-2023
Predicting the Future of Technology: 2017-2023Predicting the Future of Technology: 2017-2023
Predicting the Future of Technology: 2017-2023Dennis M Zogbi
 
Asia Pacific Digital Disruption 2016: The Next Set of Waves
Asia Pacific Digital Disruption 2016: The Next Set of WavesAsia Pacific Digital Disruption 2016: The Next Set of Waves
Asia Pacific Digital Disruption 2016: The Next Set of WavesDentsu Aegis Network
 
ConsumerLab: 10 hot consumer trends 2017
ConsumerLab: 10 hot consumer trends 2017ConsumerLab: 10 hot consumer trends 2017
ConsumerLab: 10 hot consumer trends 2017Ericsson
 
4.0IR-Presentation.pdf
4.0IR-Presentation.pdf4.0IR-Presentation.pdf
4.0IR-Presentation.pdf049YashPatel
 
Abel Aguiar - Startups as an engine for IoT development - Productized16
Abel Aguiar - Startups as an engine for IoT development - Productized16Abel Aguiar - Startups as an engine for IoT development - Productized16
Abel Aguiar - Startups as an engine for IoT development - Productized16Productized
 
Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...Dr. Mazlan Abbas
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Dr. Mazlan Abbas
 
Artificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptxArtificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptxSriLakshmi643165
 

Similar to 2007 Forecast on the Future of Surveillance Technologies (20)

What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.
 
201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014
 
Digital Intox, Digital Detox
Digital Intox, Digital DetoxDigital Intox, Digital Detox
Digital Intox, Digital Detox
 
"Big Data" by Steve Bryan, Vigillo
"Big Data" by Steve Bryan, Vigillo"Big Data" by Steve Bryan, Vigillo
"Big Data" by Steve Bryan, Vigillo
 
IOT for Smart City
IOT for Smart CityIOT for Smart City
IOT for Smart City
 
Digital Transformation trends - 2018
Digital Transformation trends - 2018Digital Transformation trends - 2018
Digital Transformation trends - 2018
 
Profiling the City With IOT
Profiling the City With IOTProfiling the City With IOT
Profiling the City With IOT
 
Future of Technology | 2020
Future of Technology | 2020Future of Technology | 2020
Future of Technology | 2020
 
KPN and Connectivity
KPN and ConnectivityKPN and Connectivity
KPN and Connectivity
 
Predicting the Future of Technology: 2017-2023
Predicting the Future of Technology: 2017-2023Predicting the Future of Technology: 2017-2023
Predicting the Future of Technology: 2017-2023
 
Asia Pacific Digital Disruption 2016: The Next Set of Waves
Asia Pacific Digital Disruption 2016: The Next Set of WavesAsia Pacific Digital Disruption 2016: The Next Set of Waves
Asia Pacific Digital Disruption 2016: The Next Set of Waves
 
ConsumerLab: 10 hot consumer trends 2017
ConsumerLab: 10 hot consumer trends 2017ConsumerLab: 10 hot consumer trends 2017
ConsumerLab: 10 hot consumer trends 2017
 
4.0IR-Presentation.pdf
4.0IR-Presentation.pdf4.0IR-Presentation.pdf
4.0IR-Presentation.pdf
 
Abel Aguiar - Startups as an engine for IoT development - Productized16
Abel Aguiar - Startups as an engine for IoT development - Productized16Abel Aguiar - Startups as an engine for IoT development - Productized16
Abel Aguiar - Startups as an engine for IoT development - Productized16
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Corporate innovation
Corporate innovationCorporate innovation
Corporate innovation
 
Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)
 
Artificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptxArtificial intelligence and Internet of Things.pptx
Artificial intelligence and Internet of Things.pptx
 
Business with Big data
Business with Big dataBusiness with Big data
Business with Big data
 

More from Eric Garland

Technology, Globalization, and the Future Wealth of Nations
Technology, Globalization, and the Future Wealth of NationsTechnology, Globalization, and the Future Wealth of Nations
Technology, Globalization, and the Future Wealth of NationsEric Garland
 
The Future of Risk Analysis
The Future of Risk AnalysisThe Future of Risk Analysis
The Future of Risk AnalysisEric Garland
 
Future-Proof your product lifecycle
Future-Proof your product lifecycleFuture-Proof your product lifecycle
Future-Proof your product lifecycleEric Garland
 
Oil production trends, fracking, and cheap gas
Oil production trends, fracking, and cheap gasOil production trends, fracking, and cheap gas
Oil production trends, fracking, and cheap gasEric Garland
 
How to Spot and Cope with Emerging Transitions in Complex Systems for Organiz...
How to Spot and Cope with Emerging Transitions in Complex Systems for Organiz...How to Spot and Cope with Emerging Transitions in Complex Systems for Organiz...
How to Spot and Cope with Emerging Transitions in Complex Systems for Organiz...Eric Garland
 
Extraordinary times and project management
Extraordinary times and project managementExtraordinary times and project management
Extraordinary times and project managementEric Garland
 
Social Media and Intelligence - the Crisis of Authority
Social Media and Intelligence - the Crisis of AuthoritySocial Media and Intelligence - the Crisis of Authority
Social Media and Intelligence - the Crisis of AuthorityEric Garland
 
David J Williams on the Future Of War
David J Williams on the Future Of WarDavid J Williams on the Future Of War
David J Williams on the Future Of WarEric Garland
 
Eric Garland Future Intelligence
Eric Garland Future IntelligenceEric Garland Future Intelligence
Eric Garland Future IntelligenceEric Garland
 

More from Eric Garland (9)

Technology, Globalization, and the Future Wealth of Nations
Technology, Globalization, and the Future Wealth of NationsTechnology, Globalization, and the Future Wealth of Nations
Technology, Globalization, and the Future Wealth of Nations
 
The Future of Risk Analysis
The Future of Risk AnalysisThe Future of Risk Analysis
The Future of Risk Analysis
 
Future-Proof your product lifecycle
Future-Proof your product lifecycleFuture-Proof your product lifecycle
Future-Proof your product lifecycle
 
Oil production trends, fracking, and cheap gas
Oil production trends, fracking, and cheap gasOil production trends, fracking, and cheap gas
Oil production trends, fracking, and cheap gas
 
How to Spot and Cope with Emerging Transitions in Complex Systems for Organiz...
How to Spot and Cope with Emerging Transitions in Complex Systems for Organiz...How to Spot and Cope with Emerging Transitions in Complex Systems for Organiz...
How to Spot and Cope with Emerging Transitions in Complex Systems for Organiz...
 
Extraordinary times and project management
Extraordinary times and project managementExtraordinary times and project management
Extraordinary times and project management
 
Social Media and Intelligence - the Crisis of Authority
Social Media and Intelligence - the Crisis of AuthoritySocial Media and Intelligence - the Crisis of Authority
Social Media and Intelligence - the Crisis of Authority
 
David J Williams on the Future Of War
David J Williams on the Future Of WarDavid J Williams on the Future Of War
David J Williams on the Future Of War
 
Eric Garland Future Intelligence
Eric Garland Future IntelligenceEric Garland Future Intelligence
Eric Garland Future Intelligence
 

Recently uploaded

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

2007 Forecast on the Future of Surveillance Technologies

  • 2. THIS MONTH’S ISSUE Why we chose… Big Brother Technologies We chose to examine forecasts for surveillance technologies for this month’s STEEP Report because the technologies are without precedent and the social implications could change the future of our entire civilization. Dramatic? Yes. Hysterical and paranoid? We wish. There is surprisingly little discussion in the media about the rapid development of information technologies that will be used to track individuals anywhere on the globe in real time. These technologies will not be implemented as part of some government scheme to control citizens, but all for useful commercial and government applications – marketing, logistics, health policy, human resources, and security. This doesn’t change the gravity of the ethical (and business!) implications of what’s next for surveillance technologies.
  • 3. A portfolio of surveillance technologies will soon be able to track most of the world’s population in real time. Do not underestimate the consequences or possibilities from this development. Through technologies such as GPS, RFID, IPv6, and facial recognition, we are rapidly developing the capacity to track billions of people in real time. The power of ubiquitous computing and sensing will give your company dramatic new powers and significant liabilities. Our societies may never be the same. Talk to your employees, your lawyers, and your elected officials
  • 4. The world is investing in cameras, RFID, GPS, remote sensing and powerful internet architectures to measure, store, and correlate trillions of points of data around the world Big Brother Tech: The Global View HOLLYWOOD: Movie posters scan facial features to examine which images evoke the most response WASHINGTON: Global climate change monitoring tracks individual factories CHINA: One billion Chinese citizens issued radio-frequency identification cards that broadcast family history, marital status, prison records LONDON: Advertisements coordinated with GPS positioning in cell phones to show businesses within walking distance AFRICA: Refugee movements tracked by satellite to coordinate humanitarian efforts
  • 6. Radio Frequency Identification Tags (RFID) Global Positioning Systems (GPS) IPv6 Internet networking Facial recognition software A portfolio of information technologies is converging in the near future (2010+) with dramatic social consequences, and plenty of business opportunities, too: We are entering, willingly or not, into the era of Big Brother Technologies. Iris scanning Biometrics Ubiquitous video surveillance
  • 7. RFID Tags – unlimited applications for “talking barcodes” In usage since 1955, radio-frequency identification chips are essentially barcodes that talk. With a tiny chip and an antenna to broadcast its unique code, short-range radio signals broadcast a limited amount of information to any device capable of listening. The technology is maturing, having dropped in price over the last eight years to begin to find applications in the logistics industry.
  • 8. The RFID market is set to explode: US $1 trillion by 2017? • From 1955 to 2005, total sales of RFID tags were $2.4 billion. • Last year alone, 2.24 billion tags were sold worldwide. and analysts project that by 2017 the annual sales could reach $25 billion. With a variety of maturing applications, from improving global logistics to preventing pharmaceutical counterfeiting, the market for RFID tags will explode in the next ten years. (“Microchips Everywhere: A Future Vision.” Todd Lewan. Seattle Times. January 29, 2008. )
  • 9. RFID tags: headed to the item level Until recently, the high price of RFID has kept it on pallets, monitoring of batches of products in transit. It has been too expensive to have one on each unit. In the coming decades , as the price continues to fall, RFID tags will finally be incorporated on individual items “[RFID] is like having an expert with a clipboard sitting next to every of your trucks, manufacturing lines, pallets with goods, and they can tell you at any time what is happening, where,” - Ken Douglas, global director of technology at BP.
  • 10. Tracking shampoo bottles is great, but applications for the future surely won’t stop there. Now companies are selling RFID tags to help identify and track pets, children and the elderly. RFID tags: headed to the individual citizen level RFID chip Plus, save time and money if you have employees in sensitive areas – many companies are choosing to implant RFID chips, increasing security and dispensing with messy ID cards.
  • 11. In the future, anything with these tags could be scanned at increasing distances without a person’s knowledge. Market researchers could scan items in your car from five feet away or a police officer could scan your ID as you pass on the street.   RFID tags: mass data collection at a distance NOTE: The Chinese government just ordered one billion RFID-loaded chips to identify its citizens.
  • 12. GPS chips: Surveillance at a serious distance GPS chips, computer chips that record and broadcast their location via satellite, are now commonly used in navigation, telecommunications, tracking almost anything in real time. The market for these devices is poised for exponential growth.
  • 13. GPS sales predicted to hit one billion units per year by 2012 Between real-time navigation, geo-tagging of images in digital cameras, emergency rescue, and more, there are seemingly limitless applications for GPS. If market forecasts are correct, then billions of digital devices will begin streaming out digital information about their position. The era of losing track of things may be over…
  • 14. GPS will lead to the advertising of the future: 100 million Europeans will subscribe to “location-based services” As all advertisers know, we are in an arms-race when it comes to capturing the attention Businesses are using GPS for new and creative ways to advertise: Pictured at left Yell.com has installed digital billboards fitted with GPS technology on the sides of London buses to create location- specific advertisements.
  • 15. Facial recognition software: the end of anonymity? 1. A tiny camera projects an invisible light pattern onto the subject’s face, revealing the face's surface geometry, which is captured on streaming video at 30 frames per second. 2. This 3-D measurement allows point-to-point measurement, such as forehead to cheekbone. 3. The face pattern is plugged into an algorithm to generate a 3-D "mesh" created from measurements smaller than a millimeter. 4. A biometric template -- based on bone structures that don't change over time -- is created from the image and is stored in the database. 5. The database stores the images, comparing them to locate matches. Combining software analysis, cameras, and databases facial recognition software could be the nosy neighbor of the future. This cutting- edge software can quickly scan faces at a distance and compare results to any database – domestic or international
  • 16. Facial recognition: The billboard of tomorrow will watch YOU Worried about your latest ad campaign? With facial recognition software, billboards like this one analyze who looks at the advertisement, where they focus, and for how long. Unlike biometrics, it requires ZERO consent from those observed. Advertisers measuring: • Age • Gender • Race Located in: • McDonald’s (Singapore) • Ikea (Europe) • A&E (New York) • 30 more locations in US
  • 17. Biometrics: check on employee productivity without the need for managerial skill • Monitor employee activity through PC and laptop computers, mobile phones, and blackberries • Monitor employees’ heart rate, breathing, body temperature, facial expressions and blood pressure • Record and analyze words and numbers used and websites visited • Measure workload and test for honesty Microsoft recently filed a patent application for “Monitoring System 500” a “virtual middle manager” that uses to:
  • 18. Biometrics to meet the talent crunch The “Monitoring System 500” is designed to replace middle managers by: • Measuring speed of task completion • Identifying areas of assistance • Offering assistance (prompts) when employees need it AND… • Nothing like invasive surveillance to motivate productivity! • Eliminating human interaction!
  • 19. Video surveillance: an old technology expands as governments become more interested in security Where there is little data correlating surveillance and public safety, governments on both sides of Atlantic are increasing their investments in Big Brother Technologies. The United States has approximately 30 million surveillance cameras in operation, mostly in cities – roughly one for every 10 people. Nearly every block of Manhattan under camera surveillance London monitors every neighborhood. “Every Briton can expect to be caught on camera on average some 300 times a day.” “Learning to live with Big Brother.” The Economist. Sept 27, 2007.
  • 20. IPv6 Internet networking: faster and more secure Internet Protocol version 6 (IPv6) is an Internet Layer protocol for packet-switched internetworks. It is designated as the successor of IPv4, the first and still dominant version of the Internet Protocol, for general use on the Internet. IPv6 has a much larger address space, which allows flexibility in allocating addresses and routing traffic. The extended address length eliminates the need to use network address translation to avoid address exhaustion, and also simplifies aspects of address assignment and renumbering when changing Internet connectivity providers. The IPv6 address space is extremely large: IPv6 supports 2128 (about 3.4×1038) addresses, or approximately 5×1028 (roughly 295) addresses for each of the roughly 6.5 billion (6.5×109) people alive today.[1] In a different perspective, this is 252 addresses for every observable star in the known universe[2] – more than ten billion billion billion times as many addresses as IPv4 supported. IPv6 is an updated internet system, greatly expanding the number of potential IP addresses, therefore the number of possible internet users. Under the current system, IPv4, the overall pool of IP addresses is expected to be depleted by 2012, leading to the necessity for IPv6.
  • 21. IPv6 Internet IPv6 uses a 128-bit address size compared with the 32-bit system used in the IPv4, allowing for as many as 3.4x1038 possible addresses, enough to cover every person on the planet several times over. The 128-bit system also provides for multiple levels of hierarchy and flexibility in hierarchical addressing and routing, an improvement over the IPv4-based Internet.
  • 22. The Whole is Greater… The combination of surveillance techniques and advanced technology is greater than the sum of its parts.
  • 23. Combining all of the parts: China’s Golden Shield Golden Shield – a nationwide digital surveillance network, linking national, regional, and local security agencies through a web of surveillance technologies, featuring: • Speech recognition • Facial recognition • Closed circuit TV • National ID cards • Credit records • Internet surveillance
  • 24. Building China’s surveillance society The police will be able to coordinate vast amounts of data RFID-implanted national ID cards – scanned without owner’s knowledge Closed-circuit TV: monitoring public spaces Database - instantly comparing fingerprints Nationwide database: tracking citizens since birth Speech recognition: monitoring telephone conversations Facial recognition – capturing and matching facial images in a crowd
  • 25. How the technology works in Shenzhen • This web of cameras will be linked to the country’s national ID system, tracking citizens by RFID tags. • Anyone who does not get the ID card cannot live in Shenzhen and cannot get government benefits. • It allows the government to control the movement of political and religious dissidents and control the population of the future. In the rapidly-growing city of Shenzhen, police are installing over 20,000 surveillance cameras in the streets, guided by American-made facial recognition software.
  • 27. RFID: Implications for the Future • ADVERTISING – to the individual level!!!! • Theft prevention • Pets, elderly, kids • Shipping industry • Sales – locate desired product in remote warehouse • Medical – speed lifesaving when seconds count, anti- counterfeiting • IDs – immigration (passports) • Political/population monitoring – eye on troublemakers • Market research!!!!!
  • 28. Implications for the Future Biometric applications combined to improve security for: • Travel speed/border security • Purchases by credit card • Secure access to buildings • Security for high-volume events •Computer passwords •National or state identification
  • 29. Questions Broad issues: • Right to privacy •Does consent exist anymore? Limitations? •Who “owns” this info? What if the info “they” have is somehow wrong (like on credit reports)? How do you know, how do you correct it if it’s not public? •What does the credit report of tomorrow look like? •Is it inevitable that we are headed for a system like China where all info is tracked on each individual since birth? •Can a person ever make a mistake? • Will there eventually be some sort of international data standard? Shared data? Will the Chinese call the shots?
  • 30. Questions Broad issues (cont): •Is there a way for laws to guide the development of these technologies? Can we overturn the PATRIOT Act, ect… • If all of this information is available on everyone, what is the future of hackers? • How to balance enormous benefits and positive uses of this technology with its far-reaching, scarring impacts?
  • 31. What To Do Today
  • 32. Addendum: Big Brother Tech - By the Numbers Figure Source There are approximately 30 million surveillance cameras in the U.S. – roughly one for every ten people. “Learning to live with Big Brother.” The Economist. Sept 27, 2007. Analysts project that by 2017 cumulative sales of RFID tags will top $1 trillion - generating more than $25 billion in annual revenues for the industry. “Microchips Everywhere: A Future Vision.” Todd Lewan. Seattle Times. January 29, 2008. GPS sales are expected to hit $1 billion by 2012. "GPS chipset sales to approach one billion by 2012 according to market research firm," Digitimes, April 19th, 2008. 100 million Europeans will subscribe to location-based services. "Euro LBS users to top 100 million by 2012." GPS World. April 9, 2008. Facial recognition software used behind the billboards. Ads for McDonalds in Singapore, Ikea in Europe, A&E in New York, and 30 different locations in malls across the U.S. “Billboards with facial recognition software trickling out.” Nilay Patel. June 4, 2008. http://www.engadget.com/2008/06/04/ billboards-with-facial-recognition-software-trickling-out/ “Every aspect of computer users’ lives — from their heartbeat to a guilty smile — could be monitored and immediately analysed under the futuristic system detailed in Microsoft’s patent application.” “How computer spy in the office will monitor everything you do.” David Brown and Elizabeth Judge. London Times. January 16, 2008. In the rapidly-growing city of Shenzhen, police are installing over 20,000 surveillance cameras in the streets, guided by American-made facial recognition software.
  • 33. Find out more: Books 1984. By George Orwell. (Why not have another look? The technology is there.) The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? By David Brin. RFID Applied. By Jerry Banks.
  • 34. Find out more: Books Loving Big Brother: Performance, Privacy and Surveillance Space. By John McGrath. No Place to Hide: Behind the Scenes of Our Emerging Surveillance Society. By Robert O’Harrow. Handbook of Biometrics. By Anil K. Jain, Patrick Flynn and Arun A. Ross.
  • 35. Find out more: Articles “Big Brother gets bigger, says global privacy study.” Elinor Mills. CNET News. January 2, 2008. http://news.cnet.com/8301-10784_3-9838743-7.html “Big Brother in China – via U.S. technology.” Warren Mass. The John Birch Society. August 16, 2007. http://www.jbs.org/node/5153 “Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society.” Jay Stanley and Barry Steinhardt. ACLU. January 2003. http://www.aclu.org/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf “Biometrics – the future for flying bliss?” Nick Heath. February 21, 2008. http://www.silicon.com/retailandleisure/0,3800011842,39170130,00.htm “Do Americans Care About Big Brother?” Massimo Calabresi. Time. February 14, 2008. http://www.time.com/time/nation/article/0,8599,1722537,00.html?xid=feed-cnn-topics "Euro LBS users to top 100 million by 2012." GPS World. April 9, 2008. http://lbs.gpsworld.com/gpslbs/LBS+News/ Euro-LBS-Users-to-Top-100M-by-2012/ArticleStandard/Article/detail/509169 "GPS chipset sales to approach one billion by 2012 according to market research firm," Digitimes. April 19th, 2008. http://www.digitimes.com/news/a20080419PR200.html
  • 36. Find out more: Articles “How computer spy in the office will monitor everything you do.” David Brown and Elizabeth Judge. London Times. January 16, 2008. http://technology.timesonline.co.uk/tol/news/tech_and_web/article3193223.ece “Japan’s teenage smokers face wrinkle test.” Justin McCurry. The Guardian. May 13, 2008. http://www.guardian.co.uk/world/2008/may/13/japan.health “Learning to live with Big Brother.” The Economist. Sept 27, 2007. http://www.economist.com/world/international/displaystory.cfm?story_id=9867324 “Microchips Everywhere: A Future Vision.” Todd Lewan. Seattle Times. January 29, 2008. http://seattletimes.nwsource.com/html/businesstechnology/2004151388_apchippingamericaiii29.html?syndication=rss “New security camera can ‘see’ through clothes.” CNN. April 16, 2008. http://www.cnn.com/2008/WORLD/europe/04/16/camera.england/index.html “RFID Tags: Big Brother in Small Packages.” Declan McCullagh. CNET News. http://news.cnet.com/2010-1069-980325.html