2. Victimization surveys have taught us an awful lot about crime
and um, the extent in nature of crimes people experience. But
there’s still so much more to learn and we, we’re gonna be
moving probably into a lot of new directions. I know that we’re
moving into some areas that we had not intended or thought we
would be in such as looking at identity theft, looking at internet
predating, things like that, new subjects. But also we face
challenges related to technology and how we conduct surveys
and how we can best reach the public and um, get the best
answers from them. So there are huge challenges to be faced,
um, both for the survey that I work on and for survey
methodology in general.
As a political scientist, what does your research indicate?
One of the things that – one of the key parts of my job is to look
at trends in crime and our country has experienced in the past
decade uh, and a half a very broad and long-standing decline in
violent property crime. That seems possibly to be ending in the
last couple of years. As a matter of fact, our survey has shown
this year that there really was no change between 2004 and 2005
in the level of crime whereas police reported crime has actually
increased by about 1% so there’s a huge discussion in the field
as to whether we’ve seen the end of the decline and we’re
entering a new period of increase in crime rates or whether this
is possibly just an interruption in the decline. So we won’t
know that for a few years. We’ll have to wait and see where that
question takes us.
Is your research more concerned with practice or theory?
As the statistical arm of the department of justice, we collect
information about crime and about the criminal justice system,
not so much to apply any theory or to validate any theories, but
to inform about crime and the criminal justice system. So we’re
not really related – specifically associated with either practice
per se or theory.
As a statistician, what does your day tend to look like?
I am in charge of the largest victimization survey conducted,
um, in the country, and I have a staff that works with me and
4. The aim of our operation in Beslan was to stop thewar, stop the
genocide of the
Chechen people,and force the withdrawal of the Russianoccupyi
ng troops.
The demands became known right away--
endthe war in Chechnya, withdraw the troops fromChechnya. B
ut apparently, the federal authoritiesdidn't like that. They made
it sound as if thehostage taking had happened for no reason.
After centuries of religiously motivated terrorism,many 19th an
d 20th century movements acted inthe name of self-
determination. The 9/11 terrorattacks epitomized a swing in the
1990s backtowards religious terrorism, even deadlier actssuppos
edly sanctioned by God.
Muslims all over the world, I strongly advise youto sacrifice thi
s life for
the hereafter. Saveyourselves from the fire and torment. Come
backto your religion, and bring back your honor.
Many analysts feared terrorists would useweapons of mass destr
uction, such as nuclear orbiological weapons. Iran and North Ko
rea, bothstates believed to sponsor terrorism, have soughtto acq
uire nuclear technology.
Any country that aims to acquire a nuclearweapon is the grave t
hreat to international peaceand security, particularly in a region
like the MiddleEast, which is full of hostility, full of lack, full o
fdistrust.
Governments rarely give into terrorists, yet evenmore rarely do
they work to alleviate the causesof terrorism, such as poverty an
d [INAUDIBLE]discrimination.
The more the Americans are supporting Israel,the more popular
Bin Laden and his like becomes.
In this film, we look at the current terrorist threat in
a range of countries, as well as how historyshapes the governme
nt's response.
[GUNSHOTS]
Gun!
[GUNSHOTS]
5. These tunnels are tiny. Literally, you've got
toreally squeeze to get through. They criss-
crossall of Bajaur. That's where the militants used tocome in
and hide and move around and store theirarms.
From homegrown terrorists with nationalist andcommunist goals
in the 1960s and '70s, Americanterrorist movements turned agai
nst the federalgovernment in the 1980s, culminating with theOkl
ahoma City bombing in 1995. At the sametime, US citizens beca
me more vulnerable toterrorist attacks abroad. In 1993, foreign t
erroristsmade their first major strike on US soil, a truckbomb de
tonated beneath the World Trade Center,killing six and woundin
g 1,000.
Eight years later, al-
Qaeda again attacked on USsoil, hijacking four planes and reduc
ing the WorldTrade Center to rubble, killing 2,700 innocentpeop
le.
Saudi Osama bin Laden founded al-
Qaeda in1988 with the goal of establishing a global Islamicstate
. 10 years later, he declared it, quote, "theduty of all Muslims to
kill US citizens, civilians, andmilitary and their allies everywh
ere." Hisobjections to the US are Washington's support ofIsrael,
the US military presence in the Middle East,and the non-
Islamic values the US is spreading.
This time, when
the shouting and screaming ofMuslims has become loud through
out the world,Palestine and Iraq, Afghanistan and Chechnya,this
time we say to the old world and declare it as
a thunderous scream-- the resolve
of Muslims willnot weaken. We wish to offer our lives in
the way of God, to please Him, to take revenge on our
enemies, the Jews and the Crusaders.
Prior to 2001, Bin Laden had made threesuccessful attacks again
st the US-- the twoseparate suicide truck bombings of
the USembassies in Tanzania and Kenya in 1998 andthe suicide
bombing of the USS Cole, moored offYemen in the year 2000.
Following 9/11, President George W.
6. Bushlaunched a massive military campaign to huntdown Bin La
den in a war on terror, starting withthe invasion of Afghanistan
to try to oust hardlineIslamists, the Taliban. Bush defined an axi
s of evilas consisting of Iraq, Iran, and North Korea. Hewas crit
icized for expanding the war to includeIraq without a concrete li
nk between Baghdad andBin Laden.
Bush also gave law enforcement authorities wide-
sweeping powers under the 2001 Patriot Act.Greater powers of s
urveillance, wiretapping, theuse of secret evidence, and closed c
ourt hearingsbecame part of the war on terror.
The Patriot Act now legalizes many things that, inmy opinion an
d the opinion of many legal scholars,are in direct contradiction
of our Constitution.
The US Constitution guarantees suspectedcriminals protection fr
om detention without charge,the right to a speedy public trial, a
nd protectionfrom cruel and unusual punishment. In war, thegov
ernment may curb these rights. Terrorsuspects captured in Afgh
anistan were classifiedas enemy combatants and transferred toG
uantanamo Bay, a US naval facility in Cuba.
We shouldn't forget that the reason they're here inGuantanamo i
s because they are terrorists.
The detainees there were largely left in limbo,without formal ch
allenges. But the pursuit ofinternational terrorists under military
rather thancivilian rules alienated many US allies.
You don't just hold people by casting them into ablack hole and
say that no one can oversee whatthey do because we are the US
military. That'snot the rule of law. That's military rule.
In 2006, US policy at Guantanamo came underfire, especially th
e use of simulated drowning orwaterboarding, sleep deprivation,
and forcefeeding. Humanitarian agencies said all prisonersthere
were entitled to a trial or release under theGeneva Convention.
These were not mastermind hardened terrorists.Most
of them probably did
not even though theABC of warfare or guerrilla warfare. And th
eywere caught up in a whirlpool of hysteria andJihad fervor, eg
ged on by their local mullahs in thevillages.
7. --in the past year.
Criticism also mounted over the policy ofextraordinary renditio
n, in which the US sentsuspects to countries that practiced tortu
re, suchas Egypt, Syria, or Morocco, for interrogation.
What this is is state-
sponsored abduction. Andthat's a violation of international law.
When President Barack Obama took office in2009, he signaled a
different direction in the waron terror, recognizing that military
might alonecannot protect the US. He banned waterboardingand
announced he would close Guantanamowithin a year. He also a
nnounced a timetable forUS combat troops to leave Iraq. Bush's
anti-
terrortactics had been widely discredited, not leastbecause Osa
ma bin Laden had never beencaught, and the Taliban had regrou
ped inPakistan.
After the war in Afghanistan in 2001, it should beremembered t
he Taliban were never defeated.They were simply routed by the
Americans. Manythousands escaped into Pakistan, includingalm
ost the entire Taliban leadership.
The Pakistani Taliban vows to destroy thePakistan government a
nd army for joining theAmerican fight against it. In 2008, the T
aliban andits associated groups crippled Pakistan with 60suicide
bombings, 140 kidnappings, theassassination of former Prime
Minister BenazirBhutto, and the shutting down of NATO's main
supply route into Afghanistan. Many are callingPakistan the ne
w front line in the war on terror,with the Taliban now seeing the
mselves as part ofa global Jihad.
[SPEAKING FOREIGN LANGUAGE]
Prophet Muhammad said
the Jihad will continueuntil the day of judgment. Our future atta
cks willbe fast and severe, God willing.
Today's prayer meeting followed the troubles lastnight, when su
pporters of
the imam tried to breakinto the building. Extra police had been
drafted tothe troubled mosque after a judge ordered--
In Britain, decades of dealing with the IrishRepublican Army--
8. IRA-- have left the securityservices relatively well-
equipped. But the UK wascaught off guard by homegrown Islam
ic terroristswho struck in 2005. Fighting for a united Ireland,the
IRA began a series of bombings againstBritish targets in the 19
60s. Living with thisperpetual threat led the British government
tocreate a response based on decentralization andpublic awarene
ss, including evacuations after IRAtip-offs.
By
the early 1990s, having achieved little throughviolence, IRA lea
ders began to focus on a politicalsolution. In 1998, the British a
nd Irishgovernments agreed the Good Friday Accord. Itincluded
the establishment of a Northern Irelandassembly and the releas
e of IRA prisoners. GerryAdams, head of the IRA's political bra
nch, SinnFein, called upon IRA militants to demobilize.
What Republicans have to be is very strategic inour attitude--
think beyond the difficulties nextyear, think beyond the proble
ms that have beenunheard from the last number of years, think o
fwhere we want to be in 10 years' time, and thenfed ourselves in
to a process which helps to bringthat about.
Meanwhile, throughout the 1990s, the UK'sgenerous asylum law
s and relaxed politicalclimate had made it a popular destination
forMuslim extremists exiled from other countries.
Remember, 6 million Muslims in the UK. We needan army of 6
million.
On July 7, 2005, four young men blew themselvesup on London'
s transport system, killing 52passengers. Al-
Qaeda claimed responsibility. AllEnglish-
born, three of the bombers had attendedradical Islamic schools i
n Pakistan.
Most of these lads are respectable lads. They
hadgood backgrounds. The families were wellrespectable people
in the area. That's not
thereason. But that is something that the Britishcommunity need
to look at, learn what makes aperson do such a thing.
They
were general lads, just like ourselves,working, educated, financi
9. ally secure. They werefrom financially secure families. What pu
t the picture in their mind is
the media. They're seeingtheir own brethren get killed day
in, day out. And itdoes affect you.
During the 1990s, firebrand imams had taken oversome mosques
to preach hate.
The imam from the
pulpit can influence thecommunity in many respects, which nee
d to besupervised, needs to be controlled.
One of these imams was Sheikh Omar BakriMohammed. He rais
ed money and inspiredrecruits to the fundamentalist calls throug
h hisgroup, Al-
Muhajiroun. Hundreds of his youngfollowers have gone oversea
s to train and fight inMuslim conflicts. In 2004, Bakri disbande
d Al-
Muhajiroun under increasing pressure from theUK authorities a
nd
was refused reentry into theUK after travelling to Lebanon in 20
05.
Another Muslim cleric with clear links to terrorismis Abu Hamz
a al-
Mazri. He preached at London'sFinsbury Park Mosque, which ha
s beenconnected to terrorist attacks in the Yemen, theBrixton sh
oe bomber, and British Taliban fighterslater held in Guantanam
o Bay.
If they want to retaliate for the dead because youdon't listen, the
n I can no way say to
them, we arenot allowed to do these things, because they alsoha
ve civilians whom you've killed with your bombsand your polici
es and your sanctions.
Abu Hamza had a close alliance with anotherIslamic extremist,
Abu Qatada, whosefundamentalist teachings inspired at least fo
uryoung men to join al-
Qaeda. One was ZacariasMoussaoui, the so-
called 20th hijacker of theWorld Trade Center. Jihadi activists i
n Britainwere swimming in a sea of like-minded individuals.
10. London. It's London. It's the safe haven. Thereare many people,
as well as Abu Hamza or Abu
Qatada, who, if they were in France, for example,a long time ag
o they'd be in prison.
The UK's 1974 Prevention of Terrorism Act hadbanned the IRA.
But new counter-
terror legislationwas introduced following the London bombings
,including the right to hold suspects withoutcharges for 28 days,
and a new charge ofglorifying terrorism. Both aspects werecont
roversial, with critics claiming the glorificationoffense would d
amage legitimate freedom ofspeech.
Britain had been revealed as a key launchpad foral-
Qaeda, a base for recruitment, and thechannelling of terrorist m
oney. But by shifting itsemphasis to terror groups based in the
UK sincethe London bombings, Britain foiled a suspectedplot to
blow up as many as 10 passenger jetsleaving the UK for the US
in 2006. It not onlyaverted what could have been another 9/11,
butunderscored the UK's determination to counterthe threat of Is
lamic terror.
Responses to terrorism are often constrained, asin Germany and
Japan, by
a nation's military past.Both these countries have constitutions
which limittheir responses and mean terrorism isapproached as a
legal, rather than military,problem. Both countries faced left-
wing groups inthe 1970s, but found their laws insufficient to de
alwith religious terrorism from the 1990s onwards.
The Japanese doomsday cult, Aum Shinrikyo,attracted scientists
capable of developingbiological and chemical weapons. Led by
ShokoAsahara, the group demanded loyalty throughacts of viole
nce and suffering. And those startingto doubt the movement wer
e killed. Aum attracted10,000 members across Japan, and by 19
94, hadbranches worldwide. The 1951 ReligiousCorporation La
w precluded the government fromintruding on their activities.
In 1993, the Aum began experiments withchemical weapons. So
me of the work was goingon right in the middle of downtown To
kyo. In 1995,members of Aum released sarin, a highly toxicnerv
11. e gas, into the Tokyo subway system. 12people died, and 5,002
were injured. Aum's sarinfactory was the brainchild of chemist
MasamiTsuchiya.
[SPEAKING JAPANESE]
I sensed a crisis in contemporary society. I wasinterested in brin
ging a spiritual dimension tomodern science and harmonizing th
e two. I wasalways looking to join a group which shared thiside
a.
The Aum subway attack caught the Japanesegovernment unprep
ared. In the wake of theattack, an emergency secretariat was cre
ated tocoordinate emergency response. Japan's primarycounter-
terrorism strategy is internationalcooperation. Since 1960, its se
curity has beenguaranteed by
a treaty with the US, as the 1947Japanese constitution renounce
s the right to an army.
But the 9/11 attacks transformed Japanese anti-
terrorist strategy. Tokyo gave logistical support tothe US in bot
h Afghanistan and the Middle East.The terrorist threat is now be
ing used to persuadeJapanese citizens of the merits of
a remilitarizedJapan.
In our case, North Korea is kidnapping our people.People know
that. And they shoot missilestowards our territory. So now peop
le are gettingmore and more concerned about nationalsecurity.
Germany's approach to terrorism has been basedon diplomacy ra
ther than military action. AlthoughGermany contributed troops t
o help oust theTaliban from Afghanistan, it refused to back the
US-led war on Iraq, a rift which has led
toproblems with intelligence sharing between the USand Germa
ny. Unlike Britain, Germany has notfaced widespread terrorist a
ttacks. Yet al-
Qaedamembers prepared for the 9/11 attacks inGermany. At leas
t three of the hijackers lived inHamburg, but had
not raised any suspicions,including the ringleader, Mohamed At
ta.
He saw all of the licentiousness of the West. Andvery commonl
y, this experience causes youngMuslim men to become much mo
12. re traditional,much more fundamentalist.
Germany's legal system is a reaction to its Nazipast. Reacting to
the central police force createdby the Nazis, Germany's police f
orce is highlydecentralized, with no centralized force forterroris
t prevention. Specific laws were drafted forfighting 1970s left-
wing terror group, Baader-
Meinhof. But prior to 9/11, Germany had no lawsbanning foreig
n terrorist organizations.
Since 2001, German law forbids joining or helpingforeign terror
ist organizations and allowed for thebanning of religious groups
thought to promoteterrorism. One of those groups banned was
Hizbut-
Tahrir, a group which, as of 2009, was stillactive in Britain.
[SPEAKING SPANISH]
Columbia suffers from narcoterrorism, wheregroups are complic
it in drug trafficking in order tofund politically motivated viole
nce. Colombia hasno clear laws on terrorism. The main thread t
oguerrillas, paramilitaries, and drug cartels alike areextradition
laws with the US.
Pablo Escobar, infamous leader of the Medellindrug cartel, surr
endered to Colombian authoritiesin 1991 only after a ban on ext
radition. Columbiahas had two left-
wing insurgencies since the1960s and a right-
wing paramilitary group, allthree of which have been drawn into
the cocainetrade. The guerrilla and narcotics networks havebec
ome intertwined, as the drug cartels seekprotection from the ins
urgencies and theinsurgencies seek funding from the cartels.Fou
nded in 1964 to be the military branch of theColombian Commu
nist Party, the RevolutionaryArmed Forces of Colombia, FARC,
has nowdiversified into bombing, kidnapping, and drugrunning.
[SPEAKING SPANISH]
In Colombia, there are just some terrorist groups.This image of
guerrillas that's projectedinternationally, it's long out of date.
[SPEAKING SPANISH]
The FARC collect tax from the cattle farmers, thecoffee farmers
, those who grow banana,soybeans, and we also tax the buyers o
13. f thecoca.
The National Liberation Army, ELN, is the smallerof Columbia'
s two left-
wing insurgents, alsofounded in 1964. It also kidnaps foreign na
tionalsand finances its activities through drugs. A right-
wing militia was formed in 1997 from groupsfrequently targeted
by the guerrillas, economicleaders, drug traffickers, and rural c
ommunities. Italso gets 70% of its income from cocaine.
[SPEAKING SPANISH]
If you have a banana plantation, they won't buythe bananas. If y
ou're a pigsty, they won't buypork. They buy
it from the wholesale dealers, and
they export it. But with the coca, everybody buyscoca--
dealers, guerrillas, paramilitaries,everybody.
Between 1996 and 2003, an average of 3,000people were kidnap
ped in Colombia each year,including journalists, politicians, an
d foreigners.FARC is responsible for most of the kidnappings.In
the year 2000, the US launched Plan Colombiato eradicate coca
ine production, includingmassive aerial spraying of coca fields
and a hugeshift in funding to the military. Alvaro Uribe waselec
ted president in 2002 with pledges to end therebel insurgencies.
If violent groups do not have a governmentcapable to stop them,
they want to negotiate.
2008 saw an unprecedented wave of FARCdesertions. But these
government successescaused FARC to launch Plan Rebirth, pro
mising tostep up their campaign of terror.
The tragedy of the Columbian war is that thegovernment cannot
defeat the guerrillas throughmilitary force, nor can the guerrilla
s overthrow thegovernment by the use of arms. This
is anunwinnable war. And we are condemned, sooneror later, to
sit at the negotiating table.
Terrorism is a political strategy based on violenceand unpredict
ability. Governments may eliminatespecific terrorist groups, but
are powerless tostop new groups forming.
The war on terror will be ongoing until the day thatwe win. The
duration of that, we'll have to see. Wehope it ends tomorrow.
14. Watch out! Watch out! Let me get a shot.
Today's global terrorist threat requires globalcooperation. The
UN's International Criminal Courtstands ready to prosecute terr
orists. But the UShas refused to ratify its creation on the basis t
hat
it would make American soldiers vulnerable toprosecution for w
ar crimes.
Meanwhile, the war on terror appears to haveradicalized many a
gainst the US. As this al-
Qaedapropaganda video shows, the ranks of thosewilling to und
ertake suicide attacks against the USare not thinning.
[SPEAKING FOREIGN LANGUAGE]
Advantages and Disadvantages
THE UNITED STATES OF AMERICA, HOME TO THREE
HUNDRED MILLION PEOPLE, EACH OF US ASSUMING
THAT IF WE OBEY THE LAWAND MIND OUR OWN
BUSINESS, THERE'S NO REASON FOR ANYONE TO PAY
MUCH ATTENTION TO US. THAT'S WHAT WE MIGHT
THINK, BUT WE WOULD BE WRONG.RECORDS ARE
BEING CREATED OF ACTIVITIES THAT USED TO BE
TOTALLY PRIVATE. THERE ARE A LOT OF
COMPANIESTHAT YOU'VE NEVER HEARD ABOUT, BUT
THEY'VE HEARD SOMETHING ABOUT YOU.DETAILED,
PERSONAL INFORMATION IS BEING COLLECTED EVERY
DAY, AND USED IN WAYS WE COULD NEVER
IMAGINE. MOST AMERICANS ARE IN YOUR DATABASE
SOMEWHERE, RIGHT? ALSO BILLIONS OF
TRANSACTIONS. INTERNET SEARCHES ARE BEING
RECORDED... THEY KEEP EVERYTHING - YOUR
POLITICAL LEANINGS,YOUR RELIGIOUS LEANINGS,
YOUR MEDICAL CONCERNS, YOUR SEXUAL
CONCERNS.DRIVING HABITS ARE BEING
MONITORED...VEHICLE SPEED, ENGINE
15. SPEED, WHETHER THE BRAKES WERE ON OR
OFF...EMPLOYEES ARE SURVEILLED... HE'S HEADING
BACK TO THE SHOP RIGHT NOW.SHOPPERS ARE
OBSERVED, RECORDED AND ANALYZED... THAT'S AN
ALERT RIGHT THERE. AND PERSONAL PHONE CALLS? I
WAS UNDER THE IMPRESSION THATNOBODY COULD
STEAL MY CELL PHONE RECORDS. AS IT TURNS OUT, I
WAS VERY, VERY WRONG. WE ARE LIVING THROUGH A
REVOLUTION. A SURVEILLANCE REVOLUTION
EMPOWERED BY TECHNOLOGY. LITERALLY WITHIN
FIVE TO SEVEN MINUTES WE'VE IDENTIFIED THE
INDIVIDUAL. IT'S TECHNOLOGY THAT CAN BE PUT TO
GOOD USE
- TO STOP TERRORISTS AND SOLVE CRIMES - BUT IF
INFORMATION FALLS INTO THE WRONG HANDS OR IT'S
JUST PLAIN WRONG, IT CAN RUIN LIVES. I WENT
WITHOUT A JOB FOUR MONTHS. TOUGH FOUR
MONTHS?VERY, VERY DIFFICULT FOR ME. FROM
IMPLANTABLE CHIPS... THEY MAKE A SMALL INCISION
IN YOUR ARM. ...TO DATA MINING COMPANIES... WELL,
HOW SECURE IS THAT DATABASE? ...WE TAKE AN
UNPRECEDENTED LOOK AT THE POWERFUL BUSINESS
OF PERSONAL INFORMATION. WE'RE NOT MINING
THROUGH THE PERSONAL LIVES OF INNOCENT
AMERICANS. THE GOVERNMENT IS NOW WORKING
WITH BIG BUSINESS TO TAKE SURVEILLANCE AND
INFORMATION GATHERING TO LEVELS THAT WERE
ONCE THE STUFF OF SCIENCE FICTION. BIG BROTHER,
IF ALLOWED TO HAPPEN, WILL HAPPEN, AND OUR JOB,
AS A RESPONSIBLE SOCIETY IS TO MAKE SURE THAT
DOES NOT OCCUR. * * IT WAS A HORRIFIC AUTOMOBILE
COLLISION. IT WAS THE BIGGEST TRAGEDY IN THE
STATE OF MICHIGAN
- ENTIRE FAMILIES WIPED OUT. IN MAY 2005, A DRUNK
DRIVER, SPEEDING AND OUT OF CONTROL ON THIS
ROAD IN FARMINGTON HILLS, MICHIGAN, SLAMMED
16. HIS YUKON, DENALI SUV INTO A CAR CARRYING
JUDITH WEINSTEIN, HER TWELVE YEAR OLD SON,
ALEX, AND NINE YEAR OLD SON, SAM. ALL THREE
WERE KILLED. IT IS MY UNDERSTANDING THIS MATTER
IS GOING TO BE A PLEA. IS THAT CORRECT? FORTY-
NINE YEAR OLD TOM WELLINGER, THE DRIVER OF THE
YUKON, WAS CHARGED WITH THREE COUNTS OF
SECOND DEGREE MURDER. CRUCIAL EVIDENCE USED
AGAINST HIM WAS OBTAINED FROM A DEVICE IN HIS
OWN CAR. A DEVICE THAT WAS TRACKING HIS
DRIVING WITHOUT HIS KNOWLEDGE. IF YOU'VE
BOUGHT A CAR IN THE LAST FEW YEARS, CHANCES
ARE YOU HAVE ONE TOO. IT IS KNOWN AS AN EVENT
DATA RECORDER OR EDR, ALSO REFERRED TO AS A
BLACK BOX. IT CAPTURES WHAT HAPPENS IN AN
AUTOMOBILE IN THESECONDS BEFORE AND AFTER ITS
AIRBAG IS RELEASED. OAKLAND COUNTY PROSECUTOR
KEN FRAZEE SAYS THE DATA RECOVERED FROM THE
BLACK BOX HAS PLAYED A CRUCIAL ROLE IN A
NUMBER OF HIS CASES, INCLUDING THIS ONE. THE
DATA THAT WAS TESTIFIED TO IN COURT
INDICATES THAT THE DEFENDANT WAS TRAVELING
CONSISTENTLY AT APPROXIMATELY 70 MILES AN
HOUR. NOW THIS WAS IN EXCESS OF THE SPEED
LIMIT.THE ENGINE THROTTLE SPEED ALSO SHOWS
THAT THE THROTTLE WAS HEAVILY ENGAGED AND
FOR THE FIVE SECONDS PRIOR TO IMPACT THE BLACK
BOX DEMONSTRATED, IN THIS CASE, THAT THERE WAS
NO ATTEMPT TO BRAKING. IT'S VERY POWERFUL
INFORMATION BECAUSEOF THE FACT THAT IT IS A
SOLID TECHNOLOGY. SANTA BARBARA, CALIFORNIA
BASED VETRONIX SELLS THE TECHNOLOGY THAT
ALLOWS LAW ENFORCEMENT TO DOWNLOAD DATA
FROM A CAR'S BLACK BOX. ANDREW BUNCH IS A
PRODUCT DEVELOPER. A FEW DIFFERENT DATA
PARAMETERS ARE RECORDED. WE HAVE VEHICLE
17. SPEED, ENGINE SPEED,PERCENT THROTTLE AND BRAKE
SWITCH/DATA SWITCH. IT'S CALLED A BLACK BOX BUT
IT'S NOT BLACK. THIS IS ACTUALLY AN AIR BAG
CONTROL MODULE. ANY VEHICLE THAT HAS AN AIR
BAG SYSTEM IS GOING TO HAVE AN AIR BAG CONTROL
MODULE SYSTEM INSTALLED IN IT.WHETHER OR NOT
IT RECORDS DATA IS, YOU KNOW, YOU CAN STICK A
CHIP IN ANYTHING THESE DAYS TO RECORD THIS
INFORMATION. EXACTLY, SO THAT AFTER
DEPLOYMENT OF THE AIR BAGS, IT WILL ACTUALLY
RECORD SOME OF THE DATA THAT WE SEE HERE. THE
CONDITIONS FOR THESE PLEAS THAT WERE ENTERED
TODAY IS THAT YOU WILL NEVER DRIVE A MOTOR
VEHICLE FOR THE REST OF YOUR LIFE. IS THAT YOUR
UNDERSTANDING? PARTLY BECAUSE OF THE
UNDISPUTED EVIDENCEPROVIDED BY THE BLACK
BOX, WELLINGER PLED NO CONTEST DURING PRE-
TRIAL MOTIONS. HE WILL SERVE A MINIMUM OF 19
YEARS IN JAIL. THERE ARE SOME PEOPLE WHO ARGUE
THAT THIS COULD BE A DEATH SENTENCE FOR YOU IN
VIEW OF YOUR AGE.ARE YOU AWARE OF THAT? IN THE
CASE OF THOMAS WELLINGER, AN ADVANCE IN
TECHNOLOGY WORKED TO PUT A MENACE TO SOCIETY
BEHIND BARS. THAT IS ONE OF THE BENEFITS OF THE
WORLD WE LIVE INWHERE TECHNOLOGY OF ALL TYPES
IS ABLE TO CAPTURE EVIDENCE OF OUR BEHAVIOR -
EVIDENCE THAT CAN BE USED TO FIND AND PUNISH
THOSE GUILTY OF COMMITTING CRIMES. BUT PRIVACY
ADVOCATES WARN THAT WHILE DEVICES SUCH AS THE
BLACK BOX OFFER ADVANTAGES, THEY CAN ALSO
CARRY RISKS. A MINOR TECHNOLOGICAL ADVANCE,
FOR EXAMPLE, COULD ENABLE A BLACK BOX TO
MONITOR YOUR DRIVING ALL THE TIME, ALLOWING
THE POLICE TO ISSUE SPEEDING TICKETS WITHOUT
OFFICERS ACTUALLY BEING PRESENT OR INSURANCE
COMPANIES TO JUDGE YOUR DRIVING HABITS BEFORE
18. DETERMINING YOUR RATES. GEORGE WASHINGTON
UNIVERSITY LAW PROFESSOR, DANIEL SOLOVE, IS AN
EXPERT ON PRIVACY LAW. I THINK THAT A LOT OF THE
PURPOSES FOR GATHERING INFORMATION ARE QUITE
BENIGN. WHAT'S BAD IS THE FACT THAT THE
PERSON WHOSE INFORMATION IS BEING COLLECTED IS
SO OUT OF THE LOOP IN THIS PROCESS, HAS NO RIGHTS
BECAUSE RIGHT NOW IT'S THE CASE WHERE THEY'LL
GATHER THE INFORMATION FOR ONE PURPOSE, IT'S
GREAT, BUT SECRETLY THEY COULD BE USING IT FOR
ANOTHER PURPOSE. ONE EXAMPLE, THE GLOBAL
POSITIONING SYSTEM. GPS AS IT'S KNOWN IS NOW
USED COMMERCIALLY TO HELP PEOPLE NAVIGATE
THEIR AUTOMOBILES. BUT IT'S NOT HARD TO GO FROM
USE TO ABUSE. CONSIDER THE CASE OF ERIC ODERO. I
DIDN'T KNOW ABOUT IT. THESE GUYS WERE TRACKING
ME. THEY KNEW EVERY STREET I'D BEEN IN LAS
VEGAS. WHERE I'D STAYED, STOPPED, SLEPT. IN
DECEMBER OF 2003, ODERO BOOKED A RENTAL CAR TO
DRIVE ROUND TRIP FROM HIS HOME IN LOS
ANGELES TO LAS VEGAS. WHEN HE RETURNED THE
CAR IN LOS ANGELES, HE RECEIVED A BILL FOR OVER
$1,400; ABOUT $1,200 MORE THAN THE FEE HE'D BEEN
QUOTED. I ASKED WHY AND HE TOLD ME "YOU USED
IT TO GO OUT OF THE STATE OF
CALIFORNIA".UNBEKNOWNST TO ODERO, THE RENTAL
CAR COMPANY IMPOSED AN ADDITIONAL CHARGE FOR
DRIVING OUT OF STATE. AND SOMEHOW THE AGENT
KNEW HE HAD GONE TO LAS VEGAS. I SAID, "HOW DID
YOU KNOW I WENT TO LAS VEGAS?" THEY SAID "WE
KNOW YOU WENT TO LAS VEGAS". THEN I SAID,
"PROVE THAT I WENT TO LAS VEGAS".THE RENTAL CAR
AGENT HANDED ODERO THIS MAP THAT SHOWED HE'D
CROSSED THE CALIFORNIA STATE LINE ON DECEMBER
29TH AT 12:29 PM. THIS GUY FINALLY TOLD ME THERE
WAS A GPS SYSTEM PRE-INSTALLED IN THE
19. VEHICLE. NO ONE HAD TOLD ME ABOUT THAT. THE GPS
CHIP IN ODERO'S CAR ALLOWED THE RENTAL CAR
COMPANY TO TRACK HIS EVERY MOVE. AS SOON AS
THE CAR TOUCHED NEVADA SOILHE WAS CHARGED A
DOLLAR FOR EVERY MILE DRIVEN FOR THE ENTIRE
TRIP. SO THERE IT WAS, MY PRIVACY WAS ALL
GONE.IN OCTOBER OF 2004, ODERO AND 139
OTHERS TOOK PART IN A CLASS ACTION SUIT
AGAINST ACCELERON CORPORATION, THE OWNER OF
TWO PAYLESS RENTAL CAR FRANCHISES IN SAN
FRANCISCO. THE SUIT ALLEGED THAT CUSTOMERS
WERE UNAWARE THE COMPANY WAS USING GPS
TECHNOLOGY TO TRACK THEIR DRIVING AND WERE
SURPRISED BY THE PENALTIES TO DRIVE OUT OF
STATE. THE LAWSUIT WAS SETTLED. ODERO AND THE
OTHERS WERE REFUNDED THE ADDITIONAL FEES
CHARGED FOR DRIVING OUTSIDE CALIFORNIA. IT'S NOT
JUST DEVICES IN CARS THAT ARE TRACKING PEOPLES'
BEHAVIOR. A LOT OF DEVICES THAT PEOPLE ARE
USING - EVERYDAY DEVICES LIKE PRINTERS AND
COMPUTERS AND CELL PHONES - ARE INCLUDING SOME
KIND OFTRACKING INFORMATION. LIKE THAT COLOR
LASER PRINTER YOU HAVE AT HOME OR THE
OFFICE; EVERY PAGE PRINTED BY MOST COLOR LASER
PRINTERS IS EMBEDDED WITH A CODE UNIQUE TO
THAT PRINTER.YEP, YOUR COLOR LASER
PRINTER COULD BE SPYING ON YOU. SETH SCHOEN IS A
PRIVACY ADVOCATE WITH THE ELECTRONIC FRONTIER
FOUNDATION. HIS WORK HAS LED TO THE CRACKING
OF THOSE CODES.MY UNDERSTANDING IS THAT THIS
WAS MOTIVATED BY A REQUEST FROM THE UNITED
STATES SECRET SERVICE WHICH INVESTIGATES
COUNTERFEIT AND THATTHEY ASKED THE
MANUFACTURERS OFCOLOR LASER PRINTERS TO DO
THIS, TO ADD THIS TRACKING CAPABILITY AND, BY
AND LARGE, THE MANUFACTURERS COMPLIED. MOST
20. OF THEM DIDN'T TELL THEIR CUSTOMERS THAT THEY
WERE DOING SO. THE CODE, A SERIES OF YELLOW
DOTS DISTRIBUTED ACROSS THE BACK OF THE
PRINTED PAGE IS NOT VISIBLE TO THE NAKED
EYE. WHEN YOU SHINE A BLUE LIGHT AND LOOK
UNDER A MICROSCOPE, I THINK IT'S QUITE DISTINCT. IT
IS. SO FAR WE'VE BEEN ABLE TO CRACK THE CODE
THAT'S USED BY XEROX AND A FEW OTHER
MANUFACTURERS LIKE DELL. SO WE CAN TELL YOU
WHAT THOSE MEAN. THERE ARE OTHERS LIKE HP AND
CANON THAT ARE STILL A MYSTERY TO US. IN THE
CASE OF DELL AND XEROX, WHAT IS IT THAT THESE
DOTS ARE COMMUNICATING? WELL, THEY'RE
COMMUNICATING THE SERIALNUMBER OF THE PRINTER
THAT MADE THE PRINT. AND THEY'RE ALSO
COMMUNICATING, IN THE CASE OF THE XEROX
PRINTERS WHICH HAVE THIS INFORMATION, THE DATE
AND TIME THAT THE PRINT WAS MADE. FROM THERE
IT'S NOT HARD TO FIND OUT WHO PRINTED THE
DOCUMENT. AND IT'S NOT JUST YOUR PRINTER. THAT
DIGITAL CAMERA YOU'RE SO FOND OF...? THIS IS A
PHOTOGRAPH OF METHAT WAS TAKEN AS A STAFF
PHOTO. IF WE LOOK AT IT WITH THE RIGHT
SOFTWARE,ALL OF A SUDDEN WE SEE A LOT MORE
INFORMATION. SO HERE'S THE INTERESTING
THING. RIGHT THERE IS THE UNIQUE SERIAL
NUMBER OF MY FRIEND'S CAMERA. IF HE'S REGISTERED
FOR A WARRANTY THEN THEY KNOW WHO HE IS, AND
IT'S EASY TO FIND BECAUSE HE PUBLISHES HIS PHOTOS
ON A PHOTOSHARING WEBSITE UNDER HIS OWN NAME
SO YOU COULD IMMEDIATELY FIND OUT THAT THAT'S
HIS CAMERA. BURN ANY CD'S LATELY? ANOTHER ONE
THE PUBLIC IS NOT REALLY AWARE OF, WHEN YOU
BURN A CD IN A CD BURNER, THE CD BURNER'S SERIAL
NUMBER IS ACTUALLY LEFT ON THE CD. SO IF YOU
MAKE A MIXED CD FOR SOMEONE OR YOU BURN ANY
21. KIND OF INFORMATIONONTO A CD AND GIVE IT OUT TO
SOMEONE,IT'S POTENTIALLY TRACEABLE BACK TO
YOUR COMPUTER. ALL OF THIS MAY SEEM
INNOCUOUS, BUT IN TIME IT MAY NOT BE. I THINK
PEOPLE ARE PERFECTLY HAPPY TO ADOPT A
COMMUNICATIONS DEVICE THAT IS IN SOME
WAY TRACEABLE OR TRACKABLE BECAUSE THEY
THINK, WELL, I DON'T HAVE ANYTHING TO HIDE AND I
DON'T USE IT IN A WAY THAT SOMEONE COULD
TRACK, AND THEN LO AND BEHOLD, TECHNOLOGY
ADVANCES. THEY SIGN UP FOR ALL KINDS OF
SERVICES AND THEY'RE USING THAT TECHNOLOGY IN
A WAY IN WHICH THINGS ARE EXPOSED AND THINGS
ARE TRACKABLETHAT THEY HADN'T
ANTICIPATED. JUAN IS OUT ON THE ROAD RIGHT NOW,
SO I CAN SEE HERE, AS OF 3:40 PM, HE'S IN FRONT OF
893 LAFAYETTE. HOWARD BOYLE, THE PRESIDENT OF
THIS RATHER LOW-TECH LOOKING FIRE SPRINKLER
INSTALLATIONCOMPANY IN QUEENS, NEW YORK,
KNOWS EXACTLY WHERE HIS EMPLOYEES ARE DURING
THE WORK DAY. THEIR CELL PHONES, LIKE MANY
WIRELESS DEVICES,CONTAIN A GPS CHIP WHICH
ALLOWS BOYLE TO USE A SOFTWARE PROGRAM
CALLED ULOCATE, THAT DOES JUST WHAT ITS NAME
IMPLIES. HE'S DOING ELEVEN MILES AN HOUR. I COULD
GO AND SEE WHERE HE IS IN TRANSIT. HE'S HEADING
DOWN THAT ROAD BACK TO THE SHOP. THIS IS
EXACTLY WHERE HE IS RIGHT NOW. WHERE HAS HE
BEEN? HE WAS AT A JOB SITE THAT I TOLD HIM TO GO
TO WHICH WAS 866 EASTLAND PARKWAY. HE WAS ON
THAT JOB SITE FROM 2:44 PM TO 3:30. OKAY, YOU'RE
GOING TO CHECK THE FIRE PUMP, RIGHT? BOYLE SAYS
HE'S NEVER TOLD HIS EMPLOYEES THEY'RE BEING
TRACKED BUT HE SUSPECTS THEY KNOW SINCE BOYLE
HAS AN UNCANNY ABILITY TO KNOW EXACTLY WHERE
THEY ARE OR WHERE THEY'VE BEEN. BOYLE'S
22. SOFTWARE CAN TELL HIM THE MINUTE BY
MINUTE WHEREABOUTS OF ANY EMPLOYEE FOR
MONTHS BACK. DID YOU THINK ABOUT TELLING THE
GUYS? IF I THOUGHT IT WAS A PRIVACY ISSUE I MIGHT
HAVE. IT'S NOT A PRIVACY ISSUE. THEY'RE ON THE
CLOCK, THEY'RE BEING PAID TO BE IN PLACES THEY'RE
SUPPOSED TO BE. THEY HAVE A ROUTE. THIS WAS JUST
A SIMPLER WAY OF BEING ABLE TO KNOW THAT THEY
ARE BASICALLY DOING WHAT THEY'RESUPPOSED TO
DO, AND HAVE THE CONFIDENCE THAT WE'RE NOT
CHEATING OUR CUSTOMERS. MANY OTHER BUSINESSES
THAT EMPLOY MOBILE WORK FORCES
- BE THEY ROTO-ROOTER OR TV STATIONS LIKE
WABC IN NEW YORK - USE TECHNOLOGY TO TRACK
THEIR EMPLOYEES. JIM JOYCE IS THE VICE-PRESIDENT
OF THE NATIONAL ASSOCIATION OF BROADCAST
EMPLOYEES AND TECHNICIANS. HE SAYS WHEN WABC
INSTALLED GPS DEVICES IN NEWS TRUCKS, UNION
MEMBERS WERE RATTLED. WE WERE CONCERNED
ABOUT PRIVACY ISSUES AND HOW THIS INFORMATION
MIGHT BE USED TO MONITOR THE EMPLOYEES IN A BIG
BROTHER SITUATION; THAT THEY WOULDUSE THE
DEVICE TO MONITOR AND CRITICIZE THE ROUTES THAT
OUR ENG DRIVERS TOOK TO GET TO STORIES, HOW
LONG IT TOOK TO GET BETWEEN ASSIGNMENTS, THE
FREQUENCY AND DURATION OF PERSONAL BREAKS. IT
ISN'T JUST AT WORK. IF YOUR PERSONAL CELL PHONE
IS ON, EVEN IF IT DOESN'T HAVE A GPS CHIP, YOU CAN
BE TRACKED. KEVIN BANKSTON IS AN ATTORNEY FOR
THEELECTRONIC FRONTIER FOUNDATION, A NON-
PROFIT THAT DEFENDS CIVIL LIBERTIES FROM THE
ENCROACHMENT OF TECHNOLOGY. MANY PEOPLE
DON'T REALIZE THAT WHENEVER YOUR CELL PHONE IS
ON, THE CELL PHONE COMPANY IS RECEIVING
INFORMATION ABOUT YOUR LOCATION. IN MANY
CASES QUITE DETAILED INFORMATION. NOT ONLY CAN
23. THEY TRACK YOU IN REAL TIME USING THIS
INFORMATION, THEY ARE ALSO STORING ALL
THAT INFORMATION ABOUT WHERE YOU HAVE BEEN
WHEN YOUR CELL PHONE IS TURNED ON -
INFORMATION THAT THEGOVERNMENT OR EVEN
PRIVATE LITIGANTS COULD GET AT. YOU CAN, OF
COURSE, TURN YOUR CELL PHONE OFF OR EVEN
CHOOSE NOT TO HAVE ONE. BUT IT IS GETTING
HARDER AND HARDER TO VENTURE OUT IN PUBLIC
WITHOUT BEING WATCHED. PRACTICALLY
EVERYTHING YOU DO IN PUBLIC IS BEING RECORDED
SOMEWHERE OR IN SOME FASHION. AND THE COURTS
HAVE LONG HELD THAT WHEN YOU'RE IN PUBLIC YOU
DON'T HAVE ANY EXPECTATION OF PRIVACY. THIS IS
OUR BACK DINING ROOM, WE HAVE TWO CAMERAS AT
OPPOSITE CORNERS. AND I CAN PRETTY MUCH SEE
THAT MOST OF THE GUESTS THERE LOOK
CONTENT. STEPHEN LOFFREDO IS THE OWNER OF
JOVIA, A HIGH END RESTAURANT ON MANHATTAN'S
UPPER EAST SIDE. THE ELEVEN CAMERAS PLACED
STRATEGICALLY THROUGHOUT JOVIA LET HIM
CONSTANTLY MONITOR HIS STAFF AND CUSTOMERS
EVEN WHEN HE'S NOT THERE. I HAVE THIS SAME
SOFTWARE LOADED ON MY PERSONAL NOTEBOOK
COMPUTER SO I CAN PRETTY MUCH WATCH WHAT'S
GOING ON HERE FROM ANYWHERE. IF I'M ON
VACATION, IF I'M AWAY ON BUSINESS, I CAN REALLY
SEE WHAT'S HAPPENING. WHERE ARE YOUR EYES
DRAWN TO? I COULD SEE IF A GUEST HAD TO FLAG
DOWN A WAITER OR IF THEY LOOKED ANXIOUS. I CAN
ALSO LOOK IN THE LOUNGE AREA AND I CAN TELLHOW
BUSY OUR MAITRE D'S DESK IS GETTING BY HOW
PEOPLE ARE COMING INTO THE RESTAURANT. THE
EMPLOYEES ARE AWARE THEY'RE BEING
SURVEILLED.SOMEBODY'S GOT TO PREP THE TABLE
BEFOREHAND. THE DELIVERY OF THIS DISH ON 13 WAS
24. LIKE A DISASTER. I'LL NEVER GO TO AN EMPLOYEE
AND SAY I SAW YOU DO THIS ON CAMERA; IT WASN'T
THE RIGHT THING TO DO. WHAT WE'LL DO IS WE'LL
TALK IN A GENERAL TERM WITH OUR STAFF AND
DISCUSS WITH THEM WAYS THAT THEY CAN IMPROVE
THE JOVIA EXPERIENCE. STEVE, WHAT ABOUT
CUSTOMERS, DO THEY KNOW THEY'RE ON
CAMERA? IT'S BECOME MORE COMMON THAT THERE
ARE CAMERAS IN RESTAURANTS. I THINK WHEN THEY
SEE THE LITTLE BLACK BALL ON THE CEILING THEY
EXPECT THAT THERE ARE CAMERAS. IN THE MODERN
RESTAURANT BUSINESS IT ISN'T JUST CAMERAS THAT
ARE KEEPING TRACK OF CUSTOMERS. ANYBODY WHO
CALLS TO MAKE A RESERVATION, WE'LL START OFF
WITH THEIR FIRST AND LAST NAME AND THEIR PHONE
NUMBER. IF I DOUBLE CLICK ON THAT I CAN SEE
INFORMATION
What is biometrics?
OUR IDENTITIES ARE CHANGING. THEY ARE BEING
TRANSFORMED BY IDENTIFICATION SYSTEMS THAT
RECOGNIZE PHYSICAL FEATURES. DATE AND PLACE OF
BIRTH AND PARENTS' NAMES ARE OUT. INCREASINGLY
WE ARE IDENTIFIED BY BIOMETRICS -- BY HAND
SHAPE, FINGERPRINTS, THE IRIS OF YOUR EYE. AS
LONG AS AGO AS THE 19TH CENTURY THE
FRENCH DETECTIVE ALPHONSE BERTILLON
PIONEEREDIDENTIFICATION BY DISTINGUISHING
FEATURES. HIS SYSTEM MEASURED LIMBS AND SKULLS
AND RECORDED PERSONAL MARKS SUCH AS SCARS
AND TATTOOS.BERTILLON COMPILED A MASSIVE
DATABASE OF ALL KNOWN CRIMINALS AND OF
ILLEGAL IMMIGRANTS LISTED FOR DEPORTATION.THE
DATABASE ALSO MADE IT EASY TO
IDENTIFY REOFFENDERS. PREVIOUSLY LIMITED TO
25. IDENTIFYING CRIMINALS,BIOMETRICS CAN NOW BE
USED ON ALL CROSS BORDER TRAVELERS. HERE FOR
INSTANCE. THE UNITED ARAB EMIRATES HAS THE
WORLD'S BIGGEST IRIS RECOGNITION SYSTEM. SINCE
2003 ANYONE WANTING TO ENTER THE UNITED
ARAB EMIRATES HAS HAD TO PRESENT ONE EYE
TO THE CAMERA.MANY OF THOSE WHO DO ARE
GUESTWORKERS. PLEASE LOOK INTO THE
MIRROR. THANK YOU FOR YOUR
COOPERATION. PLEASE LOOK INTO THE
MIRROR. THANK YOU FOR YOUR
COOPERATION. PLEASE LOOK INTO THE
MIRROR. PLEASE LOOK INTO THE MIRROR.I'M THE
INVENTOR OF THE TECHNOLOGY. I CREATED THE
ALGORITHMS WHICH ARE THE
MATHEMATICAL INSTRUCTIONS USED BY COMPUTERS
TO PERFORM IRIS RECOGNITION. IT IS A BIT
MYSTERIOUS WHY EACH IRIS IS SO UNIQUE AND
DIFFERENT.THERE'S RANDOM STRUCTURE IN THE
IRIS.RANDOM TEXTURE, WHICH IS VERY
COMPLICATED, VERY COMPLEX COMPARED TO ANY
OTHER PART OF THE BODY. AND IT'S THIS UNIQUE
RANDOM TEXTURE OF HIGH COMPLEXITY THAT MAKES
IT SUCH A RELIABLE AND ACCURATE SIGNATURE OR
FINGERPRINT. IT'S NOT NECESSARILY THE EASIEST
BIOMETRIC TO ACQUIRE, BECAUSE IT'S A SMALL
TARGET. IT MOVES AROUND. IT LIVES BEHIND A SHINY
SURFACE, THE CORNEA. SO IT MAY NOT BE THE
EASIEST ONE TO ACQUIRE, BUT IF YOU CAN ACQUIRE
THE IRIS IMAGE THE RELIABILITY AND THE ACCURACY
OF IRIS RECOGNITION HAS NOCOMPETITOR, NO
RIVAL. PROF. JOHN DAUGMAN: CURRENT PROGRESS
THAT ISUNDER DEVELOPMENT HAS TO DO WITH
IMPROVING THE IMAGE CAPTURE PROCESS, THE IMAGE
ACQUISITION. TO MAKE IT FASTER, TO MAKE IT WORK
AT A GREATERDISTANCE, AND TO MAKE IT
26. SMOOTHER.CURRENTLY IRIS CAMERAS REQUIRE WHAT
WE CALL STOP AND STARE. YOU MUST STOP AND
STARE AT THE CAMERA. THAT'S NOT SO FLUID. THAT'S
NOT SO SMOOTH AS IT MIGHT BE. SO MANY CAMERA
DEVELOPERS TODAY ARE DOING RESEARCH ON
INCREASING THE DISTANCE AND THE SPEED OF
THE IRIS RECOGNITION. THERE'S EVEN ONE PROJECT
CALLED "IRIS ON THE MOVE" IN WHICH A PERSON
WALKS PAST A CAMERA, EVEN FROM A DISTANCE OF 3
METERS AND WALKS AT A SPEED OF 1 METER PER
SECOND. THIS IS A NEW CAMERA TECHNOLOGY
DEVELOPED BY SARNOFF LABORATORIES IN NEW
JERSEY IN AMERICA.IRIS ON THE MOVE. THEN IRIS
REALLY IS A FLUID NATURAL INTUITIVE. IT'S JUST
LIKE MINORITY REPORT . I THINK THAT IN THE FUTURE
IDENTITY AND BIOMETRICS WILL BE VERY CLOSE
TOGETHER, CLOSELY LINKEDIN ORDINARY EVERYDAY
TRANSACTIONS.AND I THINK WE WILL HAVE A TIME IN
THE FUTURE WHEN WE DON'T RELY ON SECRETS OR ON
OBJECTS FOR IDENTIFICATION, AS WE DO TODAY. PIN
NUMBERS. PASSWORDS. PASSPORTS. CARDS.
KEYS. THOSE ARE SECRETS OR OBJECTS. INSTEAD
WE'LL USE PARTS OF OUR BODY FOR OUR
AUTOMATICIDENTIFICATION. I'M SURE THIS IS PART OF
THE FUTURE. THE SEPTEMBER 11TH TERRORIST
ATTACKS, FOLLOWED BY THE BOMBINGS IN MADRID
AND LONDON HAVEPUSHED GOVERNMENTS TO
DEVELOP BIOMETRIC CONTROLS. THE MARKET FOR
THEM IS NOW GLOBAL. BIOMETRICS COMPANIES ARE
WELL AWARE THAT ONE OF THE BIGGEST SELLING
POINTS IS THE FEAR OF TERRORISM. THE FRENCH
COMPANY SAGEM, BETTER KNOWN FOR ITS GUIDED
MISSILE SYSTEMS, FIGHTER AIRCRAFT ANDATTACK
HELICOPTERS, HAS BECOME A WORLD LEADER
IN FINGERPRINT RECOGNITION. THANKS TO DOZENS OF
KITS SUCH AS THIS ONE, THE MAURITANIAN
27. GOVERNMENT WAS ABLE TO ISSUE A
NATIONAL IDENTITY CARD IN 1999. ONE OF THE
GOVERNMENT'S AIMS WAS TO REGISTER THE DESERT
NOMADS AND GIVE THEM THE RIGHTS OF
CITIZENS. BUT IT WAS ALSO A WAY OF GAINING
CONTROL OVER THEM. ONE SPECIALIST IN BIOMETRIC
FACIAL RECOGNITION IS XID TECHNOLOGIES. ITS
FOUNDER ROBERTO MARIANI BEGAN
IN COMPUTERIZED MAPPING. BUT HE FOUND A NEW
NICHE IN SINGAPORE. THIS DORMITORY IN THE
SINGAPORE SUBURB HOUSES OVER 6,000 MIGRANT
WORKERS. ACCESS GRANTED.ACCESS GRANTED. WHY
ARE COMPANIES INTERESTED IN
BIOMETRICIDENTIFICATION? FOR THEM IT'S NOT SO
MUCH TO CONTROL ACCESS AS TO CHECK ON
PUNCTUALITY AND HOURS WORKED. IN THIS MEDIUM
SIZED COMPANY FACIAL RECOGNITION IS USED AS A
TIMECLOCK.CULTURE INFLUENCES WHICH BIOMETRIC
TECHNIQUES ARE ADOPTED IN DIFFERENT PARTS OF
THE WORLD. IN ASIA PEOPLE DON'T LIKE TOUCHING A
FINGERPRINTSENSOR THAT SOMEBODY ELSE HAS
ALREADY TOUCHED. IDENTIFICATION MUST NOT
INVOLVE CONTACT. THE ANSWER LIES BENEATH THE
SKIN. BEYOND PERMANENT PHYSICAL
CHARACTERISTICS SUCH AS VEINS, FINGERPRINTS OR
IRISES,BIOMETRICS ALSO USES BODILY
MOVEMENT. THE IDEA BEING THAT OUR MOVEMENTS
REVEAL OUR IDENTITY. THE SIGNATURES ARE
DIFFERENT. YOU ARE NO LONGER
RECOGNIZED. BIOMETRICS IS NOW TRYING TO ENCODE
EVERY MOVEMENT OF A HUMAN BODY TO USE FOR
REMOTEIDENTIFICATION. NO MORE SIGNALING TO A
SYSTEM, OUR IDENTITIES CAN BE CHECKED WITHOUT
OUR EVEN KNOWING IT. THIS IS A BIOMETRICS
RESEARCH LABORATORY. AND IN THE LABORATORY,
IT'S DESIGNED SO WE CAN RECOGNIZE YOU BY YOUR
28. PERSONALCHARACTERISTICS. THE CHARACTERISTICS
WE'RE CONCERNED WITH RECOGNIZING IS
RECOGNIZING YOU BY THE WAY YOU WALK.SO YOU
WALK THROUGH THIS TUNNEL AND WE
RECOGNIZE YOU FROM THE PATTERN OF YOUR
WALKING MOVEMENT. BUT IT'S ALSO TO RECOGNIZE
ME BY MY FACE AND TO RECOGNIZE ME BY MY
EAR. NOW WE DO THIS BY COMPUTER VISION, WHICH
MEANS WE HAVE A LOT OF CAMERAS. THERE IS A FACE
RECOGNITION CAMERA WHICH IS BEHIND ME
HERE. AND THERE ARE FOUR CAMERAS IN THE FOUR
CORNERS. AND THEY'RE THEN RECONSTRUCTING ME
AS IWALK THROUGH THE TUNNEL TO RECOGNIZE ME
FROM THE WAY I WALK. AND YOU MIGHT SAY "WELL
WHAT IS THIS FOR?"WELL IT'S LIKE A GATE. IT'S A
BIOMETRICS GATE WHICH CAN PREVENT OR CONTROL
ACCESS TO A BUILDING. SO WE DO A PROCESS. WE
SEPARATE THE SILHOUETTE.WE DO HERE. WE
SEPARATE THE MOVING SILHOUETTE FROM
THE BACKGROUND INFORMATION. AND THEN WE END
UP WITH THE WALKING HUMAN SILHOUETTE. HUMAN
MOTION IS PERIODIC AND AT THE SYMMETRY;
YOU HAVE AN AXIS OF SYMMETRY DOWN YOUR BODY
AND YOUHAVE AN AXIS OF SYMMETRY DOWN YOUR
LEGS. BUT WHEN YOU'RE WALKING, YOU ALSO HAVE
AN AXIS OF SYMMETRY BETWEEN THE LEGS AS
WELL. AND WE THEN APPLY SOME MORE MASS TO THE
SYMMETRY MEASURES WE OBTAIN AND EXTRA
MATHEMATICS COMES OUT WITH A SET OF
NUMBERS. AND WE CAN SHOW THAT THAT SET OF
NUMBERS IS THE SAME FOR ONE PERSON AND
DIFFERENT FORDIFFERENT PEOPLE. IN THAT SENSE WE
CAN THEN RECOGNIZE YOU BY THE WAY YOU
WALK. GERARD DUBEY IS AN ANTHROPOLOGIST. HE
LED A STUDY ON THE USE OF BIOMETRICS IN
SCHOOLCANTEENS, AIRPORTS AND VISA OFFICES. IS
29. BIOMETRICS AS RELIABLE AS ITSSUPPORTERS
CLAIM? THE HACKERS OF BERLIN'S CHAOS COMPUTER
CLUB SAY IT IS EASY TO MANIPULATE BIOMETRIC
DATA.YOU CAN CHANGE YOUR KEY OR YOUR PIN
NUMBER, BUT IF YOUR BIOMETRIC DATA ARE STOLEN,
YOU CAN'T GET A NEW EYE OR A NEW HAND. YET THE
INDUSTRY CLAIMS ITS HACKER PROOF AND
IT'S LAUNCHING MORE AND MORE SYSTEMS. CNIL IS
THE FRENCH DATA PROTECTION AUTHORITY. ONE OF A
FEW ORGANIZATIONS IN THE WORLD TO
MONITOR POTENTIAL ABUSE OF
BIOMETRICS. BERTILLON SIMPLY WANTED TO RECORD
THE DETAILS OF CRIMINALS.TODAY BIOMETRICS IS
USED IN FRENCH PRISONS AS WELL. ST.ETIENNE
PRISON STORES NO LESS THAN 80
HANDMEASUREMENTS ON A CARD. WHEN A PRISONER
IS RELEASED HIS BIOMETRICDATA ARE DELETED. FOR
THE BIOMETRICS INDUSTRY THE BEST IS YET TO
COME. FOR THE REST OF US, OUR VERY BODIES ARE
BEING TRANSFORMED INTO DIGITAL INFORMATION. WE
ARE NO LONGER IDENTIFIED SOCIALLY THROUGH OUR
FAMILY BACKGROUND OR BELONGING TO A
GROUP. ALL THAT IS GONE IN FAVOR OF A NEW
DIGITAL IDENTITY, ONE THAT IS MEASURABLE AT ANY
MOMENT.