the beat of digital culture
home | archives | about us | feedback

weblog:
Daily Relay

Tracking trends and developments in digital culture

shop:
T-Shirts
Mugs
Support Mindjack

search mindjack

Mindjack Release
Sign up to receive details of new issues

Event Calender
upcoming digital culture events


image courtesy:
www.freeimages.co.uk

 

"It was the myth of fingerprints
I’ve seen them all and man
They’re all the same"

-Paul Simon

September 18 , 2003 | feature

Hamlet beings with the words "Who goes there?" Taken out of the play’s psychological/mythic context, the phrase is actually an elegant expression of the basic duty of any security device, and it even carries connotations of that trademark security guard "politeness". The guard isn’t telling the stranger to get away, nor is he shooting first and asking questions later. His first duty is simple identification. After that, he can decide on a course of action.

All security devices have this basic function: identify who’s allowed past a certain point and who’s not, and then act accordingly. Even the key to your front door is an identification device (albeit one that performs both basic security functions).

Technology has had, and continues to have a dramatic impact on security, but until recently (i.e. the last century) all the technological upgrades focused around the second part of that equation. Instead of better ways to tell "who goes there", we simply got bigger doors, bigger walls, bigger guns.

The reasons for that particular bias in the technological developments are easy to understand: how do you determine someone’s identity, particularly if you’ve never seen them before? Though several interesting methods were tried, the main approach for centuries was simply to make the consequences of lying about your identity severe enough to provide a useful deterrent.

Nowhere were these issues more pronounced than in Europe, for reasons of simple geography. With so many borders in such a relatively small area, even medieval travelers were bound to pass through at least one other country.

The effectiveness of any identifying technology, anything that helps to answer the question "who goes there", is based upon two things: how accurately can it tell one person from another, and how easy is it to evade (or forge)?

Identification based on simple inspection was actually quite effective for many years. European border guards learned to be excellent readers of body language and accents. They would closely watch everyone passing through, listening to the way they spoke, the way they held themselves, comparing these traits to the impressive database of nationalities and ethnicities in their minds. These guards were walking computers of cultural diversity, and in those days they were the best security technology in the world. Of course, a good actor with a good working knowledge of other cultures could fool even the best of these guards. They were surprisingly accurate, but still human.

Passwords were another innovation, and they are still used today, but of all methods to identify a person or user, they are the easiest to steal. Since the judgement of the guard (or the computer system) is based solely on what response is given to the password request, if you have the password, you’re home free. ("Open sesame" could be the first example of both a password and voice recognition.)

At a certain point in European history, "Papers!" became something of a salutation, superceding and in some cases entirely dethroning "Who goes there". "Papers," were, of course, identity papers - official documents, issued by governments, complete with photograph, designed to tell whoever may have been interested that you were, indeed, who you said you were. They were the answer to a presumed question, but they were also relatively easy to forge. Some imaginative printing, photographic retouching and copied handwriting and a fake passport could be made to order. A new identity could be had for the asking (and for a considerable amount of money), and although guards quickly became skilled at detecting fakes, this method worked enough of the time that it continued to be in use for decades.

Photographs were an important innovation, but as everyone who’s had to update their passport photo knows, even the same person can change appearance drastically due to hairstyle, age and eyeglasses. (Clark Kent has used this particular method to successfully conceal his identity for over fifty years.)

The revolution in identification technology came when it was realized that there are certain fundamental biological traits that can’t be forged or stolen, that don’t change with age, and that are absolutely unique. The first of these to be identified were fingerprints, in 1864. The peculiar pattern of folds and swirls on the tips of our fingers was recognized even then as being an absolutely unique, individual trait, and within a relatively short time, it was being used by law enforcement agencies to track criminals. Although it could theoretically have been used as a unique identifier for security purposes (and indeed, fingerprints were soon added to passports), in the early years it was hardly practical. Without the help of computers, someone would literally have to sit down with a magnifying glass and painstakingly go over stacks of fingerprints in order to find a match. That process could take days, or even weeks, hardly useful for border crossings and building security.

The wonderful thing about fingerprints was that they were the first example of a "biometric" identifier. They score high on both criteria for effective security devices: they’re absolutely individually unique, and they’re impossible to steal. (Although the odd Bond villain has tried.) Biometrics revolutionized the way we thought about answering that question "who goes there".

The next big breakthrough came in 1935, when an article in the New England Journal of Medicine suggested that the pattern of blood vessels on the back of the eye (the retina) could be used as a biometric identifier. It took several more years before imaging technology advanced to the point where retinal scanning was practical, many believed (and many still believe) that this is the identification process of the future. Retinal scanning has all the advantages of fingerprinting, but it’s somewhat more practical. Even before high-speed computers, photographs of retinas could be compared and matches could be made much faster than fingerprints could be identified.

The problem with retinal scanning is that it’s a very invasive technique. Many are still uncomfortable with the thought of a laser being shot into their eye each time they walk into work. This will undoubtedly change as the technology improves (lower intensity beams are one useful innovation), but there’s still something about having a machine scan your eye that’s just…creepy.

By the late 20th century, computers gave us the chance to experiment with just about every identification method under the sun. Science fiction writers speculated about which would catch on – for example, voice identification is used in 2001: A Space Odyssey (an easily stolen identification method if there ever was one), but over in the Star Trek universe, they used a combination of retinal scanning and voice ID. The fact was that at one point or another, each of these, plus a host of other technologies (such as full facial recognition and iris scanning) were developed. The security industry has yet to decide on a standard, but the oldest example of biometrics, fingerprints, may be making a comeback.

The main issue with using fingerprinting as an identification device was technological, but by now, computers have more or less eliminated that obstacle. There are numerous innovations, based on simple image scanning technology and pattern recognition software, that are giving fingerprinting the edge in the race for a standard.

Recently, the US company Bioscrypt Inc. installed automatic fingerprint readers at the Los Angeles City Hall. "The Los Angeles City Hall deployment is a prime example of how biometrics can add not only additional security, but also reduce costs and provide fast throughput," said Julia Webb, Bioscrypt’s vice president of global sales and marketing. They had already installed similar devices at the New York Police headquarters, again selling the system on its speed and accuracy.

In fact, digital fingerprint readers are ridiculously simple to use, and require little in the way of computing power (by today’s standards). (The Identix company even sells one that plugs into a laptop through a USB port.) This speed and ease of use, combined with the public’s relative comfort level with fingerprinting (as opposed to other methods) could give it the edge it needs to become the universally adopted standards.

Of course, there’s one important biometric identifier that we haven’t touched on, and many believe that it’s the real wave of the future: DNA. If there’s one thing that can never be duplicated, it’s our genome. Every living organism (except identical twins) has a unique DNA sequence, and law enforcement has made use of "DNA fingerprinting" for several years with spectacular success.

In the early days, DNA fingerprinting used a method called "Random Fragment Length Polymorphism" (RFLP), which essentially consisted of taking a sample of DNA and chopping it up with a particular set of enzymes. The sizes of the fragment were compared, and found to be unique to each individual, hence a "DNA Fingerprint". But an RFLP analysis was tedious, labor-intensive and not 100% accurate. The somewhat "low-tech" approach only indirectly addressed the essential difference between two samples (their sequence). Ideally, we’d be able to compare the actual chemical sequence of two DNA samples, set side by side, and this is in fact the approach of modern DNA fingerprinting.

Those getting visions of Gattaca, where a simple drop of blood (or other fluid) can identify a person in two seconds can relax. We’re still a long way from that sort of technology. As in the early days of fingerprinting, it still takes a relatively long time to sequence a sample of DNA, even with the help of automatic sequencers and computers. On top of that, DNA is quite fragile (ask anyone who’s ever worked in a molecular biology lab), and difficult to acquire non-invasively.

For simple identification purposes, answering the question "who goes there", it appears that old-fashioned fingerprinting will be with us for some time. It’s fast, easy and it works. In the future, maybe you won’t have to give a security or border guard your papers, just a finger.

bio:
Ian Dawe is a freelance writer and broadcaster living in London, Ontario.

advertise here
email for info

 

 

 

 

 

 

 
home | about us | feedback