Kimmo Huosionmaa
Selective handling of data means, that in the tomorrow would be possible to use methods, what allows to filter images, what is prohibited to share from the picture, what shared in the social media. This kind of tools like very fast computers and sophisticated computer programs allow the automatized censorship for faces and other things, what danger the person's privacy.
Those systems can also be used to automatized identification of persons, and it can be used to ask people if they want to share their faces in the social media. But it needs the ability to recognize people and this might cause the leak of the security. If hackers can break the control-level of that kind of system, they can use it for tracking the persons. And another problem with this system is that it can be used with Predator- and other combat UAV, what can communicate with central computers of the Internet, and then find those persons by using the location data, and target the weapons to that target.
The system can use nuclear-powered drones for tracking that person, and when there is enough room around this person, would it open fire with missiles. The Predator is very easy to change ans the drone, what uses electric motor and RTG-generator for giving extremely long operational time, and altitude. Computers can easily calculate the kill radius of the missiles, and open fire when the target is alone in the beach, and the support team or sensitive artificial intelligent program can call the target to the remote position by playing some drug or dealer or another business partner. The profession of the caller can use to make a profile, is the targeted person real criminal. And if the caller is some drug dealer, who calls the target, would the conclusion be, that the man is a criminal.
Only persons, who have given this permission would be seen in the social media, and others faces would be hidden behind the black box. That kind of image recognition system makes possible that person would not need to take even keys from the table when our main character will walk out. Those image recognition systems can use multiple sensors, like retina-scanners and IR-cameras, what also detect the possibility of plastic surgery. And in the wildest dreams, the system can use 3D-X-ray scanners.
Sniffer scanners can detect the form of the skull, and the chemical analyzers can also be used to detect the person. Those "people sniffer" equipment can be modified gas detectors, and they can work like the artificial nose. This kind of equipment work looks like an artificial dog, and they can carry in the wrist pocket. So they can also be used for tracking people from society. The lasers and another kind of stuff can also detect the DNA of the person by use mass-spectroscopy.
That kind of equipment can be real in the future. But when we are turning back to the people, who are denying to share their identity on the Internet, would that cause some other problems, The system can use that information for select people, who wanted to target the surveillance. One very good way to choose persons for intensive surveillance is that they would not allow sharing anything about them on the Internet. That tells the system, that this person has something to hide. And only interesting targets give something for the security service.
Comments
Post a Comment