“ They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. ” - Benjamin Franklin 1.

Slides:



Advertisements
Similar presentations
1984 Chapters 1-5, Part 2 Quiz Ignorance Is Strength.
Advertisements

What is the role of Government? Us or uS? For every action there is an equal and opposite reaction What are the costs and who will pay? It’s not the law,
U.S. National Security Defining National Security.
Impact of Computers on Society 2. Privacy and Personal Information.
Technology and Privacy Benjamin Franklin once said, “They who can give up essential liberty to obtain a little temporary safety deserve neither liberty.
Civil Liberties POLS 21: The American Political System “They that can give up essential liberty to obtain a little temporary safety deserve neither liberty.
Balancing Security and Privacy in Times of Cyberterror EDUCAUSE Western Regional Conference 2005 April 28, 2005 Steve Worona EDUCAUSE
Unit 9 Have you ever been to an amusement park?. Section A Period One.
Biometrics & the Privacy Paradigm: Separating Fact from Fiction Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Security.
The Role of Computers in Surveillance ~ Katie Hatland.
GPS Chips and Implants By: Evan Kelly.
What does it mean for you?.  The protection of private, identifying information.  If information is accorded a confidential status, that status mandates.
Arguments for Gun Control Ease of killing Public interest in keeping guns away from criminals & mentally ill School and workplace shootings Irresponsibility.
OPERATING SYSTEMS MAC OS X. Operating Systems : - Windows - Linux - Mac OS X.
The Anti-car Movement in Britain Malcolm Heymer.
The Bill of Rights Introduction. Name and Claim  1. Brainstorm with your shoulder partner and name the rights you think you have as an American. (Composition.
Civics in Our Lives Chapter 1 Section 1 Notes.
Government and the State. What is Government A government is made up of those people who exercise its powers, all those who have authority and control.
The Veterans History Project collects and preserves the extraordinary wartime stories of ordinary people. Southwest Missouri State University would like.
”Billboard that looks back”  What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics.
RIGHTS IN WARTIME WEIGHING CIVIL LIBERTY AGAINST NATIONAL SECURITY.
Foundations of Government O To be free, one must be chained. O “Cherish, therefore, the spirit of our people. If once they become inattentive to the public.
History and Philosophy
Unit 2 Asking the way — Authentic practice 1 石家庄市职教中心 王岩.
Class Name, Instructor Name Date, Semester Comparative Criminal Justice Systems / 6 th edition Chapter 3: An American Perspective on Criminal Law.
NEITHER …NOR Correlative Conjunction. Usage Correlative conjunctions always join grammatically equal elements (e.g., noun & noun, adjective & adjective,
Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.
KIDS HOPE USA. For the last (insert number) years/ months members of (church name) have been sharing their love at (school name)
1984 Chapter 6-8 Quiz Be sure to restate the question as part of your answer. Since some questions have more than one part, make sure you answer what.
1 GOVERNMENT AND THE STATE Government – the institution through which a society makes and enforces public policies Public policies – all things a government.
 “He who would trade liberty for some temporary security, deserves neither liberty nor security” - Benjamin Franklin  What is the meaning of this quotes?
Assessing Cyberspace Security and Vulnerabilities: The Critical Impact on Civil Liberties and Privacy Is there a trade-off between civil liberties and.
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Vocabulaire 9.3 Français I. 2 I’ve got a little problem.
Networking Network Classification, by there: 3 Security And Communications software.
Software Security WP29 / ITS Document No. ITS/AD Rev1 (7th ITS/AD, 11 November 2015, agenda item 3-2)
Software Security WP29 IWG ITS/AD Document No. ITS/AD (6th ITS/AD, 3 November 2015, agenda item 3-3)
Arguments for Gun Control Ease of killing Public interest in keeping guns away from criminals & mentally ill School and workplace shootings Irresponsibility.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
Securities vs. Liberties Greg Gough & Ben Paulson Those Who Sacrifice Liberty For Security Deserve Neither-Benjamin Franklin.
Daily Learning Goal: I can create Cornell Notes to outline a section of text about the purpose and classification of governments Cornell Notes Style: Read.
The Enlightenment and the Founding of America. The Enlightenment was an intellectual movement in Europe during the 18th century in which people began.
PEP7 Unit 1 Read and write. turn left turn right go straight beside next to behind in front of crossing Listen and do follow me far near.
Unit 32 – Networked Systems Security
STUDENT RIGHTS MINI-WRITE On a half sheet of paper write at least two paragraphs on the following questions: What rights do you have when you come to school?
Constitution Day 9/17/2012 We the People of the United States, in Order to form a more perfect Union…
Matthew 6 1.Choose the right bank. 2.Stick with long-term investments. 3.Count on social security. 4.Make saving a priority.
Please take out a piece of paper and complete the following: 1. Write down the vocabulary word and definition. 2. Choose ONE of these options and complete.
1984 Chapter 3-6 Quiz, Part III Freedom Is Slavery.
Page 1 This is page one. I’m talking about it now….
Unit 5 Do you like fruit? Part A Let’s talk & play By QFLS.
Time to Compare and Contrast
Who in the world said what?
Roosevelt, rockwell, and the four freedoms
Lecture III Surveillance Society Powerpoint by Miyase Christensen
Advanced Safety Feature Adaptive Cruise Control
The Political Foundation: Evolution and Revolution
The Political Foundation: Evolution and Revolution
The Political Foundation: Evolution and Revolution
NETWORK SECURITY.
The Homefront Japanese Internment.
Pre AP – 08/20/2018 Pick up a laptop
What year is this?.
Zachary blum Sam Garcia Courtney Sullivan
1984 Chapter 5-6 Quiz, Part III Ignorance Is Strength.
Canada and International Law
American Revolution Primary Source Bellringers
CSCD 303 Essential Computer Security
More laws, less justice. -Marcus Tullius Ciceroca (42 B.C.)
Presentation transcript:

“ They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety. ” - Benjamin Franklin 1

I’m Eric from Argus Global. today I’m going to talk about Biometrics, and why freedom and safety don’t have to be enemies 2

Cake or Death? Freedom or Safety? 3

Biometrics - not new. – Egypt. A Fingerprint in 1888? – Argentina...a little history 4

...today 5

Biometrics – around a long time $4,000 million in 2010 $14,000 million in 2019 Chinese rewards for fingerprints 6

Our world today? 7

...our world today? 8

Our world tomorrow? 9

Biometrics all around us... Your face in the supermarket Your fingerprint in the gym Your eyes on that advert Risks to your safety, reduced? 10

Biometrics – Protecting Privacy How secure is your laptop/phone? What about your bank account?...or even your identity ? 11

12

As we start to use biometrics... “– just where do we find balance between the need to be secure from attack, to reduce risk, and at the same time, be free from unwarranted intrusion?” 13

“ The advance of a Civilisation is nothing but an exercise in the limiting of Privacy ” - Isaac Asimov 14 Thanks for listening. Eric McDonogh, Argus Global – Hall 3/S12 (Just behind me, near the London Bus)

References Slide Slide wirelessly/ / wirelessly/ / biometric-id-capab/ biometric-id-capab/ boston-bombing-manhunt/ boston-bombing-manhunt/ voice-biometrics voice-biometrics