3D Manufacturing and Printing

Chapter 13. The Role of Technology – Six (6) Tools Used to Deceive Mankind.

Knowledge will be increased.” (Daniel 12:4 )

  1. Global Monitoring, Biometric Scanning.
  2. Genetic Manipulation, Sequencing, Splicing. (CRISPR).
  3. Global Communications.
  4. Digital, Cashless, Electronic Financial Transactions and Processing.
  5. Globalized and interconnected, networked data warehousing and I.T. Systems.
  6. Artificial Intelligence (A.I.), Robotics, 3-D Manufacturing Technology.

Six Man-Made Technologies Used by Satan/Beast/False Prophet:


 Knowledge wil be increased.” (Daniel 12:4 ). Just like guns, these things are not inherantly evil. It is not the gun that kills, but the finger than pulls the trigger. These technologies are similar to the gun, in that they can be used for good or bad … depending on who or what is pulling the trigger. There is always two sides to the same coin. In the hands of the beast/antichrist, they will be used for extreme evil. They are used to facilitate buying and selling in the global economy, which is totally contingent upon people having a special mark or form of identification on one’s body (forehead or hand). These technological tools are used to propigate the endorsement and spread of false religious doctrines. They are used to showcase the beast’s murder of God’s two holy witnesses or prophets, throughout the whole world. The antichrist/beast needs a failsafe, technological system that can 100% accurately identify who has allegiance to him (via his mark) and who should be granted permission to buy and sell, through electronically controlled means. This isn’t done magically or even supernaturally, but through the man-made technology that exists at the beginning and during the seven (7) year Tribulation period. Some of these technologies will be used to deceive people who are not familiar with their capabilities.

Some of these technologies will aid in the creation and dispersion of the “image of the beast” (man-made, Rev. 13:14 … “saying to them that dwell on the earth, that they should make an image to the beast,”). These will be electronic, digitized, computer generated images (CGI) and 3-D manufactured models/statues that are made with an extremely high level of precission and accuracy of the ‘likeness’ of the beast/antichrist. “Just as in the days of Noah”, genetic manipulations will be practiced by international members of the scientific community (geneticists) who have taken the mark of the beast, and his allegiance. Any ethical or moral restraint will be gone from the earth. They will no longer be restricted to practice this science and related experiments on only animal genetics. They will be free to work on practicing human genetic manipulations and inter-species genetic manipulation and hybridization (chimeras). As I write this, attempts (experiments) are being made internationally at combining both human and animal genes. Technology is just a tool in the hands of the evil one, used according to his purposes.

In the days of John, the Apostle, there would be no words known to him that would be able to describe any of these miraculous technologies. All of them, were invented many, many, many centuries later. All of these technologies have only come to be in the past ten to twenty years.  A couple technologies  have only come on the scene in just the past several years! There isn’t even any symbolic way to describe them, other than…”In the days of Noah”, “make an image”, “deceive them by false miracles”, “make the image speak”, “receive a mark in their right hand, or (in) their foreheads AND that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name,” and so on…

How can man presently, or in the extremely near future accomplish any of these things?

Consider, for a moment, that the only words that John the Apostle had in order to describe a car or military vehicle of some sort, were the words chariot or horse. He could only explains things in the context with which he understood them and was familiar with. Yes, the Holy Spirit prompted him to write, but he had to use words the people in his time used, and in future times, would most likely understand. It would not have been logical or practical for the Holy Spirit to give him or have him use the exact words of our times. John, and other future peoples, would not have had the faintest of clues as to what was being described, and the entire meaning of Revelation would have been entirely lost on them. God provides truth and accuracy in his word, and his word is not foggy, slight or unitelligible or meant to be misunderstood through the wrong use of terms. God is omnipotent and omnipresent, he knows what to say, when to say it, how to say it, to whom to say it and what he means by saying it.  I truly believe, that as we hurtle speedingly closer to our blessed hope, God will increasingly shed more and more light and meaning on his word, in a way that people of our times will (should be) able to rightly understand. “For the LORD giveth wisdom: out of his mouth cometh knowledge and understanding.” (Proverbs 2:6).

1. Global Monitoring, Biometric Scanning:

Iris Recognition; Iris recognition systems will scan the iris in different ways, they will analyze over 200 points of the iris including rings, furrows, freckles, the corona and other characteristics. After recording data from each individual, the system will save the information in a database for future use in comparing it every time a user wants to access the system.

  • Today’s Surveillance State Technology;  Major governments around the world are pursuing and using advanced technology on their citizens to build large databases of very specific, private information. Some governments are building these under the guise of ‘tracking the criminal element in society and determining the probability of the next crime’, others are creating a civilian database to collect and centralize economic activity. The major governments of the world are somewhat late coming to the civilian big data collection party. All major banking and credit institutions around the world are already connected electronically in a way that enables the processing of transactions and fund transfers in mere seconds. These recent developments would have been unthinkable in the 1960’s, 70’s or 80’s (before the advent of personal computers) or smartphones.  An astute prophecy student and technologist can easily see how these developments play into the Tribulation scenario of being able to be centrally controlled by the new world order system.
  • Expanding Worldwide Trend – National Biometric Database. Russia is to start a biometric database for financial services starting next summer, the Central Bank of Russia said in a statement. The biometric database will incorporate images of faces, voice samples and, eventually, irises and fingerprints. Russia isn’t the only country planning to implement a biometric database. China has also turned its nation into George Orwell’s nightmare. China’s Ministry of Public Security, which oversees the database, has amassed biometric information for more than 40 million people it was reported in 2015. The Communist country has the world’s biggest database of DNA information according to a report published by Human Rights Watch (HRW) just this year. For comparison, in the US, the FBI’s national DNA index has 12.7 million offender profiles. “Mass DNA collection by the powerful Chinese police absent effective privacy protections or an independent judicial system is a perfect storm for abuses,” Sophie Richardson, China director at HRW said. “China is moving its Orwellian system to the genetic level.” A follow-up report published earlier this month by the human rights watchdog group revealed that there was even a program which has gathered biometric data–including fingerprints, iris scans, blood-type, and DNA–on millions of residents in six regions in Xinjiang in 2017 under the guise of a free public health program providing physical examinations. Here in the U.S. the DHS is planning a biometric facial recognition database for border checkpoints and to create the Homeland Advanced Recognition Technology (HART) to store 500 million people, including many US citizens’ identities within its system. HART will no doubt link into the FBI’s NGI (Next Generation Identification System.) The Electronic Frontier Foundation is currently working with allied organizations to oppose mandatory national ID cards and biometric databases. According to EFF’s website, there is an expanding list of countries that have introduced biometric ID databases including Argentina, Belgium, Colombia, Germany, Italy, Peru, and Spain. That list will soon include Russia, the U.S., and other countries within the European Union. Privacy will cease to exist and it will be a thing of the past.
  • Like all biometrics solutions, face recognition technology measures and matches the unique characteristics for the purposes of identification or authentication. Often leveraging a digital or connected camera, facial recognition software can detect faces in images, quantify their features, and then match them against stored templates in a database. Face scanning biometric tech is incredibly versatile and this is reflected in its wide range of potential applications. Face biometrics have the potential to be integrated anywhere you can find a modern camera. Law enforcement agencies the world over use biometric software to scan faces in CCTV footage, as well as to identify persons of interest in the field. Border control deployments use face recognition to verify the identities of travelers.
  • The human face plays an important role in our social interaction, conveying people’s identity. Using the human face as a key to security, biometric face recognition technology has received significant attention in the past several years due to its potential for a wide variety of applications in both law enforcement and non-law enforcement.  As compared with other biometrics systems using fingerprint/palmprint and iris, face recognition has distinct advantages because of its non-contact process. Face images can be captured from a distance without touching the person being identified, and the identification does not require interacting with the person. In addition, face recognition serves the crime deterrent purpose because face images that have been recorded and archived can later help identify a person. Face recognition technology can be implemented as a functionally independent application, or seamlessly integrated into new or existing biometric security solutions by system integrators and solution providers.

NeoFace technology’s strength lies in its tolerance of poor quality.  Highly compressed surveillance videos and images, previously considered of little to no value, are now usable evidence and leading to higher rates of positive identification.  NeoFace is able to match low resolution facial images, including images with low resolutions down to 24 pixels between the eyes. NeoFace facial recognition technology can positively identify latent photos with high degree of accuracy.

  • NeoFace® Watch – Designed for operational security users, NeoFace Watch integrates with existing video surveillance systems enhancing security by extracting faces in real time from surveillance or even web cameras and instantaneously matching them against a watchlist of individuals. Multiple alert options are available within NeoFace Watch.
  • NeoFace® Reveal – Dedicated for forensic application, NeoFace Reveal is a software application dedicated to solving crimes using facial recognition technology.  NeoFace Reveal allows for capture of “latent face”, either from photographs or crime scene videos. Latent faces are collected, enhanced and encoded for search against a facial gallery and through user-friendly applications are available for side-by-side viewing and verification. NeoFace Reveal is available as either a standalone solution or integrated with NEC biometric identification system.
  • NeoFace® Smart ID – Intended for field operations, NeoFace Smart ID is a smart phone and tablet-based solution that enables collection and identification of fingerprint, face, voice, demographic and other source data. NeoFace Smart ID can also be configured for submittal to a central database or with a local facial watch list allowing for on-the-spot identification prior to remote database search.
  • NeoFace® Match – Available to third-party system integrators as an “appliance” for integration in facial recognition solutions or existing identification systems, NeoFace Match includes NEC’s core facial recognition capabilities such as image processing, face detection, quality assessment, template encoding and matching.
  • India’s Surveillance System: Bloomberg, January 9, 2017: Snowden Joins Outcry against World’s Biggest Biometric Database; Former U.S. intelligence-contractor-turned whistleblower Edward Snowden joined critics of India’s digital ID program. An Indian journalist who faces police charges, reported that personal details of over a billion citizens enrolled in the program could be illegally accessed for just $8 paid through a digital wallet. Named Aadhaar, the program is backed by the world’s biggest biometric database, which its operator is the Unique Identification Authority of India, or UIDAI. This isn’t the first time Snowden has spoken against Aadhaar. On Jan. 5th (2017), he tweeted: “It is the natural tendency of government to desire perfect records of private lives. History shows that no matter the laws, the result is abuse.” Several Indian activists allege the program provides legal sanction for the creation of a surveillance state. Bloomberg, December 13, 2017: World’s Biggest Biometric Database Grows in India amid Doubt; Prime Minister Narendra Modi is pushing Indians to link their digital IDs to a host of services such as credit cards and cellphones. Aadhaar is a unique 12-digit number assigned to Indian residents, backed by their fingerprints, iris scans and certain demographic details. Some lawyers and activists, such as Shyam Divan, say that once linked to various services it will offer the government a web of information about each individual that will violate the person’s privacy. “The Aadhaar Act purports to provide legal sanction to a program that lays the framework for real time surveillance of every Indian,” Divan said. Indians are mandated to link their Aadhaar to:
  • Government-issued Permanent Account Numbers, which help track tax filings
  • Bank accounts, credit cards, insurance policies, mutual funds, pension plans
  • Social welfare benefits such as cooking gas subsidies
  • Mobile numbers


  • China’s Surveillance System: Activist Post, December 30, 2017: China’s Ministry of Public Security, which oversees the database, has amassed biometric information for more than 40 million people, it was reported in 2015. The Communist country has the world’s biggest database of DNA information according to a report published by Human Rights Watch (HRW) just this year. For comparison, in the US, the FBI’s national DNA index has 12.7 million offender profiles. “Mass DNA collection by the powerful Chinese police absent effective privacy protections or an independent judicial system is a perfect storm for abuses,” Sophie Richardson, China director at HRW said. “China is moving its Orwellian system to the genetic level.” A follow-up report published earlier by the human rights watchdog group revealed that there was even a program which has gathered biometric data–including fingerprints, iris scans, blood-type, and DNA–on millions of residents in six regions in Xinjiang in 2017 under the guise of a free public health program providing physical examinations. A recent BBC exposé into the network of facial recognition CCTV cameras in China’s biggest city, Beijing, illustrates how effective a surveillance network is at identifying, tracking, and interdicting any targeted or wanted individual within minutes. All the more unnerving is China’s progress in developing a system of ranking individuals based on a citizen score linking social media and big data to create a digital caste system for human beings. Something akin to a credit score showing your loyalty to the state.
  • Russia’s Surveillance System: Activist Post, December 30, 2017: Expanding Worldwide Trend – National Biometric Databases; Russia is to start a biometric database for financial services starting next summer (2018), the Central Bank of Russia said in a statement. The biometric database will incorporate images of faces, voice samples and, eventually, irises and fingerprints.
  • United States Surveillance System: Activist Post, December 30, 2017: Here in the U.S. the DHS is planning a biometric facial recognition database for border checkpoints and to create the Homeland Advanced Recognition Technology (HART) to store 500 million people, including many US citizens’ identities within its system. HART will no doubt link into the FBI’s NGI (Next Generation Identification System.) The Electronic Frontier Foundation is currently working with allied organizations to oppose mandatory national ID cards and biometric databases. According to EFF’s website, there is an expanding list of countries that have introduced biometric ID databases including Argentina, Belgium, Colombia, Germany, Italy, Peru, and Spain. That list will soon include other countries within the European Union.
  • May 10, 2018, No Place To Hide – Facial Recognition Technology Will End Your Privacy: The Chinese police in Nanchang made news in mid-April when the press reported the arrest at a concert of a man wanted for fraud. The story was significant because automatic facial recognition systems, linked through now 176 million cameras across the country (rising to 600 million by 2020), had picked the man out of a crowd of 60,000 concertgoers and allowed the police to pinpoint his location in real time.  The episode was promoted by the Chinese government as proof positive of the benefits of the Chinese surveillance state, but the notion that an authoritarian government uses automatic facial recognition to track its citizens everywhere has sent shivers down the spine of anyone concerned about privacy and who may not have full faith in the benevolence of the Chinese government.
  • Facial recognition holds the promise of an incredible leap forward in law enforcement but backwards in individual rights. No longer will oppressive governments need to employ human watchers to monitor video footage.  Now highly accurate computer algorithms, monitoring tens or even hundreds of millions of video feeds, match patterns of facial geometry to identify individuals, even if beards or makeup are used. A criminal suspect shows his face on a public street, at a shopping mall, in a bank or at a bus stop and an alert can immediately go out to summon police for arrest.  Tellingly, the same system can be used against terrorists, political dissidents, union leaders, human rights protestors, members of the press, the poor, or ethnic minorities. As Paul Harvey used to say, you can run, but you can’t hide. Though China has made the hardest push for ubiquitous surveillance through its vast network of cameras linked in real time to computer-based facial recognition, it is far from alone. The NYPD has been attempting to gain access to the state database of facial recognition information collected for driver’s licenses.
  • The NYPD’s Real Time Crime Center and Facial Identification Sections are not satisfied with using only the facial scans of those it has arrested but wants to link every driving adult to its camera-equipped system, the vast majority without ever having been arrested. Thousands of cameras now installed at NYC intersections, tunnels and public buildings are feeding data into automatic facial recognition systems similar to those in Communist China. As a precursor to real-time facial recognition powered by machine algorithms, Georgetown University’s Center on Privacy and Technology revealed in 2016 that 26 states are already sharing facial recognition data collected on driver’s licenses and 16 of those also share with the FBI, meaning that roughly half of the adult population can already be identified through facial recognition, though only upon arrest at this point.  Proponents of automatic recognition systems linked to pervasive surveillance point to the ability to locate missing persons, help dementia patients, identify unconscious victims and catch dangerous felons. The drawbacks are much harder to swallow, however.
  •  Protest movements such as Occupy Wall Street, the Tea Party Movement and Black Lives Matter, were all monitored by the FBI with thousands of faces being fed into federal databases, according to recently revealed information. Those attending vigils held for victims are also common targets for facial pattern collection, representing what amounts to a chilling crackdown on free speech.  With frightening similarity to Egyptian police who manually record protest marches so they can come, often in the night, to arrest dissidents for torture in secret prisons, the creation of a government database of known protestors and blacklists of Americans is unsettling to say the least.  The latest proposal to link such automatic systems to police body cams takes the concept even further because it makes every officer a walking eye of the surveillance state. The recent leak of data on 87 million Facebook users is another cause for concern because Facebook, as its name implies, is currently the world’s largest facial portrait database and the profile photos cannot be made private, according to company policies.  Facebook itself ran afoul of European privacy laws in 2012 and was forced to suspend its activities after it used facial recognition automatically to tag and link photos, a dangerous proposition for those who want to stay hidden from abusive ex-spouses.
  • The system showed a 97% accuracy in testing, superior at the time to even the FBI’s modest 85% accuracy several years prior. Now it is reported to be ready to restart its facial recognition program for all users.  Even more worrying, there is strong evidence to indicate that private intelligence companies have already compiled this vast trove of 2.2 billion photos for facial recognition purposes, to be sold to governments and corporations alike. Forbes magazine reported this year on a company called Terrogence, started by an ex-Mossad intelligence officer. For the last five years, Terrogence has specialized in the construction of huge face-scan databases, compiling the data from social networks, YouTube videos, Internet forums, blogs, official records, news articles and a host of other sources.  Terrogence has been selling cutting-edge intelligence technology and information to the NSA. So, what the government doesn’t collect legally through driver’s licenses and arrest data, it quietly purchases from private intelligence corporations.
  • Marketed as an effort to stop terrorism by tracking down jihadists solely by their faces, LinkedIn profiles and leaks from former employees, their involvement in politics appears to go much deeper, with one employee describing her job as “open source intelligence practices and social media engineering methods to investigate political and social groups.”  The company quietly boasts of infiltrating political groups with fake online personas in an effort to gather intelligence and create dossiers on possible subversives, all for profit and free from even the loose legal tethers of the US deep state. The American no-fly list is a famous example of a black list that, although a sensible project that started with good intentions, quickly spun out of control until it was banning toddlers with similar names. There was no way for an individual to know if they were on it, how they got there or if there was a way to get off such a black list.
  • The same threat to personal liberty now exists with privatized “black lists” created from these corporate databases and, in addition to being denied access to flights, the consequences could be high-risk police stops, pervasive monitoring and restrictions on normal activities, all based on automatic facial recognition. Communist China has made no efforts to hide what will soon be a total-information surveillance state, but the United States is quietly building out the same level of control through private contractors and a patchwork connection of corporate and government data. The reality is that all our unique facial signatures are likely already in a database, whether government or corporate, and those databases are being linked, slowly at first, to automatic facial recognition systems through cameras popping up around major cities.

2. Genetic Manipulation, Sequencing, Editing and Splicing. (CRISPR).

‘CRISPR’ (pronounced crisper) stands for Clustered Regularly Interspaced Short Palindromic Repeats, which are the hallmark of a bacterial defense system that forms the basis for CRISPR-Cas9 genome editing technology.

Genome editing (also called gene editing) is a group of technologies that give scientists the ability to change an organism’s DNA. … CRISPR-Cas9 was adapted from a naturally occurring genome editing system in bacteria.

Genome editing, or genome engineering is a type of genetic engineering in which DNA is inserted, deleted, modified or replaced in the genome of a living organism. In 2018, the common methods for such editing use engineered nucleases, or “molecular scissors”. … Nine genome editors were available as of 2017.

Genome editing is a method that lets scientists change the DNA of many organisms, including plants, bacteria, and animals. Editing DNA can lead to changes in physical traits, like eye color, and disease risk. Scientists use different technologies to do this. … Many scientists who perform genome editing now use CRISPR.

Human germline engineering is the process by which the genome of an individual is edited in such a way that the change is heritable. This is achieved through genetic alterations within the germinal cells, or the reproductive cells, such as the oocyte and spermatogonium.

Today’s Genetic Knowledge and Technology – CRISPR:

Per the U.S. National Library of Medicine: Genome editing (also called gene editing) is a group of technologies that give scientists the ability to change an organism’s DNA. These technologies allow genetic material to be added, removed, or altered at particular locations in the genome. Several approaches to genome editing have been developed. A recent one is known as CRISPR-Cas9, which is short for clustered regularly interspaced short palindromic repeats and CRISPR-associated protein 9. The CRISPR-Cas9 system has generated a lot of excitement in the scientific community because it is faster, cheaper, more accurate, and more efficient than other existing genome editing methods. Genome editing is of great interest in the prevention and treatment of human diseases. Currently, most research on genome editing is done to understand diseases using cells and animal models. Scientists are still working to determine whether this approach is safe and effective for use in people. It is being explored in research on a wide variety of diseases. It also holds promise for the treatment and prevention of more complex diseases, such as cancer, heart disease, mental illness, and human immunodeficiency virus (HIV) infection.

Ethical concerns arise when genome editing, using technologies such as CRISPR-Cas9, is used to alter human genomes. Most of the changes introduced with genome editing are limited to somatic cells, which are cells other than egg and sperm cells. These changes affect only certain tissues and are not passed from one generation to the next. However, changes made to genes in egg or sperm cells (germline cells) or in the genes of an embryo could be passed to future generations. Germline cell and embryo genome editing bring up a number of ethical challenges, including whether it would be permissible to use this technology to enhance normal human traits (such as height or intelligence). Based on concerns about ethics and safety, germline cell and embryo genome editing are currently illegal in many countries.

  • Popular Mechanics, March 10, 2017: Chinese Scientists Genetically Modify Human Embryos. This marks the first time CRISPR has been used on viable human embryos. Chinese scientists have successfully edited the genetic information of human embryos. The researchers used CRISPR to remove genetic mutations from a handful of viable human embryos and have published the results in the journal Molecular Genetics and Genomics. CRISPR has been one of the biggest breakthroughs in genetics in the past decade. It lets scientists target a specific section of DNA, remove it from the genome, and even replace it with something else if they wish.
  • EXPRESS, July 18, 2017: China unveils gene technology to create SUPERHUMANS. ARMIES of SUPER-SOLDIERS were a step closer to reality after China announced it was genetically engineering hyper-muscular SUPER-DOGS. The dogs, which are test tube bred in a lab, have twice the muscle mass of their natural counterparts and are considerably stronger and faster. The canine genome has been especially difficult to engineer and replicate – but its close similarity to the human genome means it has long been the prize of geneticists. Now, the Chinese success has led to fears the same technology could be used to create weaponized super-humans. David King, director of Human Genetics Alert (HGA), voiced his fears over what is widely viewed as the first step on a slippery slope.  He told express.co.uk: “It’s true that the more and more animals that are genetically engineered using these techniques brings us closer to the possibility of genetic engineering of humans. “Dogs as a species, in respect of cloning are very difficult, and even more difficult to clone human beings.  “There’s no medical case for it, the scientists are interested in being the first person in the world to create a genetically engineered child. They’re interested in science and the technology and their careers. They will continue pushing the regulations for it. That does set us on the road to eugenics. I am very concerned with what I’m seeing.” “But some have criticized the experiments, citing ethical concerns” Mr. King said: “This is the way it is likely to proceed if the law is changed, first of all they will use it for medical purposes, most likely to treat a genetic condition”. “In terms of genetic engineering we will be seeing this more and more”. The director of HGA, and independent body, claimed there are multiple examples of eugenics going on already, citing women who are intelligent and beautiful are paid more for their eggs in the US. Mr. King said: “It’s not scaremongering. “I’m seeing the beginning of a campaign within the scientific community to legalize human genetic engineering. We’ve seen how it happened with the thee-parent embryo. I can see the same thing building up with genetic engineering”.
  • Brand New Way to Create Babies without Sex: With new rules complicating male-female relationships, scientists claim they may have a solution that will allow the human race to continue – in vitro gametogenesis, the manipulation of skin cells to create a baby. IVG has been successfully tested by Japanese researchers on mice, which produced healthy babies derived from skin cells. The process begins by taking the skin cells from the mouse’s tail and re-programing them to become induced pluripotent stem cells. These manipulated cells are able to grow different kinds of cells, and are then used to grow eggs and sperm, which are then fertilized in the lab. The resulting embryos are then implanted in a womb. Although similar to in vitro fertilization, IVG eliminates the step of needing pre-existing egg and sperm, and instead creates these gametes. But many experts in the reproductive field are skeptical of its potential outcomes and ethical compromises. “It gives me an unsettled feeling because we don’t know what this could lead to,” said Paul Knoepfler, a stem-cell researcher at the University of California, Davis. Knoepfler noted that some of the potential repercussions of IVG could turn into “cloning” or “designer babies.” Other dangers could include the “Brad Pitt scenario,” in which celebrity’s skin cells retrieved from random places, like hotel rooms, could be used to create a baby. Potentially anyone’s skin cells could be used to create a baby, even without their knowledge or consent. In an issue of Science Translational Medicine earlier this year, a trio of academics – a Harvard Law professor, the dean of Harvard Medical School and a medical science professor at Brown – wrote that IVG “may raise the specter of ’embryo farming’ on a scale currently unimagined, which might exacerbate concerns about the devaluation of human life. ”Although IVG has proven successful in mice, there are still some wrinkles that need to be ironed out before it is tested on humans. It will take at least another decade of bioengineering work, researchers say. In the meantime, those who want to make a baby the old-fashioned way will need to pay attention to the ever-changing rules governing courtship.
  • Ambitious Genetics Project Touted as Scientific ‘Noah’s Ark’: A new project described by its Smithsonian-based directors as the “most ambitious project in the history of modern biology,” will map the genetic codes of all 1.5 million known plants and animals. The researchers involved in the project hope it will be a scientific Noah’s Ark, enabling scientists to study species after they have gone extinct. Some scientists are less impressed by the project. Dr. Nathan Aviezer, a physics professor at Bar Ilan University who is a learned and devout Jew, emphasized that as the science of genetics stands right now, the project falls short of the original Ark as a means of repopulating the planet. “Knowing how the genetic material comes together does not mean they know how to make a living thing,” Dr. Aviezer told Breaking Israel News. “Having the blueprints doesn’t mean you know how to build a building. And that is what they are doing; mapping genetic material and no more.” Even at that more mundane level, the project is an impressive undertaking. At a cost of $4.7 billion, the Earth Biogenome Project (EBP) hopes to map the genomes of all the known species of plants and animals over the next ten years. Led by researchers from the Smithsonian Institution, the world’s largest museum and research complex, 24 scientists from around the world will take part in the project. Mapping genes entails identifying the chemical code of the DNA contained with the nucleus of the organism’s cell. Currently, less than 0.2 percent of the Earth’s species have been sequenced, and even when complete, the project will not have mapped them all. There are an estimated 10 to 15 million species that are currently uncatalogued and will not be included in the EBP. Most of these are single cell organisms and small insects in the oceans. The project is a continuation of the Human Genome project completed in 2003 which succeeded in decoding the human genome. That project, focusing on one species, took fifteen years and cost $3 billion. The EBP has attracted criticism from religious circles for more than just copying Noah’s Ark. Researchers are now experimenting with editing genes, and gene mapping is a part of that process. Critics claim the scientists are playing the role of God.

3. Global Communications:

Voice, video, data; 24/7/365. Anywhere and everywhere. Around the world, to your television or smart device. Instantly.Examples of satellite link technologies include satellite TV services. Satellite TV competes with cable or the terrestrial delivery of television broadcasts, whereas new satellite radio services are replacing land-based tower options in the delivery of automotive radio. A satellite link consists of two phases: the uplink, which delivers the original broadcast signals into space, and the downlink, which sends those signals to individual customers. Customers receive signals through the use of individual satellite dishes installed on properties. These may be of various sizes and may be installed either on a wall, on a roof or on the ground in proximity to the building.

4. Biometric Scanning, Digital-Cashless Financial Transaction and Payment Processing:

 No cash needed. No credit card needed. No phone needed. No implanted, micro-chip needed. No physical check needed. No physical thing needed to make a purchase or a transaction. All that is needed is verification of a scanned biometric (mark)er on person’s face or hand. Once the database confirms the verified biometric (mark)er belongs to it owner, approval is authorized to buy or sell and funds are electronically transferred. In addition to an iris, finger print or facial scan (which would be used to verify a person’s identity), a special biometric (mark)er can be added on the forehead or hand to authenticate and approve a transaction based on some pre-determined criteria. The entire transaction would be handled digitally. Verification of a person’s identity. Authentication or approval for the transaction. All data stored in a database or cloud warehouse. Funds are electronic between parties based account codes stored in the data or cloud warehouse.

Biometric authentication is a security process that relies on the unique biological characteristics of an individual to verify that he is who is says he is. Biometric authentication systems compare a biometric data capture to stored, confirmed authentic data in a database.

  • Mastercard rolls out biometric payments in Europe: MasterCard has just rolled out a new feature that should simplify online shopping, without making any compromises in security. The feature, called Identity Check Mobile, allows users to use biometrics like fingerprint scanning or facial recognition to verify their identity before making a purchase, eliminating the need for passwords or PIN codes. At the moment, the technology is being introduced in 12 European countries: the UK, Austria, Belgium, Czech Republic, Denmark, Finland, Germany, Hungary, the Netherlands, Norway, Spain, and Sweden. Worldwide rollout is expected next year, although no specific dates have been given.MasterCard says current identity verification methods often send the user away from the website or mobile app to a new site or app, where they need to confirm their identity with a password or PIN code. That approach often makes people abandon the shopping process completely. By implementing biometrics, such as fingerprint scanners or facial recognition technology (MasterCard’s app allows you to take a selfie so that the technology can recognize you), the company hopes to “dramatically” speed up the digital checkout experience. “We are relentlessly focused on making the online payment experience near frictionless, without making any compromises on safety and security”, says Ajay Bhalla, president of Enterprise Risk & Security, Mastercard. “This is a significant milestone in the evolution of payments. Shopping in person has been revolutionized thanks to advances like contactless cards, mobile payments and wearables, and now we are making Identity Check Mobile a reality for online shopping in Europe, and soon, the world”.
  • The Biometric ID Grid: A Country-by-Country Guide: by James Corbett, corbettreport.com, January 31, 2017. In last week’s report on India’s demonetization disaster I began to connect the dots between demonetization, the push for a cashless society, and the biometric identification schemes that will eventually tie everyone’s fingerprints, iris scans, and other identifying details to every transaction they ever make. Well, that game of “connect the dots” just became even easier to play. First, it was reported last week that a key panel advising the government on its implementation of the “digital payments ecosystem” (that is being pushed and funded by USAID) is now recommending that India links its national biometric ID database directly to tax returns.
  • And now comes word that India is “working on a biometrics-backed payment system that will be connected to a user’s unique ID number, or Aadhaar.” (Who could have seen that coming?) No, it doesn’t take a Nostradamus to understand where this is all heading: From the cashless society and the biometric ID grid to the cashless biometric grid. And we already know about the cashless society. Now it’s time to collect the data on the biometric ID grid. And let’s not be naive: As I’ve demonstrated before, this is a coordinated plan to institute a worldwide biometric id system to track every human on the planet.

But given how fast and furious these new biometric databases are coming online, no one person can possibly keep track of them all. That’s why I’m calling on Corbett Report members to help assemble this information. Like last year’s open source investigation into the War on Cash, this country-by-country guide will be updated with input from the Corbett Report community. Members of the site are invited to log in and leave links to information about the biometric ID grid in their country in the comments section below.

The Biometric ID List:

Afghanistan – In 2016 the US bragged about their role in helping the Afghan Ministries of Defense and Interior roll out biometric ID systems for their workers. Also in 2016 the Afghanistan Telecom Regulatory Authority revealed that they wanted to “start linking biometrics to new SIM card registrations, to improve national security.” As has been widely reported, the US military has been waging “biometric warfare” in the country as part of its invasion, occupation and (de)stabilization effort since at least 2010. The Afghanistan National Security Forces has now deployed their own Automated Biometric Information System with fingerprint, iris, and facial scan capabilities and is “compatible with the U.S. DoD ABIS and the FBI Integrated Automated Fingerprint Identification System.”

Albania – In 2009 Albania began issuing a new type of biometric identity card. The card is in compliance with ICAO standards and contains an embedded chip that stores fingerprints and a digital photograph along with biographical information.

Australia – Australia has been issuing biometric passports since 2005 and the Department of Immigration and Border Protection (DIBP) has been running biometrics collection centres for years to issue visas tied to visitors’ biometric details. But now, Australia is about to lead us into a Brave New World with a world first: The DIBP is going to introduce the first “self-processing system” for travelers at Australian airports later this year using biometric details instead of a passport. Australian schools have implemented fingerprint scans as a method of tracking attendance at schools despite a strong backlash from parents that led to similar programs being suspended in the past.

Bahamas – Last month the Bahamas began issuing biometric passports. In keeping with international standards, the passports will require a digital photograph and fingerprints from the passport holder.

Bermuda – From June 2016 Bermuda has outsourced printing of its passports to the UK so that Bermuda’s “citizens” could enjoy the “benefits” of biometric passport technology, “which includes the highest level of internationally recognised security standards.”

Bolivia – In 2009 Bolivia’s elections were held using an electoral voter list created by using biometric data. In 2016 the Bolivian government began a 12-month program to perform a biometric census on the country’s foreign population.

Bulgaria – Bulgaria began issuing biometric identity cards (mandatory for all citizens) in March 2010. Bulgaria also issues biometric passports and driver’s licenses containing embedded biometric data.

Brazil – Brazil began issuing biometric identity cards in 2011 with the intention of issuing cards as part of its Registro de Identidade Civil, which intends to capture the biometric details of all 150 million citizens by 2020. Also in 2011 the Brazilian Electoral Justice approved the roll out of a biometric voter registration system that requires voters to register their fingerprints in order to vote (which is mandatory).

Canada – Under NEXUS, the joint Canada-US “preferred traveler” program, iris scans are used to identify passengers. In 2015 the Canadian government expanded biometric screening, including fingerprints and digital photos, to visitors from all 151 visa-required countries.

Chad – The European Union is funding a program in Chad to register the biometric details of refugees and returnees fleeing war-torn neighboring countries.

Chile – In 2013 Chile rolled out its new national ID and passport infrastructure including an eID card which is based on a multi-biometric system comprised of an Automated Fingerprint Identification System (AFIS) and a Facial Recognition System.” The country aims to issue all of its 18+ million citizens with a card by 2022.

China – In 2016 China debuted its first airport biometric entry system. The system takes travelers’ photos at security checkpoints within the airport, linking their faces to their boarding passes. In 2017, the Chinese government unveiled new biometric travel passes (including fingerprint scans) for mainland visitors to Taiwan.

Finland – Finland introduced biometric residence permit cards in 2012. The cards include a chip that stores a digital photograph and two fingerprints.

France – France has issued only biometric passports since 2009. The passport requires the collection of a biometric digital photo and eight fingerprints.

Germany – Germany introduced biometric passports in 2005 and biometric residence permits in 2011, both of which require a biometric digital photograph and two fingerprints to be collected and stored on an embedded chip. Germany’s identity card does require a biometric photo, but so far fingerprint collection is optional.

Greece – In compliance with the dictates of Washington, the Greek government is set to issue new biometric IDs this year. As Greek Report notes: “Failure to create the new IDs in a timely manner could lead to a suspension in the visa-free travel to the US that Greeks currently enjoy.”

India – India has been fingerprinting and iris scanning its population for years in its quest to construct the largest biometric ID database in the world. The plan to collect and store biometric details on all 1.2 billion Indian citizens is proceeding apace, and has so far registered over 1.1 billion people, including over 99% of all Indians over 18.

Iraq – In 2016 the Iraqi government began a national identity card system that uses biometric identifiers. This system has been widely criticized for legally allowing discrimination of minorities.

Israel – In 2009 the Knesset enacted the controversial Biometric Database Law to pave the way for the implementation of a national biometric ID database. Last July it was reported that the “pilot program” had come to an end and all Israeli residents would be forced to register their biometric details with the government. In December it was announced that the mandatory implementation of the database was being delayed and that fingerprints may no longer be required.

Japan – In 2007 the Japanese government began requiring fingerprints and digital photographs from all foreign travelers. Now, the government is considering implementing a biometric ID payment system which will “allow” (sic) tourists to “register their fingerprints or finger vein patterns among other personal information with the service and then deposit a set amount of money in a connected account,” from which they can make purchases while in the country.

Kenya – In 2012 Kenya began biometric voter registration and in 2015 the government implemented a biometric registration system for all citizens aged 12 and over. The registration includes fingerprint collection and is tied to a national database.

Kuwait – In 2015 Kuwait passed a law requiring all citizens and visitors to submit to DNA testing for a national database. After a wave of protest, legal challenges, and opposition from the emir of Kuwait the parliament announced in October 2016 that they would “scale down” and potentially revoke the law.

Luxembourg – In accordance with EU standards Luxembourg issues biometric passports with a chip containing a digital photograph, two fingerprints and an image of the holder’s signature.

Mexico – In 2011 the Mexican government began a program to issue biometric identification cards to all children between 4 and 17 years old. The cards contain a digital photograph, a fingerprint and an iris scan. The scheme is part of a broader National Population Register that will eventually extend to adults and contain the biometric details of the entire population of Mexico.

Netherlands – Since 2009 the Netherlands has issued biometric passports containing an embedded chip with a digital photograph and fingerprints. Four Dutch citizens challenged the legality of the practice of collecting fingerprints but it was approved by the European Court of Justice. Although only two fingerprints are stored on the passport’s chip, four fingerprints are taken and stored by the local government in a central database that is also used to pursue criminal investigations.

New Zealand – New Zealand’s Inland Revenue Department rolled out “Voice ID” in 2011 to register “customers’” voice prints and identify them in future interactions. By 2015 1.4 million of the country’s 6.1 million taxpayers had registered their voice prints with the “service.”

Nigeria – Nigeria is contracting with Bio-Metrica to collect citizens’ fingerprint and facial biometrics for the nation’s 2018 census.

Paraguay – In 2009 Paraguay revamped its passports and mandatory identity cards for its New Identification System by adding biometric details including a thumbprint and digital photograph.

Peru – Last year Peru announced a 3-year program to issue 1.6 million biometric passports noting that these biometric documents are “required to consolidate the Schengen visa waiver process.”

Philippines – In 2014 the Commission on Elections announced that biometric registration would be mandatory for all voters in the Philippines’ 2016 election. However, “technical problems” meant the government had to allow some voters with incomplete or corrupted biometric data to vote anyway. Voters continue to register for polls, with the Philippines’ Commission on Elections allocating US$201,000 last month to voter registration machines (VRMs) and peripherals.

Saudi Arabia – In 2015 Saudi Arabia finalized its Automated Central System to collect and store the biometric details (including fingerprints) of all citizens and expatriates. Also in 2015 the country’s biometric border security system was launched.

Sierra Leone – Just last week the Sierra Leone government confirmed receipt of 4,066 biometric registration kits that will be used to register voters for the 2018 elections. The aim is to construct a single, biometric voter register “that will capture every resident in Sierra Leone.”

South Korea – In 2012 the Korean government began collecting fingerprints and digital photographs of all foreign visitors (except foreign government officials/international organization representatives and their accompanying immediate family members as well as persons under 17 years of age).

Switzerland – Switzerland launched its biometric passport in 2010 after a referendum was held to approve the measure. The referendum passed with 50.14% of the vote, making it one of the closest referendums in Swiss history. The passports adopt the “international standard” of collecting two fingerprints (one from each index finger) and a digital photograph of the holder’s unsmiling face.

Trinidad and Tobago – In 2012 it was reported that the country was moving to fully implement biometric passports within five years. In 2013 the Ministry of the People and Social Development announced they were launching a fingerprint-based biometric smart card for citizens to access social benefits, citing fraud and security as reasons for the switch. The very next year the company that was manufacturing the cards warned that the system was vulnearable to identity theft and left the door open for frauds and scams. The cards were rolled out in 2015. Last year Major General Edmund Dillon, the Minister of National Security, announced the government was considering the implementation of biometric border screening at the country’s two international airports in keeping with a “United Nations security resolution requiring the implementation of security mechanisms to stop terrorists from returning to the country from abroad, with passenger screening systems being an important component of such efforts.”

Ukraine – A law passed by the Yanukovych government in 2012 requires all Ukrainian citizens, regardless of age, to obtain a biometric passport.

United Kingdom – The UK under the Labour government of Tony Blair and later Gordon Brown attempted to implement a national identity register and ID card system that would have required the logging of an extensive amount of personal and biometric information in a central database. However, the program caused waves of protest and the government eventually gave in to the public outcry, scrapping the plan for the national registry and instead only implementing the biometric id scheme for foreign nationals. The UK does issue biometric passports and recent polling suggests UK adults “are now willing to embrace biometric identity for online banking.”

United States – President Trump’s new Executive Order on “terrorist” (sic) entry calls on the Department of Homeland Security to “expedite the completion and implementation of a biometric entry-exit tracking system for all travelers to the United States.” (This comes as no surprise to those who warned that Trump’s transition team was swarming with biometric industry workers and lobbyists.) The United States already takes digital fingerprints of all foreign tourists (except Canadians) and stores them in a database for 75 years.  The DoD has announced plans to replace Common Access Card access to information systems with biometric authentication. The US issues biometric passports and coordinates with the Canadian government on the biometric NEXUS preferred traveler program (see Canada).

Uruguay – In 2013 the Uruguayan government opened a open call for tenders for a new eID “solution.” In 2014 Gemalto won the tender and began work on the new biometric eID cards that can store up to four fingerprints.

Yemen – In 2014 it was announced that the country of Yemen would be deploying M2SYS Technology’s TrueVoter biometric voting platform for the upcoming constitutional referendum and national elections. The system is capable of fingerprint, iris, palm print, finger vein, palm vein, and facial recognition, but only fingerprint and facial recognition are collected by the Yemeni government.

Zambia – In 2015 Zambia announced that they would be phasing in biometric National Registration Cards for the 2016 election.

Zimbabwe – The government of Zimbabwe has ruled out biometric or electronic voting in the country’s 2018 elections, but will proceed with biometric voter registration this year.

  • Compulsory Biometric ID Announced by European Commission: 17 Apr 2018. The European Commission has announced plans to make biometric ID cards compulsory across the bloc which will allow authorities to bar “terrorists and criminals” from accessing money and other services. Plans to introduce mandatory ID cards across all 28 EU member states — including Britain — have been in development for more than two years in Brussels as part of the Commission’s goal of building an effective “security union”, Die Welt reports. Set to be equipped with data including the holder’s fingerprint, the cards would be designed to tackle identity fraud and make it harder to falsify documents, according to Migration, Home Affairs and Citizenship Commissioner Dimitris Avramopoulos. “We have to tighten the screws until there is no room left for terrorists or criminals and no more means for them to carry out attacks,” he told the German newspaper on Monday. “This means that they must be barred from accessing money, counterfeit documents, weapons and explosives, and at the same time prevented from being able to cross our borders undetected.” Speaking in Brussels last month, the Greek commissioner declared that Europeans will continue to be massacred in terror attacks on their own soil “for years to come”.
  • Millennials disrupting security landscape: study. By Julia Limitone Published March 08, 2018 Cyber Security FOX Business. Millennials are moving away from passwords, a recent study focusing on biometrics conducted by IBM showed. IBM surveyed nearly 4,000 adults from across the U.S., Asia Pacific, and Europe and found while 75 percent of young adults are comfortable using biometrics, less than half are using complex passwords and 41 percent reuse passwords. “Millennials are actually leading the way towards us moving away from [passwords],” IBM Security vice president Caleb Barlow said to FOX Business’ Maria Bartiromo on “Mornings with Maria.” The study also found 67 percent are comfortable using biometrics today, while 87 percent said they will be comfortable using these technologies in the future. “It’s the combination of something I know, like a password. Something I have, like your phone and something unique about you like your face or your fingerprint,” Barlow said. “You combine those three together then you’ve got a really robust security posture versus just relying on a password alone.”
  • Biometric Authentication: The Wave of the Future: Financial institutions and businesses are incorporating biometric authentication to facilitate payments. Biometrics describes the unique biological measurements of a person that can be digitized and turned into a traceable record. Some of the most common types of use are fingerprint scanners, voice verification, or retina and vein scans. Biometrics is slowly being incorporated into our everyday lives. It has been incorporated so brilliantly that we almost don’t even notice it. Every fall when the new Iphone is revealed people wait with baited breath to snatch it up and experience all the new techiness they’ve installed. We get to enjoy that techiness with fingerprint recognition in every release since the Iphone 6. Android phones are equipped with facial recognition that allows the phone to identify the face of it’s owner to enable the unlocking of the phone. But we are not just using it to unlock our phones. We are using it to make our payments too. Think about the App store and Itunes purchases. All you have to do is confirm your purchase by allowing them to identify you with the touch of your thumb to the scanner on your phone. What about ApplePay? It’s marketed to the public as a convenience to keep you from having to carry around your credit card and also protect you from thieves scanning your card while it sits quietly in our purse, stealing the information and creating a duplicate, but this is biometrics at work.
  • MasterCard adopted their new MasterCard Identity Check dubbed ‘selfie pay’ which basically allows their consumers to confirm an online payment by showing their face to their smartphone’s camera. They have also included the option of fingerprint authentication instead if you are not comfortable with sending them your mug shot. Selfie pay rolled out all over Europe last year and is supposed to begin being available here in the U.S. early this year. MasterCard believes this will not only make it more convenient for customers but also mitigate the “risk of fraud” for card-not-present purchases.  More and more we are moving away from carrying our cash and credit around with us to pay for things. Consumers want their purchases to be quick and hassle free. Biometrics was listed as the number one technology to transform e commerce in a report the “Top 10 disruptive technologies in fintech: 2016”, released by Juniper Research last year. As we continue to see advances in biometric technology you can be sure it won’t be long before biometrics are utilized regularly in the payments world. In fact, it is already being used by some progressive banks abroad.  Japan has installed biometric facial recognition capabilities in over 80,000 of their branch ATM machines. And at Barclay’s Bank corporate customers provide finger vein authentication to prove their identity. Students at Lund University in Sweden can enroll into a system where they use a scan of their handprint to purchase items on campus.
  • India is well on their way to becoming a cashless society. Almost every single one of India’s 1.3 billion citizens have registered their biometric data under the government’s unique identification program. After submitting their personal information along with all ten fingerprints, both iris scans, and a facial photograph they are given a 12 digit number called Aadhaar. Their Aadhaar can then be used as a permanent financial address, all of this free of charge by the way. The governing authority states that their “Aadhaar identity platform is one of the key pillars of the ‘Digital India’, wherein every resident of the country is provided with a unique identity……and is by far the largest biometrics based identification system in the world.” One of the biggest threats to identity theft is having your password hacked and giving all of your personal information to the hacker. If they can figure out your passwords they can get access to credit card numbers, bank account information and more. But hackers can’t duplicate you. You are unique, your fingerprint, your face, your iris cannot be duplicated. And because this unique data is stored locally on your device it is considered generally safer than if stored on a server. Consumers like convenience but are still not willing to risk security.
  • Last year Visa Inc., conducted a study throughout Europe to find out how consumers felt about biometric technology and it’s safety. The study found that 62% of adults would feel secure using biometric technology as an authentication method to confirm their identity when making a payment using their mobile device. The study also revealed that fingerprint recognition was the most preferred biometric authentication method by consumers due to ease of use. Because biometrics are so unique they also come with their own set of unique security challenges. While the data is more protected by being stored locally in a secure part of the phone it is still at great risk. Biological identifiers are each unique and permanent making them very valuable. The very uniqueness of the data itself makes it very attractive to hackers and where there is a will there’s a way. If a hacker were to get ahold of this data or find a way to bypass the authentication, you could change passwords but you can’t just go out and get a new face, or new fingerprints. For this reason it’s best to use biometrics along with other identifying factors. This can be things like geolocation technologies, use of an additional authentication method such as a password or the device itself.  There is concern that there is too much “big brother” and people are afraid of being tracked and watched at any given moment. As this new technology advances and is being adopted in the payments industry financial institutions have an obligation to educate their customers on the new technology they have to offer, the general functionality of the products and what kinds security features and steps have been taken to protect them.

5. Globalized and interconnected, networked data warehousing and information technology systems.

Leveraging Biometrics to Secure Big Data: DANNY THAKKAR. In the present era of technology, security of data is a very important concept. The information technology development has transformed the way data is processed and nearly all of real life data is now processed electronically. This has resulted in a tremendous amount of digital information being generated on a daily basis and led to the emergence of a very popular technology and concept known as Big Data. Big Data has been utilized by large companies, e-commerce giants as well as government projects. There can be many sources of big data which includes the data arising from online transactions, pictures, posts, videos, audios, emails, medical records, search interrogations, science applications and social networking interface. Another source of big data includes the data resulting from the transfer management of devices such as smart phones.

So what actually is Big Data? The term “Big Data” is used to describe any massive amounts of structured, semi-structured or unstructured data. Big Data essentially means data that is large in volume. Companies like Amazon, Facebook, Google, Twitter and government projects like digital identity cards maintain large volumes of data. All these entities maintain a large volume of user database and it continues to grow. Therefore, security of big data is considered to be very important and a lot of research work is actively conducted to tackle the security issues in big data projects. The use of biometric technologies in big data projects will help to create a secure database. Until 2010, the term “Big Data” was quite unknown but today it is touted as the latest technology trend. Its role as a factor in production, market competitiveness and growth is continuously increasing and big data is now being adopted by everyone from product vendors to large scale outsourcing and cloud service providers. Big Data is making inroads into all areas of our digital life and transforming our day-to-day online activities. The big data concept is based on extracting business value from a high volume, variety and velocity of data in a timely and cost-effective manner. This 3-v model is used by most analytics to define big data. The first aspect is volume and includes the large quantities of data that need to be harnessed to improve decision making across the organization. Variety involves handling the complexities of a range of new and emerging data sources such as the data generated from social media, location data from smartphones, public data available online etc. The third aspect is velocity that refers to the speed at which the data is disseminated or the speed at which the data gets updated or refreshed during cyclical variations.

A number of challenges must be overcome to reap the benefits of big data. As big data handles large amounts of data with varying data structures and real-time processing, the most important challenge is to maintain data security and adopt proper data privacy policies. There is an urgent need to implement strict mechanisms that ensure data security as well as conform to the rising quality expectations of the involved stakeholders. The risks to big data implementation should not be underestimated. A big data environment consists of any number of stakeholders compiling, storing and analyzing data for any number of different reasons. Thus there is a strong need to prevent misuse of data so that people’s trust in digital channels is not broken. Biometrics is one such strategy that can respond to this digital revolution and reduce security risks significantly.

We will highlight in this section how biometrics can be leveraged to secure big data. We will also discuss the process of biometric scan and the technology that is used in big data projects. The recent years have seen a steady increase in the number of computer and cyber-crimes and it has become a serious problem for the government, public and businesses. In order to counteract these cyber-crimes, it is crucial to capture digital evidence and thus the focus is on how to obtain such evidence. However, users do not host their data themselves and it has become increasingly popular among users to use a third party data service provider to store their data and emails. In some cases, a large server could also be shared among many different users which increase the difficulty in capturing data for investigation.

The problem is further amplified in a big data environment. Big Data technology stores data in a distributed manner that may involve a large number of servers and storage devices. Furthermore, these storage devices could be remote as well and therefore traditional forensic technique may not be applied very easily. For example, the huge volume of data and the distributed manner of the storage devices makes it extremely difficult to clone a copy of data from the storage devices. So this introduction of big data technology and the need to move such information throughout an organization has also exposed a lot of vulnerabilities. This influx of big data that is valuable to organizations has now become a massive target for hackers and other cyber criminals.

This data which was earlier unusable is now valuable to organizations. Hence such data is subjected to privacy laws and compliance regulations and must be protected. Biometrics offers the highest form of security, accuracy and privacy due to the very fact that it is based on the inherent characteristics of individuals. These characteristics may include iris, fingerprints, voice etc. and acts as a strong deterrent to hacking attacks. Biometric traits are extremely difficult to replicate and is the most accurate method known to verify individual identity. We can thus conclude that biometrics can play a vital role to maintain privacy and provide a highly secure environment for big data projects. To understand how different biometric modalities can be used in big data projects, we will look at one of the most ambitious big data projects. The Aadhar project is a combination of big data and biometrics that is working to build an identity verification database of the billion Indian residents. This is the world’s largest biometric database and aims to provide resident with a unique identification number that will help them access government welfare and services. This project uses a combination of iris scan and digital fingerprints for each resident.

Retina scan

Let us understand how retinal scan works in big data projects. Iris technology is the primary technology behind retinal scan and the whole scanning process is subdivided into three key processes namely image/ signal gaining and dispensation, picture and identical process. The first stage of retinal scan is image acquisition in which the user spots his or her eye adjacent to the lens and also must remain perfectly still at this point. The user’s retinal image will be captured and thereafter converted to the desired digital format. In the picture phase, unique features of the retina is extracted and stored in a template database which contains the unique information for each user. In the identification process, the existing template is matched with the current data captured by the sensors. If there is match between both the scans, the user is authenticated successfully.

Fingerprint scan

Fingerprint scan is a very widely used biometric technique and plays a key role in maintaining the privacy and security in various industries. Fingerprint biometrics has also been extremely helpful in the field of forensic science to identify criminals. In our example of big data project i.e. Aadhar, fingerprint biometric is used to store the information of each citizen by scanning their fingers and thumbs for future references. The fingerprint scanning process that is used in Aadhar big data project has two parts – enrollment and authentication. A common database is maintained in both these key processes. The enrollment process captures snapshots of user’s fingerprints, extracts the special features of fingerprints from these snapshot images and stores this information in a database. A fingerprint sensor is used to capture the images along with a feature extraction function. The feature extraction works like encryption for each object and the data of each object is associated with a unique id and stored in the database. The main key process in authentication is matching of data objects. When an already enrolled user of the Aadhar scheme wants to access a service, he or she scans his fingerprint. This information again goes to the feature extraction phase and is decrypted which then gets checked in the existing template database by the matching function. If a match is found with the current fingerprint scan, the user is successfully authenticated. In this article, we have discussed how biometric devices and technologies can be used in big data projects for improving security and privacy. Fingerprint and retina scan are the popular biometric technologies that are adopted by many organizations to maintain their user data.

6. Artificial Intelligence (A.I.), Robotics, 3-D Manufacturing Technology.

 Artificial Intelligence (A.I.) Developments:

  • Inside the bizarre human job of being a face for artificial intelligence: The avatar for AI technology Amelia (right) is based on Lauren Hayes (left). (Courtesy of IPsoft) (Excerpts) … Until she put ‘Amelia’ in a search window long after the project had wrapped, however, she hadn’t imagined a fully animated version of her likeness—or that it would be programmed to converse with humans. “It was really creepy,” she says. “I didn’t imagine it would be so realistic. I didn’t realize it would talk or have motion.” That was Amelia 1.0. Later versions of Amelia will be even more realistic. For Amelia 3.0, which hasn’t launched yet, IPsoft flew Hayes to Serbia, to a studio that specializes in making digital characters for movies and video games. This time, in addition to the “death star” 3D body scanning, the studio cataloged Hayes’ movements. She spent a day doing, she says, “basically anything anyone could ever ask Amelia to do.” When prompted, she pretended she had just seen Brad Pitt, for instance, and that she had just seen her best friend. Dots on her face helped cameras track her specific expressions, which will be used to help animate Amelia’s face in real time. Outside of the death star, a movement suit with motion-capture sensors mapped her mannerisms and actions.
  • What is the point of making Amelia’s avatar so realistic? Or creating a human persona for her at all? When you talk to somebody, there is all sorts of non-verbal communication. The avatar itself helps with empathy. If the end user feels like they’re being heard and understood, they’re more likely to engage further and in more length. And that allows Amelia to grasp the intent of what the user is trying to say.” The avatar itself is programmed to react to human conversations with appropriate expressions and actions (so Amelia doesn’t smile, for instance, when an insurance client explains that they’ve just been diagnosed with a terrible disease).
  • IPsoft isn’t the only company that goes to great lengths to make its automation technology seem more relatable–whether that involves coming up with a backstory, mimicking tone and emotion in speech, or making their avatars actually look humanReardon says that the humanness of Amelia is partly intended to help workers feel more comfortable interacting with her. “They won’t feel, do I need an instruction manual to work with an AI? We all instinctively know how to communicate with each other well.” Most of Amelia’s appearances do not come with the full animated avatar. Only in special implementations, such as at a customer service kiosk, does Amelia’s full life-like avatar make an appearance. IPsoft is working with some clients to create customized versions of Amelia’s avatar, for instance. The avatar based on Hayes is IPsoft’s branded version of the technology, and it helps position the way that companies think about and introduce it. That position is going to get more realistic. Edwin van Bommel, IPsoft’s chief cognitive officer, says that the company is careful to avoid the “uncanny valley,” the point at which Amelia is so realistic, but still slightly off, that it’s creepy. But it’s a moving target,” he says. Culture is getting accustomed to the idea of human-looking artificial intelligence.
  • In version 3 of Amelia, her face will move in more ways and be so detailed that you can see her pores. Like Hayes’ face and all human faces, it will be slightly asymmetrical. “If I filmed Lauren and Amelia at the same time, and had them walk across the screen, you wouldn’t be able to tell the difference between the two of them,” Reardon says. Since most phones and computers can’t render an image that detailed, especially in real time, that won’t be the version of Amelia users see at the 50 global companies where she’s deployed. Most likely, it will be used in demonstrations like the game show between Amelia and Hayes. On stage, Hayes easily responds to quiz questions faster than Amelia, and with more natural, human language. When their photos look exactly the same, in this way, it will still possible to tell Hayes and Amelia apart­—at least for now.
  • Marilyn Monroe to be brought back to life, in digital avatar: The iconic actor who died from apparent drug overdose is being brought back to live using computer wizardry. Fans of the iconic Monroe can rejoice as she is being brought back to life with latest technology, using a ‘digital double.’ The movie icon who died from an apparent drug overdose in 1952, aged just 36, is being brought back to life, thanks to computer wizardry. But a new film of her life is in the pipeline using a Marilyn lookalike and the cutting-edge technology featured in Hollywood blockbusters. Actress and model Suzie Kennedy was turned into a Marilyn avatar at the world famous Pinewood Studios, home of Star Wars and James Bond. The 41-year-old actor spent hours having her face and body scanned to produce a ‘digital double’ which will play the part of the troubled star in the movie. To make the digital Marilyn, Suzie had more than 3,000 photos of her face and body taken, working with Amanda Darby, head of Pinewood 3D and had to stand on a platform surrounded by 181 cameras snapping every inch of her.  Markers were drawn on Kennedy’s body and another 60 cameras were used to pick up her facial expressions. She then had a motion capture session with Phil Stilgoe of Centroid, experts in the field, in which she moved about in a bodysuit with a helmet and camera attached to map all her movements.
  • Fake Video Could Make You Question Everything You See: “The idea that someone could put another person’s face on an individual’s body, would be like a homerun for anyone who wants to interfere in a political process. This is now going to be the new reality, surely by 2020, but potentially even as early as this year.” — Senator Mark Warner (D-VA). New technology with the ability to create hyper-realistic fake videos has the potential to wreak havoc on the political landscape, lawmakers and technology experts say. The tech allows people’s faces to be superimposed onto different bodies in other videos. Different technology can also allow facial expressions to be altered. Currently, fake video technology requires manipulation of existing video footage of a person, and cannot create fake video from scratch with just a picture.  The combination of the different emerging technologies means it is highly likely we will soon see videos of public figures saying and doing things which never happened, that are all but indistinguishable from the real thing. The website deepfakes.club offers tutorials to anyone with an internet connection on how to create fake videos. Nor are government attempts to develop reliable ways of authenticating content likely to be effective. “We all will need some form of authenticating our identity through biometrics. This way people will know whether the voice or image is real or from an impersonator,” Congressman Ro Hanna (D-CA) told The Hill.
  • Expert warns of “terrifying” potential of digitally-altered video: Alec Baldwin’s “SNL” act as Donald Trump was digitally altered with the President’s face to create a fake Trump debate performance. Alec Baldwin is to some a perfect stand-in for President Trump. But in a digitally-altered video online, the president’s face has been digitally stamped onto Baldwin’s performance. It’s part of a wave of doctored audio and video now spreading online. “The idea that someone could put another person’s face on an individual’s body, would be like a homerun for anyone who wants to interfere in a political process,” said Virginia Senator Mark Warner. He believes manipulated video could be a game-changer in global politics. “This is now going to be the new reality, surely by 2020, but potentially even as early as this year,” he said. “Deepfakes” is the anonymous YouTuber who has made fake videos of President Trump, Hillary Clinton and Vladimir Putin, based off of performances by the cast of “Saturday Night Live.” In a message to CBS News, he said he does it for “fun.” And though he sees the potential for fake news, he adds: “People will have to adapt as the tech is here to stay.” Hany Farid runs a lab at Dartmouth College aimed at exposing digital fakes. Correspondent Tony Dokoupil asked Farid, “Are we ready for this?”
  • “No. We are absolutely not ready for this. We are absolutely not ready for it,” Farid replied. “On so many different levels, we’re not ready for it.” For starters, Dokoupil asked Farid to make a fake video. “I want to replace your face with Nicholas Cage’s,” he said. Why Nick Cage? “Just because it’s awesome,” Farid laughed. “No other reason.” The result:  “You can look at that all day long, and that, I tell you, is a pretty compelling fake,” Farid said. The method, recently published online by an anonymous developer, is one of several that Farid is tracking. This program demonstrated in the video below can change facial expressions in real-time. And there is an Adobe program that can create new audio from written text. “Right out of the gate, that’s terrifying,” Farid said. “I mean, that is just terrifying. Now I can create the president of the United States saying just about anything.” Adobe calls this an “early-stage research project.” While the company acknowledges the potential for “objectionable use,” it believes “the positive impact of technology will always overshadow the negative.” All these methods have legitimate uses in digital video and design. But Farid worries they’ll be weaponized, too. “I think the nightmare situation is a fake video of a politician saying, ‘I have launched nuclear weapons against a country.’ The other country reacts within minutes, seconds, and we have a global nuclear war,” Farid said. His lab is developing tools to quickly identify fakes. But Farid suspects this is just the beginning of a longer struggle. “We have a ‘fake news’ phenomenon that is not going away,” he said. “And so add to that fake images, fake audio, fake video, and you have an explosion of what I would call an information war.” 2018 CBS Interactive Inc. All Rights Reserved.

Robotics / Animatronic Developments:

Robotics is the branch of technology that deals with the design, construction, operation and application of robots and computer systems for their control, sensory feedback, and information processing. These technologies deal with automated machines that can take the place of humans, in hazardous or manufacturing processes, or simply just resemble humans. Many of today’s robots are inspired by nature contributing to the field of bio-inspired robotics. The goal of creating human-lke expressive robots that would one day become a ‘relationship machine’ capable of understanding your thoughts and emotions.

3D Manufacturing Developments:

3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file. The creation of a 3D printed object is achieved using additive processes. In an additive process an object is created by laying down successive layers of material until the object is created.

Ten (10) feet high? That is big enough to build an exact replica or ‘likeness’ of someone big!

Examples of 3D manufactured facial images of normal human beings. They are realistic down to the freckles and wrinkles. These pictures showcase the exactness or the ‘likeness’ of the original human subject.

3D manufacturing is one tool being used to create pagan gods:

The World Government Summit recently held a meeting in Dubai, bringing together some of the most important leaders in government and business to discuss international problems. This year (2017),  it featured a reconstruction of the Arch of Palmyra, the Roman triumphal arch that once welcomed travelers to the ancient Temple of Baal in the Syrian outpost of the empire. Baal worship featured rites of child sacrifice and sexual immorality. The reproduction of the Arch was first presented in April last year at London’s Trafalgar Square for the United Nations Educational, Scientific and Cultural Organization (UNESCO) World Heritage Week. The unveiling coincided with the most important pagan holiday of the year, Beltane, ushering in a 13-day period known in the occult as “the Blood Sacrifice to the Beast”, which was traditionally celebrated with child sacrifice and bisexual orgies.

3D Printing to Preserve Heritage: Replica of Palmyra Arch Draws Millions of Visitors

The United Arab Emirates, the Italian mission to the United Nations and the Institute for Digital Archeology have re-created a statue of the goddess Athena which once stood in Palmyra, according to Breaking Israel News. The exhibit, titled “The Spirit in the Stone,” is being hosted at the United Nations headquarters in New York City. It’s another move by globalist organizations to honor pagan deities, months after the reconstructed “Arch of Baal” went on a world tour, including being placed outside the G7 meeting of the world’s industrialized nations. Joseph Farah, author of “The Restitution of All Things: Israel, Christians and the End of the Age.” States, “In fact, the gods of paganism are actually demons, according to the Bible. It’s not something to be played with. “The question confronting us right now is: Why would the United Nations be involved in resurrecting these occult images and icons of the past? Do they not understand what this represents – the false gods of child sacrifice and all kinds of abominations and perversions?” Rabbi Elad Dokow, the head rabbi and lecturer at Israel’s Technion Institute of Technology, was not surprised that the United Nations would feature a display of pagan symbols. “There is currently an unmistakable rise of paganism and idol worship in the world, more than any other religion, and it is naive to believe this display is disconnected from this phenomenon,” Rabbi Dokow told Breaking Israel News. “Paganism creates the ability for each man to create his own truth, as opposed to Judaism and Christianity, which state that there is an objective truth man must abide by. The UN, like paganism, is a place of subjective reality created by a vote.” “What we are seeing in the world today is that every place Christianity grows weak, paganism and idolatry grow stronger, and where Christianity disappears, horrible things happen.” Joe Kovacs, author of “Shocked by The Bible 2,” says the whole sad spectacle is part of an old story. “The promotion of pagan gods is certainly nothing new, and it again shows we’re all living in what I call ‘Opposite World,’” he explained. “It’s a world where most people do the very opposite action of what God has instructed. Our Creator tells us to have no other gods but Him, but folks do the opposite, honoring false gods.

The statue is believed to represent the goddess Al-lāt, one of the pre-Islamic deities worshiped in the region; the figure likely was first associated with Athena when the city was under Roman rule. As with the entire exhibit, the statue’s creation resulted from a collaboration among Dubai Future Foundation, the Permanent Mission of Italy to the United Nations, and the Institute of Digital Archaeology at the University of Oxford. Whether Al-lāt or Athena, the statue is the centerpiece of the exhibit. It appears that the negative feedback about the exhibit has an Abrahamic bent, with a story in Breaking Israel News being quoted in most versions. In that article, a rabbi interviewed discussed why the display of Pagan symbols is problematic in his view: “Paganism creates the ability for each man to create his own truth, as opposed to Judaism and Christianity, which state that there is an objective truth man must abide by. The UN, like paganism, is a place of subjective reality created by a vote.” Echoing both that concern and the position of some Abrahamic theologians that this exhibit is part of a prophesied “end of days.”

On June 18, 2004, an unusual new landmark was unveiled at CERN, the European Center for Research in Particle Physics in Geneva — a 2m tall statue of the Indian deity Shiva Nataraja, the Lord of Dance. The statue, symbolizing Shiva’s cosmic dance of creation and destruction, was given to CERN by the Indian government to celebrate the research center’s long association with India.

In choosing the image of Shiva Nataraja, the Indian government acknowledged the profound significance of the metaphor of Shiva’s dance for the cosmic dance of subatomic particles, which is observed and analyzed by CERN’s physicists. The parallel between Shiva’s dance and the dance of subatomic particles was first discussed by Fritjof Capra in an article titled “The Dance of Shiva: The Hindu View of Matter in the Light of Modern Physics,” published in Main Currents in Modern Thought in 1972. Shiva’s cosmic dance then became a central metaphor in Capra’s international bestseller The Tao of Physics, first published in 1975 and still in print in over 40 editions around the world. A special plaque next to the Shiva statue at CERN explains the significance of the metaphor of Shiva’s cosmic dance with several quotations from The Tao of Physics. Here is the text of the plaque: Ananda K. Coomaraswamy, seeing beyond the unsurpassed rhythm, beauty, power and grace of the Nataraja, once wrote of it “It is the clearest image of the activity of God which any art or religion can boast of.” More recently, Fritjof Capra explained that “Modern physics has shown that the rhythm of creation and destruction is not only manifest in the turn of the seasons and in the birth and death of all living creatures, but is also the very essence of inorganic matter,” and that “For the modern physicists, then, Shiva’s dance is the dance of subatomic matter.” It is indeed as Capra concluded: “Hundreds of years ago, Indian artists created visual images of dancing Shivas in a beautiful series of bronzes. In our time, physicists have used the most advanced technology to portray the patterns of the cosmic dance. The metaphor of the cosmic dance thus unifies ancient mythology, religious art and modern physics.”

UNESCO funded yet a third project that replicated the Lion of al-Lat which is an ancient statue that stands almost 11 feet tall and weighing 15 tons. Early pagans believed the lion was the consort of the goddess al-Lat. It is believed al-Lat was the continuation of the earlier Mesopotamian goddess Ishtar Inanna; the goddess of sex and, in particular, extra marital rela


I believe there is a very compelling case of evidence that suggests most of the technology is in place today to create an “image” in the likeness of the beast.

Moveable, robotic, animatronic skeletal infrasture


Exact 3D manufactured skin and facial likeness


Digitized, voice-synthesized speech of the original


Aritificial intelligence for “intelligent” speech and emotive patterns.

= An IMAGE made in the beast’s “likeness. “

“saying to them that dwell on the earth, that they should make an image to the beast … and he had power to give life unto the beast , that the image of the beast should both speak…” (Revelation 13:14-15). (Emphasis added).

Whether the image is in the form of a ten (10) foot, 3D manufactured replica of the beast, or of  a digital avatar or digitized replica of the best that could be used in communcations, everything needed to pull these deceptions off is converging. Even a life-like(“make an image of the beast”), robotic or animatronic machine that is exquisitely detailed with 3D rendered skin, artificial intelligence for speech and emotive reactions could conceivably deceive people who are not remotely familiar with these technologies.

The technologies indicated above are are either already developed or coming to be, and are CONVERGING to enable men to make an extremely lifelike (false) image of the beast possible.

Leave a Reply