Cyberattacks, one of the 5 worst global disasters, spread almost unstoppably.
Most attacks come in via personal mail at home or at work. The well-known hacker-buster-company “Cybereason” believes to have captured hackers who have been undisturbed inside global companies for a period up to 10 years stealing their business secrets. How do they manage and how do they get our passwords, biometric footprints or ID codes? Large global players such as a. Microsoft scans all our email. They scan billions of mail pr. week to detect hacker infiltration by checking habit changes in use. Hopeless resource demanding, and it is not pleasant that everything we send is scanned and stored.
We must all take control of our own situation.
When we use services like Facebook, Twitter or Bank ID, we consent to our photos and information being legally stored. In order to travel, we must also accept storage of our biometric data. Most countries, including Norway, require biometric imprints to obtain passports and visas. In India, most of the population has registered their biometric IDs to purchase national ID cards, and in China all are registered by biometrics in a performance system. Visitors to America must record all their fingerprints, face and iris prints in the US database. With the new Law “Cloud Act.” the public US can, when they need it, gain full insight into all US companies and their affiliates worldwide. The UN wants everyone to be registered biometrically before 2030 and in the past couples of years we have biometric registered over half of the world’s population. Our biometric footprints are publicly available to both the authorities and international corporations to identify us all. This is contrary to the GDPR, PDS2, privacy regulations and “Datatilsynet`s” recommendations.
Digital global bio-register as a global
The scary thing about all this personal biometric information stored all over is the danger of falling into the wrong hands. For example, if US databases are hacked, all the visitors’ biometric values can become merchandise on the “dark network”. Anyone who gets all their biometric information stolen would then be digitally dead and could not use their own biometric footprints anymore. The only way this information should be used is therefore for personal identification on travel, attendance at banks, insurance, or meeting with police and health care. In other words, it should work a bit like a digital global telephone directory. If biometric data can only be used for identification at attendance, they cannot be misused over the web, and then have no value for criminal hackers and public and bank cheaters and business abusers.
Cyberbiometry to fight cyberattacks.
We have created a Cyber-safe personal ID key for everyone to fight cybercrime and cyberattacks. When our biometric footprints are flowing around everywhere, legally or illegally, we will soon need a new personal-unique type of identification. One solution is a cyber-ID-key that generates unique codes based on our genetic footprint, not to be interchanging with or compromising our real biometric footprints. Then we can be authenticated safely wherever we go, without having to reveal or be confused with our real biometric ID values. The new cyber-biometric ID key must be a small, autonomous, wireless and universal digital key that can replaces all our house, job, car, boat and wireless and payment keys. It should also act as personal identification to authenticate your passport and national card on travel if local biometric readings are not available or out of service.
Do we get responsible use of artificial intelligence?
Artificial intelligence in use as machine learning, in education, for disease control, traffic safety, weather and environment control create huge amounts of data of our habits and personal way of lives. Large corporations and public actors promise to use artificial intelligence in a responsible manner, but unfortunately this is not possible. Nobody, either providers or users, has currently the ability to control and monitor the large supercomputer servers or all the information stored there. We, as users, must therefore not rely blindly on suppliers and public administration to be able to secure us, but rather do what we can to take control of our own information. We must be able to create a distinction between personal and socially necessary personal data. Then the GDPR, PSD2, the privacy regulations and the “Datatilsynet`s rules” have to be modernized.
Have a good and secure digital life.
Siv. Ing. Harald Marthinussen
CEO, PCU Company