Publication Cover

Prometheus

Critical Studies in Innovation
Volume 24, 2006 - Issue 4: National Security
107
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Historical Lessons on ID Technology and the Consequences of an Unchecked Trajectory

Pages 365-377
Published online: 23 Nov 2006
 

Abstract

This paper traces the use of identification techniques throughout the ages and focuses on the growing importance of citizen identification by governments. The paper uses a historical approach beginning with manual techniques such as tattoos, through to more recent automatic identification (auto‐ID) techniques such as smart cards and biometrics. The findings indicate that identification techniques born for one purpose have gradually found their way into alternate applications, and in some instances have been misused altogether. There is also strong evidence to suggest that governments are moving away from localized identification schemes to more global systems based on universal lifetime identifiers.

Notes

1. A. Delbridge et al. (eds), ‘Identification’, in Macquarie Dictionary, Macquarie University, Sydney, 1998, p. 1062.

2. Ibid.

3. Britannica, ‘Tattoo’, The New Encyclopaedia Britannica Micropaedia, Helen Hemingway Benton, Sydney, Vol. IX, 1983, p. 841.

4. C. Grognard, The Tattoo: Graffiti for the Soul, The Promotional Reprint Company, Spain, 1994, pp. 19, 21, 25.

5. T. Cohen, The Tattoo, Savvas, Sydney, 1994, pp. 25, 32.

6. M. G. Michael, The Number of the Beast, 666 (Revelation 13:16–18): Background, Sources and Interpretation, MA (Hons) dissertation, Department of History, Philosophy and Politics, Macquarie University, Sydney, 1998.

7. Herodotus, The Histories, Penguin Books, London, 1972, p. 282.

8. Cohen, op. cit.

9. U. E. Paoli, Rome: Its People, Life and Customs, Bristol Classical Press, London, 1990, pp. 138–40.

10. Grognard, op. cit.

11. E. Black, IBM and the Holocaust, Little, Brown and Company, UK, 2001, pp. 22, 58.

12. M. Kitchen, Nazi Germany at War, Longman, Essex, 1995, p. 202.

13. Grognard, op. cit.

14. P. Levi, The Drowned and the Saved, translated by Raymond Rosenthal, Summit Books, London, 1998, p. 118f.

15. R. J. Lifton, The Nazi Doctors: Medical Killing and the Psychology of Genocide, Basic Books, New York, 1986, p. 165.

16. M. Dery, Escape Velocity: Cyberculture at the End of the Century, Hodder and Stoughton, London, 1996.

17. C. P. Jones, ‘Stigma: tattooing and branding in Graeco–Roman antiquity’, The Journal of Roman Studies, 77, 1987, pp. 148–50.

18. J. Ellul, The Technological Society, Vintage Books, New York, 1964, pp. 98–100.

19. W. Kuhns, The Post‐Industrial Prophets: Interpretations of Technology, Harper Colophon Books, New York, 1971, p. 94.

20. H. H. Scullard, Festivals and Ceremonies of the Roman Republic, Thames and Hudson, London, 1981, pp. 232f.

21. Paoli, op. cit.

22. Britannica, ‘Census’, The New Encyclopaedia Britannica Micropaedia, Helen Hemingway Benton, Sydney, Vol. II, 1983, p. 679.

23. Ibid.

24. G. D. Austrian, Herman Hollerith: Forgotten Giant of Information Processing, Columbia University Press, New York, 1982.

25. I. Castles, CDATA91 Data Guide: 1991 Census of Population and Housing, Australian Bureau of Statistics, Canberra, 1993.

26. C. T. Anglim, Religion and the Law: a Dictionary, ABC‐CLIO, California, 1999; R. C. van Caenegem, The Birth of the English Common Law, Cambridge University Press, Cambridge, 1988.

27. Paoli, op. cit.

28. DSS, ‘Understanding public perception’, Connecticut Department of Social Services [Online]. Available at: http://www.dss.state.ct.us/faq/disuppt.htm, accessed 23 November 1998.

29. NZCS, ‘Investigation of a unique identification system’, New Zealand Computer Society, May 1972, pp. 28–9.

30. A. S. Lunde et al., The Person‐Number Systems of Sweden, Norway, Denmark, and Israel, US Department of Health and Human Services, Maryland, 1980.

31. C. Clark, ‘The advance to social security’, Realities of Reconstruction 9, Melbourne University Press, Carlton, 1943, p. 9.

32. SSA, History: Social Security Online, Online. Available at: http://www.ssa.gov/history/ brief.html, accessed 30 March 2003.

33. C. Hibbert, ‘What to do when they ask for your social security number’, in R. Kling (ed.), Computerization and Controversy: Value Conflicts and Social Choices, Academic Press, New York, 1996, pp. 686–96.

34. A. Miller, The Assault on Privacy: Computers, Databanks and Dossiers, New American Library, London, 1971, p. 77.

35. B‐A. Lipetz, ‘Information Storage and Retrieval’ in Scientific American, W. H. Freeman, London, 1966, p. 191.

36. R. P. Kusserow, ‘The government needs computer matching to root out waste and fraud’, in R. Kling (ed.), Computerization and Controversy: Value Conflicts and Social Choices, Academic Press, New York, part 6, section E, 1996, pp. 653f.

37. D. B. Yoffie (ed.), Competing in the Age of Digital Convergence, Harvard Business School, Massachusetts, 1997, pp. 41–110.

38. NZCS, op. cit.

39. Hibbert, op. cit.

40. A. F. Westin and M. A. Baker, Databanks in a Free Society, Quadrangle Books, New York, 1972, pp. 396–400.

41. J. Smith, ‘Too many corpses to count’, Daily Record, Online. Available at: http://www.dailyrecord.co.uk, accessed 1 January 2005.

42. Paoli, op. cit.

43. Ibid.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.