OT: Digital Angel's new head mentions implant as benefiting e-business (.. that no man might buy or sell...)

greenspun.com : LUSENET : TimeBomb 2000 (Y2000) : One Thread

Stumbled on 1/7 press release.

Trained in Germany, BS in China, Dr. Zhou referrrs to digital demon uh I mean angel as having e-business benefits...

Inviting comments,

Hokie

============================

http://adsx.com/news/index.html

APPLIED DIGITAL SOLUTIONS HIRES DR. PETER ZHOU AS CHIEF SCIENTIST TO SPEARHEAD DEVELOPMENT OF DIGITAL ANGEL TECHNOLOGY

Company believes the implantable device will have applications in a variety of beneficial areas, including e-business security, health care and law enforcement

PALM BEACH, FLORIDA, JANUARY 7, 2000 -- Applied Digital Solutions, Inc. (NASDAQ:ADSX) today announced the appointment, effective January 17, of Dr. Peter Y. Zhou, a noted scientist and holder of numerous patents in the field of electronic detection systems, as its new chief scientist in charge of developing the recently announced Digital Angel technology.

Dr. Zhou is currently serving as Vice President of Technology at Sentry Technology Corporation based in Hauppauge, New York. Prior to this, Dr. Zhou held the position of Vice President, Technology, at Knogo North America.

Dr. Zhou has also been an Adjunct Professor at State University of New York (Old Westbury). Earlier in his career, Dr. Zhou was a Research Investigator at the University of Pennsylvania, and a Research Scientist at Max-Planck Institute in Stuttgart, Germany. He holds a Ph.D. in Materials Science from the University of Pennsylvania and a Master of Science degree in Solid State Physics from Beijing University of Science and Technology.

"Dr. Zhou brings enormous expertise to ADS, and especially to our Digital Angel R&D effort," said Richard J. Sullivan, Chairman and CEO of ADS. "Given Dr. Zhou's track record of success in developing related technologies, we're very hopeful that he will be able to help us speed the development of this potentially life-saving technology," he further stated.

In his new position, Dr. Zhou will serve as Vice President and Chief Scientist at ADS and as President and Chief Scientist of ADS's wholly owned subsidiary, Digital Angel.net, Inc. Commenting on his new position, Dr. Zhou said: "I'm excited about this opportunity. I believe Digital Angel will have many useful commercial applications in the e-business arena, as well as many applications in the area of health and safety. This truly is a new technology for the new millennium."

ADS announced on December 15, 1999, that it had acquired the patent rights to a miniature digital transceiver - which it has named Digital Angel -- that can be used for a variety of purposes, such as providing a tamper-proof means of identification for enhanced e-business security, locating lost or missing individuals, monitoring livestock, tracking the location of valuable property and monitoring the medical conditions of at-risk patients.

Under the terms of its agreement acquiring the patent rights to Digital Angel, ADS has the right to develop the device itself for all of its applications or to sublicense the development of specific applications to other entities.

The implantable Digital Angel transceiver sends and receives data and can be continuously tracked by GPS (Global Positioning Satellite) technology. The transceiver's power supply and actuation system are unlike anything ever created. When implanted within a body, the device is powered electromechanically through the movement of muscles, and it can be activated either by the "wearer" or by the monitoring facility. A novel sensation feedback feature will even allow the wearer to control the device to some degree. The "smart" device is also small enough to be hidden inconspicuously on or within valuable personal belongings and priceless works of art.

ADS is actively seeking joint venture partners to help develop and market the unique technology. The company hopes to have a prototype of the Digital Angel device available for testing by the end of this year.

For more information about the Digital Angel technology, visit Digital Angel.net, Inc.'s website at www.digitalangel.net.

Applied Digital Solutions, Inc. is an e-business to business solutions provider offering Internet, telecom, LAN and software services to a wide variety of businesses throughout North America. For more information, visit the Company's web site at www.adsx.com.



-- Hokie (Hokie_@hotmail.com), February 06, 2000

Answers

But I thought it was just to help missing children? heh

-- Hokie (Hokie_@hotmail.com), February 06, 2000.

Once this becomes widespread, the first thing a kidnapper will do is carve out the child's chip with his Bowie knife. Muggers will be cutting folks open to get their chip. Count on it happening.

Chipless Kook

-- Y2Kook (Y2Kook@usa.net), February 06, 2000.


---there are no depths that business will not stoop to to make money, nor that some dot com "investors" will go to either. It's disgusting. What more can be said. The implications are truly worthy of that phrase "digital demon". This device will be abused to the maximum amount, unless public outcry stops it. Perhaps an E-avalanche to the representative from the district where these headquarters for this "company" is located might be an appropriate first step. Just because humankind CAN accomplish some piece of technology is no reason to follow through with the development. Lame "assurances" that this technology won't be abused are not enough, it needs to be banned from production, my opinion. Of course, I feel like that with several different technologies. If anything sparks massive civil disobedience or more, this is way up in the list. I think it's time for that arizona initiative, dissolve the current government, re-form under constitutional guidelines, and require a return to privacy and born- with rights. This device will be required to be implanted in various human beings soon as production starts, of that I have no doubt, and then it's only a matter of time before it's required universally, for some vague reason or another, all will be excuses for complete big brother control. Welcome to the United China States, where you are as free as long as you are useful and do not speakout against the State.

-- zog (zzoggy@yahoo.com), February 06, 2000.

"digital demon"

heh

i really like that, hokie!

we should ALL start referring to it as such whenever speaking about it

if they want to implant these things....then maybe we should do a little implanting ourselves : )

-- mebs (andrea@mebs.lurking), February 06, 2000.


LOL all!

I've "heard" some SEaLS have them implanted already so their position and vital signs can be monitored during operations. I've read that they have a lithium battery, which concerns me cause if you remember high school chemistry then you know that if this battery were to rupture then it would create a "...grievous sore upon the men which had the mark of the beast, and upon them which worshipped his image (Rv:16:2)."

Remarkable coincidence...

-- Hokie (Hokie_@hotmail.com), February 06, 2000.



Oh Zog, there are 4 patents, and sizes range from a grain of rice to a grain of sand. Because these chips store electrical activity sponged off your muscles, they are able to translate signals. That thread on mind control stuff kinda raises the issue of these chips being able to transmit signals which will effect the host's uh mind, go figure? Spookey stuff, FWIW.

-- Hokie (Hokie_@hotmail.com), February 06, 2000.

"translate" should be TRANSMIT.

-- Hokie (Hokie_@hotmail.com), February 06, 2000.

You will be assimilated.

-- justme (justme@myhouse.com), February 06, 2000.

Hokie,

Thanks for the post(s).

Just me,

Assimilated - your right!

Anyone notice how the 'powers-that-be' want us all hooked up to the net?

Quote from John Koskinen; "We have created a jugernaut" referring to the systems put in place prepping for Y2k. Well, at least that's what they told us anyway.

Anyone else see that quote by him or take note of it ?

BTW, will the .gov 'stand down' from alert status post February 29 ? The systems will still be there won't they.

-- maid upname (noid@ihope.com), February 06, 2000.


"To Buy And Sell" update ?

Hokie,

Just stumbled on this story linked from WorldNetDaily

>http://www.asahi.com/english/asahi/0205/asahi020502.html

That chip will make id's very popular.

-- maid upname (noid@ihope.com), February 06, 2000.



Hokie, you read my mind...

This is truly indicative of "The Mark of the Beast".

-- LZach (lisa@texasnetworks.com), February 06, 2000.


maidup name's link:

NPA calls for stricter checks for online IDs The agency wants tougher measures to battle the expected increase in Internet-related crimes.

Asahi Shimbun

February 5, 2000

The National Police Agency on Friday asked that mandatory identity checks be part of a digital-signature bill to curb Internet-related crimes and prevent hackers from wreaking havoc on Web sites.

The agency also asked Internet service providers to improve their systems that check customer identities and preserve logs.

The bill, which will provide guidelines on digital signatures and verification systems, is being compiled by the Ministry of International Trade and Industry, the Ministry of Posts and Telecommunications and the Justice Ministry.

It will be submitted to the current Diet session.

A digital signature allows people to use the Internet to buy and sell goods and services. A third party verifies the identification.

The police agency is urging mandatory identity checks on people who apply for such digital signatures and verification.

The agency's request follows recent incidents of hackers rewriting central government Web sites and people committing online crimes by using stolen identifications and passwords.

While MITI says that companies should be the ones that decide how to operate their digital signature and verification systems, the police agency deems it necessary to prevent crime by mandating such identification procedures under law.

The agency predicts an increase in the number of crimes committed by people using others people's IDs on the Net.

The agency said 357 cases of so-called ``high-tech'' crimes-including bank employees manipulating company computers to steal money-were recorded last year, down by 58 from 1998.

However, the number of network-related crimes among the ``high-tech'' cases increased by 131 to 247 last year. These included swindling money or goods using false identity on the Net, as well as the distribution of child pornography.

-- Hokie (Hokie_@hotmail.com), February 06, 2000.


http://www.biometrics.org/html/standards.html

Human Authentication

- Application Program Interface: (HA-API) HA-API Version 2.0 Zipped Word version (138 kB)+

"THE DEPARTMENT OF DEFENSE HAS FUNDED THIS SPECIFICATION AS A RESEARCH PROJECT AIMED AT INTEROPERABILITY AND EASE IN IMPLEMENTATION OF BIOMETRIC ACCESS CONTROLS FOR U.S. GOVERNMENT AND DOD COMPUTERS. IT DOES NOT REFLECT U.S. GOVERNMENT ENDORSEMENTS OF HA-API COMPLIANT PRODUCTS OR ENDORSEMENT OF THIS SPECIFICATION OVER OTHER INDUSTRY GENERATED BIOMETRIC API STANDARDS. "

-- Hokie (Hokie_@hotmail.com), February 06, 2000.


Chips are the internal "samrt card" which offers maximum security when cross-verifying biometric data to confirm identity. If you want to learn more about how businesses are behind this, and HAVE been pushing for this, before lawEnforcement jumped on the bandwagon, then I have found a conference for you to attend NOW in Miami:

http://www.aliconferences.com/conferences/biometrics.htm

The 2000 Biometrics Summit Implementing the Practical Applications of Biometrics for the Next Millennium

February 7-9, 2000 Miami Florida

The industry forum featuring best practice examples and case studies from organizations who have successfully implemented Biometric identification systems, including:

Home Shopping Network Biometric Digest State Of Connecticut, Dept. Of Social Services City Of Baltimore Kpmg, Llp Visionics Corporation American Biometric Company Miros, Inc. Polaroid Corporation Nec Technologies Biometric Access Corporation Digital Biometrics Saflink Securcom The Association For Biometrics Sandia National Laboratories Bank United Gerber & Company, Llc I/O Software Bioapi Consortium

And Our Chairperson, Bill Rogers, Editor, Biometric Digest

Supporting Publications: AVANTI Access Control & Security Systems Integration

Free BioTrack software to all registered delegates. Over a $750 value!

Highlights Include:

Explore which Biometrics really work--and which are showing the most promise Achieve cost savings and increase efficiency by implementing Biometric applications Demonstrate proven results from your Biometrics investment Learn what consumers really think of Biometrics Evaluate the performance of a Biometrics system Integrate Biometrics into existing PIN/card systems Utilize Biometrics as a tracking and logistics tool Discover the ethical issues and how to avoid being perceived as "Big Brother" Develop seamless and total end-to-end business security via system solutions Uncover what is happening with BioAPI standards

---------------------------------------------------------------------- ----------

Dear Executive:

Biometric technology has been a long time coming. For several years now, industry observers have been predicting an explosion of biometric applications, which will forever banish the card and PIN. The reality has been subtly different, with a steady but relatively small stream of applications being configured and implemented, often in high security situations.

Biometrics are methods of using the human body (including iris scan, retina scan, finger scan, hand geometry, facial recognition, voice verification, and dynamic signature verification) to identify or verify an individual. Applications include data security, physical access and customer identification.

The idea of using your physical attributes--fingerprints, a voiceprint, or any of several other characteristics--to prove identity has a lot of appeals. Passwords and personal identification numbers (PINs) are fraught with problems. Biometrics offers solutions. Applications that are preparing to accept biometric data include computer networks, ATMs, cars, cellular phones,

and dozens of other types of embedded systems.

HOW WILL THIS CONFERENCE HELP YOUR ORGANIZATION?

This conference is designed to give you the chance to examine the practical application of Biometrics users, systems designers, and developers of Biometric security technologies. By attending this conference, users of Biometrics will learn to develop a viable action plan for implementing and adopting biometrics. Vendors, developers and integrators should be able to plan an allocation of future efforts and resources to best serve the market. "The 2000 Biometrics Summit" is packed with best practice case studies from companies who have already faced the challenges and identified solutions for implementing Biometrics. In addition, this conference will provide you with a clear understanding of key Biometric objectives, and let you see, first-hand, how these objectives can be met.

Our speaker platform will provide you with the insight you need to tackle even the toughest technical and political issues--and move forward. Learn from forward thinking organizations how you can build a reliable foundation for implementing Biometrics in your own organization. Hear first hand how:

CONNECTICUT DEPARTMENT OF SOCIAL SERVICES uses fingerprint biometrics to eliminate welfare fraud BANK UNITED is the first bank in the country to pilot an iris scanning ATM CITY OF BALTIMORE chose biometric technology over five years ago to increase security and reduce costs HOME SHOPPING NETWORK implemented one of the largest voice verification systems in the country And much more! This event is the ideal forum for you to share your experiences and challenges with others, and more importantly, to take home a series of proven methods, processes and approaches for achieving desired results from your Biometric initiatives. Benchmark with this wide variety of case studies and experts. Register yourself, and a team of key people today! I look forward to seeing you at this important industry summit in February!

Sincerely,

Bill Rogers, Editor The Biometric Digest Conference Chairperson

P.S. Get up to speed on Biometric technology and how to implement the right system in your organization by attending the Pre-Conference Workshop, "Understanding Biometric Technology and its Implementation!"

---------------------------------------------------------------------- ----------

WHO WILL ATTEND?

This conference has been researched and designed for executives interested in improving and enhancing their security initiatives from the following industries:

Security and Safety, Banking and Financial Services, Healthcare, Physical Access Control, Computer Security, Telecommunications, Law and Order, Government, Retail, and Electronic Commerce.

The greatest value will be realized by CEOs, CFOs, Presidents, Vice Presidents, Directors, Supervisors and Managers responsible for:

Security Administration, Operations, Data Processing, MIS, Credit Card/Debit Card, Access Control, Safety, Loss Prevention, Financial Management, Plant Operations, Information Security, Network Communications Security, and Physical Security. Plus all other End Users, Consultants, Designers and Developers of Biometric Security and Identification Technologies interested in how the latest Biometric developments can benefit their organizations.

Benefits of Attending Include:

Case Studies from Bank United, City of Baltimore, OHare International Airport and the State of Connecticut Hear what Wall Street thinks about the Future of Biometrics Learn what the BioAPI is doing to set standards in the Biometrics Industry View a showcase of a variety of Biometric Techonologies

Rave Customer Reviews from ALIs First Annual International Biometrics Summit

"Useful insight into an actual implementation scenario" -User Program Manager

"Good content, informative and well presented" -Assistant Project Director

"Very informative and useful" - Director of Law Enforcement Systems

---------------------------------------------------------------------- ----------

PRE-CONFERENCE WORKSHOP

Sunday, February 6, 2000 3:30PM-6:30PM

This pre-conference workshop is a basic tutorial on how to implement a successful Biometrics program in your organization. It will bring you up to speed on Biometric Technologies and give you a thorough foundation for the rest of the conference. Dont miss this great opportunity to jump-start your learning and network with your fellow conference attendees.

Biometrics Tutorial: Understanding Biometric Technology and its Implementation

This workshop is targeted at those with little or no previous experience with biometrics. It covers the basics of:

What are biometrics? How do they work? Biometric applications Selecting a biometric technology System requirements Implementation considerations Using multiple biometrics Performance factors Biometric standards Evaluation, Testing, and Certification Privacy and Ethics The workshop will be informal and interactive. It is a great opportunity to get a jump-start on the learning curve as you begin your foray into the world of biometrics.

Workshop Leader

Catherine Tilton, Project Manager SAFLINK

Spokesperson and Steering Committee Member, BioAPI Consortium

Mrs. Tilton is a systems engineer and project manager for SAFLINK Corporation. She is a member of the Steering Committee and spokesperson for the BioAPI Consortium. She worked for 2 years on the FBIs Automated Fingerprint Identification System Project. She has a MS in systems engineering from Virginia Tech and a BS in nuclear engineering from Mississippi State.

DAY ONE ~ FEBRUARY 7, 2000

7:30 Registration, Continental Breakfast & Exhibits

8:10 Conference Welcome

8:20 Chairpersons Opening Presentation

Biometrics 2000: An Overview Of Future Security Bill Rogers, Editor BIOMETRIC DIGEST

9:00 The Pinnacle Of Precision And Convenience: Iris Recognition Technology BANK UNITEDCASE STUDY

9:50 Morning Refreshment Break & Exhibits

10:20 Incorporating Biometrics Into Smart Cards: Delivering The Face On A Card VISIONICS CORPORATION

11:10 Biometrics Single Sign-On: How To Secure The Corporate Enterprise AMERICAN BIOMETRIC COMPANY

12:00 Luncheon

1:00 Biometrics And Their Benefits: A Case Study Of The City Of Baltimores Experience CITY OF BALTIMORE--CASE STUDY

1:50 How To Implement Facial Recognition Solutions: Critical Success Factors And Benefits MIROS, INC.

2:40 Afternoon Refreshment Break & Exhibits

3:00 Biometrics: Measuring More Than Just Security BIOMETRIC ACCESS CORPORATION

3:50 How To Use Finger Imaging Solutions To Attain The Ultimate In Access Control And Authentication NEC TECHNOLOGIES--FINANCIAL SERVICES PERSPECTIVE

4:40 How To Improve Your Customer Relationships With Biometrics HOME SHOPPING NETWORK--CASE STUDY

5:30 Chairpersons Recap And End Of Day One

DAY TWO ~ FEBRUARY 8, 2000

8:00 Continental Breakfast & Exhibits

8:20 Chairpersons Recap

8:30 Implementing The Security Access System At OHare International Airport SECURCOMAIRPORT CASE STUDY

9:20 How To Use Biometrics For Employment Background Investigations DIGITAL BIOMETRICS

10:10 Morning Refreshment Break & Exhibits

10:40 Biometric Standards: What Standards Exist, How Are They Evolving, And What Is Their Impact On The Biometrics Industry SAFLINK SPOKESPERSON AND STEERING COMMITTEE MEMBER, BioAPI CONSORTIUM

11:30 How Good Is It? Evaluating The Performance Of A Biometric System SANDIA NATIONAL LABORATORIES

12:20 Luncheon

1:30 Real World Biometrics Future Author of "Biometrics--Advanced Identity Verification" THE ASSOCIATION FOR BIOMETRICS--INTERNATIONAL PERSPECTIVE

2:20 Preventing Fraud With Biometrics: The State Of Connecticuts Experience STATE OF CONNECTICUT, DEPARTMENT OF SOCIAL SERVICES--CASE STUDY

3:10 Afternoon Refreshment Break & Exhibits

3:30 The Future Of Electronic Identification And The Role Of Biometrics POLARIOD CORPORATION

4:20 Biometrics: How The "Street" Views Biometrics GERBER & COMPANY, LLC--Wall Street Perspective

5:10 Chairpersons Recap And End Of Day Two

February 9, 2000 ~ INTERACTIVE CONFERENCE WORKSHOPS

These workshops are designed to take your conference experience to the next level. Workshops allow you to take the information you gained from the general sessions and identify and focus on your individual needs and applications. Make the most out of this conference by attending these highly interactive, hands-on sessions. Space is limited!

Morning Workshops ~ 8:30 Am To 11:30 Am ~ CHOOSE B OR C ~

WORKSHOP B: DEVELOPING ARCHITECTURE, API, ENCRYPTION AND SECURITY INTO YOUR EXISTING BIOMETRICS SYSTEMS

Security administrators considering biometrics as a way to provide better user authentication have more choices than ever before. Companies have begun to integrate various biometrics into their existing security systems. This workshop will explain how to implement and build biometrics technology to augment current security systems, while explaining specific issues, designed to benefit both technical and non-technical professionals. This information will enable developers to develop biometrics solutions without compromising the intended security enhancement. This workshop will be divided into sessions covering the following issues:

Developing a common methodology for software developers looking to integrate biometrics into their applications:

End-user education Making applications easier to use via Biometrics Client/Server programming issues to consider Common UI (User Interface) issues regarding Biometrics Developing biometrics to enhance your existing security:

Template storage and management issues Template encryption issues Security and integrity of biometrics data from source to output Potential security threats and solutions to them WORKSHOP LEADER:

William Saito is the President and CEO of I/O Software, Inc. I/O software designs and develops biometric and smart card driven security software and solutions. Applications range from user authentication, electric commerce, encryption, and computer access. A few of I/O Softwares clients include; Sony, Fujitsu, Toshiba, NEC, Mitsubishi, Microsoft, Siemens, Thomson, Citibank, and Chase Manhattan Bank.

~ Choose B or C ~

WORKSHOP C: HOW TO USE A BIOMETRIC STANDARD TO ASSURE SYSTEM SECURITY

Today, biometric systems are being widely developed and deployed to provide greater security to users, and there is an increased awareness of the value of biometric systems. Users and developers of this technology have also recognized the need for a biometric standard, and work on a defining standard is currently underway. The standard establishes an appropriate biometric model and the associated security requirements that will allow different biometric solutions to co-exist in the marketplace. The standard views biometric systems within a global user community, and it assures that the security of any one biometric

system will be unaffected by the security of any other biometric system. This workshop will cover the following topics:

Establishing a common biometric framework:

The Data Collection Subsystem The Transmission Subsystem The Signal Processing Subsystem The Matching Subsystem The Storage Subsystem Understanding the security requirements:

Injection of False or Replayed Biometric Data Synthetic Biometric Feature Attack Exposure or Loss of Biometric Data Registration of Individuals Using False Identities Finding Collisions Discussion of techniques includes:

Digital Signatures Message Authentication Codes Encryption Abstract Syntax Notation WORKSHOP LEADER:

Jeff Stapleton is a Manager with KPMG LLP in the Information Risk Management practice focusing on Secure Electronic Commerce and PKI services. He is also the chair of the ANSI/ASC X9F4 working group, currently developing the X9.84 draft standard Biometric Information Management and Security, and has participated in developing Financial Industries security standards with ISO TC68 and ANSI/ASC X9 committees, subcommittees, and working groups for over 10 years.

AFTERNOON WORKSHOP ~ 12:00 PM to 3:00 PM

WORKSHOP D: DEVELOPING AN END-TO-END SOLUTION FOR IMPLEMENTING BIOMETRICS IN YOUR ORGANIZATION

In this workshop, find out how to best implement a biometric project from start to finish that best meets your organizations needs. Step- by-step, this session will walk participants through the requirements for a successful biometric

project including:

Assessing the various technological options Determining user/company requirements Working within financial guidelines and constraints Through case study examples, participants will be led through each phase of a biometrics development and implementation as it pertains to the needs of an organization. Specifically, learn how to:

Identify your business and operational requirements Analyze your existing process to identify legacy requirements Design a system architecture open for future enhancement Satisfy user requirements Test your system Participants will leave with an action plan for implementing a biometric project in their own organization.

WORKSHOP LEADER:

Ron Gerber, Founder and President of Gerber & Company, LLC, a specialized mergers and acquisitions and financial advisory firm serving clients in the data communications, access control, information security, structured cabling and related low voltage fields. Mr. Gerber has been a financial advisor to a variety of organizations including; Cardkey Systems, Litecomm Supply Corporation, Servercast, Pittway Corporation, Harris Corporation, and Cosmocom.com.

About Your FREE BioTrack Software

All registrants will receive a free copy of BioTrack software. BioTrack is a biometrics evaluation tool, which can connect to a variety of biometric readers as well as card readers, keypads and other devices. BioTrack is an easy to use application suitable for Microsoft Windows 32 bit platforms such as Windows 95 / 98 and Windows NT. It can also create ID badges, and generate and print transaction reports. Register today and receive this software--valued at over $750.

About Our Supporting Publications:

Biometric Digest is an advertising-free technology newsletter dedicated solely to Biometric identification technology. You can obtain Biometric information from our web site at http://www.biodigest.com. To subscribe, please send e-mail with your name, title, company name and address, e-mail address, telephone, and fax to wrogers@anet-stl.com.

AVANTI: The independent and international journal for all things biometric, Avanti covers both the technical and broader business perspectives of using biometrics in a down to earth plain English manner. Previous Avanti features and other information may be found on the Avanti web site at www.biometric.freeserve.co.uk. To subscribe to this free, quarterly, electronic journal, please email the editor at avanti@biometric.freeserve.co.uk.

Access Control & Security Systems Integration magazine is the leader in providing news, information, exclusive research and support to the security industry. 100% of our subscribers personally request the magazine, and we are the only security publication that delivers an audit of Fortune 1,000 end-users in its circulation. For more information, visit www.securitysolutions.com.

SPONSORSHIP & EXHIBIT OPPORTUNITIES ARE AVAILABLE

This conference provides an excellent opportunity to market your products and services to a targeted Biometrics audience. Space is limited, so please call (312) 362-9100 and ask for our Sponsorship Manager today.

---------------------------------------------------------------------- ----------

REGISTRATION FEES

Conference prices include conference attendance, continental breakfasts, lunches, refreshments, a detailed conference workbook and all meeting materials.

Conference Only..........................$1,495

Conference Plus One Workshop...................................$1,895

Conference Plus Two Workshops..................................$2,195

Conference Plus Three Workshops..................................$2,295

Government Discount....................$200

Set of Audio Tapes (if attending the conference)...$295

Set of Audio Tapes w/Workbook if not attending the conference)...$495

Payment is due two weeks prior to the conference. If payment has not been received two weeks prior to the conference, a credit card hold will be taken to ensure your space.

Click here now to register online!

TEAM DISCOUNTS:

Groups of 2 or more from the same organization, registering at the same time, can receive an additional 10% discount. Groups of 4 or more receive a 15% discount. For groups of 6 or more, please call (312) 362-9100.

LOCATION INFORMATION:

Lodging arrangements and all sessions for the conference and workshops will be held at:

Sheraton Biscayne Bay Hotel 495 Brickell Avenue Miami, FL 33131 305-373-6000

A block of rooms has been reserved for delegates attending this event. To secure reduced rates, please call the hotel by January 5th and be sure to mention the Advanced Learning Institute and the conference name.

Click here now to register online!

1999 ) Copyright Advanced Learning Institute. All Rights Reserved.



-- Hokie (Hokie_@hotmail.com), February 06, 2000.


Since, I have studied the bible and other texts, you would have to tie me down to implant me. I don't want everyone knowing my every move or what I buy. Freedom, yes freedom is to important to loss. Don't ever give your freedom away. Freedom is your personal power, don't give it away.

-- ET (bneville@zebra.net), February 06, 2000.


ET, I'm with you on this, and that is why I pass on snips, so you and other concerned Christians can see how quickly this is becoming a conceivable threat, and we can share insights and interpretations on it all. For me, the bio data to buy/sell is a test to pull out of the system before the implant, but I really cannnot imagine how.

But the bio data is LEAD by the N_S_A and private as well as academic folks are there "by invitation" (see recent thread). If you read adsx and biometrics sites, you will see that bio requires a smart card to cross-verify, which today is implanted on the back of the right hand or forhead just under the hair line because these hapen to be the only places on the human body that the temp etc. sustain the chip for transmitting perforance.

-- Hokie (Hokie_@hotmail.com), February 06, 2000.


Congratulations Mr. and Mrs. Moron on the birth of your little bundle of joy. Now, please fill out these permission forms, required by law, while we wisk junior away to have his cirumcision and implantation procedures. CAN YOU SAY HOMEBIRTH AND MIDWIFERY IN THE 21ST CENTURY???

-- Breastfed is Bestfed (birth@thome.now), February 06, 2000.

Windows NT is capable of supporting biometric applications, retinal scan, finger print, etc.

-- snooze button (alarmclock_2000@yahoo.com), February 06, 2000.

For ET,

I'm glad you have studied the Bible adn even the other texts, but, I fear you have made a common error. As one of my favorite teachers is fond of saying of his students, "Read the Bible through in '92.... and don't remember a damn thing I read."

It is made plain in the Revelation, both at the beginning and at the end, THESE THINGS MUST SHORTLY COME TO PASS. This is the same terminology used in the book of Daniel, which came to pass within a 500 year period. To be consistent, the events described in the Revelation must also have ocurred in the same time frame.

An Implanted Digital Snitch has nothing to do with the mark of the antichrist - it has everything to do with becoming the marked property of an abusive entity....

-- Hillbilly (Hillbilly@possum.crrek), February 07, 2000.


Three cheers for Hokie!! Where do you find these gems? Keep em coming! I do not consider these articles out there. It is scary stuff and sure seems like we are getting closer and closer to the end of times.

Just when I try to bury my head in the sand for a while you make me face reality once again. I guess it won't go away will it. Thanks again Hokie.

-- (I Believe (Repent@time is now.com)), February 07, 2000.


Moderation questions? read the FAQ