Chapter XIII: The Socio-Ethical Implications of Automatic Identification and Location Services
The number of automatic identification (auto-ID) technologies being utilized in eBusiness applications is growing rapidly. With an increasing trend toward miniaturization and wireless capabilities, auto-ID and LBS technologies are becoming more and more pervasive. The pace at which new product innovations are being introduced far outweighs the ability for citizens to absorb what these changes actually mean, and what their likely impact will be upon future generations. This chapter attempts to cover a broad spectrum of issues ranging from the social, cultural, religious and ethical implications of auto-ID with an emphasis on human transponder implants. Previous work is brought together and presented in a way that offers a holistic view of the current state of proceedings on the topic.
The relative ease of performing electronic transactions by using auto-ID has raised a number of social, cultural, religious and ethical issues. Among others, civil libertarians, religious advocates and conspiracy theorists have long cast doubts on ID technology and the ultimate use of the information gathered by it. Claims that auto-ID technology impinges on human rights, the right to privacy, and that eventually it will lead to totalitarian control of the populace have been put forward since at least the 1970s. This chapter aims to explore these themes with a particular emphasis on emerging human transponder implant technology. At present, several US companies are marketing e-business services that allow for the tracking and monitoring of individuals using RFID implants in the subcutaneous layer of the skin or Global Positioning System (GPS) wristwatches worn by enrollees. Until 2003, literature had not consistently addressed philosophical issues related to chip implants for humans in the context of e-business. We can point to some of the works of Roger Clarke, Steve Mann and Simon Davies who touched upon the idea of implants but it was popular online news sources like CNN (Sanchez-Klein, 1998) and the BBC (Jones, 2000) that were among the few mainline publishers discussing the topic with genuine and continued interest, albeit in a fragmented manner. The credible articles on implanting humans are mostly interviews conducted with proponents of the technology, such as Applied Digital Solutions (ADS, 2002) representatives who are makers of the VeriChip system solution (ADSX, 2004); Professor Kevin Warwick of the University of Reading who is known for his Cyborg 1.0 and 2.0 projects (Warwick, 2002); and implantees like the Jacobs family in the US who bear RFID transponder implants (Goldman, 2002). Block passages from these interviews are quoted throughout this chapter to bring some of the major issues to the fore using a holistic approach.
More recently academic papers on human transponder implants covering various perspectives have surfaced on the following topics: legal and privacy (Ramesh, 2004; Unatin, 2002], ethics and culture (Gotterbarn, 2002), technological problems and health concerns (Covacio, 2003), technological progress (Warwick, 2003), trajectories (Norman, 2001, Bell & Gray, 2001). Since 2005, over 40 refereed journal papers have been published on the topic of the socio-ethical implications of microchip implants and most of these can be found listed in Michael, Fusco and Michael (2008) and Michael (2007). While there is a considerable amount of other popular material available especially on the Internet related to human chip implants, much of it is subjective and not properly sourced. One major criticism of these reports is that the reader is left pondering as to the authenticity of the accounts provided with little evidence to support respective claims and conclusions. Authorship of this literature is another problem. Often these articles are contributed anonymously, and when they do cite an author’s name, the level of technical understanding conveyed by the individual is severely lacking to the detriment of what he/she is trying to convey, even if there is a case to be argued. Thus, the gap this chapter seeks to fill is to provide a sober presentation of cross-disciplinary perspectives on topical auto-ID issues with an emphasis on human transponder implants, and second to document some of the more thought-provoking discussion which has already taken place on the topic, complemented by a comprehensive introductory bibliography.
TOWARDS UBIQUITOUS COMPUTING
From personal computers (PCs) to laptops to personal digital assistants (PDAs) and from landline phones to cellular phones to wireless wristwatches, miniaturization and mobility have acted to shift the way in which computing is perceived by humans (figure 1). Lemonick (1995) captures this pace of change well in the following excerpt: “[i]t took humanity more than 2 million years to invent wheels but only about 5,000 years more to drive those wheels with a steam engine. The first computers filled entire rooms, and it took 35 years to make the machines fit on a desk- but the leap from desktop to laptop took less than a decade… What will the next decade bring, as we move into a new millennium? That’s getting harder and harder to predict.” Once a stationary medium, computers are now portable, they go wherever humans go (McGinity, 2000). This can be described as technology becoming more human-centric, “where products are designed to work for us, and not us for them” (Stephan, 2001). Thus, the paradigm shift is from desktop computing to wearable computing (Sheridan, 2000).
Quite remarkably in the pursuit of miniaturization, little has been lost in terms of processing power. “The enormous progress in electronic miniaturization make it possible to fit many components and complex interconnection structures into an extremely small area using high-density printed circuit and multichip substrates” (Lukowicz, 2001). We now have so-named Matchbox PCs that are no larger than a box of matches with the ability to house fully functional operating systems (DeFouw & Pratt, 1999). “The development of wearable computer systems has been rapid. Salonen (1997), among others (Mann, 1997) are of the belief that “quite soon we will see a wide range of unobtrusive wearable and ubiquitous computing equipment integrated into our everyday wear”. The next ten years will see wearable computing devices become an integral part of our daily lives, especially as the price for devices keeps falling. Whether noticeable or not by users, the change has already begun.
Technology is increasingly becoming an extension of the human body, whether it is by carrying smart cards or electronic tags (Millanvoye, 2001) or even PDAs and mobile phones. Furui (2000) predicts that “[p]eople will actually walk through their day-to-day lives wearing several computers at a time.” Cochrane described this phenomenon as technology being an omnipresent part of our lives. Not only will devices become small and compact but they will be embedded in our bodies, invisible to anyone else (Pickering, 1999). For the time being however, we are witnessing the transition period in which auto-ID devices especially are being trialed upon those who either i) desperately require their use for medical purposes or ii) who cannot challenge their application, such as in the case of armed forces or prison inmates. Eventually, the new technology will be opened to the wider market in a voluntary nature but will most likely become a de facto compulsory standard (i.e. such as in the case of the mobile phone today), and inevitably mandatory as it is linked to some kind of requirement for survival. Upon reflection, this is the pattern that most successful high-tech innovations throughout history have followed.
Mark Weiser first conceived the term “ubiquitous computing” to espouse all those small information systems (IS) devices, including calculators, electronic calendars and communicators that users would carry with them every day (Sydänheimo, 1999). It is important to make the distinction between ubiquitous and wearable computing. They “have been posed as polar opposites even though they are often applied in very similar applications” (Rhodes, 1999). Kaku (1998) stated that ubiquitous computing, is the time “when computers are all connected to each other and the ratio of computers to people flips the other way, with as many as one hundred computers for every person.” This latter definition implies a ubiquitous environment that allows the user to seamlessly interface with computer systems around them. Environments of the future are predicted to be context-aware so that users are not disturbed in every context, save for when it is suitable (van Laerhoven & Cakmacki, 2000). Kortuem (1998) stated that “[s]uch environments might be found at the home, at the office, at factory floors, or even vehicles.” There is some debate however of where to place sensors in these environments. For example, should they be located around the room or should they be located on the individual. Locating sensors around the room enforces certain conditions on an individual, while locating sensors on an individual means that that person is actually in control of their context (i.e. sousveillance, Mann, Nolan and Wellman, 2003). The latter case also requires less localized infrastructure and a greater degree of freedom. Rhodes et al. (1999) argue that by “properly combining wearable computing and ubiquitous computing, a system can have the advantages of both.”
Privacy Concerns and Big Brother Fears
Starner (2001) makes the distinction between privacy and security concerns. “Security involves the protection of information from unauthorized users; privacy is the individual’s right to control the collection and use of personal information.” Mills (1997) is of the opinion that some technology, like communications, is not non-neutral but totalitarian in nature and that it can make citizens passive. “These glamorous technologies extend and integrate cradle-to-grave surveillance, annihilating all concept of a right to personal privacy, and help consolidate the power of the national security state… every technology, being a form of power, has implicit values and politics…” Over the years terms like Big Brother (Davies, 1992; Davies, 1996) and function creep (Hibbert, 1996) have proliferated to correspond to the all-seeing eyes of government and to the misuse and abuse of data. In most western countries data matching programs were constructed, linked to a unique citizen ID, to cross-check details provided by citizens, claims made, and benefits distributed (Kusserow, 1996; Privacy Commissioner, 1990). More recently however, the trend has tended towards information centralization between government agencies based around the auspices of a national ID to reduce fraud (Jones, 2000) and to combat terrorism (Michels, 2002). Currently computers allow for the storage and searching of data gathered like never before (Rosenberg, 2004). The range of automated data collection devices continues to increase to include systems such as bar codes (with RF capabilities), magnetic-stripe card, smart card and a variety of biometric techniques, increasing the rapidity and ease at which information is gathered. RFID transponders especially have added a greater granularity of precision in in-building and campus-wide solutions, given the wireless edge, allowing information to be gathered within a closed environment, anywhere/ anytime, transparent to the individual carrying the RFID badge or tag.
Now, while auto-ID itself is supposed to ensure privacy, it is the ease with which data can be collected that has some advocates concerned about the ultimate use of personal information. While the devices are secure, breaches in privacy can happen at any level- especially at the database level where information is ultimately stored after it is collected (Brin, 1998). How this information is used, how it is matched with other data, who has access to it, is what has caused many citizens to be cautious about auto-ID in general (Branscomb, 1994). Data mining also has altered how data is filtered, sifted and utilized all in the name of customer relationship management (CRM). It is not difficult to obtain telemarketing lists, census information aggregated to a granular level, and mapping tools to represent market segments visually. Rothfeder (1995) states: “[m]edical files, financial and personnel records, Social Security numbers, and telephone call histories- as well as information about our lifestyle preferences, where we shop, and even what car we drive- are available quickly and cheaply.”
Looking forward, the potential for privacy issues linked to chip implants is something that has been considered but mostly granted attention by the media. Privacy advocates warn that such a chip would impact civil liberties in a disastrous way (Newton, 1995). Even Warwick, himself, is aware that chip implants do not promote an air of assurance: “Looking back, Warwick admits that the whole experiment [Cyborg 1.0] “smacked of Big Brother.” He insists, however, that it’s important to raise awareness of what’s already technically possible so that we can remain in the driver’s seat. “I have a sneaking suspicion,” he says, “that as long as we’re gaining things, we’ll yell ‘Let’s have Big Brother now!’ It’s when we’re locked in and the lights start going off- then Big Brother is a problem” (Masterson, 2001). In this instance, Warwick has made an important observation. So long as individuals are “gaining” they generally will voluntarily part with a little more information. It is when they stop gaining and blatantly start being taken advantage of that the idea of Big Brother is raised. On that point, chip implants promise the convenience of not having to carry a multitude of auto-ID devices, perhaps not even a wallet or purse.
According to McGinity (2000) “[e]xperts say it [the chip] could carry all your personal information, medical background, insurance, banking information, passport information, address, phone number, social security number, birth certificate, marriage license.” This kind of data collection is considered by civil libertarians to be “crypto-fascism or high-tech slavery” (Associated Press, 2002a). The potential for abuse cannot be overstated (Mieszkowski, 2000). Salkowski (2000) agrees pointing to the ADSX VeriChip system, stating that police, parents and ADSX employees could abuse their power. “It might even be possible for estranged spouses, employers and anyone else with a grudge to get their hands on tracking data through a civil subpoena”. Hackers too, could try their hand at collecting data without the knowledge of the individual, given that wireless transmission is susceptible to interception (figure 2). At the same time, the chip implant may become a prerequisite to health insurance and other services. “You could have a scenario where insurance companies refuse to insure you unless you agree to have a chip implant to monitor the level of physical activity you do” says Pearson of British Telecom (LoBaido, 2001). This should not be surprising given that insurance companies already ask individuals for a medical history of illnesses upon joining a new plan. Proponents say the chip would just contain this information more accurately (Goldman, 2002). Furthermore, “[c]ost-conscious insurance companies are sure to be impressed, because the portability of biomems [i.e., a type of medical chip implant] would allow even a seriously ill patient to be monitored after surgery or treatment on an outpatient basis” (Swissler, 2000). Now a chip storing personal information is quite different to one used to monitor health 24x7x365 and then to relay diagnoses to relevant stakeholders. As Chris Hoofnagle, an attorney for the Electronic Privacy Information Centre in Washington, D.C., pointed out, “[y]ou always have to think about what the device will be used for tomorrow” (Black, 2002). In its essential aspect, this is exactly the void this paper has tried to fill.
Mandatory Proof of Identification
In the US in 2001 several bills were passed in Congress to allow for the creation of three new Acts related to biometric identification of citizens and aliens, including the Patriot Act, Aviation and Transport Security Act, and the Enhanced Border Security and Visa Entry Reform Act. If terrorism attacks continue to increase in frequency, there is a growing prospect in the use of chip implants for identification purposes and GPS for tracking and monitoring. It is not an impossible scenario to consider that one day these devices may be incorporated into national identification schemes. During the SARS (severe acute respiratory syndrome) outbreak, Singapore (RFID, 2003) and Taiwan (Editor, 2003) considered going as far as tagging their whole population with RFID devices to monitor automatically the spread of the virus. Yet, independent of such random and sporadic events, governments worldwide are already moving toward the introduction of a single unique ID to cater for a diversity of citizen applications. Opinions on the possibility of widespread chip implants in humans range from “it would be a good idea,” to “it would be a good idea, but only for commercial applications not government applications,” to “this should never be allowed to happen”.
Leslie Jacobs, who was one of the first to receive a VeriChip told Scheeres (2002d), “[t]he world would be a safer place if authorities had a tamper-proof way of identifying people… I have nothing to hide, so I wouldn’t mind having the chip for verification… I already have an ID card, so why not have a chip?” It should be noted that some tracking and monitoring systems can be turned off and on by the wearer, making monitoring theoretically voluntary (Wherify, 2004). Sullivan a spokesperson for ADSX, said: “[i]t will not intrude on personal privacy except in applications applied to the tracking of criminals” (Mieszkowski, 2000). ADSX have claimed on a number of occasions that it has received more than two thousand emails from teenagers volunteering to be the next to be “chipped” (Scheeres, 2002a). There are others like McClimans (1998) that believe that everyone should get chipped. Cunha Lima, a Brazilian politician who also has a chip implant is not ignorant of the potential for invasion of privacy but believes the benefits outweigh the costs and that so long as the new technology is voluntary and not mandatory there is nothing to worry about. He has said, “[i]f one chooses to ‘be chipped,’ then one has considered the consequences of that action” (Scheeres, 2002c). Lima argues that he feels more secure with an implant given the number of kidnappings in South America of high profile people each year- at least this way his location is always known.
Professor Brad Meyers of the Computer Science Department at Carnegie Mellon University believes that the chip implant technology has a place but should not be used by governments. Yet the overriding sentiment is that chip implants will be used by government before too long. Salkowski (2000) has said, “[i]f you doubt there are governments that would force at least some of their citizens to carry tracking implants, you need to start reading the news a little more often.” Black (2002) echoes these sentiments: “Strictly voluntary? So far so good. But now imagine that same chip being used by a totalitarian government to keep track of or round up political activists or others who are considered enemies of the state. In the wrong hands, the VeriChip could empower the wrong people.” In a report written by Ramesh for the Franklin Pierce Law Centre the prediction is made that (Horn, 2000): “[a] national identification system via microchip implants could be achieved in two stages: Upon introduction as a voluntary system, the microchip implantation will appear to be palatable. After there is a familiarity with the procedure and a knowledge of its benefits, implantation would be mandatory.” Bob Gellman, a Washington privacy consultant, likens this to “a sort of modern version of tattooing people, something that for obvious reasons- the Nazis tattooed numbers of people- no one proposes” (Mieszkowski, 2000; Levi, 1998; Lifton, 1986). The real issue at hand as Gellman sees it is “who will be able to demand that a chip be implanted in another person.” Mieszkowski supports Gray by observing how quickly a new technological “option” can become a requirement. Resistance after the voluntary adoption stage can be rather futile if momentum is leading the device towards a mandatory role.
McMurchie (1999) reveals the subtle progression toward embedded devices: “[a]s we look at wearable computers, it’s not a big jump to say, ‘OK, you have a wearable, why not just embed the device?’… And no one can rule out the possibility that employees might one day be asked to sport embedded chips for ultimate access control and security…” Professor Chris Hables Gray uses the example of prospective military chip implant applications. How can a marine, for instance, resist implantation? Timothy McVeigh, convicted Oklahoma bomber, claimed that during the Gulf War, he was implanted with a microchip against his will. The claims have been denied by the U.S. military (Nairne, 2000), however the British Army is supposedly considering projects such as APRIL (Army Personnel Rationalization Individual Listings) (LoBaido, 2001). Some cyberpunks have attempted to counteract the possibility of enforced implantation. One punk known by the name of “Z.L” is an avid reader of MIT specialist publications like open|DOOR MIT magazine on bioengineering and beyond. Z.L.’s research has indicated that: [i]t is only a matter of time… before technology is integrated within the body. Anticipating the revolution, he has already taught himself how to do surgical implants and other operations. “The state uses technology to strengthen its control over us,” he says. “By opposing this control, I remain a punk. When the first electronic tags are implanted in the bodies of criminals, maybe in the next five years, I’ll know how to remove them, deactivate them and spread viruses to roll over Big Brother” (Millanvoye, 2001).
Public concern about electromagnetic fields from cellular phones was a contentious issue in the late 1990s. Now it seems that the majority of people in More Developed Countries (MDCs) have become so dependent on mobile phones that they are disregarding the potential health risks associated with the technology (NRPB, 2004). Though very little has been proven concretely, most terminal manufacturers do include a warning with their packaging, encouraging users not to touch the antenna of the phone during transmission (ACA, 2000). Covacio (2003) is among the few authors to discuss the potential technological problems associated with microchips for human ID from a health perspective. In her paper she provides evidence why implants may impact humans adversely, categorizing these into thermal (i.e. whole/partial rise in body heating), stimulation (i.e. excitation of nerves and muscles) and other effects most of which are currently unknown. She states that research into RFID and mobile telephone technology: “...has revealed a growing concern with the effects of radio frequency and non-ionizing radiation on organic matter. It has been revealed a number of low-level, and possible high-level risks are associated with the use of radio-frequency technology. Effects of X-rays and gamma rays have been well documented in medical and electronic journals…”
In considering future wearable devices, Salonen (1997) puts forward the idea of directing antenna away from the head where “there may be either a thermal insult produced by power deposition in tissue (acute effects) or other (long-term) effects” to midway between the shoulder and elbow where radiation can be pushed outward from the body. Yet chip implants may also pose problems, particularly if they are active implants that contain batteries and are prone to leakage if transponders are accidentally broken. Geers et al. (1997) write the following regarding animal implants.
Another important aspect is the potential toxic effect of the battery when using active transponders. Although it should be clear that pieces of glass or copper from passive tags are not allowed to enter the food chain. When using electronic monitoring with the current available technology, a battery is necessary to guarantee correct functioning of sensors when the transponder is outside the antenna field. If the transponder should break in the animal’s body, battery fluid may escape, and the question of toxological effects has to be answered. In fact, we need only consider the very real problems that women with failed silicon breast implants have had to suffer. Will individuals with chip implants, twenty years down the track, be tied up in similar court battles and with severe medical problems? Surgical implantation, it must also be stated, causes some degree of stress in an animal and it takes between four to seven days for the animal to return to equilibrium (Geers et al., 1997). Most certainly some discomfort must be felt by humans as well.
In the Cyborg 1.0 project, Warwick was advised to leave the implant under his skin for only ten days. According to Trull (1998), Warwick was taking antibiotics to fight the possibility of infection. Warwick also reportedly told his son while playing squash during Cyborg 1.0: “Whatever you do, don’t hit my arm. The implant could just shatter, and you’ll have ruined your father’s arm for life” (Witt, 1999). It is also worthwhile noting Warwick’s appearance after the Cyborg 2.0 experiment. He looked pale and weary in press release photographs, like someone who had undergone a major operation. Covacio (2003) believes ultimately that widespread implantation of microchips in humans will lead to detrimental effects to them and the environment at large. Satellite technology (i.e. the use of GPS to locate individuals), microwave RF and related technological gadgetry will ultimately “increase health problems and consequentially increase pressure on health services already under economic duress.”
The Net Generation
When the ENIAC was first made known to the public in February of 1946 reporters used “anthropomorphic” and “awesome characterizations” to describe the computer. The news was received with skepticism by citizens who feared the unknown. In an article titled “The Myth of the Awesome Thinking Machine”, Martin (1995) stated that the ENIAC was referred to in headlines as “a child, a Frankenstein, a whiz kid, a predictor and controller of weather, and a wizard”. Photographs of the ENIAC used in publications usually depicted the computer to completely fill a small room, from wall-to-wall and floor-to-ceiling. People are usually shown interacting with the machine, feeding it with instructions, waiting for results and monitoring its behavior. One could almost imagine that the persons in the photographs are ‘inside the body’ of the ENIAC (Michael, 2002). Sweeping changes have taken place since that time, particularly since the mid 1980s. Consumers now own personal computers (PCs) in their homes- these are increasingly being networked- they carry laptop computers and mobile phones and chip cards, and closely interact with public automated kiosks. Relatively speaking, it has not taken long for people to adapt to the changes that this new technology has heralded. Today we speak of a Net Generation (N-Geners) who never knew a world without computers or the Internet (Tapscott, 1998); for them the digital world is as ubiquitous as the air that they breathe (figure 3). What is important to N-Geners is not how they got to where they are today but what digital prospects the future holds: “[O]ur increasing cultural acceptance of high-tech gadgetry has led to a new way of thinking: robotic implants could be so advantageous that people might actually want to become cybernetic organisms, by choice. The popularization of the cyberpunk genre has demonstrated that it can be hip to have a chip in your head” (Trull, 1998).
Science Fiction Genre
The predictions of science fiction writers have often been promoted through the use of print, sound and visual mediums. Below is a list of sci-fi novels, films and television series that undoubtedly have influenced and are still influencing the trajectory of auto-ID. Chris Hables Gray (2001) tells his students “…that a lot of the best cyborgology has been done in the mass media and in fiction by science fiction writers, and science fiction movie producers, because they’re thinking through these things” (Walker, 2001). The popular 1970s series of Six Million Dollar Man, for instance, began as follows: “We can rebuild him. We have the technology. We have the capability to make the world’s first Bionic man.” Today bionic limbs are a reality and no longer science fiction (Anonymous, 2001). More recently AT&T’s Wireless mMode magazine alluded to Start Trek (Goldberg, 2004): “They also talked about their expectations- one media executive summed it up best, saying, “Remember that little box that Mr. Spock had on Star Trek? The one that did everything? That’s what I’d like my phone to be…”
Beyond auto-ID we find a continuing legacy in sci-fi genre toward the electrification of humans- from Frankenstein to Davros in Dr Who, and from Total Recall to Johnny Mnemonic. While all this is indeed ‘merely’ sci-fi, it is giving some form to the word, allowing the imagination to be captured in powerful images, sounds and models. What next? A vision of a mechanized misery (Wilmington, 2004) as portrayed in Fritz Lang’s 1927 cult film classic Metropolis? Only this time instead of being at the mercy of the Machine, we have gone one step further and invited the Machine to reside inside the body, and marked it as a ‘technological breakthrough’ as well. As several commentators have noted, “[w]e live in an era that… itself often seems like science fiction, and Metropolis has contributed powerfully to that seeming” (McRoy, 2001).
Some of the more notable predictions and social critiques are contained within the following works: Frankenstein (Mary Shelley 1818), Paris in the 20th Century (Jules Verne 1863), Looking Backward (Edward Bellamy 1888), The Time Machine (H.G. Wells 1895), Rossum’s Universal Robots (Karel Čapek, 1921), Brave New World (Aldous Huxley 1932), 1984 (George Orwell 1949), I, Robot (Isaac Asimov 1950), Foundation (Asimov 1951-53, 1982), 2001: A Space Odyssey (Arthur C. Clarke 1968), Do Androids Dream of Electric Sheep (Philip K. Dick 1968), Neuromancer (William Gibson 1984), The Marked Man (Charles Ingrid 1989), The Silicon Man (Platt 1991), Bridge trilogy (William Gibson 1993-1999), Silicon Karma (Thomas A. Easton 1997), Oryx and Crake (Margaret Atwood 2003), The Traveler (John T. Hawks 2005), Next (Michael Crichton 2006). The effects of film have been even more substantial on the individual as they have put form and dynamism to the predictions. These include: Metropolis (Fritz Lang 1927), Forbidden Planet (Fred Wilcox 1956), Fail Safe (Sidney Lumet 1964), THX-1138 (George Lucas 1971), 2001: A Space Odyssey (Stanley Kubrick 1968), The Terminal Man (George Lucas 1974), Zardoz (John Boorman 1974), Star Wars (George Lucas 1977), Moonraker (Lewis Gilbert II 1979), Star Trek (Robert Wise 1979), For Your Eyes Only (John Glen II 1981), Blade Runner (Ridley Scott 1982), War Games (John Badham 1983), 2010: The Year We Make Contact (Peter Hyams 1984), RoboCop (Paul Verhoeven, 1987), Total Recall (Paul Verhoeven 1990), The Terminator Series, Sneakers (Phil Alden Robinson 1992), Patriot Games (Phillip Noyce 1992), The Lawnmower Man (Brett Leonard 1992), Demolition Man (Marco Brambilla 1993), Jurassic Park (Steven Speilberg 1993), Hackers (Iain Softley 1995), Johnny Mnemonic (Robert Longo 1995), The NET (Irwin Winkler 1995), Gattaca (Andrew Niccol 1997) Enemy of the State (Tony Scott 1998), Fortress 2 (Geoff Murphy 1999), The Matrix (L. Wachowski & A. Wachowski 1999), Mission Impossible 2 (John Woo 2000), The 6th Day (Roger Spottiswoode 2000), A.I. Artificial Intelligence (Steven Spielberg 2001), Minority Report (Steven Spielberg 2002), I, Robot, (Alex Proyas 2004), Untraceable (Gregory Hoblit 2008).
Shifting Cultural Values
Auto-ID and more generally computer and network systems have influenced changes in language, art (King, 2001), music and film. An article by Branwyn (1993) summarizes these changes well.
§ Language: “Computer network and hacker slang is filled with references to “being wired” or “jacking in” (to a computer network), “wetware” (the brain), and “meat” the body”.
§ Music: “Recent albums by digital artists Brian Eno, Clock DVA, and Frontline Assembly sport names like Nerve Net, Man Amplified and Tactical Neural Implant.” See also the 1978 album by Kraftwerk titled “The Man Machine”.
§ Film: “Science fiction films, from Robocop to the recent Japanese cult film Tetsuo: The Iron Man, imprint our imaginations with images of the new.”
Apart from the plethora of new terms that have been born from the widespread use of IT&T and more specifically from extropians (much of which have religious connotations or allusions (Dery, 1996), it is art, especially body art that is being heavily influenced by chip implant technology. Mieszkowski (2000) believes that “chipification” will be the next big wave in place of tattoos, piercing and scarification. In the U.S. it was estimated in 2001 that about two hundred Americans had permanently changed their bodies at around nine hundred dollars per implant, following a method developed by Steve Hayworth and Jon Cobb (Millanvoye, 2001).
Canadian artist Nancy Nisbet has implanted microchips in her hands to better understand how implant technology may affect the human identity. The artist told Scheeres (2002b), “I am expecting the merger between human and machines to proceed whether we want it to or not…”
As far back as 1997, Eduardo Kac “inserted a chip into his ankle during a live performance in Sao Paulo, then registered himself in an online pet database as both owner and animal” (Tysome, 2001). Perhaps the actual implant ceremony was not Kac’s main contribution but the subsequent registration onto a pet database. Other artists like Natasha Vita More and Stelarc have ventured beyond localized chip implants. Their vision is of a complete prosthetic body that will comprise of nanotechnology, artificial intelligence, robotics, cloning, and even nanobots (Walker, 2001). More calls her future body design Primo 3M Plus. Stelarc’s live performances however, have been heralded as the closest thing there is to imagining a world where the human body will become obsolete (Tysome, 2001). “A Stelarc performance… usually involves a disturbing mix of amplified sounds of human organs and techno beats, an internal camera projecting images of his innards, perhaps a set of robotic legs or an extra arm, or maybe tubes and wires connecting the performer’s body to the internet with people in another country manipulating the sensors, jerking him into a spastic dance. It’s a dark vision, but it definitely makes you think” (Walker, 2001). Warwick (2002) believes that the new technologies “will dramatically change [art], but not destroy it.”
Medical Marvels or Human Evolution
As Sacleman wrote in 1967 “...the impact of automation on the individual involve[d] a reconstruction of his values, his outlook and his way of life”. Marshall McLuhan (1964, 1989) was one of the first explorers to probe how the psycho-social complex was influenced by electricity. “Electricity continually transforms everything, especially the way people think, and confirms the power of uncertainty in the quest for absolute knowledge” (E. McLuhan & Zingrone, 1995). Numerous examples can be given to illustrate these major cultural changes- from the use of electricity for household warmth, to wide area networks (WAN) enabling voice and data communications across long distances, to magnetic-stripe cards used for credit transactions (Ellul, 1964; Toffler, 1981; Gates, 1995; Negroponte, 1995. But what of the direct unification of humans and technology, i.e., the fusion between flesh and electronic circuitry (Moravec, 1988, 1999; Paul & Cox, 1996)?
Consider for a moment the impact that chip implants have had on cochlear recipients. A medical marvel perhaps but it too, not without controversy. There are potentially 500,000 hearing impaired persons that could benefit from cochlear implants (Sorkin & McClanahan) but not every deaf person wants one. “Some deaf activists… are critical of parents who subject children to such surgery [cochlear implants] because, as one charged, the prosthesis imparts “the nonhealthy self-concept of having had something wrong with one’s body” rather than the “healthy self-concept of [being] a proud Deaf” (Weber, 2000). Assistant Professor Scott Bally of Audiology at Gallaudet University has said: “Many deaf people feel as though deafness is not a handicap. They are culturally deaf individuals who have successfully adapted themselves to being deaf and feel as though things like cochlear implants would take them out of their deaf culture, a culture which provides a significant degree of support” (Branwyn, 1993).
Putting this delicate debate aside it is here that some delineation can be made between implants that are used to treat an ailment or disability (i.e. giving sight to the blind and hearing to the deaf), and implants that may be used for enhancing human function (i.e. memory). Some citizens are concerned about the direction of the human species as future predictions of fully functional neural implants are being made by credible scientists. “[Q]uestions are raised as to how society as a whole will relate to people walking around with plugs and wires sprouting out of their heads. And who will decide which segments of the society become the wire-heads” (Branwyn, 1993)? Those who can afford the procedures perhaps? And what of the possibility of brain viruses that could be fatal and technological obsolescence that may require people to undergo frequent operations? Maybury (1990) believes that humans are already beginning to suffer from a type of “mental atrophy” worse than that that occurred during the industrial revolution and that the only way to fight it is to hang on to those essential skills that are required for human survival. The question remains whether indeed it is society that shapes technology (Bijker & Law, 1992) or technology that shapes society (Pool, 1997). Inevitably it is a dynamic process of push and pull that causes cultural transformations over time.
The Mark of the Beast
Ever since the bar code symbology UPC (Universal Product Code) became widespread some Christian groups have linked auto-ID to the “mark” in the Book of Revelation (13:18): “the number of the beast… is 666” (Relfe, 1982). Coincidentally, the left (101), centre (01010) and right (101) border codes of the UPC bars are encoded 6, 6, 6. As it is now an established standard for every non-perishable item to be bar coded there was a close association with the prophecy: “so that no one could buy or sell unless he had the mark” (Rev 13:17). In full, verses 16-18 of chapter 13 of Revelation read as follows: “Also it causes all, both small and great, both rich and poor, both free and slave, to be marked on the right hand or the forehead, so that no one can buy or sell unless he has the mark, that is, the name of the beast or the number of its name. This calls for wisdom: let him who has understanding reckon the number of the beast, for it is a human number, its number is six hundred and sixty-six (Rev 13:16-18).”
According to some Christians, this reference would appear to be alluding to a mark on or in the human body, the prediction being made that the UPC would eventually end up on or under human skin (Watkins, 1996). As the selection environment of auto-ID devices grew, the interpretation of the prophecy further developed as to the actual guise of the mark. It was no longer interpreted to be ‘just’ the bar code. Some of the more prominent religious web sites that discussed auto-ID and the number of the beast, when RFID implants for animals became popular included: http://www.666soon.com (2003), http://www.greaterthings.com (2003), http://www.countdown.com.org (2003), http://www.raidersnewsupdate.com (2003), http://www.light1998.com (2003) and http://www.av1611.org (1996). At first the sites focused on bar code technology, now they have grown to encompass a plethora of auto-ID technologies, especially biometrics and looming chip implants. For a thorough analysis of the background, sources and interpretation of the “number of the beast” see M.G. Michael’s thesis (1998).
Card technology such as magnetic-stripe and smart cards became the next focus as devices that would gradually pave the way for a permanent ID for all citizens globally: “He also forced everyone, small and great, rich and poor, free and slave, to receive a mark…” (Rev 13:16). Biometrics was then introduced and immediately the association was made that the “mark” [charagma] would appear on the “right hand” (i.e. palmprint or fingerprint) or on the “forehead” (facial/ iris recognition) as was apparently prophesied (Rev. 13:16). For the uses of charagma [mark] in the literature of antiquity (a mark or stamp engraved, etched, branded, cut, or imprinted) see Arndt and Gingrich (1979, p. 876). Short of calling this group of people “fundamentalists”, as Woodward (1997) refers to one prominent leader, Simon Davies is more circumspect (Roethenbaugh, 1998): “I think they’re legitimate [claims]. People have always rejected certain information practices for a variety of reasons: personal, cultural, ethical, religious and legal. And I think it has to be said that if a person feels bad for whatever reason, about the use of a body part then that’s entirely legitimate and has to be respected”.
Finally RFID transponders made their way into pets and livestock for identification, and that is when some Christian groups announced that the ‘authentic’ mark was now possible, and that it was only a matter of time before it would find its way into citizen applications (Decker, 2002). Terry Cook (1999), for instance, an outspoken religious commentator and popular author, “worries the identification chip could be the ‘mark of the beast’, an identifying mark that all people will be forced to wear just before the end times, according to the Bible” (Newton, 2002). The description of an implant procedure for sows that Geers et al. (1997) gives, especially the section about an incision being made on the skin, is what some religious advocates fear may happen to humans as well in the future. “When the thermistor was implanted the sows were restrained with a lasso. The implantation site was locally anaesthetized with a procaine (2%) injection, shaved and disinfected. After making a small incision in the skin, the thermistor was implanted subcutaneously, and the incision was closed by sewing. The position of the thermistor (accuracy 0.1C) was wire-connected to a data acquisition system linked to a personal computer.”
“Religious advocates say it [i.e. transponder implants] represents ‘the mark of the Beast’, or the anti-Christ” (Associates Press, 2002). Christians who take this mark, for whatever reason, are said to be denouncing the seal of baptism, and accepting the Antichrist in place of Christ (M.G. Michael, 2002a, 2002b; Baukham, 1993). Horn (2000) explains: “[m]any Christians believe that, before long, an antichrist system will appear. It will be a New World Order, under which national boundaries dissolve, and ethnic groups, ideologies, religions, and economics from around the world, orchestrate a single and dominant sovereignty… According to popular Biblical interpretation, a single personality will surface at the head of the utopian administration… With imperious decree the Antichrist will facilitate a one-world government, universal religion, and globally monitored socialism. Those who refuse his New World Order will inevitably be imprisoned or destroyed.” Barnet and Cavanagh (1994) describe the New World Order from an economic viewpoint.
Companies that specialize in the manufacture of chip implant solutions, whether for animals or for humans, have been targeted by some religious advocates. The bad publicity has not been welcomed by these companies- some have even notably “toned down” the graphic visuals on their web sites so that they do not attract the wrong ‘type’ of web surfers. While they are trying to promote an image of safety and security, some advocates have associated company brands and products with apocalyptic labels. Some of the company and product names include: Biomark, BioWare, BRANDERS, MARC, Soul Catcher, Digital Angel and Therion Corporation. Perhaps the interesting thing to note is that religious advocates and civil libertarians agree that ultimately the chip implant technology will be used by governments to control citizens.
ADSX is one of the companies that have publicly stated that they do not want adverse publicity after pouring hundreds of thousands of dollars into research and development and the multi-million dollar purchase of the Destron Fearing company. So concerned were they that they even appeared on the Christian talk show The 700 Club, emphasizing that the device would create a lot of benefits and was not meant to fulfill prophecy (Scheeres, 2002c). A spokesperson for ADSX said: “[w]e don’t want the adverse publicity. There are a number of privacy concerns and religious implications- fundamentalist Christian groups regard [i.e., implanting computer chips] as the Devil’s work” (LoBaido, 2000). According to Gary Wohlscheid, the president of The Last Day Ministries, the VeriChip could well be the mark. Wohlscheid believes that out of all the auto-ID technologies with the potential to be the mark, the VeriChip is the closest. About the VeriChip he says however, “[i]t’s definitely not the final product, but it’s a step toward it. Within three to four years, people will be required to use it. Those that reject it will be put to death” (Scheeres, 2002c). These are, of course, the positions of those who have entered the debate from the so-called fundamentalist literalist perspective and represent the more vocal and visible spectrum of contemporary “apocalyptic” Christianity. In this context the idea of fundamentalism seems to be a common label today, for anyone within the Christian community who questions the trajectory of technological advancement.
With respect to the potential of brain chips in the perceived quest for “immortality” (Norman, 2001; Bell & Gray, 2001), many Christians across the denominational confession see this as an attempt to usurp the Eternal Life promised by God, in Jesus Christ, through the Holy Spirit. This is similar to the case of human cloning, where specialist geneticists are accused of trying to play God by usurping the Creator’s role. However, the area is notoriously grey here; when for instance, do implants for medical breakthroughs become acceptable versus those required for purposes of clear identification? In the future the technology in question could end up merging the two functions onto the single device. This is a real and very possible outcome, when all factors, both market and ethical, are taken on board by the relevant stakeholders. Ultimately, for most members of a believing religious community, this subject revolves around the most important question of individual freedom and the right to choose (Stahl, 1999; Noble, 1999).
In an attempt to make our world a safer place we have ‘inadvertently’ infringed on our privacy and our freedom through the use of surveillance cameras and all of the other Big Brother ancillary. We equip our children with mobile phones, attach tracking devices to them or make them carry them (Sensormatic, 1999) in their bags and soon we might even be implanting them with microchips (Raimundo, 1999). This all comes at a price- yet it seems more and more people are willing to pay this price as heinous crimes become common events in a society that should know better. Take the example of 11-year old Danielle Duval who is about to have an active chip (i.e. containing a rechargeable battery) implanted in her. Her mother believes that it is no different to tracking a stolen car, simply that it is being used for another more important application. Mrs Duvall is considering implanting her younger daughter age 7 as well but will wait until the child is a bit older: “so that she fully understands what’s happening” (Wilson, 2002). One could be excused for asking whether Danielle at the age of 11 actually can fully comprehend the implications of the procedure she is about to undergo. It seems that the age of consent would be a more appropriate age.
Kevin Warwick has said that an urgent debate is required on this matter (i.e. whether every child should be implanted by law), and whether or not signals from the chips should be emitted on a 24x7 basis or just triggered during emergencies. Warwick holds the position that “we cannot prejudge ethics” (Warwick, 2002). He believes that ethics can only be debated and conclusions reached only after people become aware of the technical possibilities when they have been demonstrated. He admits that ethics may differ between countries and cultures (Ermann, 1997). The main ethical problem related to chip implants seems to be that they are under the skin (Trull, 1998) and cannot just be removed by the user at their convenience. In fact there is nothing to stop anyone from getting multiple implants all over their body rendering some applications useless. Tien of the Electronic Frontier Foundation (EFF) is convinced that if a technology is there to be abused, whether it is chip implants or national ID cards, then it will because that is just human nature (Eng, 2002). Similarly, Kidscape, a charity that is aimed at reducing the incidence of sexual abuse in children believe that implants will not act to curb crime. Kidscape hold the position that rather than giving children a false sense of security because they are implanted with a tracking device that could be tampered with by an offender, they should be educated on the possible dangers. Implanted tracking devices may sound entirely full-proof but deployment of emergency personnel, whether police or ambulance, cannot just magically appear at the scene of a crime in time to stop an offender from committing violence against a hostage.
Whenever ethical issues are involved in any given area of our lives, normally it will involve making some very difficult decisions from a range of possibilities set out before us. Given that this “range of possibilities” has grown at a super rate in the context of the information age we seem to have made things much more problematical and confusing to resolve. The authors are not going to pretend to “solve” the ethics issues in IT in this book. That is an awesome and complex subject that demands an entirely new study and specialists to attack it who are uniquely trained in the field (there are such people, Michael J. Quinn, Sara Base, and Herman T. Tavani, for instance, and they have written some marvelous works on the subject). One of the issues, however, which the authors of this present work wish to emphasize, is that we need not completely abandon the “old” approach in considering some of these topics. That is, we can still apply some “litmus tests” in the context of human rights for example or on questions of privacy for instance , in determining the morality and consequences of our decisions.
The Prospect of International ID Implants
There are numerous arguments for why implanting a chip in a person is outright unconstitutional. But perhaps the under-explored area as Gellman puts it are the legal and social issues of who would have power over the chip and the information gathered by its means (Mieszkowski, 2000). Gellman is correct in his summation of the problem but science has a proven way of going into uncharted territory first, then asking the questions about implications later. ADSX, for instance, have already launched the VeriChip solution. Sullivan, a spokesperson for the company told Salkowski (2000): “I’m certainly not a believer in the abuse of power,” he offered, suggesting that Congress could always ban export of his company’s device. Of course, he admits he wouldn’t exactly lobby for that law. “I’m a businessman,” he said.
Black (2002) makes the observation that the US government might well indeed place constraints on international sales of the VeriChip if it felt it could be used against them by an enemy. Consider the governance issues surrounding GPS technology that has been in operation a lot longer than human RFID implants. “Good, neutral, or perhaps undesirable outcomes are now possible… Tension arises between some of the civil/commercial applications and the desire to preclude an adversary’s use of GPS. It is extremely difficult (technically, institutionally, politically, and economically) to combine the nonmilitary benefits of the system that require universality of access, ease of use, and low cost with military requirements for denial of the system to adversaries. Practical considerations require civil/commercial applications to have relatively easy access” (Pace, 1996).
From a different angle, Rummler (2001) points out that the monitoring and tracking of individuals raises serious legal implications regarding the individual’s capacity to maintain their right to freedom. He wrote: “[o]nce implanted with bio-implant electronic devices, humans might become highly dependent on the creators of these devices for their repair, recharge, and maintenance. It could be possible to modify the person technologically… thus placing them under the absolute control of the designers of the technology.” The Food and Drug Administration’s (FDA) Dr. David Feigal has been vocal about the need for such devices as the VeriChip not to take medical applications lightly and that companies wishing to specialize in health-related implants need to be in close consultation with the FDA (Associated Press, 2002b; 2002c). There is also the possibility that such developments, i.e. regulating chip implants, may ultimately be used against an individual. The Freedom of Information Act for instance, already allows U.S. authorities to access automatic vehicle toll-passes to provide evidence in court (Sanchez-Klein, 1998); there is nothing to suggest this will not happen with RFID transponder implants as well, despite the myriad of promises made by ADSX (figure 4). Professor Gray is adamant that there is no stopping technological evolution no matter how sinister some technologies may appear, and that we need to become accustomed to the fact that new technologies will continually infringe upon the constitution (Mieszkowski, 2000).
Beyond Chip Implants
Luggables, like mobile phones, do create a sense of attachment between the user and the device but the devices are still physically separate; they can accidentally be left behind. Wearable computers on the other hand are a part of the user, they are worn, and they “create an intimate human-computer-symbiosis in which respective strengths combine” (Billinghurst & Starner, 1999). Mann calls this human-computer-symbiosis, “human interaction” (HI) as opposed to HCI (human-computer interaction). “[W]e prefer not to think of the wearer and the computer with its associated I/O apparatus as separate entities. Instead, we regard the computer as a second brain and its sensory modalities as additional senses, which synthetic synesthesia merges with the wearer’s senses (Mann, 2001).”
Human-computer electrification is set to make this bond irrevocable. Once on that path there is no turning back. If at the present all this seems impossible, a myth, unlikely, a prediction far gone, due to end-user resistance and other similar obstacles facing the industry today, history should teach us otherwise. This year alone, millions of babies will be born into a world where there are companies on the New York Stock Exchange specializing in chip implant devices for humans. “They” will grow up believing that these technologies are not only “normal” but also quite useful, just like other high-tech technologies before them such as the Internet, PCs, smart cards etc. Consider the case of Cynthia Tam, aged two, who is an avid computer user:“[i]t took a couple of days for her to understand the connection between the mouse in her hand and the cursor on the screen and then she was off… The biggest problem for Cynthia’s parents is how to get her to stop… for Cynthia, the computer is already a part of her environment… Cynthia’s generation will not think twice about buying things on the Internet, just like most people today don’t think twice when paying credit card, or using cash points for withdrawals and deposits” (Chan, 2001) (figure 5 and 6).
But you do not have to be a newborn baby to adapt to technological change. Even grandmothers and grandfathers surf the web these days and send emails as a cheaper alternative to post or telephone (Tapscott, 1998). And migrants struggling with a foreign language will even memorize key combinations to withdraw money even if they do not actually fully perceive the actions they are commanding throughout the process. Schiele (2001) believes that our personal habits are shaped by technological change and that over time new technologies that seem only appropriate for technophiles eventually find themselves being used by the average person. “[O]ver time our culture will adjust to incorporate the devices.” Gotterbarn is in agreement (2003). We enthusiastically adopt the latest gadget for one use, but then we start to realize that it gives us power for another use. Then there is the inevitable realization that we have overlooked the way it impacts other people, giving rise to professional and ethical issues. What is apparent regardless of how far electrophoresis is taken is that the once irreconcilable gap between human and machine is closing.
Beyond chip implants for tracking there are the possibilities associated with neural prosthetics and the potential to directly link computers to humans (Kurzweil, 1999; 2005). Warwick is also well aware that one of the major obstacles of cyber-humans are the associated moral issues (Irwin, 1998; Warwick, 2003)- who gives anyone the right to be conducting complex procedures on a perfectly healthy person, and who will take responsibility for any complications that present themselves? Rummler (2001) asks whether it is ethical to be linking computers to humans in the first place and whether or not limitations should be placed on what procedures can be conducted even if they are possible. For instance, could this be considered a violation of human rights? And more to the point what will it mean in the future to call oneself “human”. McGrath (2001) asks “how human”? “As technology fills you up with synthetic parts, at what point do you cease to be fully human? One quarter? One third?... At bottom lies one critical issue for a technological age: are some kinds of knowledge so terrible they simply should not be pursued? If there can be such a thing as a philosophical crisis, this will be it. These questions, says Rushworth Kidder, president of the Institute for Global Ethics in Camden, Maine, are especially vexing because they lie at “the convergence of three domains- technology, politics and ethics- that are so far hardly on speaking terms.”
At the point of becoming an electrophorus (i.e. a bearer of electricity), “[y]ou are not just a human linked with technology; you are something different and your values and judgment will change” (Salon, 1999). Some suspect that it will even become possible to alter behavior in people with brain implants (LoBaido, 2001), whether they will it or not. Maybury (1990) believes that “[t]he advent of machine intelligence raises social and ethical issues that may ultimately challenge human existence on earth.” Gotterbarn (2003) argues precisely that our view of computer technologies generally progresses through several stages: “1) naïve innocence and technological wonder, 2) power and control, and 3) finally, sometimes because of disasters during the second stage, an understanding of the essential relationship between technologies and values.”
Bill Joy, the chief technologist of Sun Microsystems, feels a sense of unease about such predictions made by Ray Kurzweil in The Age of Spiritual Machines (1999). Not only because Kurzweil has proven technically competent in the past but because of his ultimate vision for humanity- “a near immortality by becoming one with robotic technology” (Joy, 2000). Joy was severely criticized for being narrow-sighted, even a fundamentalist of sorts, after publishing his paper in Wired, but all he did was dare to ask the questions- ‘do we know what we are doing? Has anyone really carefully thought about this?’ Joy believes (Joy, 2000): “[w]e are being propelled into this new century with no plan, no control, no brakes. Have we already gone too far down the path to alter course? I don’t believe so, but we aren’t trying yet, and the last chance to assert control- the fail-safe point- is rapidly approaching.” Surely there is a pressing need for ethical dialogue (Masey, 1998) on auto-ID innovation, location-based services and more generally information and communication technology. If there has ever been a time when engineers have had to act socially responsibly (Wenk, 1989), it is now as we are at defining crossroads. The new era of biomedical and genetic research merges the worlds of engineering, computer and information technology with traditional medical research. Some of the most significant and far-reaching discoveries are being made at the interface of these disciplines (Boehringer, 2001).
The principal objective of this chapter was to encourage critical discussion on the exigent topic of human implants in e-business applications by documenting some of the central social, cultural, religious and ethical issues. The evidence provided indicates that technology-push has been the driving force behind many of the new RFID transponder implant applications instead of market-pull. What is most alarming is the rate of change in technological capabilities without the commensurate response from an informed community involvement or ethical discourse on what these changes actually “mean”, not only for the present but also for the future ‘shock’. It seems that the normal standard now is to introduce a technology, stand back to see its general effects on society, and then act to rectify problems as they might arise. The concluding point of this chapter is that the long-term side effects of a technology should be considered at the outset and not after the event. One need only bring to mind the Atomic Bomb and the Chernobyl disaster for what is possible, if not inevitable once a technology is set on its ultimate trajectory (Pool, 1997). As citizens it is our duty to remain knowledgeable about scientific developments and to discuss the possible ethical implications over and again (Gotterbarn, 2003). In the end we can point the finger at the Mad Scientists (Walker, 2001) but we too must be socially responsible, save we become our own worst enemy (Ebert, 1998). It is certainly a case of caveat emptor, let the buyer beware.
ACA. (2000). Human exposure to radiofrequency electromagnetic energy: information for manufacturers, importers, agents, licensees or operators of radio communications transmitters, Australian regulations. Melbourne.
ADS. (2002). Applied Digital Solutions. from http://www.adsx.com/
ADSX. (2004). VeriChip Corporation. Applied Digital Solutions Retrieved 1 April 2004, from http://www.4verichip.com/
Anonymous. (2001). Will a chip every day keep the doctor away? PhysicsWeb Retrieved 29 November, from http://physicsweb.org/article/world/14/7/11
Arndt, W. F., & Gingrich, F. W. (1979). A Greek-English Lexicon of the New Testament and Other Early Christian Literature. Chicago: The University of Chicago Press.
Associated Press. (2002a, 15 October 2002). Chip in your shoulder? Family wants info device. USA Today: Tech, from http://www.usatoday.com/life/cyber/tech/2002/04/01/verichip-family.htm
Associated Press. (2002b). Company gets okay to sell ID-only computer chip implant. The Detroit News Retrieved 5 April, from http://www.detnews.com/2002/technology/0204/05/technology-457686.htm
Associated Press. (2002c). ID chip ready for implant. USA Today: Tech Retrieved 4 April, from http://www.usatoday.com/life/cyber/tech/2002/04/04/implant-chip.htm
Baase, S. (2008). A Gift of Fire: Social, Legal, Ethical Issues for Computing and the Internet (3rd ed.). Upper Saddle River: Prentice Hall.
Barnet, R. J., & Cavanagh, J. (1994). Global Dreams: imperial corporations and the new world order. New York: Simon and Schuster.
Bauckham, R. (1993). The Climax of Prophecy: Studies on the Book of Revelation. Edinburgh: T & T Clark.
Bell, G., & Gray, J. (2001). Futuristic forecasts of tools and technologies: digital immortality. Communications of the ACM, 44(3), 29-31.
Bijker, W. E., & Law, J. (Eds.). (1992). Shaping Technology/Building Society: studies in sociotechnical change. Massachusetts: The MIT Press.
Billinghurst, M., & Starner, T. (1999). Wearable devices: new ways to manage information. IEEE Computer, 32(1), 57-64.
Black, J. (2002). Roll up your sleeve – for a chip implant. Illuminati Conspiracy, from http://www.conspiracyarchive.com/NWO/chip_implant.htm
Boehringer, B. (2001, 23 October). Benefits of the OHSU/OGI merger. The Oregon Opportunity: A New Era of Medical Breakthroughs, from http://www.ohsu.edu/about/opportunity/ohsu_ogi.htm
Branscomb, A. W. (1994). Who Owns Information? New York: Basic Books.
Branwyn, G. (1993). The desire to be wired. Wired 1.4, from http://www.eff.org/Net_culture/Cyborg_anthropology/cyber_modification.article
Brin, D. (1998). The Transparent Society: will technology force us to choose between privacy and freedom? Massachusetts: Perseus Books.
Chan, T. (2001). Welcome to the Internet, baby! Telecom Asia, 38.
Cook, T. L. (1999). The Mark of the New World Order. USA: ASIN.
Covacio, S. (2003). Technological Problems Associated with the Subcutaneous Microchips for Human Identification (SMHId). InSITE-Where Parallels Intersect, June, 843-853.
Davies, S. (1992). Big Brother: Australia’s growing web of surveillance. Australia: Simon and Schuster.
Davies, S. (1996). Monitor: extinguishing privacy on the information superhighway. Sydney: PAN Macmillan.
Decker, S. (2002). Technology raises concerns: Pros and cons of scientific advances weighed as Christians discuss issue. The Falcon Online Edition Retrieved 1 April 2003, from http://www.thefalcononline.com//story/2270
DeFouw, G., & Pratt, V. (1999). The matchbox PC: a small wearable platform: IEEE.
Dery, M. (1996). Escape Velocity: cyberculture at the end of the century. London: Hodder and Stoughton.
Ebert, R. (1998, 20 November). Enemy of the State. Chicago Sun Times, from http://www.suntimes.com/ebert/ebert_reviews/1998/11/112006.html
Ellul, J. (1964). The Technological Society. New York: Vintage Books.
Eng, P. (2002). I, Chip? Technology to meld chips into humans draws closer. ABCNEWS.com Retrieved 15 October 2002, from http://abcnews.go.com/sections/scitech/DailyNews/chipimplant020225.html
Ermann, M. D. (1997). Computers, Ethics, and Society. New York: Oxford University Press.
Furui, S. (2000). Speech recognition technology in the ubiquitous/wearable computing environment. Paper presented at the IEEE International Conference on Acoustics, Speech, and Signal Processing.
Gates, B. (1995). The Road Ahead. New York: The Penguin Group.
Geers, R., Puers, B., Goedseels, V., & Wouters, P. (1997). Electronic Identification, Monitoring and Tracking of Animals. Oxon: CAB International.
Goldberg, H. (2004). Building a better mMode. mMode Magazine Retrieved 1 April 2004, from http://www.mmodemagazine.com/features/bettermmode.asp
Goldman, J. (2002). Meet ‘The Chipsons’: ID chips implanted successfully in Florida family. ABC News: techtv Retrieved 13 November 2003, from http://abcnews.go.com/sections/scitech/TechTV/techtv_chipfamily020510.html
Gotterbarn, D. (2003). Injectable computers: once more into the breach! The life cycle of computer ethics awareness. inroads- The SIGCSE Bulletin, 35(4), 10-12.
Gray, C. H. (2001). Cyborg Citizen: politics in the posthuman age. USA: Routledge.
Hibbert, C. (1996). What to do when they ask for your social security number. In R. Kling (Ed.), Computerisation and Controversy: value conflicts and social choices (pp. 686-696). New York: Academic Press.
Horn, T. (2000, 19 February). Opinionet contributed commentary. Opinionet, from http://www.opinionet.com/commentary/contributors/ccth/ccth13.htm
Irwin, A. (1998, 15 October). Brain implant lets man control computer by thought. Telegraph.co.uk 1238. from http://www.telegraph.co.uk/et?ac=000118613908976
Jones, C. (2000, 16 December 2000). Kevin Warwick: Saviour of humankind? BBC News, from http://news.bbc.co.uk/2/hi/in_depth/uk/2000/newsmakers/1069029.stm
Jones, D. (2000). UK government launches smart card strategy. Card Technology Today, 11(6), 2.
Joy, B. (2000, April 2000). Why the future doesn’t need us. Wired, 8.04, from http://www.wired.com/wired/archive/8.04/joy_pr.html
Kaku, M. (1998). Visions: how science will revolutionise the 21st century and beyond. Oxford Oxford University Press.
King, B. (2001). Robots: It’s an art thing. Retrieved 4 January 2003, from http://www.wired.com/news/print/0,1294,48253,00.html
Kortuem, G. (1998). Context-aware, adaptive wearable computers as remote interfaces to ‘intelligent’ environments. Second International Symposium on Wearable Computers, 58-65.
Kurzweil, R. (1999). The Age of Spiritual Machines. New York: Penguin Books.
Kurzweil, R. (2005). The Singularity is Near. New York: Penguin.
Kusserow, R. P. (1996). The government needs computer matching to root out waste and fraud. In Rob Kling (Ed.), Computerisation and Controversy: value conflicts and social choices (Vol. part 6 section E, pp. 653f). New York: Academic Press.
Lemonick, M. D. (1995, 17 July). Future tech is now. Time Australia, 44-79.
Levi, P. (1988). The Drowned and the Saved, trans. Raymond Rosenthal. London: Summit Books.
Lifton, R. J. (1986). The Nazi Doctors: medical killing and the psychology of genocide. New York: Basic Books.
LoBaido, A. C. (2001). Soldiers with microchips: British troops experiment with implanted, electronic dog tag. WorldNetDaily.com, from http://www.fivedoves.com/letters/oct2001/chrissa102.htm
Lukowicz, P. (2001). The wearARM modular low-power computing core. IEEE Micro(May-June).
Mann, S. (1997). Wearable computing: a first step toward personal imaging. IEEE Computer, 1(1), 25-32.
Mann, S. (2001). Wearable computing: toward humanistic intelligence. IEEE Intelligent Systems(May/June), 10-15.
Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments. Surveillance and Society, 1(3), 331-355.
Martin, C. D. (1995). ENIAC: Press conference that shook the world. IEEE Technology and Society Magazine, 3-10.
Masey, S. (1998). Can we talk? The need for ethical dialogue. IEE, 4/1.
Masterson, U. O. (2000, 1 May). A day with ‘Professor Cyborg’. MSNBC, from http://www.msnbc.com/news/394441.asp
Maybury, M. T. (1990). The mind matters: artificial intelligence and its societal implications. IEEE Technology and Society Magazine, 7-15.
McClimans, F. (1998, 2 September). Is that a chip in your shoulder, or are you just happy to see me? CNN.com, from http://www.cnn.com/TECH/computing/9809/02/chippotent.idg/index.html
McGinity, M. (2000). Body of the technology: It’s just a matter of time before a chip gets under your skin. Communications of the ACM, 43(9), 17-19.
McGrath, P. (2001). Technology: Building better humans. Newsweek, from http://egweb.mines.edu/eggn482/admin/Technology.htm
McLuhan, E., & Zingrone, F. (1995). Essential McLuhan. USA: BasicBooks.
McLuhan, M. (1964). Understanding Media: the extensions of man. Cambridge: MIT Press.
McLuhan, M., & Powers, B. R. (1989). The Global Village. Oxford: Oxford University Press.
McMurchie, L. L. (1999). Identifying risks in biometric use. Computing Canada, 25(6), 11.
McRoy, J. (2001). Science fiction studies. DePauw University, 28(3).
Michael, K. (2002). The automatic identification trajectory: from the ENIAC to chip implants. In E. Lawrence (Ed.), Internet Commerce: digital models for business (pp. 131-134, 136). Queensland: John Wiley and Sons.
Michael, K. (2007). Selected Works of Dr. Katina Michael. University of Wollongong Retrieved 5 October, 2007, from http://ro.uow.edu.au/kmichael/
Michael, M. G. (1998). The Number of the Beast, 666 (Revelation 13:16-18): Background, Sources and Interpretation. Macquarie University, Sydney, Australia.
Michael, M. G. (2000a). For it is the number of a man. Bulletin of Biblical Studies, 19(January-June), 79-89.
Michael, M. G. (2000b). 666 or 616 (Rev 13:18): Arguments for the authentic reading of the Seer's conundrum. Bulletin of Biblical Studies, 19(, July-December), 77-83.
Michael, M. G., Fusco, S. J., & Michael, K. (2008). A Research Note on Ethics in the Emerging Age of Uberveillance (Überveillance). Computer Communications, 31(6), 1192-1199.
Michels, S. (2002, 25 February). National ID. Online NewsHour, from http://www.pbs.org/newshour/bb/fedagencies/jan-june02/id_2-26.html
Mieszkowski, K. (2000). Put that silicon where the sun don’t shine. Salon, from http://www.salon.com/tech/feature/2000/09/07/chips/
Millanvoye, M. (2001). Teflon under my skin. UNESCO.org, from http://www.unesco.org/courier/2001_07/uk/doss41.htm
Mills, S. (Ed.). (1997). Turning Away From Technology: a new vision for the 21st century. San Francisco: Sierra Club Books.
Moravec, H. (1988). Mind Children: the future of robot and human intelligence. Cambridge: Harvard University Press.
Moravec, H. (1999). Robot: mere machine to transcendent mind. Oxford: Oxford University Press.
Nairne, D. (2000). Building better people with chips and sensors. scmp.com, from http://special.scmp.com/mobilecomputing/article/FullText_asp_ArticleID-20001009174
Negroponte, N. (1995). Being Digital. Australia: Hodder and Stoughton.
Newton, C. (2002, 27 February). U.S. to weigh computer chip implant. Netscape: Daily News, from http://dailynews.netscape.com/mynsnews/story.tmpl?table=n&cat=51180&id=200202261956000188605
Newton, J. (1995). Reducing ‘plastic’ counterfeiting. European Convention on Security and Detection, 408, 198-201.
Noble, D. F. (1999). The Religion of Technology: the divinity of man and the spirit of invention. New York: Penguin Books.
Norman, D. A. (2001). Cyborgs. Communications of the ACM, 44(3), 36-37.
NRPB. (2004). Understanding radiation: ionizing radiation and how we are exposed to it. National Radiological Protection Board Retrieved 1 May 2004, from http://www.nrpb.org/radiation_topics/risks/index.htm
Pace, S. (Ed.). (1996). The Global Positioning System: assessing national policies. New York: Rand Corporation.
Paul, G. S., & Cox, E. D. (1996). Beyond Humanity: cyberevolution and future minds. Massachusetts: Charles River Media.
Pickering, C. (1999). Silicon man lives. from http://www.cochrane.org.uk/opinion/interviews/forbes.htm
Pool, R. (1997). Beyond Engineering: how society shapes technology. New York: Oxford University Press.
Privacy Commissioner. (1990). Selected Extracts from the Program Protocol Data-Matching Program (Assistance and Tax). Sydney.
Quinn, M. J. (2006). Ethics for the Information Age (2nd ed.). Sydney: Pearson International.
Raimundo, N. (2002). Digital angel or big brother? , from http://cseserv.engr.scu.edu/StudentWebPages/NRaimundo/ResearchPaper.htm
Ramesh, E. M. (2004). Time Enough: consequences of the human microchip implantation. Franklin Pierce Law Centre Retrieved 1 March 2004, from http://www.fplc.edu/risk/vol8/fall/ramesh.htm
Relfe, M. S. (1982). The New Money System. Alabama: Ministries Inc.
RFID. (4 June 2003). Singapore Fights SARS with RFID. RFID Journal Retrieved 10 August, 2005, from http://www.rfidjournal.com/article/articleprint/446/-1/1/
RFID. (2003). Taiwan uses RFID to combat SARS. RFID Journal Retrieved 1 May 2004, from http://188.8.131.52/article/articleprint/520/-1/1/
Rhodes, B. J. (1999). Wearable computing meets ubiquitous computing: reaping the best of both worlds. Paper presented at the The Third International Symposium on Wearable Computers.
Roethenbaugh, G. (1998). Simon Davies- Is this the most dangerous man in Europe? Biometrics in Human Services User Group, 2(5), 2-5.
Rosenberg, R. S. (2004). The Social Impact of Computers. Sydney: Elsevier.
Rothfeder, J. (1995). Invasion of privacy. PC World, 13(11), 152-162.
Rummler, D. M. (2001). Societal issues in engineering [Electronic Version], 1-3. Retrieved 6 March.
Sacleman, H. (1967). Computers, System Science, And Evolving Society: the challenge of man-machine digital systems. New York: Wiley.
Salkowski, J. (2000). Go track yourself. StarNet Dispatches, from http://dispatches.azstarnet.com/joe/2000/0104-946929954.htm
Salon. (1999). Professor Cyborg. salon.com, from http://www.salon.com/tech/feature/1999/10/20/cyborg/index1.html
Salonen, P. (1997). ‘A small planar inverted-F antenna for wearable applications. Paper presented at the IEEE Tenth International Conference on Antennas and Propagation.
Sanchez-Klein, J. (1998). Cyberfuturist plants chip in arm to test human-computer interaction. from http://cnn.com/TECH/c...ng/9808/28/armchip.idg/index.html
Scheeres, J. (2002a). Kidnapped? GPS to the rescue, Wired News (pp. 1-2).
Scheeres, J. (2002b, 15 February). New body art: Chip implants. Wired News, from http://www.wired.com/news/culture/0,1284,50769,00.html
Scheeres, J. (2002c, 15 February). Politician wants to ‘get chipped'. Wired News, from http://www.wired.com/news/technology/0,1282,50435,00.html
Scheeres, J. (2002d, 6 February). They want their id chips now. Wired News, from http://www.wired.com/news/privacy/0,1848,50187,00.html
Schiele, B. (2001). Sensory-augmented computing: wearing the museum’s guide. IEEE Micro, 44-52.
Sensormatic. (1999). SafeKids™. Retrieved 3 June 1999, from http://www.sensormatic.com/html/safekids/index.htm
Sheridan, J. G. (2000). Spectators at a geek show: an ethnographic inquiry into wearable computing. Paper presented at the IEEE The Fourth International Symposium on Wearable Computers.
Sorkin, D. L., & McClanahan, J. (2004). Cochlear implant reimbursement cause for concern. HealthyHearing Retrieved 3 May 2004, from http://www.healthyhearing.com/healthyhearing/newroot/articles/arc_disp.asp?id=147&catid=1055
Stahl, W. A. (1999). God and the Chip: religion and the culture of technology. Canada: Canadian Corporation for Studies in Religion.
Starner, T. (2001). The challenges of wearable computing: part 2. IEEE Micro(July-August), 54-67.
Stephan, R. (n.d.). The ultrahuman revolution. from http://www.moneyzone.com/MTM_features3.28.cfm
Swissler, M. A. (2000, 8 September). Microchips to monitor meds. Wired, from http://www.wired.com/news/technology/0,1282,39070,00.html
Sydänheimo, L. (1999). Wearable and ubiquitous computer aided service, maintenance and overhaul. Paper presented at the IEEE International Conference on Communications.
Tapscott, D. (1998). Growing up digital: the rise of the net generation. New York: McGraw- Hill.
Tavani, H. T. (2007). Ethics & Technology: Ethical Issues in An Age of Information and Communication Technology. New York: John Wiley & Sons.
Toffler, A. (1981). Future Shock. New York: Bantam Books.
Trull, D. (1998). Simple Cyborg. Parascope, from http://www.parascope.com/articles/slips/fs29_2.htm
Tysome, T. ( 2001). Dance of a cyborg. The Australian, p. 35.
Unatin, D. (2002). Progress v. Privacy: the debate over computer chip implants. JOLT: Notes Retrieved 1 March 2004, from http://www.lawtechjournal.com/notes/2002/24_020819_unatin. php
van Laerhoven, K., & Cakmacki, O. (2000). What shall we teach our pants? Paper presented at the IEEE The Fourth International Symposium on Wearable Computers.
Walker, I. (2001). Cyborg dreams: Beyond Human: Background Briefing [Electronic Version]. ABC Radio National. Retrieved 4 November.
Warwick, K. (2002). Frequently Asked Questions. from http://www2.cyber.rdg.ac.uk/kevinwarwick/FAQ.html
Warwick, K. (2002). Professor of Cybernetics, University of Reading. from http://www.kevinwarwick.com
Warwick, K. (2003). Are chip implants getting under your skin? Compiler Retrieved 1 March 2004, from http://www.synopsys.com/news/pubs/compiler/art3_chipimplan-mar03.html
Warwick, K. (2003). I, Cyborg. Paper presented at the Joint Lecture: The Royal Society of Edinburgh and The Royal Academy of Engineering, UK.
Watkins, T. (1996). WARNING: 666 IS COMING! Dial-the-Truth Ministries, from http://www.secis.com/truth
Weber, D. O. (2000). Me, myself, my implants, my micro-processors and I. Software Development Magazine September. from http://www.sdmagazine.com/print/documentID=11149
Wenk, E. (1989). The design of technological megasystems: new social responsibilities for engineers. Paper presented at the IEEE Delicate Balance: Technics, Culture and Consequences.
Wherify. (2004). Frequently Asked Questions: Wherify Wireless. Retrieved 15 April 2004, from http://www.wherifywireless.com/faq.asp
Wilmington, M. (2004). Movie review, ‘Metropolis (Re-release). Metromix.com Retrieved 3 May 2004, from http://metromix.chicagotribune.com/search/mmx-17922_lgcy.story
Wilson, J. (2002, 3 September). Girl to get tracker implant to ease parents’ fears. The Guardian, from http://www.guardian.co.uk/Print/0,3858,4493297,00.html
Witt, S. (1999). Professor Warwick chips in. Computerworld, 89.
Woodward, J. D. (1997). Biometrics: privacy’s foe or privacy’s friend? Proceedings of the IEEE, 85(9), 1480-1492.