Facial Recognition was initially developed with good intentions in mind to assist individuals and businesses nationwide with a safer means for citizen identification. Since its initial development, it has morphed into a platform that is being used all over the nation for good intentions, as well as bad intentions. Certain government entities and businesses feel like this platform is a wonderful extension, because they can use it to assist with payment transactions, make boarding a plane more efficient and track down wanted fugitives more easily. Certain people feel like this platform is helpful, because it gives you a sense of being able to identify yourself via cell phone or computer without having to enter passcode's or other personal information. (Face ID: Apple's Most Intriguing and Impressive New Feature) On the other side of the spectrum, this platform could be a catastrophic event in the making. It is possible that this platform could end up in the wrong hands and create a degree of identity theft that effect individuals on a greater spectrum. Businesses and government entities could also use this practice to violate citizens’ rights and privacy under the Amendment. (Lynch) Some regular everyday citizens could be tracked while going about their daily lives for no apparent reason, and without their consent. (Solon) The author states that this technology is known as Facial Recognition Technology. She confirmed that is was created in the 1960’s, by a man named of Woodrow Wilson Bledsoe. (Bledsoe). It works by using various features of the face to identify someone in a digital framework database. The author states that following the invention of this technology, various individuals and companies made various revisions to the platform and started implementing it within their organizations. The invention was intended to explore a safer way to identify citizens, as well as gain the ability to share information without private personal information being breached and compromised by the hands of cyberthieves.(Stroup) Although the author feels like the concept behind the initial idea behind the concept is brilliant, she also feels like the whole idea can result in negative consequences; due to mistaken identity, security breach, or decreased privacy due to organizational breaches of consumer data information and government interrogation. She states that there are several countries who have already implemented this practice in place, regarding the use of a citizen’s face for methods of payment or a source of identification. Singapore is implementing the platform by attaching a camera to their lamppost to help the authorities identify wanted suspects. (Loh) The United States have built a biometrics database that assist the law enforcement agencies with having on demand photos of people who are wanted and even people who favors a sketch of a potentially wanted criminal using mobile devices. She states that law enforcement agencies use surveillance cameras for more current real time photos to track people as move about in their daily lives. These tools, along with the use of Facial Technology could jeopardize the very reason of what this country symbolizes. Freedom, creativity, and the ability to go where you want without being targeted for no apparent reason. The author states that Malaysia is using the platform to assist passengers in boarding flights more quickly. The author states that China’s traffic division is utilizing this platform to publicly embarrass citizens who jaywalk by publicizing their photo and pick wanted fugitives out of a crowd. (Loh) She states that China also uses the platform for the completion of fast food transactions within local eateries. She states that even though, there is a huge benefit in the diversity of this platform, it does not stop citizens from being concerned; because of the amount of information that is being shared with these countries about someone. Regardless as to how anyone feels, the author feels like this is the current trend that is setting the stage for the future, and more countries are jumping on board by the minute to utilize this technology in one way or another. The author states that there are many disadvantages to this facial recognition platform, and those disadvantages could potentially have catastrophic effects for everyone involved. The authors talk about the aging face or cosmetic changes that occur in the life of a human being for one reason or another. The author states that according to a study conducted by Michigan State University, a biometrics expert concluded that the platform could pose an accuracy concern, and have difficulty tying the face of an aging participant to an older picture after a 6-year time span. She states that the timeframe could be sooner, dependent upon various external factors that could affect an individual in a negative manner. (Adler, and Jane) The author states that some organizations such as Facebook are using the facial recognition platform to breach citizen privacy but storing biometric photos into a digital database without the user’s permission. (Bennet) She states that every time someone post a picture on the social media platform, their data is collected and could be later sold to third party organizations. The author feels like this could potentially open the door for life shattering identity theft cases, and well as pose a breach in privacy; especially if the user did not authorize the platform giant the permission to collect such data. The author states that there was a proposal of bills that were unsuccessful in its attempts to provide consumer data protection for facial recognition to everyone involved. She states that only one state was granted that protection, but the scope of its protection is extremely limited. The factors in the author’s life that has influenced her interest in this topic was due to her being a victim of identity theft. She states that she knew what it meant to go through the hassle of having to deal with all sorts of headache and frustrations in attempts to get her life back on track from her personal data being stolen and used in a fraudulent manner. This is an experience that the author states that she will remember for the rest of her life, because of all the hoops that she had to go through to prove herself. The author states that she had to show that she was not responsible for all the new collections accounts that piled up quickly on her credit report. From the, growing amount of companies that had to be contacted, to the mounds of paperwork that had to be completed all in the hopes to restore her good name. It was a long, grueling process, that the author states that she would never wish on anyone. The whole experience has made her extremely paranoid to this day when it comes to sharing her personal and private information with anyone. The author states that even when it comes to her sharing her personal information over the phone to a reputable source, she remains very leery. Due to what the author has experienced in her personal life, the whole idea behind facial technology is intriguing, but it does come with some pros and a lot of cons. The author states that although it’s not the worst idea, the advantages and disadvantages that can be very costly for people worldwide. The author does reference advantages such as ease of transaction, using stored biometrics information. She also points out the shortened timeframe that it takes for people to easily board flights due to the use of this technology. She states that this use of technology is great because identity thieves are everywhere, and all it takes a person being in the wrong place at the wrong time for the wrong person to gain access to your personal information and wreak havoc on your life. The author wants one to do a real hard reality check and imagine the type of detrimental effects that would arise if someone’s identity and biometric information is taken or shared without the consumer knowledge. This could easily occur with the use of the facial recognition platform being released into the wrong hands with ill intentions. The author states that this day and age, identity theft could stem from sources that you never would have imagined. She states that social media platforms or government breaches could easily be hacked by organizations who are posing as a third party looking to buy stored consumer information as a sales tactic. The author feels like that if these companies who collect consumer information without consumer knowledge are not stopped, this alone could produce catastrophic results. She states that the advantage of this type of technology could have more of a disadvantage than an actual advantage. There are so many reasons why the author states that she is not comfortable, but the main ones that the author constantly reference is due to mistaken identity, security breach, or decreased privacy due to organizational breaches of consumer data information and government interrogation. Just like the world is always changing, so are people. She states that there are so many things that could influence the way a person looks from one day to the next. The author states that sometimes people are involved in terrible accidents or start messing with drugs that could completely disfigure them. People can also change their facial features; for personal reasons. Before you know it, that person can also transform into someone that looks completely different to the person that they once were. The author feels like these changes would disrupt the memory of the biometric system and cause more harm than good. She states that even though some countries make it mandatory for a citizen to update their picture every 6 years, all types of physical changes could occur within that time frame. (Adler, and Jane) The author feels like this flaw could cause someone to gain access to things that they were not entitled to or even cause someone else to be targeted for a crime that they did not do. The author would like laws to be created to protect consumer data if organization are posing as third-party retailers, who turn out to be an intelligent ring of identity thieves looking to gain illegal access to personal information. The author feels like if this technology will not be discontinued, then there should be a department dedicated to maintaining the integrity of this platform, since this holds the key to our livelihood. The author feels like this facial recognition is a massive platform that has outgrown the realm for which it was initially created. She states that this platform has too many loopholes that can be infiltrated, because it does not have (Adler, and Jane) the proper security measures in place. The author feels like the outcome of keeping it around is not worth the devastation that millions of citizens would endure due to carelessness and negligence. She states that the ongoing problem of security breaches and misidentification is not worth the risk of producing a massive catastrophic event that would affect everyone involved. The author is devasted by the outcome of future generations, that would be affected by this platform. She feels like the world as we know it, would change forever in a negative manner. The author feels like there should be laws put in place to govern and track everyone who has access to the information stored within this platform. For these reasons, the author feels like the facial recognition platform has to be stopped. Works Cited Adler, Jessie, and Anil Jane. “Aging Faces Could Increase Security Risks.” MSUToday, Michigan State University, 1 Mar. 2017, msutoday.msu.edu/news/2017/aging-faces-could-increase-security-risks/. Bennet, Jared. “Facebook: Your Face Belongs to Us.” The Daily Beast, The Daily Beast Company, 31 July 2017, www.thedailybeast.com/how-facebook-fights-to-stop-laws-on-facial-recognition. Bledsoe, Woodrow Wilson. “A Facial Recognition Project Report : Woodrow Wilson Bledsoe : Free Download, Borrow, and Streaming.” Internet Archive, The Library Shelf, 1 Jan. 1963, archive.org/details/firstfacialrecognitionresearch. “Face ID: Apple's Most Intriguing and Impressive New Feature.” Dotsquares, 23 Mar. 2018, www.dotsquares.com/news_events/face-id-apples-intriguing-impressive-new-feature/. Loh, Lainey. “Which Countries Are Already Employing Facial Recognition Technology?” Which Countries Are Already Employing Facial Recognition Technology?, Asia Correspondent, 17 Apr. 2018, asiancorrespondent.com/2018/04/which-countries-are-already-employing-facial-recognition-technology/#ViAGF5lZsBS7A3zo.97. Lynch, Jennifer. “Face Off: Law Enforcement Use of Face Recognition Technology.” Electronic Frontier Foundation, 23 Feb. 2018, www.eff.org/wp/law-enforcement-use-face-recognition. Solon, Olivia. “Facial Recognition Database Used By FBI Is Out Of Control, House Committee Hears.” The Guardian, 27 Mar. 2017, www.theguardian.com/technology/2017/mar/27/us-facial-recognition-database-fbi-drivers-licenses-passports. Stroup, Jake. “Why Biometric Identification May Not Be All It's Cracked Up to Be.” The Balance, The Balance, 7 Apr. 2018, www.thebalance.com/biometric-identification-and-identity-theft-1947595.