2. 3 4 5 7 8 INTRODUCTION MARKET RESEARCH SCENARIOS THE OPPORTUNITY WHERE WILL IT TAKE US 2
3. introduction There are 7 billion people in the world. How can you not get lost in the crowd? Stop and take a moment to think. How many cards do you have in your wallet? How soon do you have to get your passport renewed? How many times a day do you deal with locks, passwords, and other protections in order to protect your possessions, information and identity? How many days will you take off work to maintain your “identity” this year? Access to your information is being controlled by various entities. The government, credit card companies and Google are keeping track of your health, your finances, your purchasing behaviour and your interests. With all this information being passed around, sold to third parties, leaked accidentally, how much say do you have over who gets to know the “real” you? We have granted strangers free access to our lives. We feel entitled to personal information of our friends, rather than privileged. The internet has become our playground. But how safe is it? 582M Smart Cards in circulation worldwide, 20071 The authentication, mobile device security and identity market is worth over $5B2 35% of banks had a biometric authentication program... In 2005 The number of U.S. identity fraud victims increased 22 percent in 2008 to 9.9 million adults.3 Canadians lost $10.8M to identity theft in 2009 alone. This figure has been growing at 29 percent a year.4 (1) Smart Cards in the US, Contactless Payment Cards, May 2007 (2) Internet Security, Privacy, and Fraud, Packaged Facts, Oct 2005 (3) Javelin Strategy & Research, February 2009 study (4) http://www.phonebusters.com/english/documents/AnnualStatisticalReport2009_001.pdf 3
4. market research The world as we know it is changing before our eyes... Nations the world over are switching to biometric passports to identify travelers. Manchester Airport uses facial recognition to allow travelers to bypass lineupsandgovernments to check anyone against international watchlists. Lockheed Martin is giving 1 million maritime workers access to secure areas of portsvia finger and iris scans, stored on biometric ID cards. The US, Australia, Britain, and Canada have created a biometric database to help combat terrorismand rapidly identify victims in large-scale disasters. PositiveID markets FDA-approved RFID microchip implants for patient identification applications, and is developing implantable glucose sensing microchip Biometric passports Security speed access Finger & iris scans biometric database combat terrorism identify victims RFID microchips Implantable glucose sensors Source: BusinessWeek Online; 5/21/2009, p2-2, 1p 4
5. scenarios No matter who you are and where you live, nothing is more important than your identity. Meet Richard. He is 50 years old. Richard works in for a large multinational company. He has been travelling between 4 different countries for the past 7 years working on various projects. He’s tired of waiting in lines at airports and getting his passport renewed. hundreds of hours wasted inefficient processes passport renewed. “I’ve wasted hundreds of hours going through the same, inefficient processes,” Richard says. “System glitches and human error have cost me countless of dollars in terms of time and wages. I’m tired of this.” He is a member of different VIP travellers groups, and despite their promises of time savings and line bypasses, John continues to waste countless of precious hours in queues. tired of waiting Meet Margareth, she is a 23-year old administrative assistant in Port-au-Prince and a native of Haiti. After the earthquake, she could not locate her husband Roméo, who was a peacekeeper for the lack of awareness “hate this way of living” can’t trust anyone anymore 5 UN. She was unable to find him in the chaos, since the UN headquarters had collapsed in the earthquake, as well as their home in the outskirts of the city. She searched through the rubble of her home for days, but was not able to find his body. The area around his office building was far too dangerous, and none of the authorities or police were able to give her a clue as to whether he was still living, potentially injured in some hospital without a way to communicate with her, or whether she should grieve his loss. She kept on hanging on to hope, wishing there was some way to know for sure where he was, and how he was doing. She wanted answers, so that she could be reunited, or find his body so that she could give him a proper burial.
6. 6 the common need How do you define living? Do you exist if no one knows who you are? paycheques ...needs a summer job to pay for school and new car. living expenses work Without ID will governments believe you exist? ...will soon require emergency services at hospital. travel food ...plans to travel to Asia this summer. health care
7. identifying the opportunity introducing Constient your key towards complete digital awareness what is Constient? how is it possible? Why do we need it? the ability to be digitally aware of others, and have others digitally aware of you what if technology could flawlessly identify you? wouldn’t that change everything about how we live, work, and play? it is freedom from worry of fraud or theft, of the hassle of PIN codes and passwords of carrying ID and forgetting it of misplacing your keys of lineups and hours wasted updating IDs and government documents the technology is out there biometric databases facial recognition human RFID implants sensor networks subdermal health sensors 7 what is the future of Constient? A world where all your data, from government documents, to your car keys and your gmail account are all centralized in one location – YOU. Forget having to carrying 50 different keys, cards and passwords to access 50 different locations and services. This will be one key giving you instant access, instant recognition, and perfect service – just the way you like it. Let us open the way for you, it will be the last ID you’ll ever need.
8. 8 IMPACT where will it take us? INTENSIFICATION BEHAVIOR Food Selects You One-think Shopping Non MassTransit Data Civil Rights Random Acts of Randomness Custom Manufacturing Predictive Services Consumer RFPs Behavior Recommendations Virtual Democracy Individual Price Discrimination Corporatacracy Manipulation Interactive Virtual Ancestors Iterative Social Contract Hacking Big Brother Interactive Flora & Fauna Off The Grid Micro Testing Data Aggravation Data Conservation Life Regression Modeling Smart Product Design Social Engineering Info Piracy Data Aggregation Data Junkies Credibility Auditing Relationship Ratings Selective Memory Independent Data Profiling Negotiation Fishbowl Guarded Confident Indiscretion Artificial Intelligence Alliances Carefree Smart Medical Personal Data Constient Tribalism Semantic Reviews Auto-Friending Boredom Preemptive Purchase Shopping Loyalty Wallet-less Arms Length Digital Freedom Gesturing Social Norms Hacking Scanners Standards Unobtrusive Enforcement iLawyer Etiquette Jurisprudence Permissions Installation Tool Digital Identity Trustworthiness Biometric data Privacy Laws Design D.I.Y. Understanding Security Algorithms Memory Trends Programmers Learning Com. Protocols Personalized Branding Proxy Management Pro Personal Firewall Risk Mitigation Personal Apps Simulation Wireless Encryption Real-time Promotions Black Market Password Constraints Data Mining Cookies Data Snooping Boundary Conditions Credibility Bureaus Software Profiling Processing Verification Data Mgmt. India/China Insurance History Meta Data Analysis Underwriters Trend Analysis Profile Management Smart Relationships Life Evaluation Personal Marketing Campaigns Prediction Lifecycle Management Nano-Segmentation Clones Personalized Consumerism Rating Agencies Genealogy TOOLS
9. 9 Where will it take us? DISRUPTION AMPLIFICATION BEHAVIOR Going “Dark” Real-time purchase monitoring Health scan for roller-coasters Perimeter Alert Sex offender registry Digital Alibi Battle drugs Access personal history Digital Mimicry Retail analysis Employee tracking VIP Guests Find Friends Chip engaged ignition Search and rescue Monitor Kids Virtual Reality Personalized Insurance premium Health 2.0 Big Brother Background profiling Health monitoring Financial security Anti-terrorism Stalking 2.0 Behaviour cessation Exercise diet aid National security Search and rescue Preventative medical tracking Marriage 2.0 No Customs Line .Corporate espionage Fatigue monitoring Protection Data Profiling Viral warefare Proactive health Control Location-aware commerce Travelling Coordinate large crowds Getting “chipped” Personalized recommendations Identity Theft Gene warfare Personal Data Constient Hacking Fishbowl Selling Data Payment Addiction cessation Traffic coordination Google AdSense Proximity scanning Document digitization Micro RFID Airport bioscanners Digitized personas patriot act Personal insurance premiums Elite bypass Biometric monitoring subdermal install intelligent drug dosages Electro-mechanic power Personal data storage Bio sensors Digital Angel The Cloud Personal algorithms Multi-layer encryption biometric IDs Tamper resistant hardware Biofeedback alerts Privacy Laws NEXUS passes Smart cards Genomic targeted viruses Implant app store Personal Apps Random number generators Miniaturization + nanotechnology Implantable phones Micro-segmentation Holo band Neocortical interfaces Privacy Litigation Real-time video tracking GPS age sensitive screening securID Computer viruses attack you Wireless data transfers Jawbone readers Reality overrides Global real-time positioning Virtual clones Hearing override Virtual reality Profile Management Backdoor code Payment for clone access Personal History data Personal worlds Perfect personal product positioning Real-time stimulation Instant learning by upload Neural integration Global translation for VR interactions Automated Threat Assessment Scanning blockers TOOLS
10. 10 Personal Data Constient where will it take us? MARKET MAXIMIZATION DESIRE Always on Fear Utopia Rebellion Escapism Conditioning Eternal youth Community Unbounded Training Big Brother Transparency Safety Resistance Personal shopping Reality TV Media dependence Interactivity Perfectionism Carefree Conformity Personalization Customized Religion Freedom Survival Desire Health Carnality Social engineering Consumerism Un-Think Gratification Me-focus Progress Pleasure Control privacy Smart Services Nanotechnology Security 3D Chip cards Government Mass customization Education Identification Implants identity theft Biomimicry Banks Monitor IVF Non-invasive Cloud computing Media spin Privacy Laws Smart Products Marketplace RFID Apps Biotech Internal Apps Crowd sourcing Personalized media Hackers Stem cell research Smart relationship Online avatars Real-time promotions Prosumerism Intelligent packaging Thrift Social media ECONOMY
11. 11 the future of digital identification MAJOR Virtual Democracy MAP INSIGHTS Data Profiling Data Aggregation Negotiation IMPACT Crowd sourcing Digital Identity Digital Freedom Prediction Personalized Consumerism Big Brother Identification Neocortical interfaces Implants Customized Neural integration Virtual Reality MARKET Resistance Smart relationship Freedom Miniaturization + nanotechnology DISRUPTION Genomic Viruses Smart Products Personal shopping Automated Threat Assessment
13. Inconvenience to users: 36 % of users have between six and 15 passwords to remember 18% have more than 15 unique identifiers to memorize Costs to Firms: 25 to 35 per cent of calls made to IT helpdesks are password related at an estimated cost of around $25 to $30 a call Appendix Passwords cost money Source: http://www.securitypark.co.uk/security-market.asp
14. Appendix A 100 Billion dollar idea Disrupted Industries Value loss avoided Source: http://www.securitypark.co.uk/security-market.asp