rdfs:comment
| - Once upon a time, infiltrating a base was pretty easy: just knock the guards out, take the keys, and get in. Fortunately, modern high-tech facilities, or in The Future have more cunning devices, and can identify the guards by unique biological features, such as handprints or retinal scans. These cunning devices are reliable, efficient, and not prone to believing just anyone who happens to be wearing the right uniform. Great, huh? Note that this is not about bypassing biometric scanners in in general. This is about the bloody way to get around them. Examples of Borrowed Biometric Bypass include:
|
abstract
| - Once upon a time, infiltrating a base was pretty easy: just knock the guards out, take the keys, and get in. Fortunately, modern high-tech facilities, or in The Future have more cunning devices, and can identify the guards by unique biological features, such as handprints or retinal scans. These cunning devices are reliable, efficient, and not prone to believing just anyone who happens to be wearing the right uniform. Great, huh? Unfortunately, the more dangerous individual won't need to get your guards to agree: He'll find someone with the right access, and engage in some very unpleasant surgery. He may remove a guard's eye, or he may simply lop off his or her head and hand with a big ol' sword. Then equipped with those body parts, he'll simply apply these to the biometric authentication device in question, and get through. This raises the question of whether or not any such devices would be able to tell whether the hand or eye in question was attached to a living body. In reality, this actually is a key consideration in designing biometric security. Some devices (the cheaper ones, mostly) ARE vulnerable to this kind of thing. Needless to say, such a weakness is considered an absolute disqualification for usage in any classified government facility. This is rarely used by good guys, as it's definitely on the morally dubious side of things, even if you don't kill the victim. A more moral person may have to talk or threaten the guard into showing his Eye-D, or simply wrestle the poor Mooks into place. Note that this is not about bypassing biometric scanners in in general. This is about the bloody way to get around them. Examples of Borrowed Biometric Bypass include:
|