First: Facial recognition.
How: What can only be described as an absolutely mad grab by every major corporation involved in computers and software to secure a copy of every photograph ever taken by anyone anywhere in the world.
Second: Biometric recognition
: By incorporating access to anything electronic using personal identifiers. This is not merely facial recognition. This will include biometric recognition of every individual's unique chemical profile as described by their sweat
. Using an array of sensors built into everything, perhaps even your clothing, individuals can generate a unique ID that is based upon a combination of their sweat and the product that is reading it. A unique key.
A key to open what? Answer: You.
This data will be supplemented by interpretation of whole body movements
, postures, or calculable size and weight. Ever recognized someone from afar because you could just tell it was them? You're not the only one. And soon, not the only thing
You already know that every non-cash purchase you make is tracked, don't you? Oh, and think your medical data, what prescriptions you take, will somehow be protected by HIPAA? Don't make me laugh.
: User-facing cameras capturing your continuous expressions and eye movements
, as well as what you are typing, or what you are dictating into your electronic devices (as I am right now). It does not matter whether you type it or it is dictated
: all communications are and will be processed algorithmically to determine what you are thinking, and what you will think. And ultimately: what you will do.
Next thing to accomplish: electronic sensors as arrays built into your phone, your computer, your clothing, your car...everything. And lasers work, too. Lasers can identify what you had for lunch
How: When an individual's behavior matches a profile or template, it will generate specific content and experiences to be delivered to that individual -- or possibly elicit a response from something or someone else. Thus, it will not be necessary to "spy" on everyone.
It will only be necessary to determine when every individual intends to do something that is of interest to those who handle or control this information and predictive capability.
In this sense, you might think of every individual as having a potential covalent bond, as in chemistry. Or, more accurately, every individual's behavior will be matched with an electronic receptor. A "socket" will exist as a profile for kinds of behavior, and your individual behavior will be of interest if and when it matches a profile -- like a puzzle piece.
Conclusion: When all of the above occurs (and it is already well underway), certain people will know everything there is to know about you whenever they choose to know it.
Mostly this will just automatically feed electronically-delivered goodies to you that are interesting and useful. The overarching desire is that you buy something. But if you appear likely to do something
not approved, your activities will match a profile that will trigger a protocol and you will be flagged for appropriate action
By, the way: Sorry...just by turning on your computer, you are now on "the list." Oops.