Preview

Human Microchip Implant

Good Essays
Open Document
Open Document
1312 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Human Microchip Implant
I shall walk toward my car completely naked and keyless and laughing maniacally and I shall wave my arm over a tiny scanner and the doors will open and the engine will start and the stereo will begin to pump out "Highway to Hell" at a nice respectable skull-thumping volume. And, lo, it shall be Good.

I shall stroll up to any ATM sans wallet and sans ATM card and I shall hold my arm over the screen and immediately withdraw four hundred dollars and then turn around to the big shiny vending machine and wave my arm again and get myself a nice bag of toxic neon-orange Doritos and a Diet Mountain Dew so I can poison my body in the American tradition without inserting a single piece of needless pocket change.

It is all possible. It is all just on the cusp. All we must do is welcome the sinister intimations and the positively draconian implications and say a big warm slightly terrified hello to the new, FDA-approved implantable microchip, coming soon to a hospital and a Starbucks and a bleak government agency and a human dermal layer near you. Very, very near you.

Have you seen it? Did you check out the pictures? Microchips the size of a grain of rice, programmed with all manner of data and inserted just under your skin and it's all completely legal and government approved and it's happening right now. I mean, who knew microchipping your pet and implanting livestock would lead to this? Oh right -- everyone, that's who.

The wait is over. No more Philip K. Dick sci-fi fantasia, no more far-off Orwellian Big Brother. We are there. Or, rather, here. This new chip is already being implanted in medical patients for the alleged purpose of tracking their health needs and speeding treatment and it is right now being used in the flesh of employees working in high-security areas to ensure they don't swipe top-secret pens and classified pads of Post-it Notes.

Which is to say, you have been warned. Human skin has already been penetrated. Alarms are already sounding

You May Also Find These Documents Helpful

  • Good Essays

    Adam's Calendar Summary

    • 1410 Words
    • 6 Pages

    Only time will tell. However, anyone that is open-minded enough to look at the evidence (from the tablets and Tellinger's work) without completely dismissing the idea that the human race could have been genetically engineered at some point, will realize that it is at least a possibility.…

    • 1410 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    The Digital Angel’s VeriChip is placed beneath your skin to monitor the following: identifying you, tracking you, and monitoring your health. The system is powered by body heat. There is potential that it will be used for monitoring chronically ill patients, tracking livestock to ensure food quality, tracking people that are at risk of kidnapping, enforcing the terms of parole, and identifying people for security and e commerce applications. The information from the chip is relayed either to another GPS signal or to a wireless communications signal to a remote monitoring system. The only way the chip would be activated would be by controlling authority. Once the VeriChip is in your body you can make payments online using the chip. By having a MSN or AOL account you can set up a profile, which could help when buying things online.…

    • 1426 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Leg 500 Assignment 1

    • 939 Words
    • 4 Pages

    We are certainly in the age of technology, but with all technology that is available, where does the line of privacy lie? More and more technical gadgets are being tested and manufactured for the convenience of individuals to enjoy them in the privacy of their own homes. Also, any business or public place you visit with most likely be ran by the aid of some sort of technical gadget. Society has become so used to this, no one really questions when personal information is asked to be shared to a complete stranger and typed or scanned into a piece of technology. Who knows where all of this information is going? With emails, cell phones, and google, it’s virtually impossible NOT to get someone’s personal information.…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Qr Codes and Nursing

    • 1098 Words
    • 5 Pages

    Originally invented in 1994, by the Denso Wave Corporation in Japan, Quick response codes, or QR codes were intended to for the auto manufacturer Toyota as a means to track vehicles, as well as vehicle parts, during the manufacturing production stages of building their cars. The QR codes were designed to allow Toyota manufactures to identify parts by scanning a two dimensional barcode, or, QR code at high speed. Since its inception in 1994 QR codes have become one of the most popular types of barcode used in Japan. Used primarily through Smart phones, this technology quickly allows consumers to access information contained in the QR code. In recent years the QR barcodes have infiltrated the United States via consumer advertisers and packaging companies. QR codes can be found on direct mail from advertisers, billboards, buses, internet ads, and have even crossed boarders into the healthcare industry (Wikipedia, 2012). Even the Federal Government is adopting the use of QR codes to reduce the risks associated with mistaken personnel identification. The United States Department of Defense has also boosted identification (ID) security of employees by adopting smart ID cards, which are essentially QR codes. Instead of using the traditional ID card with employee photos, the Department of Defense has issued smart ID cards which act much like QR codes, however, they more are more expensive to produce, and require ongoing IT support. Although they are more expensive than a traditional ID card, The Smart ID cards allow for faster verification of personnel, and may ease some of the pressure on security officials who have to use their judgment based on an ID card flashed in their face. With one scan of the QR code, down to the minute, information can be displayed, which includes, authorizations for the employee, or their qualifications and, or credentials. The purpose of this communication is to explain the advantages and disadvantages of participating in a QR code pilot…

    • 1098 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Our technology is driving society to a world in which Big Brother is watching. There has been many technological advances made over time that can be used by the government to have power over the population. Many people are unaware of this situation they have been placed in the instant that they make a phone call, log into a computer or send an email.…

    • 979 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The sound of beeping awakens you. With difficulty and trouble, you force yourself out of bed, your brain still not yet conscious. You get your uniform and proceed to head to the bathroom to get ready for school. Minutes pass by quickly and you are walking to school, lost in deep thought. For some time now, you have not yet listened to the world around you. As you gently shift your focus towards the world before you, your ears process the sound of anger at its highest level. You cannot believe what you hear. Vexation fills the air and you are now in an ever so dangerous environment. As you turn the corner, the sounds of the shouting get louder and louder. You can now hear loud running. Your eyeballs move to look around and then you see it…

    • 1355 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Genetic Engineering Debate: Are There Lines We Shouldn’t Cross? written by Jessica Erickson, shows that just because we can genetic engineer, doesn’t mean we should leave it unsupervised. Currently genetic engineering is available for plants, animals, and humans. Genetic engineering for plants and animals is quicker and less complex then doing it on humans. The next subject Erickson wrights about is the uses of genetic engineering. Erickson believes that genetic engineering could be good if it benefits diseases, prevent, and treatments, on the other hand Erickson believes genetic engineering could be bad if it is used for “designer babies”. Erickson believes that there should be a “Do not cross line”, which means that there should be government…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    MicroCHIP Technology- A Renovation in Diabetes Therapy Table of Contents: List of tables and Figures ……………………………………………………………….. 3 Abstract ………………………………………………………………………………… .4 1.0 Introduction…………………………..………………………………………………5 1.1 Back ground of Problem…..…..……………………………………………... 5 1.2 Substitute Technology...…………………...………………………………….8…

    • 5192 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    1984

    • 714 Words
    • 3 Pages

    I completely agree that our technology today is bringing us closer to the world of Big Brother. I agree because even though we are not forced necessarily to mask emotions and hinder temptations, most of us (U.S.) lead lives which in reality are lead by the technology at our disposal. I would not be surprised if the government taps into our many devices such as computers, phones, and even private surveillance cameras to monitor our every breath and move. This greatly worries me, it makes me want to get out of this country and find refuge in a technology free paradise.…

    • 714 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In “Unreality Stars”, Andrew Marantz talks about how almost “one percent of the United States’ population suffers from schizophrenia”, resulting in them not being able to determine what is reality and what is not (33). Some of the people who suffer from this extreme paranoia think that technology is their enemy because they may feel that they are being recorded on a live reality television show without them knowing or that the C.I.A has inserted computer chips into their brains. While those scenarios are highly unlikely, the unfortunate truth is that with today’s technology, people are being spied on and it is being used against them. Today, people of the United States are surrounded by technology everywhere they go, and the vast majority of the people fail to recognize the threats this poses. The purpose…

    • 1533 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Tibor R. Machan says that animals do not have rights, there fore it is okay to experiment on them. But many people disagree. The Daily Californian says that on June 19, 2014, about 15 protesters laid motionless in public to protest against animal testing at the UC Berkeley Research Labs. Many people agree that animal testing is cruel and inhumane. Animals can be harmed because they are tested on for cosmetics and medicines. With our technology now, there are altenatives to testing on animals. Cruelty Free International states, " The device, which is about the size of a smartphone, Is known as a human-on-a-chip." This device uses cells from different organs linked together to mimic the human body. This method is cheaper and cruelty free. Also, PCRM took a survey and the results were 72% of people were against animal testing, especially for useless things like…

    • 467 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Protecting the privacy of patient information is one of the top priorities of all healthcare providers and is specifically required by various state and federal laws. On February 17, 2009 the American Recovery and Reinvestment Act of 2009 (ARRA, sometimes referred to as “the stimulus”) included provisions making significant improvement in the privacy and security standards for health information was signed into law by the federal government (http://www.hpsafind.hrsa.gov). Included in this law is $19.2 Billion which is intended to be used to increase the use of Electronic Health Records (EHR) by physicians and hospitals; this portion of the bill is called, the Health Information Technology for Economic and Clinical Health Act, or HITECH Act (http://www.opencongress.org/bill/111-h1/show). The Act is directed towards protected health information that is not secured by a technology standard that renders protected health information unusable, unreadable or indecipherable to unauthorized individuals. Additionally, it addresses entities subject to the Health Insurance Portability and Accountability Act of 1996 (HIPAA) that access, maintain, retain, modify, record, store, destroy, or otherwise hold, use, or disclose unsecured protected health information. The HITECH Act require patients be notified of any unauthorized acquisition, access, use or disclosure of their unsecured protected health information.…

    • 1188 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Alien Implants

    • 244 Words
    • 1 Page

    Alien abductions seem very dangerous and scary. Although there isn’t any actual evidence of alien abductions there is something that might show us that alien abductions are real. In the video, “Alien Implants,” Dr. Roger Leir talks about how he has found a strange object in people’s bodies that have been abducted. He says that it's a small perfect T-shape figure that is coated in a gray material, he assumes that this is an alien Implant. This gives us a great hint that aliens are real. Dr. Roger Leir shows a lot of credibility because he has been doing surgeries on people who say have been abducted for nearly thirty years. He has said he hasn’t seen anything like this figure before, and for someone with many years of experience he would…

    • 244 Words
    • 1 Page
    Good Essays
  • Good Essays

    The use of RFID in patients with Alzheimer’s disease can be very helpful since information about the patients can quickly be retrieved when the patients cannot provide the information themselves. However, there are ethical considerations with the use of RFID. The principles of information privacy and security come into play when using this new technology. Patients do not have control over who can access their information. I feel that the risk of violating HIPPA is very high when using this technology. As of right now, I feel that the risks of unauthorized access and misuse of patient information outweigh the benefits of RFID.…

    • 103 Words
    • 1 Page
    Good Essays
  • Good Essays

    Gillian Mohney, a reporter for ABC News, explains how in 2013 over 300 devices made by 40 different companies are potentially vulnerable to hacking, including ventilators and drug infusion pumps. Although these issues were eventually fixed, “A larger concern, Lewis said, is that there is a chance a hacker attempting to get patient data could accidentally knock out medical devices connected to the Wi-Fi network, such as an MRI or X-ray machine” (Mohney). These incidents are not limited to outside interference in hospital’s cyber security as Harold Thimbleby claims. Harold Thimbleby, professor of computer science at Swansea University, clarifies in his report on a criminal case in the United Kingdom. Tech co., a company that produces blood glucometers to be used in hospitals, was found to have “tidied up” the database but provided no record of what they had done, this caused discrepancies. The hospital in order to prevent discrepancies over recorded data should have taken control over the records and improved cybersecurity in order to prevent tampering with the data. With Hospital equipment being ill-fit to run in our increasingly wireless world a more important problem arises, what about the portable medical…

    • 1088 Words
    • 5 Pages
    Good Essays

Related Topics