Uses and Abuses of Biochip Technology

1696 Words4 Pages

Topic:

Biochip Technology; Uses and Abuses

Working Hypothesis:

What is the correlation between the prophecy of "the mark of the beast", and current trends in biochip technology?

Intro/Thesis statement:

Technology is chipping away at our personal freedoms. In the New Testament, Revelations 13 warns " He also forced everyone, small and great, rich and poor, free and slave, to receive a mark on his right hand or forehead, so that no one could buy or sell unless he had the mark, which is the name of the Beast or the number of his name...". Bible scholars fear that this passage reflects the modern world, and its use of numbers for authentic identification. Imagine the potential of a computer chip to help or hinder the identification process. We are arriving at a time in history when our government is forming an alliance with science and technology. As our generation increasingly embraces technological advances, we continue to witness the ongoing neglect of our personal liberties and private lives. The potential for our global rulers to catalog every single human being, depends on the use of Biochip Implants.

This is the generation of a technological revolution. Just like our ancestors witnessed the spread of the industrial revolution, we are experiencing parallel advances in society today. Technology increases the speed of access to information, which we have at our disposal. Through the advances of technology, the venues in which we have to communicate are almost unlimited. All ranges and ages of individuals can be found using cell phones, ATMs, computers and TV's. We have grown to rely on the microwave, the Internet, E-Z Pass, just as we did the automobile. Satellite images, Global Positioning Systems, wi...

... middle of paper ...

...t concerns America. In 1959, Alan Westin was a member of the special committee on Science and Law, of the Association of the Bar of the City of New York. The special Committee sought to hypothesize the interaction of science and legislation, technology, and the general public. Some of the contents found within the book are: five case studies, investigation of tools for invading privacy, data collection, and legal assessments concerning privacy matters. Due to the fact that Privacy and Freedom dates back to 1967, this is evidence that technology and its repercussions have raised concerns for decades. Westin included "a report on the New Technology of Privacy Invasion and the Responses we have made and must make to this threat". This book is an asset to the study of government and privacy. The author is well respected, and considered an expert in with this subject.

Open Document