The ghost in the identity

February 2013 Access Control & Identity Management

Often touted by the ID salesmen as the ultimate unerring manifestation of your identity on official documents, it surpasses only in some ways the drama of yore when ghosts would make friendly appearances at the theatre, and leave the audience awe-struck, by the living and the dead … and everything in between. My own creator (Mr Shakespeare, really) took much of the thunder away from all of us, by having The Ghost appear in The Play, but just four times.

It all starts with the fact that the picture on your identity document – a passport, ID Book or employee access card – can be altered by someone else wanting to be you, though not always for an unspeakable evil purpose, but maybe only to sneak into 'enemy' territory to hold hands with a beloved.

To make this difficult, nay impossible, a ghost image is inserted that stealthily appears (just like real ghosts) only under strange lights, or as shadows among the other images, or when you look at it all at a particular angle, or as today, among the fine lines, dots, colours and pixels. The characters from Baker Street could exclaim “excellent” and “elementary” when they have examined such documents with their magnifying glasses and ultra-violet lamps.

We did it in more dramatic ways. In the 1964 Broadway production, the great director-actor played The Ghost himself – just with his voice, and his shadow – both unmistakable, in such a manner that no one could impersonate him in a thousand years. But then we are all not John Gielguds. No wonder they said that in his prime, he was outstanding, but in his later years, a mere shadow of himself.

Beyond the obvious practical convenience of not being yourself (to get the better of spouse or tax collector), the deeper psychological ramifications of your wanting to be someone else, or of your not wanting to be yourself, are serious. It could even be that in some cases, of your wanting to be more than one self like the proverbial Jekyll and Hyde. Even worse, it could be the case of many of us wanting to be one particular likable self, like Elvis. Could our ghost images keep up with all that?

In this context, the ghost image indeed plays a role, much more important than we think. It keeps all seven billion of us on the planet, from being someone else. Just imagine the chaos, if this were not so.

Salesmen need to worry as well. It is a travelling salesman, Gregor Samsa, in Kafka’s famous novel, Metamorphosis, who wakes up one morning and finds himself transformed into a gigantic insect. Perhaps he was an ID salesman badly in need of an order.

Fortunately, everyone needs an ID today, and thus an immutable ghost image. Despots need them for their subjects and democracies for their citizens, albeit for slightly different reasons. So do corporations, banks, schools and universities, airlines, hotels and even shopping malls.

In every case, the ghost images must lie hidden, just like real ghosts, among the watermarks, beneath the holograms, interwoven with the guilloches and coloured with invisible inks, until some compelling reason makes them speak their lines – just like Hamlet, Banquo and Julius Caesar of my time. Even if we no longer look like our portraits, we must conform to our ghost images or else we are in trouble. That is the challenge.

Today, bartenders across America routinely ask for your ID, ostensibly to verify if you are of age, before serving you. But perhaps they are really checking on your ghost image. It was, again many years back in the 1930s prohibition years, that the public places first carried notices that said, 'Serving spirits is strictly prohibited'.

Polonius, when not appearing in Shakespeare’s Hamlet, is a Hi-Tech Security Solutions’ writer who fantasises about a life on the stage.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...
Mines require proof of performance
Technews Publishing Mining (Industry)
The relatively hostile environment and remote locations of mining establishments mean that any electronic/technical implementations have to be easily installed, require little or no maintenance and, once commissioned, require no adjustment.

Read more...
From the Editor's Desk: Something old and something new
Technews Publishing News & Events
      Welcome to the 2024 edition of SMART Security Solutions’ Mining Handbook. Mining is a challenging industry for security professionals, although security is a challenge on this continent, no matter your ...

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Entries to southern Africa OSPA Awards now open
Technews Publishing Securex South Africa Editor's Choice News & Events
The southern Africa OSPAs are part of a global awards scheme that recognises and rewards teams, individuals and organisations for their commitment and outstanding performance within the security sector.

Read more...
Securex has moved to June
Technews Publishing Editor's Choice News & Events
Following the formal announcement of the date for South Africa’s national election, 29 May 2024 , which happened to be in the middle of the planned dates for Securex South Africa, Securex will now take place from 11 – 13 June 2024 at Gallagher Estate in Midrand.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...