The Conflicting Role of Technology in Security and Safety

As the 2013 International Consumer Electronics Show is being held this week in Las Vegas, consumers are getting all excited about the newest technological development of consumer gadgets and appliances from the top Tech Companies worldwide. The significant role of technology in improving our everyday lives is simply undeniable. From remote-free televisions to mobile phones with high end cameras, we are continuously treated with the best offerings. Because of the impact of technology in human lives, it is thus being brought into question whether technology makes human living better or makes it actually worse.
As with any aspect of human life, technology plays a big role on security. It is not irrational to say that nowadays security is almost completely dependent on technology. The most valued properties are expected to be secured with the most technologically advanced system of devices and programs. However, since technology is available to all parties, the same parties, which we are securing our properties from, are also utilizing the same level of technology to enhance their skills and instruments on defeating the security system. Technology is then viewed as a part of both problem and solution. This is true with security on properties in the cyber and physical world.


This is not a new problem though. This two-faced role of technology has always   been there. The conflict has always been a challenge to those who want to stay secured and those whose intention is to violate other people’s right to security and privacy. Thus, it becomes an endless race and what’s stake could be much more than just your valued material possessions, it could be your life and those of the people you love.
Security system developers are tirelessly inventing new security gadgets and more and more intricately designed systems, each time promising that the invented gadget or system is the one that is impossible to disable or disarm. The most recently released security systems are now making use of biometric authentication such as Eye Scan and Voice Recognition technology, full-HD surveillance and wireless communication system. But since technology is not owned by only one entity, this same level of technology, sometimes even better, is also available for the hackers, the burglars and the thieves. As soon as new systems and devices are released in the market, they painstakingly study each component so they can devise a way to quietly disarm them, and you can bet your hard-earned dollar that they will be successful at it. Rest assured though that before, or as soon as the bad guys learn how to disarm these security systems, the developers have already updated and armed them against the new threats. Although this race to preserve security and privacy is as tight as any race can be, it’s still a good thing that the good guys are still one step ahead.
In the end though, technology is not to be blamed. By itself, technology cannot be categorized as neither bad nor good. It is the user’s intention that renders technology as productive or destructive to human lives, as it is everyone of us who decides whether we should value or forsake security and privacy.