Small Tech, Big Issues



Similar documents
The murky ethics of implanted chips

RF ID Security and Privacy

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Tracking People s Movements by RFID Implants

RECOMMENDATIONS COMMISSION

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

RFID in a nutshell. Colin Jervis, Director, Kinetic Consulting Ltd

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of

The Drug Quality & Security Act

RFID Security and Privacy. Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005

How To Understand The Power Of An Freddi Tag (Rfid) System

White Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now

WHITE PAPER. ABCs of RFID

Radio Frequency Identification (RFID)

CHAPTER 1 Introduction 1

RFID Design Principles

CONSUMER PERSPECTIVES OF IMPLANTED RADIO FREQUENCY IDENTIFICATION (RFID) DEVICES FOR MEDICAL INFORMATION RETRIEVAL

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

Micro-Chip Implant: Would you get one?

NEW TECHNOLOGY. Figure 1. Simplified view of data transfer in low-frequency passive RFID tags (the tag is enlarged for clarity).

RFID Design Principles

Ethical Use of RFID in for the Surveillance of People and the Tracking of Things in Healthcare Delivery

Data Protection Technical Guidance Radio Frequency Identification

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

International Journal of Engineering Research & Management Technology

Reactec s HAVmeter depends on CoreRFID. A Case Study.

Evolving Bar Codes. Y398 Internship. William Holmes

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

RFID Based Real Time Password Authentication System for ATM

K.Srinivasu Ravi 1, Seema Kalangi 2, Veeraiah Maddu 3

Dr. Asher Vaturi The Max Stern Yezreel Valley College

Microchip FAQ's All you wanted to know about microchips but were afraid to ask!

Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework

RFID BASED VEHICLE TRACKING SYSTEM

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

RFID Security: Threats, solutions and open challenges

The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results

An Overview of RFID Security and Privacy threats

Ethical Implications of Implantable Radiofrequency Identification (RFID) Tags in Humans

HUMAN MICROCHIP IMPLANTATION

RFID TECHNOLOGY USED FOR IDENTIFICATION AND TEMPERATURE MONITORING OF CATTLE

RFIDs and European Policies

Executive summary. by Steve Nibbelink, CHPA

GUIDELINES REGARDING THE PROCESSING OF PERSONAL DATA BY MEANS OF SMART CARDS AND RFID TAGS

Automated Identification Technologies

A. Background. In this Communication we can read:

Contents. 1. Introduction

RF Attendance System Framework for Faculties of Higher Education

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

Using Contactless Smart Cards for Secure Applications

Mobile. Task 1. Report2: Mobile Phones and Radiation Page 1

Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda

What are radio signals?

The Place of Emerging RFID Technology in National Security and Development

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

Radio Frequency Identification (RFID) An Overview

RFID Based Centralized Patient Monitoring System and Tracking (RPMST)

Obama Care Approves RFID Chips

Various Attacks and their Countermeasure on all Layers of RFID System

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Introduction to Information Technology

What Merchants Need to Know About EMV

The Success Family of CE Companies Affordable CE Success CE Success Live CE FirstChoice CE

ELECTROMAGNETIC FIELDS AND PUBLIC HEALTH HEALTH AND SAFETY GUIDELINES #1

Secure egovernment Where convenience meets security.

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

Strengthen RFID Tags Security Using New Data Structure

Credit Card Fraud The Contactless Generation Kristin Paget

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

EMISSION OF RADIO FREQUENCY RADIATION BY CELLULAR PHONES <STUDENT NAME(S)> DEN 399 RESEARCH PROPOSAL MAY 1, 200

a GAO GAO INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government Report to Congressional Requesters

An Introductory and Elementary Study on RFID & Its Applications

Your Mobile Phone as a Ticket (NFC)

Implementing high-level Counterfeit Security using RFID and PKI

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Software Requirements Specification Document

RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID)

Transcription:

Small Tech, Big Issues

How It Works Advantages of RFID History of the RFID Proposed Uses Identification Medical Records Immigration Security Authentication Ethical Issues Purchase tracking Lack of encryption Location tracking Unauthorized tag reading Requiring implant for job / immigration

http://www.rotil.nl/communications/products/rfid.en.php 1. Controller initiates read 2. Reader antenna sends short range radiofrequency signals 3. Tag converts signal to energy 4. Tag uses stored energy to transmit its memory contents back to reader 5. Reader antenna collects sent data

Tags are: Cheap Resilient Long lived Don t need power source Small Operate under extreme conditions (cold / heat) Contactless recognition Through materials like plastic, glass, wood Can be made invisible to the user

In WW2, the Germans, Japanese, Americans, and British were all using radar No way to identify planes Germans discovered that if pilots rolled their planes as they returned to base, it would change the radio signal reflected back First passive RFID system http://apocalapsus.es/blog/category/cine/

EAS Systems Introduced Checkpoint Sensormatic 1 bit tags: on or off Deactivated by partially destroying capacitor by running tag over a strong electromagnetic field Multi bit tags size of a loaf of bread, size limited by circuitry http://www.spychips.com/blog/2006/01/ eas_or_rfid_new_labels_prompt.html http://www.contractpharma.com/articles/2007/06/images/rfid.jpg

http://autoid.mit.edu/pickup/rfid_papers/008.pdf http://electronics.howstuffworks.com/gadgets/high tech gadgets/rfid.htm

http://images.businessweek.com/ss/06/01/medtech/image/ verichip.jpg http://www.rfidjournal.com/imagecatalogue/imageview/5154/? RefererURL=/article/articleview/4055/

Received permission from USFDA to market VeriChip in 2004 2000+ implants as of 2007 ~$200 16 digit code (128 bits)

Although currently PositiveID does not actively market the VeriMed system, it continues to support existing patients and healthcare facilities. PositiveID website FAQ

Medical Records Immigration Security Authentication Kidnapping Prevention Tracking of criminals/parole.and sick people?

# of record in secure database Focus market: Cancer patients, people w/ pacemakers, or people who might be cognitively impaired

Detection: How does ER staff know you have a VeriChip? Bracelet? Tattoo? Big problems if not detected Does hospital have RFID reader? Health Issues CAUSED by chip?

The potential risks to health associated with the device are: adverse tissue reaction; migration of implanted transponder; compromised information security; failure of implanted transponder; failure of inserter; failure of electronic scanner; electromagnetic interference; electrical hazards; magnetic resonance imaging incompatibility; and needle stick. USFDA http://www.spychips.com/devices/verichip fda letter.pdf

CEO of VeriChip proposed implants in immigrants and guest workers to assist the government in later identifying them President of Columbia quoted telling a US senator that he would agree to require Columbian citizens to be implanted before they could gain entry into the US for seasonal work

Who pays for it? Maintenance? Problems w/ chip? Cloning? Dangerous Precedent Similar to branding cattle or tattoos the Nazis forced on their victims in concentration camps?

Suggested use by VeriChip 2004: Mexico s attorney general Carlos Altamirano and staff receive VeriChip implants for the purposes of access, for security. http://msnbcmedia1.msn.com/j/msnbc/components/photos/ 040714/040714_mexicoChip_hmed_3p.hmedium.jpg

Lack of encryption Power/memory constraints prevent any security measures, rolling code and challenge response authentication systems being worked on Unauthorized reading Few laws preventing Hand held readers ~$250 Make your own? Cloning

2000+ Mexican citizens have had tags implanted for the purpose of tracking in case they are kidnapped No GPS capabilities in current RFID implants.. CEO of VeriChip s parent company concedes that the company s Mexican distributor may not have tried very hard to dispel the notion that VeriChips have GPS capabilities, which would be required for real remote tracking [McHugh]

http://i34.photobucket.com/albums/d115/uniteduniverse/verichip1.jpg

life in the U.S. will become difficult for those who do not want a chip inside them (in much the same way as it is currently difficult for anyone without a credit card, cellphone, email address or internet access http://industry.bnet.com/pharma/10005641/ positiveid deal advances use of microchipimplants in florida health system/).

If there were a societal benefit, could a government require individuals to modify their bodies? For public health purposes, the answer is yes. In the United States, for example, students must have certain immunizations before attending public school. Foster & Jaeger

Little legislation Washington (2008) Unauthorized Reading California, Georgia, North Dakota, Virginia, Wisconsin Prohibits forced RFID implants 28(?) other states w/pending RFID legislation Need a comprehensive set of regulations EPIC Electronic Privacy Information Center Public interest research center No clients, no customers, no shareholders

Give notice of: Tag Presence Reader Presence Reading Activity Removal Anonymity Priority Security Openness Accountability Rights Access Removal Accountability

RFID implants can be powerful tools if used while being conscious of their vulnerabilities or if sufficient advances in the technology are made. Even though RFID implants aren t widely deployed at this time, legislation needs to be put in place to prevent potential issues from turning into real issues.

Bacheldor, Beth. American Medical Association Issues Ethics Code for RFID Chip Implants. RFID Journal. 17 July 2007. Accessed 11 May 2010. <http://www.rfidjournal.com/article/articleview/3487/1/1/> Foster, Kenneth and Jaeger, Jan. RFID Inside: The Murky Ethics of Implanted Chips. University of Pennsylvania Department of Bioengineering. 2007. Reprinted from IEEE Spectrum, March 2007, 24 29. < http://repository.upenn.edu/cgi/viewcontent.cgi?article=1098&context=be_papers> Guidelines on Commercial Use of RFID Technology. Electronic Privacy Information Center. July 2004. http://epic.org/privacy/rfid/rfid_gdlnes 070904.pdf Landt, Jeremy. The history of RFID. IEEE Potentials. October/November 2005. http://autoid.mit.edu/pickup/rfid_papers/008.pdf McHugh, Josh. A Chip in Your Shoulder. Slate.com. 10 November 2004. http://www.slate.com/id/2109477 Microchip implant (human). Wikipedia. < http://en.wikipedia.org/wiki/microchip_implant_(human)> Perakslis, Christine and Wolk, Robert. Social Acceptance of RFID as a Biometric Security Method. IEEE Technology and Society Magazine. Fall 2006. <http://autoid.mit.edu/pickup/rfid_papers/079.pdf> Radio frequency identification. Wikipedia. < http://en.wikipedia.org/wiki/rfid> Weissert, Will. Mexican attorney general personally goes high tech for security. USA Today. 14 July 2004. http://www.usatoday.com/tech/news/2004 07 14 mex security implant_x.htm Westhues, Jonathan. Demo: Cloning a Verichip. July 2006. < http://www.cq.cx/verichip.pl> Witt, Sam. Is human chip implant wave of the future?. CNN.com. January 14, 1999. < http://www.cnn.com/tech/computing/9901/14/chipman.idg/>

Be gentle