Running head: RFID TAGS: NOW HUMAN 1



Similar documents
Citizenship Activity Pack Spy Implants

Computer Forensics. Computer Forensics: History, Tools and Outlooks. By John Burns IT Research Paper

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

Can RFID Tags Work Inside Metal?

Running head: AN OVERVIEW OF CLOUD COMPUTING TECHNOLOGY 1. An Overview of Cloud Computing Technology:

Implantable RFID Chips: Security versus Ethics

Notice of Privacy Practices

FIBER OPTICS AND ITS IMPACT ON TELECOMMUNICATIONS 1. Fiber Optics and Its Impact on Telecommunications. Jefferson L.

HIPAA Notice of Privacy Practices

ACTA UNIVERSITATIS APULENSIS No 9/2005. Burja Lucian and Tanase Mihai

The Potential Implementation of Radio-Frequency Identification Technology for Personal Health Examination and Monitoring Andrew Nguyen*

Information with a person who is involved in your medical care or payment for your care, such as your family or a

Micro-Chip Implant: Would you get one?

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Greater Dallas Orthopaedics, PLLC. Notice of Privacy Practices

HIPAA NOTICE OF PRIVACY PRACTICES

RFID Penetration Tests when the truth is stranger than fiction

IT 101 Introduction to Information Technology

LAWRENCE COUNTY MEMORIAL HOSPITAL Lawrenceville, Illinois. NOTICE OF PRIVACY PRACTICES Effective April 14, 2003 Revised May, 2013

IF YOU HAVE ANY QUESTIONS ABOUT THIS NOTICE OR IF YOU NEED MORE INFORMATION, PLEASE CONTACT OUR PRIVACY OFFICER:

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

HIPAA Notice of Privacy Practices Effective Date: 09/23/13

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Evolving Bar Codes. Y398 Internship. William Holmes

This Notice describes Hill-Rom s practices regarding the use of your Protected Health Information, specifically including:

Notice of Privacy Practices

NOTICE OF PRIVACY PRACTICES

RFID Technology - Potential Of Big Brother

NOTICE OF PRIVACY PRACTICES

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Active RFID Solutions for Asset Tracking and Inventory Management

NOTICE OF PRIVACY PRACTICES FOR KU MEDICAL CENTER

650 Clark Way Palo Alto, CA

MULTICARE ASSOCIATES OF THE TWIN CITIES, P.A. NOTICE OF PRIVACY PRACTICES

WASHINGTON HOSPITAL HEALTHCARE SYSTEM (WHHS) NOTICE OF PRIVACY PRACTICES

CHAPTER 1 Introduction 1

Richmond Gastroenterology Associates, Inc.

Wyoming School Boards Association Insurance Trust ( The Plan ) HEALTH CARE PLAN PRIVACY NOTICE

Notice of Privacy Practices

How To Understand The Power Of An Freddi Tag (Rfid) System

Notice of Privacy Practices

Welcome To Our Physical Therapy Department

NOTICE OF PRIVACY PRACTICES FOR OUR PATIENTS POTOMAC PHYSICIAN ASSOCIATES, P.C.

NOTICE OF PRIVACY PRACTICES

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

RFID Design Principles

Effective Date of This Notice: September 1, 2013

Notice of Privacy Practices for Protected Health Information

If you are under 18 years of age, your parents or guardian must sign for you and handle your privacy rights for you.

RFID Design Principles

Cooper Dental Group Notice of Privacy Practices

The Drug Quality & Security Act

Eye Clinic of Bellevue, LTD. P.S. Privacy Policy EYE CLINIC OF BELLEVUE LTD PS NOTICE OF INFORMATION PRACTICES

WHY DO I NEED DATA PROTECTION SERVICES?

NOTICE OF PRIVACY PRACTICES

Data Protection Technical Guidance Radio Frequency Identification

The Health and Benefit Trust Fund of the International Union of Operating Engineers Local Union No A-94B, AFL-CIO. Notice of Privacy Practices

Amy Hissom Fall 2007

The use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes.

I. OVERVIEW OF THE VERICHIP HUMAN IMPLANT...1 II. OVERVIEW OF MICROCHIP IMPLANTS FOR PETS...3 III. CANCER AND CHIP IMPLANTS...6

P.G Aided Cases General Procedure

Policy & Procedure AUTUMN RIDGE RESIDENTIAL CARE. March, 2013

Enabling the secure use of RFID

Automated Identification Technologies

RFID the next step in consumer-product relations or Orwellian nightmare?

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

W.A.R.N. Passive Biometric ID Card Solution

Atlanta Insomnia & Behavioral Health Services, P.C. 315 West Ponce de Leon Ave Suite 1051 Decatur, GA

Radio Frequency Identification (RFID)

HIPAA PRIVACY NOTICE PLEASE REVIEW IT CAREFULLY

By: Dean Wilhelm. October 11, IT 103, Section 006. the GMU Honor Code on

WELCOME TO STRAITH HOSPITAL FOR SPECIAL SURGERY OUR PHILOSOPHY JOINT NOTICE OF PRIVACY PRACTICES

Free Life Insurance. FREE PARENT LIFE INSURANCE A helping hand to protect your family

We are so happy you booked your first appointment. Enclosed you will find your new client paperwork and some important information about our office.

Major Risks and Recommended Solutions

Great Bay Mental Health Associates, Inc. Notice to Clients and Consent to Mental Health Treatment Agreement Courtney A. Atherton, MA, LCMHC, MLADC

Pet Microchips: High-Tech Protection Helps Find Lost Pets

BRAIN PERFORMANCE & PSYCHOLOGY CENTER NOTICE OF PRIVACY PRACTICES

Notice of Privacy Practices

Introduction to Emergency Medical Care 1

Qlik Sense Enabling the New Enterprise

NOTICE OF PRIVACY PRACTICES

NIH Clinical Center Patient Education Materials Giving a subcutaneous injection

MILITARY HEALTH SYSTEM NOTICE OF PRIVACY PRACTICES. Effective April 14, 2003

IT 415 Information Visualization Spring Semester

The Marriage of Passive and Active Technologies in Healthcare. Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari

Adopted Rule - 11/19/14 1

Patti Levin, LICSW, Psy.D. Clinical Psychologist

Guilford Medical Associates, P.A.

ADDRESSES SYSTEM LOCATION

Introduction to Information Technology

Reproductive Medicine Associates of New Jersey, LLC

NOTICE OF PRIVACY PRACTICES ILLINOIS EYE CENTER

HIPAA POLICIES & PROCEDURES AND ADMINISTRATIVE FORMS TABLE OF CONTENTS

NOTICE OF PRIVACY PRACTICES

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others

RFID BASED VEHICLE TRACKING SYSTEM

Compliance & Privacy Program. HIPAA For Institutional Advancement

Transcription:

Running head: RFID TAGS: NOW HUMAN 1 RFID Tags: Now Human Implantable Christina Flores George Mason University "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code/. I am fully aware of the following sections of the Honor Code: Extent of the Honor Code, Responsibility of the Student and Penalty. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://copyright.gmu.edu/?page_id=301 web site."

RFID TAGS: NOW HUMAN 2 RFID Tags: Now Human Implantable Introduction In this paper I will be discussing the present use of RFID (Radio-Frequency Identification Device) tags (or chips) on humans, for the purpose of an automatic identification method that runs on wireless technology (Duquenoy, Fischer-Hübner, Martucci, Zuccato, 2008, p. 151). Generally speaking, RFID tags would mean that individuals with the implant would have an internal identification card, thus no longer having to carry personal documents (Duquenoy et al., 2008, p. 153). The factors I will be mentioning about this development include: the potential benefits, legal and ethical issues, security concerns, social problems and further required research. Background According to Andy Greenberg of www.forbes.com (2012), the implantation of an RFID tag is a simple procedure that requires very few steps; (1) the retrieval of a tiny cylindrical twomillimeter diameter EM4012 RFID chip out of a tin of isopropyl alcohol, (2) dropping of it into the syringe s end (3) swabbing of the hand with iodine, (4) carefully pinching and pulling up a fold of skin on the top of the hand to create a tent of flesh, (5) the other hand slides the syringe into the subcutaneous layer known as the fascia, just below the surface, and the (6) plunging of the plastic handle and withdrawal of the needle (para. 2). There are three main components that make up an RFID system: a tag, a reader and a computer system (Pande & Unuakhalu, 2013, para. 5). Pande and Unuakhalu (2013) explain how RFID tags are made by combining a radio antenna with a microchip and then adjoining the two with a protective case. A tag is a small and inexpensive microchip that releases an identifier in reaction to a query from a nearby reader. RFID tags may be the size of a grain of rice (or smaller), and have built-in logic (microcontroller

RFID TAGS: NOW HUMAN 3 or state machine), a coupling element (analog front end with antenna), and memory (pre-masked or EEPROM) (para. 5). Potential Benefits The main potential benefit of having an RFID tag implantation revolves around the aspect of hands-free/easily accessible personal information. Demetrius Klitou (2014), mentions a couple of scenarios that demonstrate the benefit to using RFID tags as a means of tracking an individual s location, and unmistakably identifying them (p.181). A few of his examples include: tracking the location of an abducted child (if the child had been implanted with an RFID tag and if they were at a close distance to an RFID reader that was linked to the internet), companies or government agencies identifying employees before granting them access to secure sites, and tracking the movements of prisoners convicted of violent crimes within prisons and to immediately locate them if they have escaped (Klitou, 2014, pp. 181-182). Paris Kitsos and Yan Zhang (2008) explain another scenario where an RFID tag could be used to obtain accurate identification from patients who are unconsciously admitted to the hospital and have no other means of identification on their person (p. 64). Legal and Ethical Issues The concept of privacy is recognized by various organizations; The Universal Declaration of Human Rights, American convention of Human Rights and the International Covenant on Civil and Political Rights, as a fundamental human right (Klitou, 2014, p. 17). Therefore, the biggest issue pertaining to the use of RFID tags is the major risk it has become for maintaining personal privacy (Adeli, Balitanas, Kim, Robles, 2011, p. 243). The fact that RFID technologies have the ability to create an environment where the government and even

RFID TAGS: NOW HUMAN 4 corporations are able to profile and monitor individuals with the implantation, causes individuals to feel like their right to privacy is being neglected (Adeli et al., 2011, p.243). In 2011, Kim et al., concluded that a primary reason that privacy issues are a concern is because security and privacy features are often built in RFID tags after their initial design. This method leads to RFID technology that is not focused on privacy but on work efficiency (Adeli et al., 2011, p.243). Security Concerns The most obvious security concern of using RFID tags on humans is the threat of an unauthorized user gaining access to the personal information stored in an implantee s tag (Adeli et al., 2011, p.245). There will always be individuals just waiting to get their hands on the personal information of others, whether it be their social security number, credit card number or date of birth. RFID tags were specifically developed to respond to a read request by any device (Adeli et al., 2011, p.245). According to Adeli et al. (2011), a hacker using the open source program called RFDump, a surface developed to work on almost all RFID protocols, can read virtually any RFID tag and obtain its information (p. 245). All in all, individuals with an implanted RFID run the risk of having their personal information accessed without permission, stolen or duplicated. Social Problems Adeli et al. (2011), points out the observation that with the development of new technology comes religious objections (p.242). In the particular case of RFID tags, the religious objections towards the device include the following beliefs; it sinfully alters the human body (a sanctuary), and is the mark of the beast (a mark that prior to the end of the world, humans will be compelled to receive on their right hand or forehead ) mentioned in the Book of Revelation (Adeli et al., 2011, p.242). One of the major reasons why some people believe that

RFID TAGS: NOW HUMAN 5 an implantation of an RFID tag is the mark of the beast is because in a another passage in the Book of Revelation its states that a foul and loathsome sore came upon men who had the mark of the beast, and according to research and conducted studies an implanted RFID has the potential of causing a sore as the one described in the scripture (Adeli et al., 2011, p.242). Further Required Research Although implantations of RFID tags are becoming more and more common, further required research is needed in order to ensure that implantee s are safe and that the device works efficiently. Klitou (2014), mentions that there are two ways that an RFID implant could potentially be destroyed or damaged; by either using a microwave or covering an implantee s arm with metal (p.181). Another area for further research is explained by Jones and Chung (2011), on how an RFID reading system must be properly equipped to operate under various weather conditions (p.311). In case of severe humidity, rain or snow, the RFID reader must still be able to operate properly. Other areas of further research would most likely include; properly authorizing who has access to RFID readers, and conducting enough studies to reassure that getting an RFID tag implanted does not cause any diseases or other severe abnormalities. Conclusion I for one agree with Adeli et al. (2011) when they say that there is great potential for RFID technology in our society (p. 236). In this case RFID tags can be used for supply chain management, inventory systems, animal tracking, instant payments or even human implantation (Adeli et al., 2011, p.236). With that being said, I believe that RFID tags are a wise investment, but only for those in high need of their function; the elderly, military soldiers, and government personnel. If further research is conducted, safety regulations are put into effect, and all the bugs and glitches are fixed, there may be a higher possibility of more RFID implants in our future.

RFID TAGS: NOW HUMAN 6 References Adeli, H., Balitanas, M., Kim, T., & Robles, R. (Eds.). (2011). Information security and assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings (pp. 236, 242-243, 245). Berlin: Springer. Retrieved February 3, 2015, from https://books.google.com/books?id=2ldtpe8iif8c&pg=pa242&dq=human+implant+of+r fid+chips&hl=en&sa=x&ei=frnrvnxoh4udnvb4g4ah&ved=0cdkq6aewaq#v=on epage&q=human%20implant%20of%20rfid%20chips&f=false This book mentioned different elements concerning RFID tags, such as; its potential social problems ( mark of the beast ), its legal concerns (invading the privacy of others) and its security setbacks (not as secured as one would hope). This was probably my most reliable source because it did not only discuss the technology behind RFID tags but also its affects on the public. I was able to incorporate this source in almost every section of my paper because it provided countless facts and statistics on RFID tag usage and the technology behind its programming. Chung, C., & Jones, E. (2011). RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications (p. 311). Boca Raton, FL: CRC Press. Retrieved February 3, 2015, from https://books.google.com/books?id=ggvmas4h_88c&pg=pa325&dq=human+implant+ of+rfid+chips&hl=en&sa=x&ei=frnrvnxoh4udnvb4g4ah&ved=0cdiq6aewaa#v =onepage&q=human%20implant%20of%20rfid%20chips&f=false

RFID TAGS: NOW HUMAN 7 Chung and Jones mainly discuss the benefits to using RFID tags for military personnel, as a means of identifying them in cases of catastrophic death or illness. They also mention the logistics and technology behind how exactly all the different compartments of an RFID tag must properly function. This was a reliable source because it informed me more about the technological side of an RFID tag and all the different components that allow it to function efficiently. Duquenoy, P., Fischer-Hübner, S., Martucci, L., & Zuccato, A. (Eds.). (2008). The Future of Identity in the Information Society (p. 151, 153). New York: Springer. Retrieved February 3, 2015, from https://books.google.com/books?id=dfutwythnwkc&pg=pa151&dq=human+implant +of+rfid+chips&hl=en&sa=x&ei=mxrrvpduomibnv_kg9gl&ved=0cgmq6aewc A#v=onepage&q=human%20implant%20of%20rfid%20chips&f=false Penny Duquenoy and her fellow editors thoroughly discuss how implantable RFID chips are becoming a future security device. However, they mention how the dark side to them is that they threaten our humane right to privacy due to their ability to track one s location and access their personal information. This source was very helpful because it was a book on the subject of technological devices that are being programmed around identity storage and the pros and the cons to their usage. Greenberg, A. (2012, August 13). Want An RFID Chip Implanted Into Your Hand? Here's What The DIY Surgery Looks Like (Video). Retrieved February 3, 2015, from http://www.forbes.com/sites/andygreenberg/2012/08/13/want-an-rfid-chip-implantedinto-your-hand-heres-what-the-diy-surgery-looks-like-video/

RFID TAGS: NOW HUMAN 8 Andy Greenberg explains step by step in his article the simple procedure of getting an RFID tag implanted into your hand, for the purpose of having an internal device that stores your personal information. I appreciated how Andy s article included a video that actually showed the procedure being done to a person, while also explaining the thinking and reasoning behind someone wanting to get this procedure done. I found this source to be reliable because it provided visual evidence, first-hand accounts of the procedure and inside stories as to what some implantees thought of the procedure in general. Kitsos, P., & Zhang, Y. (Eds.). (2008). RFID Security Techniques, Protocols and System-on- Chip Design (p. 64). New York: Springer. Retrieved February 3, 2015, from https://books.google.com/books?id=wif7h9oyt34c&pg=pa64&dq=human+implant+o f+rfid+chips&hl=en&sa=x&ei=mxrrvpduomibnv_kg9gl&ved=0cfwq6aewbw#v =onepage&q=human%20implant%20of%20rfid%20chips&f=false In their book; RFID Security Techniques, Protocols and System-on-Chip Design, Kitsos and Zhang talk about the earlier years of RFID technology and various purposes an RFID tag can be used for. This source also mentions the security aspects of the device and all of the positives and negatives of its programming. I thought this source was reliable because it gave me an insight on how the technology of RFID came about and how exactly it s being used in the present day (identifying patients who are admitted to a hospital unconsciously). Klitou, D. (2014). Privacy-Invading Technologies and Privacy by Design Safeguarding Privacy, Liberty and Security in the 21st Century (Aufl. 2014 ed., pp. 17, 181-182). The Hague: T.M.C. Asser Press. Retrieved February 3, 2015, from

RFID TAGS: NOW HUMAN 9 https://books.google.com/books?id=q2_1awaaqbaj&pg=pa188&dq=human+implant +of+rfid+chips&hl=en&sa=x&ei=frnrvnxoh4udnvb4g4ah&ved=0cemq6aewaw #v=onepage&q=human%20implant%20of%20rfid%20chips&f=false In; Privacy-Invading Technologies and Privacy by Design Safeguarding Privacy, Liberty and Security in the 21st Century, Klitou mainly writes about the legal aspect of RFID systems and how the use of them threatens our humane right to privacy. However, he also mentions a couple of beneficial uses for RFID tags such as; using them to locate abducted children who have the implantation, identifying personnel before granting them access to secure sites etc. This book was a reliable source because it introduced me to more ways an RFID tag could be used for, instead of just stating the most widely known usage (identifying individuals who are unable to be identified). Pande, S., & Unuakhalu, M. (2013). PRIVACY AND SECURITY CHALLENGES OF RFID. International Journal of Management, IT and Engineering, 3(11), 194-211. Retrieved February 3, 2015, from http://search.proquest.com/docview/1497177592/abstract/87c29fb58f164b2dpq/1?acc ountid=14541# Pande and Unuakhalu mention in their scholarly journal, the security challenges RFID tags cause implantees due to their function as a personal information provider. They successfully expose the security setbacks to an RFID tag by explaining the actual setup of a tag and what an entire RFID system consists of (tag, reader and a computer system). I believe this was a reliable source because it not only mentioned the technological setup of RFID tags in a positive light but also included the legal setbacks the device consists of.

RFID TAGS: NOW HUMAN 10