Running head: RFID TAGS: NOW HUMAN 1 RFID Tags: Now Human Implantable Christina Flores George Mason University "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code/. I am fully aware of the following sections of the Honor Code: Extent of the Honor Code, Responsibility of the Student and Penalty. In addition, I have received permission from the copyright holder for any copyrighted material that is displayed on my site. This includes quoting extensive amounts of text, any material copied directly from a web page and graphics/pictures that are copyrighted. This project or subject material has not been used in another class by me or any other student. Finally, I certify that this site is not for commercial purposes, which is a violation of the George Mason Responsible Use of Computing (RUC) Policy posted on http://copyright.gmu.edu/?page_id=301 web site."
RFID TAGS: NOW HUMAN 2 RFID Tags: Now Human Implantable Introduction In this paper I will be discussing the present use of RFID (Radio-Frequency Identification Device) tags (or chips) on humans, for the purpose of an automatic identification method that runs on wireless technology (Duquenoy, Fischer-Hübner, Martucci, Zuccato, 2008, p. 151). Generally speaking, RFID tags would mean that individuals with the implant would have an internal identification card, thus no longer having to carry personal documents (Duquenoy et al., 2008, p. 153). The factors I will be mentioning about this development include: the potential benefits, legal and ethical issues, security concerns, social problems and further required research. Background According to Andy Greenberg of www.forbes.com (2012), the implantation of an RFID tag is a simple procedure that requires very few steps; (1) the retrieval of a tiny cylindrical twomillimeter diameter EM4012 RFID chip out of a tin of isopropyl alcohol, (2) dropping of it into the syringe s end (3) swabbing of the hand with iodine, (4) carefully pinching and pulling up a fold of skin on the top of the hand to create a tent of flesh, (5) the other hand slides the syringe into the subcutaneous layer known as the fascia, just below the surface, and the (6) plunging of the plastic handle and withdrawal of the needle (para. 2). There are three main components that make up an RFID system: a tag, a reader and a computer system (Pande & Unuakhalu, 2013, para. 5). Pande and Unuakhalu (2013) explain how RFID tags are made by combining a radio antenna with a microchip and then adjoining the two with a protective case. A tag is a small and inexpensive microchip that releases an identifier in reaction to a query from a nearby reader. RFID tags may be the size of a grain of rice (or smaller), and have built-in logic (microcontroller
RFID TAGS: NOW HUMAN 3 or state machine), a coupling element (analog front end with antenna), and memory (pre-masked or EEPROM) (para. 5). Potential Benefits The main potential benefit of having an RFID tag implantation revolves around the aspect of hands-free/easily accessible personal information. Demetrius Klitou (2014), mentions a couple of scenarios that demonstrate the benefit to using RFID tags as a means of tracking an individual s location, and unmistakably identifying them (p.181). A few of his examples include: tracking the location of an abducted child (if the child had been implanted with an RFID tag and if they were at a close distance to an RFID reader that was linked to the internet), companies or government agencies identifying employees before granting them access to secure sites, and tracking the movements of prisoners convicted of violent crimes within prisons and to immediately locate them if they have escaped (Klitou, 2014, pp. 181-182). Paris Kitsos and Yan Zhang (2008) explain another scenario where an RFID tag could be used to obtain accurate identification from patients who are unconsciously admitted to the hospital and have no other means of identification on their person (p. 64). Legal and Ethical Issues The concept of privacy is recognized by various organizations; The Universal Declaration of Human Rights, American convention of Human Rights and the International Covenant on Civil and Political Rights, as a fundamental human right (Klitou, 2014, p. 17). Therefore, the biggest issue pertaining to the use of RFID tags is the major risk it has become for maintaining personal privacy (Adeli, Balitanas, Kim, Robles, 2011, p. 243). The fact that RFID technologies have the ability to create an environment where the government and even
RFID TAGS: NOW HUMAN 4 corporations are able to profile and monitor individuals with the implantation, causes individuals to feel like their right to privacy is being neglected (Adeli et al., 2011, p.243). In 2011, Kim et al., concluded that a primary reason that privacy issues are a concern is because security and privacy features are often built in RFID tags after their initial design. This method leads to RFID technology that is not focused on privacy but on work efficiency (Adeli et al., 2011, p.243). Security Concerns The most obvious security concern of using RFID tags on humans is the threat of an unauthorized user gaining access to the personal information stored in an implantee s tag (Adeli et al., 2011, p.245). There will always be individuals just waiting to get their hands on the personal information of others, whether it be their social security number, credit card number or date of birth. RFID tags were specifically developed to respond to a read request by any device (Adeli et al., 2011, p.245). According to Adeli et al. (2011), a hacker using the open source program called RFDump, a surface developed to work on almost all RFID protocols, can read virtually any RFID tag and obtain its information (p. 245). All in all, individuals with an implanted RFID run the risk of having their personal information accessed without permission, stolen or duplicated. Social Problems Adeli et al. (2011), points out the observation that with the development of new technology comes religious objections (p.242). In the particular case of RFID tags, the religious objections towards the device include the following beliefs; it sinfully alters the human body (a sanctuary), and is the mark of the beast (a mark that prior to the end of the world, humans will be compelled to receive on their right hand or forehead ) mentioned in the Book of Revelation (Adeli et al., 2011, p.242). One of the major reasons why some people believe that
RFID TAGS: NOW HUMAN 5 an implantation of an RFID tag is the mark of the beast is because in a another passage in the Book of Revelation its states that a foul and loathsome sore came upon men who had the mark of the beast, and according to research and conducted studies an implanted RFID has the potential of causing a sore as the one described in the scripture (Adeli et al., 2011, p.242). Further Required Research Although implantations of RFID tags are becoming more and more common, further required research is needed in order to ensure that implantee s are safe and that the device works efficiently. Klitou (2014), mentions that there are two ways that an RFID implant could potentially be destroyed or damaged; by either using a microwave or covering an implantee s arm with metal (p.181). Another area for further research is explained by Jones and Chung (2011), on how an RFID reading system must be properly equipped to operate under various weather conditions (p.311). In case of severe humidity, rain or snow, the RFID reader must still be able to operate properly. Other areas of further research would most likely include; properly authorizing who has access to RFID readers, and conducting enough studies to reassure that getting an RFID tag implanted does not cause any diseases or other severe abnormalities. Conclusion I for one agree with Adeli et al. (2011) when they say that there is great potential for RFID technology in our society (p. 236). In this case RFID tags can be used for supply chain management, inventory systems, animal tracking, instant payments or even human implantation (Adeli et al., 2011, p.236). With that being said, I believe that RFID tags are a wise investment, but only for those in high need of their function; the elderly, military soldiers, and government personnel. If further research is conducted, safety regulations are put into effect, and all the bugs and glitches are fixed, there may be a higher possibility of more RFID implants in our future.
RFID TAGS: NOW HUMAN 6 References Adeli, H., Balitanas, M., Kim, T., & Robles, R. (Eds.). (2011). Information security and assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings (pp. 236, 242-243, 245). Berlin: Springer. Retrieved February 3, 2015, from https://books.google.com/books?id=2ldtpe8iif8c&pg=pa242&dq=human+implant+of+r fid+chips&hl=en&sa=x&ei=frnrvnxoh4udnvb4g4ah&ved=0cdkq6aewaq#v=on epage&q=human%20implant%20of%20rfid%20chips&f=false This book mentioned different elements concerning RFID tags, such as; its potential social problems ( mark of the beast ), its legal concerns (invading the privacy of others) and its security setbacks (not as secured as one would hope). This was probably my most reliable source because it did not only discuss the technology behind RFID tags but also its affects on the public. I was able to incorporate this source in almost every section of my paper because it provided countless facts and statistics on RFID tag usage and the technology behind its programming. Chung, C., & Jones, E. (2011). RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications (p. 311). Boca Raton, FL: CRC Press. Retrieved February 3, 2015, from https://books.google.com/books?id=ggvmas4h_88c&pg=pa325&dq=human+implant+ of+rfid+chips&hl=en&sa=x&ei=frnrvnxoh4udnvb4g4ah&ved=0cdiq6aewaa#v =onepage&q=human%20implant%20of%20rfid%20chips&f=false
RFID TAGS: NOW HUMAN 7 Chung and Jones mainly discuss the benefits to using RFID tags for military personnel, as a means of identifying them in cases of catastrophic death or illness. They also mention the logistics and technology behind how exactly all the different compartments of an RFID tag must properly function. This was a reliable source because it informed me more about the technological side of an RFID tag and all the different components that allow it to function efficiently. Duquenoy, P., Fischer-Hübner, S., Martucci, L., & Zuccato, A. (Eds.). (2008). The Future of Identity in the Information Society (p. 151, 153). New York: Springer. Retrieved February 3, 2015, from https://books.google.com/books?id=dfutwythnwkc&pg=pa151&dq=human+implant +of+rfid+chips&hl=en&sa=x&ei=mxrrvpduomibnv_kg9gl&ved=0cgmq6aewc A#v=onepage&q=human%20implant%20of%20rfid%20chips&f=false Penny Duquenoy and her fellow editors thoroughly discuss how implantable RFID chips are becoming a future security device. However, they mention how the dark side to them is that they threaten our humane right to privacy due to their ability to track one s location and access their personal information. This source was very helpful because it was a book on the subject of technological devices that are being programmed around identity storage and the pros and the cons to their usage. Greenberg, A. (2012, August 13). Want An RFID Chip Implanted Into Your Hand? Here's What The DIY Surgery Looks Like (Video). Retrieved February 3, 2015, from http://www.forbes.com/sites/andygreenberg/2012/08/13/want-an-rfid-chip-implantedinto-your-hand-heres-what-the-diy-surgery-looks-like-video/
RFID TAGS: NOW HUMAN 8 Andy Greenberg explains step by step in his article the simple procedure of getting an RFID tag implanted into your hand, for the purpose of having an internal device that stores your personal information. I appreciated how Andy s article included a video that actually showed the procedure being done to a person, while also explaining the thinking and reasoning behind someone wanting to get this procedure done. I found this source to be reliable because it provided visual evidence, first-hand accounts of the procedure and inside stories as to what some implantees thought of the procedure in general. Kitsos, P., & Zhang, Y. (Eds.). (2008). RFID Security Techniques, Protocols and System-on- Chip Design (p. 64). New York: Springer. Retrieved February 3, 2015, from https://books.google.com/books?id=wif7h9oyt34c&pg=pa64&dq=human+implant+o f+rfid+chips&hl=en&sa=x&ei=mxrrvpduomibnv_kg9gl&ved=0cfwq6aewbw#v =onepage&q=human%20implant%20of%20rfid%20chips&f=false In their book; RFID Security Techniques, Protocols and System-on-Chip Design, Kitsos and Zhang talk about the earlier years of RFID technology and various purposes an RFID tag can be used for. This source also mentions the security aspects of the device and all of the positives and negatives of its programming. I thought this source was reliable because it gave me an insight on how the technology of RFID came about and how exactly it s being used in the present day (identifying patients who are admitted to a hospital unconsciously). Klitou, D. (2014). Privacy-Invading Technologies and Privacy by Design Safeguarding Privacy, Liberty and Security in the 21st Century (Aufl. 2014 ed., pp. 17, 181-182). The Hague: T.M.C. Asser Press. Retrieved February 3, 2015, from
RFID TAGS: NOW HUMAN 9 https://books.google.com/books?id=q2_1awaaqbaj&pg=pa188&dq=human+implant +of+rfid+chips&hl=en&sa=x&ei=frnrvnxoh4udnvb4g4ah&ved=0cemq6aewaw #v=onepage&q=human%20implant%20of%20rfid%20chips&f=false In; Privacy-Invading Technologies and Privacy by Design Safeguarding Privacy, Liberty and Security in the 21st Century, Klitou mainly writes about the legal aspect of RFID systems and how the use of them threatens our humane right to privacy. However, he also mentions a couple of beneficial uses for RFID tags such as; using them to locate abducted children who have the implantation, identifying personnel before granting them access to secure sites etc. This book was a reliable source because it introduced me to more ways an RFID tag could be used for, instead of just stating the most widely known usage (identifying individuals who are unable to be identified). Pande, S., & Unuakhalu, M. (2013). PRIVACY AND SECURITY CHALLENGES OF RFID. International Journal of Management, IT and Engineering, 3(11), 194-211. Retrieved February 3, 2015, from http://search.proquest.com/docview/1497177592/abstract/87c29fb58f164b2dpq/1?acc ountid=14541# Pande and Unuakhalu mention in their scholarly journal, the security challenges RFID tags cause implantees due to their function as a personal information provider. They successfully expose the security setbacks to an RFID tag by explaining the actual setup of a tag and what an entire RFID system consists of (tag, reader and a computer system). I believe this was a reliable source because it not only mentioned the technological setup of RFID tags in a positive light but also included the legal setbacks the device consists of.
RFID TAGS: NOW HUMAN 10