Amy Hissom Fall 2007



Similar documents
RF ID Security and Privacy

RFID Technology - Potential Of Big Brother

Citizenship Activity Pack Spy Implants

Data Protection Technical Guidance Radio Frequency Identification

RFID in a nutshell. Colin Jervis, Director, Kinetic Consulting Ltd

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

RFID BASED VEHICLE TRACKING SYSTEM

Evolving Bar Codes. Y398 Internship. William Holmes

PRIVACY ISSUES (RFID)

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID the next step in consumer-product relations or Orwellian nightmare?

RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID)

915MHz RFID State of the Art RFID

Small Tech, Big Issues

WHITE PAPER. ABCs of RFID

Active RFID Solutions for Asset Tracking and Inventory Management

RFID SECURITY. February The Government of the Hong Kong Special Administrative Region

915MHz RFID State of the Art RFID RFID RADIO FREQUENCY IDENTIFICATION. Asset Management & Accountability

Will nanotechnology solve our energy crisis?

LibRFID: Automation Software for Library Management System Using RFID Technology

Radio Frequency Identification (RFID) Vs Barcodes

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

RFID Basics HEGRO Belgium nv - Assesteenweg Ternat Tel.: +32 (0)2/ Fax : +32 (0)2/ info@hegrobelgium.

THE LITTLE BIG BOOK OF BADNESS

How To Understand The Power Of An Freddi Tag (Rfid) System

Section II. Privacy and Legislation. Sanjay Goel, School of Business, University at Albany, SUNY

GameRoom of the Month

Allwin Initiative for Corporate Citizenship Dartmouth Center for the Advancement of Learning Dickey Center Ethics Institute Institute for Security

Microchip FAQ's All you wanted to know about microchips but were afraid to ask!

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Implantable RFID Chips: Security versus Ethics

W.A.R.N. Passive Biometric ID Card Solution

The Place of Emerging RFID Technology in National Security and Development

RFID Based Toll Automation System

NAIT DEVICE STANDARD FOR CATTLE 25 SEPTEMBER 2014

Security and Privacy Issues of Wireless Technologies

VEHICLE TRACKING ALONG WITH THE ADVANCED RTO TECHNOLOGY

Attitudes and Behaviour

CONSUMER PERSPECTIVES OF IMPLANTED RADIO FREQUENCY IDENTIFICATION (RFID) DEVICES FOR MEDICAL INFORMATION RETRIEVAL

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

IJESR/Nov 2012/ Volume-2/Issue-11/Article No-24/ ISSN International Journal of Engineering & Science Research

John Ansbach General Counsel, GDT January 8, #IoTISACA

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

AFC BUS TAXI BIS. Solutions for Traffic Information and Fare Collection

PUSD High Frequency Word List

Maslow s Hierarchy of Needs and Purchasing

SOURCE ID RFID Technologies and Data Capture Solutions

The Drug Quality & Security Act

9-5/OG 9-3 Key FAQ/How-To

STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS.

Radio Frequency Identification (RFID) An Overview

Pet Microchips: High-Tech Protection Helps Find Lost Pets

Automated Identification Technologies

Enter the iphone challenge.

fleischhauer tickets RFID

Rural crime prevention

OI-TECH Asset Management

Time & Access System An RFID based technology

INVENTORY MANAGEMENT SYSTEM USING RFID FOR FSKKP LABORATORY IN UMP. JESSICA OLIVIA ANAK SIMON PAtE

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns

Major Risks and Recommended Solutions

How To Protect Yourself With Securtek

Point of View, Perspective, Audience, and Voice

California Treasures High-Frequency Words Scope and Sequence K-3

E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY

Modern Multipurpose Security Management System

How To Hack An Rdi Credit Card

Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework

RFID market value vs tag cost : Reality vs Dream. Figure 3.2 Examples of RFID applications and potential applications at different tag prices


Page-by-Page/Chapter Discussion Questions. The Other Wes Moore: One Name, Two Fates (Wes Moore) New York, Spiegel & Grau (2010)

Self-Check-In Hotels Using RFID. Technology

EKOLA Junior High School Bilingual Programme Entrance Test (1h15) Sample Paper. Result:

ELECTRICAL REMOTE KEYLESS ENTRY (RKE) Article No. SERVICE TIPS

Privacy(and(Data( Protection( (Part(II(

RFIDs and European Policies

rf Technology to automate your BUsiness

BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

Totally Wireless Video Security

Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas

An Escape. our man John on a research binge. Electric Slide

Inventory & Location System

Remote Deposit Capture: The Future of Check Processing BB&T Webinar March 28, 2007 Q&A Session

Questions and answers (FAQ) Reliance Protectron Go! Control security system

LEAN ON ME. He took me to this gas station in Colorado Springs and dropped me off with all my stuff. I called my mom and she came and got me.

Access Control, Ticketing and Booking System for Sports Halls

Data Mining. Craig Chomsky, Marek Dvorak

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Frequently Asked Questions

Parable of The Prodigal Son

The Potential Implementation of Radio-Frequency Identification Technology for Personal Health Examination and Monitoring Andrew Nguyen*

Tax Planning Within The Law Not Enough For Some

Wexler, Wasserman & Associates Insurance Agency, LLC. Wexler Insurance Agency, Inc. CHECK CASHER'S/PAYDAY LENDER APPLICATION

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department

What are you. worried about? Looking Deeper

Other 555 based and 8051 based projects...

AI 3: Library Card Numbers and Hand-Held Devices

Transcription:

Running Head: The Microchip The Microchip Radio Frequency Identification (RFID) Amy Hissom Fall 2007

Running Head: The Microchip 2 Introduction Remember the movie called Demolition Man that came out in 1993. The lead stars of the movie were Sylvester Stallone, Wesley Snipes, and Sandra Bullock. For those of you that may have not watched it, this was a fiction type movie about what the future might be like concerning a New World Order. Everywhere you went you were watched. Life was so controlled that if you even said a bad word you were automatically ticketed. If you said two bad words, the police came to arrest you. In this movie there was a group of people who refused to live like this, in turn, they had no access to normal things in life such as food and so on. They lived underground and came out at night to steal what they needed to survive. I m sure you will agree that this would be a terrible way to live life. Now I want you to imagine a world where there was no more privacy. A world where your every purchase was recorded in a database and your every belonging was numbered. Now imagine that someone many states away or in another country had a record of everything you ever bought, everything you ever owned, every item of clothing in your closet. Imagine a world where even people were numbered and tracked at a distance. Sounds really futuristic, doesn t it? If I told you that there was a technology in today s world based on a tracking system that is growing in sophistication as we speak, would you be concerned as to where it will be say ten years from now? There is a technology of such and it is called Radio Frequency Identification (RFID). RFID is a rapidly spreading technology based on a tracking system, which raises concerns of privacy infringement and creates fear of a surveillance society. Theses concerns need to be addressed quickly. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is an object that can be attached to or incorporated into a product, animal, or person for the purpose of identification using radio waves. This tag transmits the identity and other properties of anything to which it is attached to a reader via radio frequency signals, allowing further information to be accessed in a computer database. A Radio-Frequency Identification system has three parts: A scanning antenna A transceiver with a decoder to interpret the data A transponder - the RFID tag - that has been programmed with information. The scanning antenna puts out radio-frequency signals in a relatively short range. The RF radiation does two things: It provides a means of communicating with the transponder (the RFID tag) AND It provides the RFID tag with the energy to communicate (in the case of passive RFID tags).

Running Head: The Microchip 3 RFID tags are tiny, cheap, and all around you. With the use of RFID technology, the surveillance of the surrounding world is more easily accomplished than ever before. There are many current uses for RFID. Companies of all sorts, including clothing stores, libraries, and so on are jumping on this new technology, to track inventory. One particular company, Marks & Spencer, have extended the use of RFID chips in their stores. Marks & Spencer claim that this particular technology will help them stay accurate with inventory. They state that the chip will be placed in the removable price tags on their clothing. Wal-Mart is also taking advantage of this technology. I don t know about you, but he thought of my whereabouts being tracked through my underwear makes my skin crawl. Consumer Products Shown at left is a magnified image of actual tag found in Gillette Mach3 razor blades. Note: The chip appears as the tiny black square component. The coil of wires surrounding the chip is the antenna, which transmits information to a reader device, which can be located anywhere! Electronic Toll Collection Many ETC systems use transponders like this one to electronically debit the accounts of registered cars without their stopping The transponder, once attached to your windshield, transmits a radio signal to sensors mounted in the toll lanes. As you drive through the lanes, the proper toll amount is deducted from your Prepaid Account. Remote Keyless Vehicle Entry Remote keyless entry (RKE) systems allow a user to lock and unlock the car using a transmitter on the keychain, which transmits data to a receiver in the vehicle. Some of these systems even allow you to start you car by pushing a button. Each car has a unique identification number that is sent from transmitter to the receiver inside the car. In other words, your transmitter will not unlock the doors of your friend s car. Only yours.

Running Head: The Microchip 4 Passports On August 14, 2006 the Department of State began issuing Electronic Passports (e-passports) to the public. This next generation of the U.S. passport includes biometric technology. The proposed U.S. Electronic Passport is the same as a regular passport with the addition of a small contactless integrated circuit (computer chip) embedded in the back cover. The chip will securely store the same data visually displayed on the photo page of the passport, and will additionally include a digital photograph. The inclusion of the digital photograph will enable biometric comparison, through the use of facial recognition technology at international borders. A recent vote in Congress endorsing standardized, electronically readable driver's licenses has raised fears about whether the proposal would usher in what amounts to a national ID card. Inmate Tracking The RFID tagging is being used in some US prisons to keep track of inmates. The tiny chip is placed in a wristband and worn by the inmates. This keeps them from trying to escape along with recording their whereabouts in the prison. This particular RFID enabled wristband will send off an alarm if the inmate tries to remove it. Electronic Cash RFID enabled cards, such as SmartCards, are being used for electronic cash. While some of these uses sound good, they come with a price. Animal Tracking Implantable RFID tagging has been used in animals since the 1960s to track livestock and other animals. For example, a cow can be traced from birth to consumption. This also helps meat packing companies who have to condemn a carcass because of disease. If one cow is infected, maybe others from the herd are as well. The packing company can track a cow back to its original owner, due to the information stored on the RFID chip. Pet owners are using RFID tags in identifying their pets, which increases the likelihood of the pet being returned if it gets lost. According to Verichip Corp., more than one million pets in the United States and greater than ten million in Europe are protected by implantable identification devices. Success in animal applications has led to the idea of implanting RFID tags in humans. Miracle or Mark of the Beast? You decide! Revelations "And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name." (Rev. 13:16, 17)

Running Head: The Microchip 5 Human Implants In 2004 the U.S. Food and Drug Administration approved an RFID tag for humans called Verichip, which allows health care workers to access a person s medical history in the event the person could not communicate. The Verichip is unpowered and only transmits its unique 16- digit identification number when interrogated by the special scanner. The encrypted number is transmitted via the Internet to the secure database. Previously stored medical information on the patient is then relayed to authorized onsite medical professionals. Alzheimer's Patients This past summer, VeriChip Corporation, a subsidiary of Applied Digital Solutions, located in Delray Beach, FL funded a large pilot program involving hundreds of human patients at the Alzheimer's Community Care agency in West Palm Beach, Florida. VeriChip Corporation wants to market its tags to the roughly 45 million high-risk patients in the U.S. with diseases such as Alzheimer's, diabetes, cancer and heart disease. As of October 18 2007, 2,000 people worldwide have voluntarily had the VeriChip tag implanted into their upper right arms, among them patients with chronic or debilitating disease as well as VIP patrons of a Barcelona nightclub and investigators requiring special access to confidential drug-trafficking case files at the Ministry of Justice in Mexico. Over the next two years, VeriChip and Alzheimer's Community Care plans to inject 110 patients with dementia or Alzheimer's with the chip as well. But VeriChip came under fire in September shortly after the first 90 or so Alzheimer's patients received its chips in Florida after an AP report unearthed studies suggesting the chips may cause cancer in laboratory animals. Bioethicists argue that existing safeguards to protect Alzheimer s patients, among others, are being exploited for the sake of research studies and commercial gain. Employee Requirement In 2006 a Cincinnati video surveillance company titled CityWatcher required that any employee who works in its secure data center must be implanted with the VeriChip, which has been proven to have security flaws. CityWatcher is the company that provides video surveillance throughout the streets of Cincinnati. When news of this got out, it fired up a debate over the production of ever-more-precise tracking technologies and their ability to erode privacy in the digital age. Last month, California Governor, Arnold Schwarzenegger signed a bill that bars California employers and others from forcing people to have RFID devices implanted under their skin. This bill will go into effect as of January 1. Wisconsin and North Dakota have enacted similar laws. My Greatest Concern My greatest concern, and it should be yours as well, is that RFID chiping will be put to uses to which an individual does not wish to submit and that the procedure will cease to be voluntary, forcing citizens to surrender to its intrusion without the capability to make an informed choice. Considering recent moves by the government, such as the intended imposition of a national identification card for every US citizen, the eventual use of RFID in such applications is a real possibility. Where should the line be drawn for what is and is not acceptable usage?

Running Head: The Microchip 6 Are We Protected? Radio Frequency Identification is a new technology based on a tracking system that is rapidly spreading. This new technology is definitely amazing, but how is our individual privacy protected? This is the question amongst many Americans. Radio frequency identification is definitely a controversial issue. Many people are worried about their privacy along with the risk of identity theft. As long as computers have been around someone has found a way to crack, hack, and steal information. Why should this case be any different? Can we protect ourselves against RFID interception?