Why is rfid controversial




















Here are answers to some of the most common questions about this increasingly ubiquitous technology. RFID stands for radio frequency identification. A computer chip is attached to an antenna, and they are often referred to together as an RFID tag. Data stored on the chip transmits wirelessly through the antenna to an RFID reader or scanning device that operates on the same frequency as the antenna. Makers of RFID tags and readers use proprietary technology and design their systems to run on different frequencies anywhere from KHz to about MHz.

Tags designed by one company generally cannot be read by readers made by another company or by readers running on different frequencies. That may not be an issue in the future as industry standards are more broadly adopted. RFID devices can be active or passive. Active RFID tags have a battery that provides power to transmit data on the chip, and can transmit data feet or more. This powers the tag to send data to the reader.

Passive RFID usually requires a reader to be within a foot of the chip, but depending on the frequency, can be read from up to 20 feet away.

This depends on the storage size of the chip. A few CityWatcher. They were given a key chain that contained an RFID chip. Regardless, Darks says the idea helps maintain security in the building -- and he sees some humor in the situation. But this human-implant trend worries privacy advocates like Marc Rotenberg with the Electronic Privacy Information Center.

A lot of pet owners are using chips to keep track of their animals if they're lost. I think people are going to be concerned about who uses the chip and who has access to it. One new consumer application is in credit cards. Consumers could simply wave a credit card containing a passive chip at an RFID reader to pay for their purchases. While there is concern that hackers could remotely read the card information, supporters argue it would be easier for merchants, and the speed of the processing time could shave off more than a dozen seconds per transaction, which would add up.

They also say transactions would be no more or less secure than they are today. If the government wants access to the RFID data or the bar code data, it's essentially the same thing.

The controversy and discussion about RFID technology will not end anytime soon. But both sides agree that a sizable dose of debate is needed to hammer out the kinks. Meanwhile, the technology is appearing in an increasing number of places -- though even if you look around, you still might miss it. RFID labels could be used in place of conventional price stickers for produce and other groceries.

Member Center: Sign In Register. Is RFID tracking you? One could argue that the presence of these tags in clothing, books, or any of the other thousands of things found in a store is quite harmless.

It is the utilization of this information that causes the controversy. Ultimately, these ubiquitously, ostensibly innocuous RFID tags could be found in all purchased products. Most people are not even aware of the presence of such tags. And these tags, once taken home, do not magically cease functioning.

The tags would allow currency to record information about each transaction in which it is passed. Governments and law enforcement agencies hail the technology as a means of preventing money-laundering, black-market transactions, and even bribery demands for unmarked bills. However, consumers fear that the technology will eliminate the anonymity that cash affords. Under this system, all patients, visitors, and staff entering the hospital are issued a card embedded with an RFID chip. The card is read by sensors installed in the ceiling, which record exactly when a person enters and leaves the department.

The information is stored in a computer for 21 days. Other hospitals in Singapore are expected to adopt similar technology. Payment systems : In , ExxonMobil developed the wireless payment application known as Speedpass. Since then, six million consumers have utilized the payment option at 7, Speedpass-enabled locations. Now, a wide range of merchants and retailers are looking for ways to implement radio frequency RF wireless payment systems.

Sony and Phillips are leading the way. Next, consumers would shop online, say, for tickets to a local event. Then, at the event, consumers would wave their cell phone near a reader in the turnstile, and be automatically admitted. Privacy Risks While corporate giants tout the merits of RFID technology, civil liberties advocates point out that the ability to track people, products, vehicles, and even currency would create an Orwellian world where law enforcement officials and nosy retailers could read the contents of a handbag-perhaps without a person's knowledge-simply by installing RFID readers nearby.

Such a fear is not unfounded. This means that if a person enters a store carrying several RFID tags-for example, in articles of clothing or cards carried in a wallet-one RFID reader can read the data emitted by all of the tags, and not simply the signal relayed by in-store products.

This capacity enables retailers with RFID readers to compile a more complete profile of shoppers than would be possible by simply scanning the bar codes of products a consumer purchases. Share this page:. Defend Privacy. Donate Now. Radio Frequency Identification is an identification tracking technology "designed to monitor physical objects," such as commercial products, vehicles, and animals.

The report warns of significant privacy and security risks. If RFID techniques are adopted, the groups urge that schools adopt robust privacy safeguards. The State Department subsequently made changes to the "e-Passport," to address privacy and security concerns.

The retailer has stated that its goal is to expand the use of the tags to its other merchandise as well. Previously RFID tags have only been used in larger packages for warehouse and distribution use, but this will be the first time the tags are used in the stores for individual products that will be taken home by consumers.

The tags will remain readable from a short range even after they are removed from the store. The federal government now requires US citizens to present identity documents when entering the US.

Senator Leahy has also criticized the program. RFID applications transfer personal data wirelessly between an embedded tag, typically in an ID card or product, and a reader.

Many privacy concerns have been raised. The guidance directs organizations to perform privacy impact assessments, apply risk minimization techniques, and inform individuals about RFID. In comments to the Federal Trade Commission, EPIC reiterated recommendations pdf it made in to the consumer protection agency to address the risks to consumer safety of the unregulated use of RFID tags that reveal personal data.

The latter would be used in a nationwide network for billing of public transportation. Both cards use the Mifare Classic RFID tags, which relies for its security on an algorithm that can be cracked with modest effort. The troubled card provides for contact-less entrance to public transportations and office buildings worldwide. The manufacturer of the chip, NXP, follows Dutch secretary of state Tineke Huizinga in claiming that publication of the results is irresponsible.

While NXP is taking the researchers to court , the University issued a statement Dutch valuing scientific publication of security leaks and mentioning that the publication will help NXP to develop a better chip. The results will be published at the European computer security Esorics conference in Spain in September of this year. Senators Leahy and Stevens authored a law that postponed the document requirements until June or until seven conditions are met, whichever is later.

In response to the final rule, Senator Leahy said , DHS "still [has] given the American people no reason to believe they will meet the readiness conditions in the new law. However, EPIC recommended four changes to the bill: " 1 including regulations on the use of unique identifiers and the profiles that can be created; 2 including an enforcement provision with a private right of action; 3 stronger provisions on deactivation of tags, including the possibility of permanent deactivation; and 4 clearly and prominently labeling RFID readers or transponders.

The European Commission has published draft guidelines on the use radio frequency identification RFID technology in member countries.

Among other proposals, the commission recommends RFID operators conduct privacy impact assessments before deploying the technology and immediate deactivation of RFID tags containing personal data when goods are purchased.



0コメント

  • 1000 / 1000