| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

WynesWorldFinal

This version was saved 18 years, 4 months ago View current version     Page history
Saved by PBworks
on December 9, 2005 at 12:48:48 am
 

RhetoricAndComposition > SectionSixtySeven > YourBlogs > WynesWorld > WynesWorldFinal


This blog is best viewed with Mozilla Firefox

 

Radio Frequency Identification - NOT FINAL

 

The purpose of this paper is to inform businesses and governments who plan to incorporate Radio Frequency Identification (RFID) systems into their work about the potential security and privacy vulnerabilities associated with the technology. I will also persuade them to regulate the use of this technology in a manner to better protect privacy and security of the general population. RFID technology can offer many advantages to manufacturers and the government. Manufacturers can use this equipment to better supply consumers by having more detailed information on the products sold. The government could use this technology to aid in anti-counterfeiting technology and assist with accurate reading of biometric data. However, while this same technology can aid the manufacturers and government, it also poses a threat to the general population. RFID could easily be used as tracking devices for everything on the planet, even humans. This may sound farfetched, but this is actually the plan of some large companies. Proper precautions need to be taken by the organizations implementing this technology to ensure the safety and privacy of the public.

To understand the threats that this technology can produce, a general understanding of it is required. Radio Frequency Identification systems are exactly what they say they are. They are systems that use radio frequencies to read identification data. Data is stored on specially made devices called “transponders”, also known as “tags”. These tags come in two types: active and passive. Active tags are tags that include a power supply such as a battery. Passive tags, on the other hand, do not require a local power source. Tags are as large as needed and can be half as small as a grain of sand. (14 Albrecht) Passive tags are small enough to be placed on store-bought products and can even be woven into clothing. Surprisingly, this has already been done, but I’ll come back to it later. (19 Albrecht) Each tag transmits data to a reader by sending radio waves from a built-in antenna. These antennas, usually flat and maze-looking, can be seen on the back of barcode stickers in retailers’ stores. Retailers that have already implemented RFID tags include Wal-Mart and Target.

Besides the tag, the other important, perhaps the most important, part of any RFID system is the tag “reader”. The reader broadcasts a radio wave which the tag receives then sends back information that is stored on the tag’s microchip. Since this technology utilizes radio frequency, a direct light of sight is not needed between the reader and the tag.

The technology of RFID itself is not new. In fact, versions of this idea have been around since World War II. During World War II, the British, Japanese, Germans, and Americans all were using Radar which informed of incoming aircraft. However, this did not distinguish between returning allies’ and approaching enemies’ aircraft. To overcome this limitation in the technology, the German pilots would roll the aircraft, in turn altering the signal sent back to the radar. In essence, this is the same idea of the RFID technology.

If the technology has been around since the 1930’s, then what’s all the fuss about? Though the technology is not new, the proposed uses of RFID is what is gaining the media’s recent attention. Businesses, especially manufacturers, plan to use RFID tags to more or less replace barcodes. While this can be very useful for manufacturers to track products, it also creates privacy concerns. If the tag is still enabled once the product leaves the store, it can be tracked while in the purchaser’s possession and all the way to the landfill.

The fact that RFID tags can be read even without a direct line of sight to the ID tag is itself a privacy threat. The furthest distance a reader can read a tag with current technology is about 30 feet. (9 Lahiri) Normal active tags can send signals up to about a mile. Some active RFID tags that are used to track animals in the ocean can even transmit data to low orbiting satellites. Furthermore, like most technology, improvements will be made on the current devices and allow them to read from much further distances.

Another reason RFID poses a threat to personal privacy is that no information stored in RFID tags are encrypted. This means that if RFID tags are used as passports or driving licenses, information such as full name, date of birth, place of birth, and age could all be stored in a tag, unencrypted. When near a reader, the tag would broadcast this personal information through the air in all directions, which is clearly a bad idea.

As future uses of RFID technology is fought, the very same technology is in use today. Knowledge of the current technology is possibly the biggest reason new implementations of RFID systems are being opposed: because it is proven to work.

Along with already mentioned negative effects that RFID technology can cause to society if not properly regulated, the technology itself has limitations. Some examples of these limitations are that reading can be restricted by the surroundings and materials near the equipment. Materials and objects are categorized by RF lucent and RF absorbent…We do not have to discard the idea of implementing RFID technology all together, but we do have to create certain restrictions and limitations of its use. I would like to propose certain guidelines that would help regulate the use of this technology that could otherwise be detrimental to society. If RFID tags are placed on products sold at stores, not only should the consumer deserve the right to be informed that the product contains the tag, but also the tag should be deactivated or removed at point of sale. Like mentioned before, if tags are not removed from the product or packaging, they can stay attached until they reach the landfill. They need to be removed or deactivated to ensure that product tracking will not take place in the consumers’ possession outside of the supply chain. There is no need for manufacturers to monitor people in this way to justify keeping the tag after point of sale.

I also suggest that a tag reader must clearly inform all persons of a tag reading beforehand so that there is no secretive tag reading. For example, all tag readers placed at the entry and exit points of a store must clearly label what they are, what they are doing, and what the information is used for.

In conclusion, RFID technology can be useful for manufacturers, retailers, and even the consumers. More importantly, we must take everything into consideration before. We need to work out the problems before applying this technology everywhere in our lives.

Comments (0)

You don't have permission to comment on this page.