feurstec_a1

__ Radio-Frequency Identification tags. __ (how do they work) Radio-Frequency Identification Tags or RFID tags are believed to be the next step in barcode technology. They have many uses and are becoming quite cost effective. Barcodes are found on almost everything consumers buy. The barcodes are literally a series of printed black bars that have information encoded into them. A literal code made from bars. These codes are then read by a laser and the information is decoded by a computer. This is where RFID tags come in. An RFID tag would take the place of the barcode. The product no longer has to be visible for the information to be sent. There are no scanners in the RFID tag system. An electronic device is activated when it receives a signal and then the information is exchanged. There are many advantages and some risks involved in using this technology. There is also a concern on the ethical issues surrounding the implantation of RFID chips in humans as well as the possibility of identity theft when using RFID implants. Because they contain no visible mark to be read by a receiver, the RFID chip has a variety of uses.
 * What are they?**

The RFID tag system has many uses. Race Timing, Passports, Transportation payments, Product tracking ,Transportation and logistics, Lap scoring, Animal identification, Inventory systems, Human implants, Libraries, Schools and universities, Museums, Social retailing, are all cited as having used RFID tags. [1] The specific topic of this research paper is to understand the use of RFID implants in humans by exploring the risks, the benefits, and the future of RFID implants, and the paper will also explore the ethical questions regarding these implants. RFID tags are implanted in humans for a variety of different reasons. They can be used for secure entry into building. They can be used to store medical data or banking or any other data. They can also be used to track a person’s location. [2] These uses bring about them certain risks as well. Despite the apparent widespread acceptance by various corporations of this technology, there exist numerous risks that threaten the implementation of such devices. One such risk poses a threat to the privacy of the consumers, as these devices have the potential to be tracked globally, which threatens not only those who use such technologies for personal reasons, but also military personnel.3 In addition, concerns have been raised in regards to potential cloning of the tags. Defensive technologies have been created in order to eliminate cloning hazards, including challenge-response authentications; however, the costly price tag limits the integration into everyday society. The high cost associated with such technologies has lead manufacturers to distribute substantially weakened versions, which cannot withstand sophisticated forms of attack, once again leaving the consumer at risk.4 Recent reports have also indicated that RFID databases for passports and baggage at airports have been susceptible to prohibited access of the confidential information contained within both.5 The introduction of the RFID technologies into passports has proven to be the most widely contested field of implementation, as many security breaches have already been noted in their infant stages of utilization. For instance, the encryption for the chips of UK versions was said to be broken in less than 48 hours of its introduction.6
 * Some uses**
 * Risks**

The versatility of such technologies is undeniable. Since its inception, RFID technologies have diversified to become useful in a multitude of areas from animal tracking to event management. In the subcategory of Low-Frequency RFIDs, it is possible to obtain tags with very small sizes, making them ideal for the tracking of material. Passive RFID tags also have the potential to last for a lifetime, boasting unlimited potential. The second category of RFID tags, labelled active, come with a three- to ten-year lifespan and a 200m range. While this type of RFID is typically reserved for high value asset tracking and the tracking of goods in real time, it is undeniable that both of these benefits contribute to the overall appeal of active RFIDs. In addition to all of the widespread uses and statistics which solidify our understandings of RFID technologies as an aid to society, the technology also gives the precise location of objects on a global (not just local) scale. For this reason, technologies found in RFID chips have been mimicked in GPS navigation systems.7
 * Benefits**

The main fears some people have about RFID tags is the possibility of mandatory implantation for everyone, privacy concerns, and security concerns. Some people have a George Orwellian outlook on life where the government would use these implants to track and control our every move. These people fear that one day RFID tags will become mandatory and that the government will be able to spy on them like ‘Big Brother’.8 Of course the tags won’t allow you to been seen physically, your entire private data is what can be seen. From as much as 10m away, a scanner can potentially pick up your signal and steal the data contained within.9 RFID also has the capabilities to track in real time. Ian Fleming could think of a variety of uses for such technology. The potential loss of privacy has many people nervous over the technology. The state of California has banned employers from forcing their employees to get the RFID implants.10 There is still much debate as to how the technology and implementation of RFID tags will evolve. There are both benefits and risks associated with RFID implants in humans as well as ethical and social concerns. These could hinder or completely stop the implantation of RFID tags into humans.
 * Ethical questions**
 * The future**
 * Sources**
 * 1) “RFID Journal News”  RFID Journal 
 * 2) “NJE Consulting” Azcar Technologies Inc.
 * 3) . [|What's New"]. //Radio Frequency Identification (RFID)//. 4 April 2007. 
 * 4) [|"RFID Privacy and Security"]. RSA Laboratories. 
 * 5) [|"RFID chips can carry viruses"]. [|Ars Technica].< http://arstechnica.com/news.ars/post/20060315-6386.html.>
 * 6) [|"RFID Passports cracked through the mail"]. [|the register]. .
 * 7) “NJE Consulting” Azcar Technologies Inc. 
 * 8) “Is RFID Tracking You?” CNN. By Daniel Sieberg. 
 * 9) [|"FIPS-201, Personal Identity Verification (PIV) of Federal Employees and Contractors"] (PDF). 
 * 10) “[|California Bans Forced RFID Tagging of Humans]”, //Government Technology// website, October 17, 2007.< http://www.govtech.com/gt/156351?topic=117688>
 * 11) “How RFID Works” By Kevin Bonsor and Candace Gibson 