RFID: The Reward is Worth the Risk With Government Intervention By Alex Johnson.

Slides:



Advertisements
Similar presentations
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
Advertisements

The Fourth Amendment and Public Schools
Ellie Ingbritsen and Rosie Parmigiani Board of Education of Independent School District #92 of Pottawatomie County et. al v Earls et. al.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
The Patriot ACt. Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.
Happy Monday SCREENMY DESK “Theme Song from the Movie The Patriot *CELL PHONES OFF OR ON SILENT, AND IN YOUR BACKPACK, WHICH SHOULD BE PLACED.
Internet Privacy & Security A Presentation to WPI Student Pugwash Michael J. Ciaraldi Professor of Practice, WPI Computer Science 2003/10/02.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Beyond the Barcode RFIDs Radio Frequency Identification.
Privacy & Personal Information -- Why do we care or do we?
The Fourth Amendment to the U.S. Constitution. The U.S. Constitution The Constitution was created on September 17 in It was ratified on June 21,
Fourth Amendment Assignment. Amendment 4: Right to Search and Seizure The right of the people to be secure in their persons, houses, papers, and effects,
4th Amendment.
Drug Testing In Selection: Legal, Ethical and Privacy Issues Joanna Bonilla, Anthony Bordogna, Danielle Dow, Antoine Woods, Stephanie Brawley.
Lisa Morales CIS * Online and offline purchase data * Supermarket savings cards * White pages * Surveys * Sweepstakes and contest entries *
The Fourth Amendment and Students’ Rights in Public Schools.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Analyzing a Court Decision An overview of Student Searches presented by Bart Fennemore.
By Marta Telatin and Andrew Koennig 4 TH AMENDMENT.
Jörn-Marc Schmidt Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
What right do you have to keep your stuff private? How does this right change depending on whether you are home or at school? Does it change depending.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
It really is easier that you think!. Why use learning objectives  If you don't know where you are going, any road will take you there.  Lewis Carroll,
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Privacy. Position A university should NOT be allowed to monitor university network and connected computers for improper activity.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
The Use and Effectiveness of Digital Video in the Classroom Presented by: Traci Evans.
DO NOW – Friday, December 6 What do you think “unreasonable” means? A man is seen walking into an apartment with a grey duffel bag. He is then seen coming.
The Bill of Rights The First Fundamental Changes of the Constitution.
THE 4 TH AMENDMENT The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Lecture 2 Applications of Propositional Logic. Translating English into Logic " The right of the people to be secure in their persons, houses, papers,
CPS 82, Fall Privacy before … l Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic.
The Fourth Amendment and the Home By Laura Zajac.
Should Welfare Recipients be drug tested? BY: TAMMY GRUNERT.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
The Fourth Amendment, Technology, and a Right to Privacy
A student’s rights to privacy and freedom of speech in a school setting.  Objective:  Students will describe student rights and constitutional issues.
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
 The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
CALL TO ORDER  Have you or someone you’ve known ever been searched by the police, legally or illegally?  What do you know about the rules that police.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
By, Kris Coles Eva Ortega Christina Torres. Veronia School District v. Acton First court case to go to Supreme Court, were the school district demand.
T HE R IGHT TO B E L EFT A LONE Essential Question: How has an individual’s right to privacy changed over time?
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Fourth Amendment Search and Seizure Civil Liberties.
Arrest and Detainment How do you know you’ve been arrested?
Privacy and the Law.
Limiting the Right of Search
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Enforcement of Fourth Amendment Protections Is a man’s home his castle
Surveillance in Society
Grab a book off the shelf and look it up. (Article V)
Forensics Week 7.
Chapter 14 Searches and Seizures
The Fourth Amendment and the Home
Understanding Law: Mr Thompson, APT Academy
Fourth Amendment.
4th amendment By: KEila Aguilar.
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Surveillance State
IA455 Chris Danieli and Zachary gibson
Search & Seizure The act of taking possession of this property.
Warm Up – February 11 Grab the handouts from the front table
How does this Constitutional amendment protect Americans?
Arrest.
Judicial Restraint vs. Judicial Activism
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

RFID: The Reward is Worth the Risk With Government Intervention By Alex Johnson

Beginning of RFID WWII Identify Friend or Foe

Wide usage of RFIDs begins when WalMart required all major suppliers to to tag their shipments to the company with RFID tags “smart shelves” - RFID Scanners can keep track of inventory better and faster than a human

paving the way for a techno- totalitarian state in which each person ’ s movements, associates, and casual acquaintances are carefully monitored and recorded in futuristic data centers - Simson L. Garfinkel

The Fourth Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

4th Amendment and RFID Wiretapping 1928 Olmstead v. United States - LEGAL 1967 Katz v. United States - ILLEGAL “The Fourth Amendment protects people, not places” (Strickland) RFID as tracking devices

RFID and Passports Sniffers Identity theft How to combat theft Encryption Digital signatures Aluminum Foil barriers

Tagging People Tracking missing children RFID as security measure/key

RFID as Tracking Devices Real Time Locator System - RTLS A person associated with a certain product containing an RFID tag

Personal Privacy Protection Kill/Deactivate tags Blocker tags Should you have to explicitly ask for your privacy?

RFID Bill of Rights 1.The right to know if a product contains an RFID tag 2.The right to have embedded RFID tags removed, deactivated, or destroyed when a product is purchased 3.The right to first-class RFID alternatives. Consumers should not lose other rights (such as the right to return a product or travel on a particular road) if they decide to opt-out of RFID or exercise an RFID tag’s kill feature. 4.The right to know what information is stored inside their RFID tags. If this information is incorrect, there must be a means to correct or amend it. 5.The right to know when, where and why an RFID tag is being read (41).

Works Cited Garfinkel, Simson L., Ari Juels, Ravi Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions," IEEE Security and Privacy, vol. 3, no. 3, pp , May/June Lockton, Vance, and Richard S. Rosenberg. "RFID: The next serious threat to privacy." Ethics and Information Technology 7.4 (2006): Web. 23 Mar Strickland, Lee S., and Laura E. Hunt. "Technology, security, and individual privacy: New tools, new threats, and new public perceptions." Journal of the American Society for Information Science and Technology 56.3 (2004): Web. 23 Mar 2010.