Download presentation
Presentation is loading. Please wait.
1
RFID: The Reward is Worth the Risk With Government Intervention By Alex Johnson
2
Beginning of RFID WWII Identify Friend or Foe http://www.fighterfactory.com/airworthy-aircraft/curtiss-p-40.php
3
Wide usage of RFIDs begins when WalMart required all major suppliers to to tag their shipments to the company with RFID tags “smart shelves” - RFID Scanners can keep track of inventory better and faster than a human
4
paving the way for a techno- totalitarian state in which each person ’ s movements, associates, and casual acquaintances are carefully monitored and recorded in futuristic data centers - Simson L. Garfinkel
5
The Fourth Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
6
4th Amendment and RFID Wiretapping 1928 Olmstead v. United States - LEGAL 1967 Katz v. United States - ILLEGAL “The Fourth Amendment protects people, not places” (Strickland) RFID as tracking devices
7
RFID and Passports Sniffers Identity theft How to combat theft Encryption Digital signatures Aluminum Foil barriers
8
Tagging People Tracking missing children RFID as security measure/key
9
RFID as Tracking Devices Real Time Locator System - RTLS A person associated with a certain product containing an RFID tag
10
Personal Privacy Protection Kill/Deactivate tags Blocker tags Should you have to explicitly ask for your privacy?
11
RFID Bill of Rights 1.The right to know if a product contains an RFID tag 2.The right to have embedded RFID tags removed, deactivated, or destroyed when a product is purchased 3.The right to first-class RFID alternatives. Consumers should not lose other rights (such as the right to return a product or travel on a particular road) if they decide to opt-out of RFID or exercise an RFID tag’s kill feature. 4.The right to know what information is stored inside their RFID tags. If this information is incorrect, there must be a means to correct or amend it. 5.The right to know when, where and why an RFID tag is being read (41).
12
Works Cited Garfinkel, Simson L., Ari Juels, Ravi Pappu, "RFID Privacy: An Overview of Problems and Proposed Solutions," IEEE Security and Privacy, vol. 3, no. 3, pp. 34-43, May/June 2005. Lockton, Vance, and Richard S. Rosenberg. "RFID: The next serious threat to privacy." Ethics and Information Technology 7.4 (2006): 221-231. Web. 23 Mar 2010. Strickland, Lee S., and Laura E. Hunt. "Technology, security, and individual privacy: New tools, new threats, and new public perceptions." Journal of the American Society for Information Science and Technology 56.3 (2004): 221-234. Web. 23 Mar 2010.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.