https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

content


IWCE: Speakers say RFID privacy issues loom large

IWCE: Speakers say RFID privacy issues loom large

LAS VEGAS--Despite improvements in encryption and access control technology, users of radio frequency identification, or RFID, systems and their customers should cast a wary eye toward the burgeoning technology, according to experts speaking yesterday at IWCE 2007
  • Written by Urgent Communications Administrator
  • 29th March 2007

LAS VEGAS–Despite improvements in encryption and access control technology, users of radio frequency identification, or RFID, systems and their customers should cast a wary eye toward the burgeoning technology, according to experts speaking yesterday at IWCE 2007.

While Generation 2 RFID systems incorporate advanced encryption, access controls that necessitate a “handshake” between the tag and reader before any information is transferred, and the ability to lock down the tag, the safeguards aren’t foolproof, said Ron Plesco, director of the privacy and special projects division of consultancy SRA International.

“It’s nuts to put personal information on RFID tags,” Plesco said.

Nevertheless, it’s happening with greater frequency, and often without the knowledge of the public. The Department of State has tested the technology in entrance and exit documents at five crossing points along the U.S.-Canadian border and will incorporate the technology in passports beginning next year. Meanwhile, Washington State is using long-range RFID—which provides a read-range of 30 feet or more, perhaps as much as 70 feet—in driver’s licenses.

RFID tags are “remotely and secretly readable,” a vulnerability that becomes more troubling when the public isn’t aware its personal information might be at risk, said Melissa Ngo, director of the Electronic Privacy Information Center’s Identification and Surveillance Project. “If someone steals your wallet, you know it’s gone and you can take the proper steps,” Ngo said. “With RFID, you don’t know.”

Lee Tien, senior staff attorney for the Electronic Frontier Foundation, described RFID as a “very insecure” technology that’s likely to pass along sensitive information. He’s particularly troubled by the use of RFID in applications such as passports and driver’s licenses because the owners of those documents have little choice in the matter.

“You can’t choose another technology that’s more secure—you have to take it or leave it,” he said.

Tien suggested that state and local government refrain from using RFID in such situations until it collects empirical data that defines the risks, as well as the solutions needed to mitigate those risks. Only then can a government agency make an informed decision as to whether the use of RFID is worth the associated risks.

“There hasn’t been enough data collected so far to know for sure what the real risks are,” Tien said. “Much of the time, what is thought to be possible differs from reality.”

Kenneth Mortensen, acting chief of staff for the Department of Homeland Security’s Privacy Office, agreed that risk assessment and greater disclosure should be necessities going forward for any entity contemplating the use of RFID technology.

“We need to be transparent in terms of how this technology is going to be used,” Mortensen said. “We need to tell people that their credentials contain an RFID tag. There hasn’t been openness about this.”

He added that this applies to companies in the private sector as well. “You’re not told at [the clothing store] that there’s an RFID tag in the sweater you just bought,” Mortensen said. “You’re told that you should cut out the tag before wearing, but you’re not told why.”

Ngo agreed and said that EPIC guidelines suggest that retailers remove or disable RFID tags before the customer leaves the store, and refrain from collecting data from the tag, which often occurs for marketing purposes.

In addition to implementing appropriate safeguards to prevent the interception of personal information, Mortensen recommended RFID users—particularly government entities—ensure that only the information needed for a specific application is transmitted—“nothing extraneous”—and that use limits be defined.

“We should only use the technology for the purposes we told the public about,” he said. “Additional uses should be put out for public comment. That will guard against mission creep.”

Tags: RFID content Tracking, Monitoring & Control

Most Recent


  • AT&T FirstNet unleashes robotic dogs for emergency services
    AT&T is releasing robotic hounds from Ghost Robotics as part of the service provider’s FirstNet emergency responder service. In a blog, AT&T VP Lance Spencer explained that the robotic dogs will be connected to AT&T’s network and deployed for public safety, defense, federal and state agencies, local police and fire departments, and commercial customers. “Network-connected robotic dogs can deliver a […]
  • Federal agencies infested by cyberattackers via legit remote-management systems
    It has come to light that hackers cleverly utilized two off-the-shelf remote monitoring and management systems (RMMs) to breach multiple Federal Civilian Executive Branch (FCEB) agency networks in the US last summer. On Jan. 25, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) released […]
  • Self-driving cars present terrorism risk, FBI director says
    The rollout of self-driving cars could mean an increased threat of terrorist attacks. That was the alarming warning delivered during a discussion on national security at the World Economic Forum at Davos in Switzerland. While the safety benefits of autonomous vehicles (AVs) have long been touted, the need for caution was highlighted by Federal Bureau […]
  • IWCE: Speakers say RFID privacy issues loom large
    Newscan: Police software vendor breach exposes personal data, raid plans
    Web Roundup Items from other news organizations Police software vendor breach exposes personal data, raid plans Is China about to destroy encryption as we know it? Maybe RapidSOS delivers its public safety location tech to Grubhub Monitoring and funding concerns could undermine DoD’s secure unclassified network, IG says LAUSD hackers started probing a month before […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • L3Harris unveils P25-LTE device that is designed to meet stringent new fire standard
  • Open-source tools for the IoT ecosystem
  • New Orleans-area 911 center inks multiyear APEX deal with Carbyne to replace call-handling system
  • IWCE: Speakers say RFID privacy issues loom large
    Newscan: Feds recover millions from pipeline ransom hackers, hint at U.S. Internet tactic

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

AT&T FirstNet unleashes robotic dogs for emergency services dlvr.it/ShW7p8

27th January 2023
UrgentComm

Federal agencies infested by cyberattackers via legit remote-management systems dlvr.it/ShVhn3

26th January 2023
UrgentComm

How 5G is making cities safer, smarter, and more efficient dlvr.it/ShVS1h

26th January 2023
UrgentComm

MCPTT interworking for critical communications dlvr.it/ShTm3P

26th January 2023
UrgentComm

Self-driving cars present terrorism risk, FBI director says dlvr.it/ShTTHx

26th January 2023
UrgentComm

UK Home Office officially will cut ESN ties with Motorola Solutions in December dlvr.it/ShNjfN

24th January 2023
UrgentComm

Newscan: Police software vendor breach exposes personal data, raid plans dlvr.it/ShN0q2

24th January 2023
UrgentComm

RT @IWCEexpo: We're so excited about our awesome list of speakers! Today we highlight Budge Currier, a 9-1-1 Branch Manager at CAL OES, res…

24th January 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.