overview
technologies
applications
implants
numbers
issues
advocacy

related
Guide:
Privacy
Economy
Security
& InfoCrime
Consumers

related
Profiles:
Passports
Australia
Card
Surveillance
Internet
Refrigerator
Biometrics
|
applications
This
page covers business, institutional and personal applications
of RFID technology.
It covers -
introduction
As the preceding page suggested, RFID technologies are
neither inherently benign or subversive, unless you believe
that they embody "the mark of the Beast".
Their value (and threat) lies in how they are used, in
particular
- what
happens to information collections that incorporate
data from RFIDs
- whether
people are aware of (and consent to) data collection
and use.
The
salient attraction for may developers is the ease of data
capture: entities can be readily identified in ways that
minimise labour costs and integrate that information with
other applications (eg billing systems).
traffic systems
The
RFID application with which most people are familiar is
one of the oldest and simplest: traffic systems.
RFID-based road management systems operate on the basis
of flat fees or congestion pricing. Those systems typically
have two features -
- real
time automated identification of vehicles
- automated
billing, with the fee for use of the road being deducted
from the user's bank account or added to a periodic
bill
Singapore
for example regulates traffic flow by using congestion
pricing (fees or higher fees on particular roads during
peak periods) and RFIDs. All vehicles in that nation carry
active tags, communicating with readers dispersed across
the island along all main routes. Vehicle by vehicle identification
allows the government to automatically deduct payments
from each user's account and, if there are insufficient
funds, to issue a fine. As a single journey often involves
transit past several readers it is in principle possible
to get a broad idea of individual itineraries.
Australian commercial tollways (and some counterparts
in the US) use a less sophisticated scheme, with travelers
being able to lease an active tag that is generally left
on the dashboard of the vehicle that they are using. The
tag is identified by the road operator when it passes
through a checkpoint onto the particular tollway, with
a fee being debited from the user's account or directly
from a credit card. Information about the NSW E-Toll scheme
is here.
Several jurisdictions are trialling RFID-equipped smartcards
for commuter rail, ferry and light rail networks. Typically
commuters are billed when they pass through a barrier
(or enter a vehicle) that is equipped with a reader of
the relevant tag. Some cards embody a rechargeable electronic
purse, with the consumer topping up the account.
Other jurisdictions, such as NSW, are considering tagging
to detect vehicle registration fraud.
perimeter control
The
RFID application with perhaps the highest profile in the
ICT sector is, in practice, one of the simplest. Many
organisations are using RFID-based cards (often called
proximity cards) as a replacement for magnetic stripe
cards or keypad entry controlling entry to compounds,
buildings or individual rooms.
That application has attracted little consumer attention,
in contrast to anxieties about use or potential misuse
of tagging in supply chains (particularly at the retail
link and beyond).
supply chain management
Improved
inventory management - including identifying what is in
stock and minimising handling of items passing from manufacturer
through wholesaler to the retailer or from a component
supplier to an assembler - has the potential to significantly
reduce costs, of particular interest for major retailers
whose business is based on high volume sales with very
low margins. Benefits include reduced labour costs and,
more broadly, greater scope to move to just-in-time product
acquisition and strengthen EDI between various actors.
As with barcodes, initial interest in supply chain tagging
was at the category or consignment level (eg a shipping
container, a pallet or a class of products). It was driven
by leading actors - for example the US Defence Department,
the major automobile manufacturers and dominant retailers
retailers such as WalMart and Tesco - who could mandate
deliveries must feature particular identifiers, had the
resources to establish the necessary infrastructure, the
capacity to integrate RFID data with their information
systems and often were in the position to develop standards.
The focus is shifting beyond the consignment to identification
of individual items, with the pace of change being determined
- as highlighted on the preceding page of this profile
- by factors such as the cost of tags and the perceived
ROI from reengineering information systems to fully leverage
the data. Some actors are adopting a 'wait & see'
approach, in the expectation that the next generation
of tags and systems integration will allow features such
as
- dynamic
pricing of items 'on the shelf'
- seamless
payment schemes (eg the vision of money being sucked
out of your account via a wireless payment card as you
walk your shopping trolley through the gateway where
the cashregister used to be).
At
the moment it is likely that some early adopters - and
potential adopters - are in a position to collect data
but have difficulty making sense of it on a commercial
basis (eg altering their product acquisition) or reducing
particular costs beyond the warehouse.
Uptake has been bedevilled by mismanagement of RFID introduction
by individual retailers in the US, Germany, France and
UK (exacerbated by mischiefmaking by some activist groups
and hype by RFID visionaries). As we note in the following
page of this profile, that has led to vandalism, boycotts
and calls for regulatory intervention.
Libraries are trialling tagging for security (eg replacing
traditional 'tattletape' alarms) and for inventory management,
increasingly with identification at the item level to
assist handling of multiple copies of a particular title.
That tagging is often based on a unique number rather
than on the work's ISBN or ISSN, undermining claims that
surveillance agencies will park a reader outside libraries
to track consumption of subversive literature. (Tracking
would, presumably, be available through old-fashioned
access to the institution's database).
The American Library Association's RFID Fact
Sheet highlights benefits such as enhanced collection
security, rapid charging and discharging of library materials
by staff, easier patron self-charging, sorting for reshelving,
electronic inventorying, and electronic shelf reading.
The same organisation's Office for Intellectual Freedom
has published a bibliography
that considers privacy issues regarding library use of
RFIDs.
authentication
RFIDs have also been promoted as a generic or item by
item authentication mechanism, particularly for high value
items such as pharmaceuticals subject to forgery.
The expectation is that tagging would replace barcodes
and hologram labels, with hospitals or other dispensaries
able to quickly interrogate a secure global database to
determine whether a particular consignment or container
is what it purports to be.
Other claims for RFIDs as an anti-forgery mechanism are
more problematical. Much media attention has been attracted
by supposed current use of RFIDs in US and EU banknotes
as an anti-counterfeiting tool or as a mechanism for pervasive
surveillance. Skeptics about some conspiracist claims
note that notes in many currencies already bear unique
serial numbers or other identifiers: in principle the
advantage of including a tag would be to speed up reading
and logging of notes.
In practice the large number of notes in circulation,
movement through different hands (and acceptace by people
'off the grid' without the ability to validate the tag),
formidable data collection and data mining problems, and
cheapness of alternate mechanisms for tracking malefactors
means that fears about tagged notes appear unjustified.
materiel life-cycle control
Other proponents of RFIDs have mooted use in
the 'glass pipeline'
as an identifier for building material, consumer electronics
and other items that might eventually be recycled. Singapore,
for example, gained attention over trials in embedding
tags in the fabric of buildings that are likely to be
demolished in twenty years time.
It is unclear whether tagging of items for recycling -
particularly those that will be in use for many years
or where end-processing techniques mean that reduced sorting
costs offer few benefits - is of particular value.
human identifiers
In practice use of RFIDs as human identifiers has largely
taken two forms.
The first is the 'wireless bracelet' (or handcuff), which
alerts a network operator if the wearer moves out of contact
with the network or instead enables the operator to locate
the wearer. Uses have included restricting prisoners in
home detention (remove the handcuff or leave the premises
results in an automated alert being sent to custodial
authorities). More benignly, tagged
kids in the LegoLand theme park can be tracked by
anxious - or merely ambitiously technophile - parents.
The second form is as supplementary verification in official
documentation, with for example moves to incorporate tags
in -
- passports
- either to indicate that the document is authentic
or, more usefully, supply unique identification numbers
tied to citizenship and watchlist databases.
- national
identity cards or official 'access to services' cards
Tagging
is accordingly a feature of plans in several nations for
enhanced passports. A new global passport standard, developed
by the International Civil Aviation Organization (ICAO),
includes RFIDs and biometric
identifiers. It has been criticised
by groups such as Privacy International, Statewatch and
the EFF. They have characterised it as "fundamentally
flawed" and
part
and parcel of a larger surveillance infrastructure monitoring
the movement of individuals globally that includes Passenger-Name
Record transfers, API systems and the creation of an
intergovernmental network of interoperable electronic
data systems to facilitate access to each country's
law enforcement and intelligence information.
Proposals
to more permanently identify people through implanted
RFID tags have proved more controversial, although as
discussed later in this profile the terms of debate strike
us as misplaced. Subcutaneous implants in companion animals,
other beasts and human animals are discussed in the following
page.
next page
(implants)
|
|