Identity Theft And Rfid – Are You At Risk?
Join 1000's of Authors at StreetArticles Today!

What is Radio Frequency Identification?

RFID stands for Radio Frequency Identification. RFID technology was created during the Second World War to differentiate enemy war planes from friendly war planes and has evolved into a very useful technology. RFID has a variety of uses that range from asset tracking to the implementation of microchips embedded in credit or debit cards. In a nutshell, information is embedded into a “tag.” The tag contains a unique code and a transponder that can communicate with a reader. The reader picks up the transponder signal and transmits data from the microchip tag back to the “host” computer.

The Evolution of RFID

The evolution of RFID technology has advanced tremendously since the Second World War. It has made the progression from identifying air planes on up to the capability of identifying people, animals, and goods that are bought and sold. For instance, RFID technology has been piloted as a means of communication between retailers and manufactures through the use of a low cost RFID tag that allows each entity to communicate when goods leave the warehouse and when they arrive at their proper destination. In addition the technology is also now used by retailer as a means of inventory control. Plastic sensors with RFID tags are placed on textiles and other merchandise and readers are placed at the entrance or exit doors and if the sensor is still attached to the item, an alarm will sound. Furthermore, RFID has been implemented into the financial industry by providing a way for people to pay for items necessary for everyday life by a wave of the hand or plastic transponder device.

RFID –How Does it Affect You?

Some may agree that RFID technology has improved human purchasing power because it is faster, easier and more convenient than the traditional debit/credit card or cash avenues. But is it really secure? Each RFID tag in a credit or debit card has its own unique code that is only supposed to be capable of communicating with a certain reader, but that is not always the case. As a January 2012 Forbes™ magazine article points out, hackers can retrieve that information fairly quickly just by using a $300.00 magnetizing tool and $50.00 RFID credit card reader. As Kris Paget, the demonstrator in the Forbes article points out “ That RFID-enabled credit card data can be easily, cheaply, and undetectably stolen and used for fraudulent transactions. With a Vivotech RFID credit card reader she bought on eBay for $50, Paget wirelessly read a volunteer’s credit card onstage and obtained the card’s number and expiration date, along with the one-time CVV number used by contactless cards to authenticate payments. A second later, she used a $300 card-magnetizing tool to encode that data onto a blank card. And then, with a square attachment for the iPhone that allows anyone to swipe a card and receive payments, she paid herself $15 of the volunteer’s money with the counterfeit card she’d just created”. (Greenburg, para.1)

RFID – The Controversy

There are 2 very strong sides to the controversy of RFID technology. Some say that there proof that the technology is safe and can be trusted. For example, advocates of RFID state that due to the encryption standards, authenticity, and control that are programmed into RFID systems, they are safe and can be trusted. {privatewifi, para. 12}. On the other hand, opponents of Radio Frequency Identification state “Currently, some RFID readers have the capacity to read data transmitted by many different RFID tag. This means that if a person enters a store carrying several RFID tags-for example, in articles of clothing or cards carried in a wallet-one RFID reader can read the data emitted by all of the tags, and not simply the signal relayed by in-store products.” (EPIC para. 30).

For more information on RFID, visit this page.

Food For Thought

The choice to use RFID technology is up to you. Even though there are safeguards built into RFID, the bottom line is that your information is essentially “floating in the air” via radio waves. Do you really think that your information is safe? Is your identity worth the risk for a few “modern” conveniences? You decide….

Resources

Greenberg, Andy. "Hacker's Demo Shows How Easily Credit Cards Can Be Read Through Clothes And Wallets." Forbes, 30 01 2012. Web. 14 Jan 2014 .

Junker, J., “What is RFID and is it Safe?” PrivateWiFi. 12 02 12. Web. 28 Jan 2014. .

"Radio Frequency Identification (RFID) Systems." Electronic Privacy Information Center. Electronic Information Privacy Center, 12 08 2012. Web. 28 Jan 2014. .

Roberti , Mark.. “The History of RFID Technology.” RFID Journal. 05 01 16. Web. 22 Jan 2014. .

“Speedpass: How it Works: An Overview.” Exxon Mobil Corporation. Web. 13 Feb 2013.


Street Talk

No comments present
You May Also Like
Choosing Plants For Your Koi Water Garden
So you finally finished your water garden construction. You have finally come to the fun part of creating your water garden: picking the flowers and plants that will make your water garden a beautiful oasis. Not only should you consider beauty when you are picking your plants, but you must…
By: Makowski Piotr Dariusz in  Legal  >  Identity Theft   Mar 03, 2016  
0
  Likes: 0

Identity Theft And Data Breaches – How Do They Affect You?
Once You Supply Your Information – The Security of that Information is in Someone’s Hands What is a Data Breach? A data breach is defined according to Wikipedia as "A data breach is the intentional or unintentional release of secure information to an untrusted environment." A data breach commonly occurs…
By:  in  Legal  >  Identity Theft   Feb 05, 2014  
0
  Likes: 0

Learn Ways To Protect Yourself From Identity Theft And Credit Scams
If you thought identity theft and credit scams only occurred in seedy establishments or in the dark corners of the Internet, think again. A recent article by NBC New York reported on November 17, 2011, that dozens of waiters from high-end New York City and surrounding area steakhouse restaurants were…
By: Ron Estel in  Legal  >  Identity Theft   Nov 22, 2011  
0
  Likes: 3

What Does A Private Investigator Aim to Do?
Sometimes, solving the mysterious puzzles in life becomes really challenging. Most people do not know how to handle confusing situations when they do not have enough time to deal with something that requires them to go out of their way to find a solution. This is exactly when private investigation…
By: Shawn Deny in  Legal  >  Identity Theft   Jun 04, 2015  
0
  Likes: 2

Protect Yourself From Identity Theft And Credit Fraud
The holiday season is fast approaching and consumers are gearing up for their annual trek to the retail stores and to the computer to purchase gifts for their loved ones. Increased purchase activity may attract those people who want to take advantage of others, so there is no better time…
By: Ron Estel in  Legal  >  Identity Theft   Nov 18, 2011  
0
  Likes: 2

Protect Your Identity Online
Identity theft continues to be one of the fastest growing crimes today. Due to the fact that the majority of us make the choice to submerge ourselves in the world of the “information super highway” and share our information so freely, here are some tips to assist you in protecting…
By:  in  Legal  >  Identity Theft   Jan 26, 2014  
0
  Likes: 0

Identity Theft Can Turn Your Life Upside Down
The majority of us are busy with work, family and friends. In amongst the milieu of our daily lives, we toss out the items we don’t need any more or the things that annoy us the most like the constant strew of junk mail that bombards our mailboxes…but, do you…
By:  in  Legal  >  Identity Theft   Jan 25, 2014  
0
  Likes: 1

Orlando Legal - Do I Need Prepaid Legal Services
You may ask yourself, why do I need a pre-paid legal plan, but like 70% of American last year you may, in actuality, have used legal help if it was freely available and affordable. Think about this, did you get a traffic ticket last year? Did you sign a contract…
By: Steve J. Gerwig in  Legal  >  Identity Theft   Apr 20, 2011  
0
  Likes: 0

Identity Theft Protection & Phishing
Introduction Identity theft protection is more important now than ever. With the recent rise of identity theft through all of the data breaches that have been in the news lately, it is also important to understand how cyber criminals can trick you into giving up your personal identifying information from…
By:  in  Legal  >  Identity Theft   Feb 12, 2014  
0
  Likes: 0

6 Realities Of Identity Theft
There are many issues regarding identity theft. These are but a few that will open your eyes to this problem. 1. People can use your SSN and open up credit cards under another name. The kicker though is that, according to a Consumer Reports article from 2008, since the accounts…
By: Ian Worrall in  Legal  >  Identity Theft   Apr 23, 2011  
1
  Likes: 1

Identity Theft What To Do
Identity theft is a serious crime, and it has been growing so fast. It takes place when unknowingly to someone a thief illegally uses your credit card, security number ,name or other personal records to secure goods ,services, or credit with your hard earned assets. Everyday in the USA and…
By: Winston Hackshaw in  Legal  >  Identity Theft   May 22, 2011  
0
  Likes: 1

What is Identity Theft - The Truth About Identity Theft
Identity theft, also called ID theft, is identified as a crime in which the perpetrator obtains vital pieces of somebody's personal information, for example, their social security, passport, or driver's license numbers, and uses these to claim to be someone else. The crook then acquires credit, merchandise, services, or another…
By: Jamie Wheeler in  Legal  >  Identity Theft   May 09, 2011  
0
  Likes: 2

Cyber Security And Identity Theft
One aspect of identity theft is the issue of the security of our computers. A cyber attack can come under many different forms. The major headlines have shown where Sony and Citibank recently had their networks compromised when they were attacked by cyber criminals. Not to mention Google's Gmail was…
By: Ian Worrall in  Legal  >  Identity Theft   Jun 10, 2011  
0
  Likes: 0

Ten Reasons You Should Protect Yourself From Identity Theft
Identity theft is an ever-evolving crime that has and will plague millions of people. There are still so many people out there that have no clue their identity has been stolen; many times they don't find out until it's too late. Once it's too late, it can take a lifetime…
By: Bryan2 in  Legal  >  Identity Theft   Dec 26, 2011  
0
  Likes: 0

Tips For Storing Your Customer Information On Your Website
Today, I'm going to share some tips on storing your customers' personal information on your website. With data breaches and identity theft on the rise, it's important to keep security as your number one priority when developing a website where you store client's personal data.Never store your customers passwords in…
By: Jason Molnar in  Legal  >  Identity Theft   Oct 26, 2011  
0
  Likes: 0

Article Views: 1326    Report this Article