The Pros And Cons Of RFID Chips

Improved Essays
With today’s technological advancements powering forward with startling speed, it can quickly become difficult to pay attention to the minute details that surround and encompass everyday life. Everyone has seen Windows 10 and the new iPhone 6s+, but not many people have noticed the small and silent but (metaphorically) deadly technological “predators” that are spreading quickly throughout humanity: RFID chips. RFID stands for Radio Frequency Identification. RFID is a small piece of equipment that utilizes electromagnetic fields to transfer data between the chip and a receiving device. General RFID chips are a breach of personal privacy and should not be used in any circumstance that involves humans. RFID chips have two different forms: the passive form and the active form. Passive RFID chips are the most commonly used form of RFID chips because of their inexpensive nature; however, these chips are tasked with the dependency of requiring a reader to access the information stored. Active RFID chips cost more to manufacture but have the ability to broadcast its own independent signal without the dependence of a reader. Because of the two types of chips, RFID have an extensive pallet of skills that could be utilized in many fashions. Under the category “RFID,” there are two distinct forms of usage: human application and animal application. Animal application bears a resemblance to the way RFID chips are used in humans in that an RFID chip can loosely be referred to as a “sophisticated dog tag.” For the purpose that RFID is applied to animals, this is the extent that it will be used for. Similar to current Global Positioning Systems (GPS) that are used on either exotic breeds of animals or for the rich people who have so much money that they don’t know what to do with it, RFID chips that are “Active” can be used as a relatively inexpensive way to track animals. For example, assuming that in a future time period every household was equipped with a RFID reader, an active tag for a dog could theoretically be assigned specific coordinates located as “home” relative to where this dog lives. If the dog were to step out of a certain boundary defined by his owners, his tag would begin to send out pulses of radio waves alerting any nearby neighbors that this dog is lost. Upon reaching the dog the RFID tag would send the coordinates of “home” to the neighbor’s reader and the neighbor would know where the dog lives. This neighbor could then retrieve contact info about the owners and could call them and tell them that he or she located their lost pet. Human application is a tad bit more complex, as humans are in essence the most diverse and unique species on the face of the Earth. Since the beginning of the 21st century RFID chips have been developed and incorporated into various pieces of equipment and items; however, primordial forms of readers were available exclusively to those who could afford …show more content…
With some simple modification, RFID chip readers have been developed to sense and track goods and supplies that have these chips sown inside the material. For example, some stores have implanted RFID chips into pieces of clothing so that not only can the store track the location of the apparel in case it was misplaced, but if the apparel happened to be in a customer’s hand as he or she walked by a modified TV in the store (a special model that had an RFID reader built into a sensor), the screen would instantly show more information about the piece of clothing in hand and more items that are directly related to that article of clothing (Halzack …show more content…
This means that is has no consciousness to be able to legislate whether or not the information it is transferring is important or private to the owner. As the RFID readers themselves are a piece of technology, they can inherently be enhanced to increase their capabilities. This may include, but it is not limited to: increased reading range, faster transfer rate, ability to bypass security, etc. Each of these increases the susceptibility of the normal population’s information to a private hackers reach, from issues as small from changing prices to grocery items to as large as tracking the lives of people with frighteningly specific

Related Documents

  • Decent Essays

    Chip Card Nightmares Published in Wall Street Journal, Joanna Stern’s “Chip Card Nightmares, Help Is on The Way” (a) Swipe the card (b) get scold by the cashier to use the chip reader (c) insert the chip and cancel all foreseeable plans (d) wait, wait some more and celebrate once you hear that joyless “ remove your card” sound. I want you to remember that next time you experience, it’s not you. It’s the banks, credit card companies, merchants, payment processors, terminal Manufacturers and many others But there’s a ray of hope; your Smartphone.…

    • 94 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Chick-Fil-A Case Study

    • 710 Words
    • 3 Pages

    Technology has a monumental impact on society and in the way we live our day-to-day lives. Its simplified the most mundane tasks, such as making in-store purchases, by developing more innovative and effective ways to reduce our routinely and tiresome duties. For example, apps such as Google Wallet and Apple Pay, help consumers make transactions through their phones instead of swiping their credit cards. This new form of technology makes in-store transactions much easier and phone-friendly for end-users and companies alike. Food restaurants such as Chick-fil-A, have also jumped on this new innovative bandwagon by allowing customers to make in-restaurant purchases wirelessly through the Google Wallet and Apple Pay apps.…

    • 710 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Essay On 1984 Technology

    • 501 Words
    • 3 Pages

    In 1984 by George Orwell, technology is used in real life today. There are many ways technology could be used, in that book technology is now early more advanced than it is now in real life. Now a days there has been real life situations which technology is used and it helps out tremendously. Surveillance technology has advanced far beyond anything Orwell imagined. Technology is so far advanced that is unstoppable.…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This offers an advantage for a customer who can search for a product by color, shape, size and proportions to find similar products. • Digital assistants styling shoppers: this newest technological addition in ones closet suggesting what to wear based on your calendar, as well as recommending appropriate clothes from your favorite clothing brands. Economic • Ever since the United States has been in the largest recession since the Great Depression of the 1930’s, consumers have become more conservative on what they purchase. Buyers are now doing their research, evaluating the company and its product before their make any purchases.…

    • 822 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Blown To Bits Analysis

    • 346 Words
    • 2 Pages

    Blown to Bits Chapter 2 showed us how private the digital world is. Headline spoke upon different types about privacy around the globe. The main topic was Radio Frequency Identification Tags (RFID). The topic entirely went into detail about how it knows almost everything about a person or company. This Chapter reveled benefits, effects of technology being in our private lives and the change it has had on our society as a whole.…

    • 346 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    You’re being watched, listened to and monitored through your computer, phone and even TV. And it doesn’t stop there. You’re being told what to eat and what to buy. Whether you know it or not, big brother is watching — and here’s seven signs that tell you how. 1.…

    • 1361 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    (29) This is critical to the Party’s success. By destroying privacy, the Party is able to pick out rebels and vaporize them. No rebels, no threat to Party power. While the Party doesn’t have a device to detect thoughts, the suffocating pressure put on by the technology they do possess, makes it so they know what every citizen is doing.…

    • 1028 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    2nd Argument (Medics) From a medical perspective, microchip implants could save countless lives. In the news, we hear a number of stories everyday about death due to allergic reaction, mental illness and even wandering elderly freezing out in the cold. If one device, the microchip implant, could prevent or even simply diminish the number of these deaths from occurring, why not have them mandated? The ideal microchip implant would keep a record of each person’s medical history on their individual implant.…

    • 775 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Outsourcing Trends

    • 1566 Words
    • 7 Pages

    Briefly describe the technologies that are leading businesses into the third wave of electronic commerce. The key technologies that are leading businesses into the third wave of electronic commerce include mobile phones and tablets along with high-speed networks that allow users to access the Internet and smart cards and radio frequency identification devices (RFID) that are being used with biometric technologies such as retina scanners and fingerprint readers. In about 100 words, describe the function of the Internet Corporation for Assigned Names and Numbers. Include a discussion of the differences between gTLDs and sTLDs in your answer.…

    • 1566 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    In the book “1984” by George Orwell, he talks about the government who watches their citizens, control the past such as changing the newspapers, and important dates of events that happened and such. They used a “telescreen” as a surveillance system to watch whoever they wanted, whenever they wanted to. The way that Orwell explains and compares how 1984’s technology is used as surveillance is we as in 2017, are having our own privacy invaded by cameras, phones and other devices as well that Orwell would refer to as “surveillance”. Today’s society is slowly but surely starting to resemble George Orwell’s book, 1984 due to lack of privacy and lack of freedom of speech. The technology that was available in 1984 was being used and controlled…

    • 1262 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    "None of our Business?" by Roberta Fusaro Raydar Electronics is a technology firm which makes radio frequency identification tags and readers. This article describes the use of RFIDs and where they are placed, what their intended purpose is, and why it has stirred commotion to people. Dante Sorella, a CEO of a technology firm informs the readers of some presentations that were given as well. One quick example of this that places such as the US military which have been experimenting with RFIDs on tires for vehicles they use. Further into the article, Marketing director at KoolKids incorporated Carol Sullivan and the CEO of KK Craig Davis took an interest in Raydar to know what is going in and out of the warehouse.…

    • 950 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Rhetorical Analysis

    • 516 Words
    • 3 Pages

    IPhones and iPods were invented to keep us constantly connected, however they are consuming our lives and isolating us from our surroundings. Both articles, "iPod's Missed Manners" by George F. Will and "Society Is Dead: We Have Retreated into the iWorld" by Andrew Sullivan, discuss the negative impact of iPods and electronic devices have on us as individuals in particular and as a society in general. Both authors, Will and Sullivan, imply that our electronics are controlling our lives and we are becoming addicted to them. Everywhere you go now you see people with, “little white wires hanging down from their ears, or tucked into pockets, purses or jackets,” (Sullivan).…

    • 516 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    I think would what people are afraid of, will it fall in the wrong hands? As seen in the CodeBreaker “I’ll tune it to the frequency of the listening device I placed in the spine of reference book on it’s to his left-the one titled Law and Ethics.” ... (Petry 5). That device Bolts used was a type of surveillance, is the government watching us secretly?…

    • 472 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    At the kingdom meeting, Bailey proposed the new concept of democratic participation of registering the accounts and taking the votes. So, Mae quickly states an idea that rather than voting the government everyone must have a circle account profile. Later this idea was called as Demoxie. There were 5 Demoxie questions in the voting system. If these voting questions were authenticated using the social networking websites such as Google, Facebook, Twitter and so on, these voting systems would be interesting and encourage many people by the posts.…

    • 1069 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    “B-to-B E-Commerce: Assessing the Impacts of RFID Technology in a Five Layer Supply Chain” is a research paper written by Ygal Bendavid, Elisabeth Lefebvre, Louis A. Lefebvre, and Samuel Fosso Wamba École Polytechnique de Montréal. This paper focus is to track the key performance marks to measure the effects of RFID technology in a five-layer supply chain management system for the utility sector. While the main objective is to expand, the reader understanding of the possible effects of RFID technology with dealing with supply chain. Radio-frequency identification (RFID) uses electromagnetic fields to mechanically recognize and track tags attached to items. Some believe that RFID is to be well-thought-out the next big thing in supply chain management.…

    • 1017 Words
    • 5 Pages
    Decent Essays