TrendRFID technology ever more pervasive, pt. I

Published 30 January 2008

RFID tags are everywhere — on boxed goods, in some computer printers, car keys and tires, on shampoo bottles and department store clothing tags; they are also in library books, contactless payment cards, passports, and travel documents; they introduce efficiency and security to the supply chain, but also allow companies and organizations to track the behavior and shopping patterns of individuals

What would George Orwell say about societies in which:

—Microchips with antennas are embedded in virtually everything you buy, wear, drive, and read, allowing retailers and law enforcement to track consumer items — and consumers — wherever they go, from a distance

—A seamless, global network of electronic “sniffers” scan radio tags in myriad public settings, identifying people and their tastes instantly so that customized ads, “live spam,” may be beamed at them

—In “Smart Homes,” sensors built into walls, floors, and appliances are taking inventory of possessions, record eating habits, monitor medicine cabinets — all the while, silently reporting data to marketers eager for a peek into the occupants’ private lives

AP’s Todd Lewan writes that this is no sScience fiction. In truth, much of the radio frequency identification (RFID) technology that enables objects and people to be tagged and tracked wirelessly already exists — and new and potentially intrusive uses of it are being patented, perfected and deployed.

Some of the world’s largest corporations are vested in the success of RFID technology, which couples miniaturized computers with radio antennas to broadcast information about sales and buyers to company databases. Already, microchips are turning up in some computer printers, car keys and tires, on shampoo bottles and department store clothing tags. They are also in library books and “contactless” payment cards (such as American Express’ “Blue” and ExxonMobil’s “Speedpass”).

Companies say the RFID tags improve supply-chain efficiency, cut theft, and guarantee that brand-name products are authentic, not counterfeit. At a store, RFID doorways could scan your purchases automatically as you leave, eliminating tedious checkouts. At home, convenience is a selling point: RFID-enabled refrigerators could warn about expired milk, generate weekly shopping lists, even send signals to your interactive TV so that you see “personalized” commercials for foods you have a history of buying. Sniffers in your microwave might read a chip-equipped TV dinner and cook it without instruction. “We’ve seen so many different uses of the technology,” says Dan Mullen, president of AIM Global, a national association of data collection businesses, including RFID, “and we’re probably still just scratching the surface in terms of places RFID can be used.”

Critics say that the problem is that microchipped products might very well do a whole lot more. With tags in so many objects, relaying information to databases that can be linked to credit and bank cards, soon no aspect of life will be safe from the prying eyes of corporations and governments, says Mark Rasch, former head of the computer-crime unit of the U.S. Justice Department. By placing sniffers in strategic areas, companies can invisibly “rifle through people’s pockets, purses, suitcases, briefcases, luggage — and possibly their kitchens and bedrooms — anytime of the day or night,” says Rasch, now managing director of technology at FTI Consulting, a Baltimore-based company. In an RFID world, “You’ve got the possibility of unauthorized people learning stuff about who you are, what you’ve bought, how and where you’ve bought it … It’s like saying, ‘Well, who wants to look through my medicine cabinet?”’ Rasch imagines a time when anyone from police to identity thieves to stalkers might scan locked car trunks, garages or home offices from a distance. “Think of it as a high-tech form of Dumpster diving,” says Rasch, who’s also concerned about data gathered by “spy” appliances in the home. “It’s going to be used in unintended ways by third parties