|
Hmm. Does the car come with a "valet finger"? On a more serious note, one would also have to wonder about the ability to clone the RF tag. Place a reader at the entrance to a parking garage, for instance, and pick up the signal as cars enter. Burn a matching signal to a new tag and drive off into the sunset. While people think RF tags can only be read inches away, that just depends on the sensitivity of your reader. Also, what does one do when the car is sold? I hope there's some way to disassociate the tag from the former owner & associate it with the new owner. And really, people who lose their keys deserve what they get. For the rest of us, this offers no benefit over the passive fob already implemented in the Prius and a few other vehicles. Walk up to your car and it unlocks when it detects the presence of your fob. Another and: Are RF ID tags safe? Will they eventually degrade and release toxins into your body? Finally, two points: Do you get RFID tags implanted for each device (gun lock triggers, cel phones, laptops, etc.) or a single one for everything? And once you have any single tag implanted, your movements can be tracked by any entity that can deploy a fleet of tag readers. John A. Jones, CISSP Americas Information Security Officer Jones Lang LaSalle, Inc. V: +1-630-455-2787 F: +1-312-601-1782 john.jones@xxxxxxxxxx -----Original Message----- From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Al Mac Sent: Wednesday, April 05, 2006 11:30 AM To: Midrange Systems Technical Discussion Subject: RE: Sarbanes-Oxley / my opinion Just be aware that this technology opens up its users to a spectrum of new types of crimes. I have seen multiple stories about incidents like these. i do not believe they are all April Fool stories. * Carjackers swipe biometric Merc, plus owner's finger * Source: The Register * Date Published: April 4, 2005 * Malaysian accountant K Kumaran lost his finger when car thieves stole his S-Class Mercedes with biometric security. The thieves force Mr. Kumaran to start the car for him, using a fingerprint. However, this would force them to keep the accountant with them every time they wanted to start the car. Instead, they decided to chop off Mr. Kumaran's finger and take it with them. While many tout biometrics as stronger security, some argue it only slows down criminals and kidnappers, or drives them to such extreme measures as severing a victim's limb. Improved biometrics, such as a system that check to make sure a finger is attached to a person, may induce criminals to resort to kidnapping for auto thefts. Such incidents demonstrate that at times a person may want to be able to easily disable security. * <http://www.theregister.co.uk/2005/04/04/fingerprint_merc_chop/>http://w ww.theregister.co.uk/2005/04/04/fingerprint_merc_chop/ >Wayne, > > >Forgive the rant, but if we continue on our present course, >we'll > >ALL >have RF chips imbedded in us, not just the >animals. > > >Odd that you would write this the same day my local paper printed this >story... > > >Implanted chip opens new doors -- This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l. This email is for the use of the intended recipient(s) only. If you have received this email in error, please notify the sender immediately and then delete it. If you are not the intended recipient, you must not keep, use, disclose, copy or distribute this email without the author's prior permission. We have taken precautions to minimize the risk of transmitting software viruses, but we advise you to carry out your own virus checks on any attachment to this message. We cannot accept liability for any loss or damage caused by software viruses. The information contained in this communication may be confidential and may be subject to the attorney-client privilege. If you are the intended recipient and you do not wish to receive similar electronic messages from us in future then please respond to the sender to this effect.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.