Hmm.  Does the car come with a "valet finger"?

On a more serious note, one would also have to wonder about the ability
to clone the RF tag.  Place a reader at the entrance to a parking
garage, for instance, and pick up the signal as cars enter.  Burn a
matching signal to a new tag and drive off into the sunset.  While
people think RF tags can only be read inches away, that just depends on
the sensitivity of your reader.

Also, what does one do when the car is sold?  I hope there's some way to
disassociate the tag from the former owner & associate it with the new
owner.


And really, people who lose their keys deserve what they get.  For the
rest of us, this offers no benefit over the passive fob already
implemented in the Prius and a few other vehicles.  Walk up to your car
and it unlocks when it detects the presence of your fob.

Another and: Are RF ID tags safe?  Will they eventually degrade and
release toxins into your body?

Finally, two points: Do you get RFID tags implanted for each device (gun
lock triggers, cel phones, laptops, etc.) or a single one for
everything?  And once you have any single tag implanted, your movements
can be tracked by any entity that can deploy a fleet of tag readers.

John A. Jones, CISSP
Americas Information Security Officer
Jones Lang LaSalle, Inc.
V: +1-630-455-2787 F: +1-312-601-1782
john.jones@xxxxxxxxxx

-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx
[mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Al Mac
Sent: Wednesday, April 05, 2006 11:30 AM
To: Midrange Systems Technical Discussion
Subject: RE: Sarbanes-Oxley / my opinion

Just be aware that this technology opens up its users to a spectrum of
new types of crimes. I have seen multiple stories about incidents like
these.  i do not believe they are all April Fool stories.
    * Carjackers swipe biometric Merc, plus owner's finger
    * Source: The Register
    * Date Published: April 4, 2005
    * Malaysian accountant K Kumaran lost his finger when car thieves
stole his S-Class Mercedes with biometric security. The thieves force
Mr. Kumaran to start the car for him, using a fingerprint. However, this
would force them to keep the accountant with them every time they wanted
to start the car. Instead, they decided to chop off Mr. Kumaran's finger
and take it with them. While many tout biometrics as stronger security,
some argue it only slows down criminals and kidnappers, or drives them
to such extreme measures as severing a victim's limb. Improved
biometrics, such as a system that check to make sure a finger is
attached to a person, may induce criminals to resort to kidnapping for
auto thefts. Such incidents demonstrate that at times a person may want
to be able to easily disable security.
    *
<http://www.theregister.co.uk/2005/04/04/fingerprint_merc_chop/>http://w
ww.theregister.co.uk/2005/04/04/fingerprint_merc_chop/ 


>Wayne,
>
> >Forgive the rant, but if we continue on our present course, >we'll 
> >ALL
>have RF chips imbedded in us, not just the >animals.
>
>
>Odd that you would write this the same day my local paper printed this 
>story...
>
>
>Implanted chip opens new doors
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe,
unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a
moment to review the archives at http://archive.midrange.com/midrange-l.



This email is for the use of the intended recipient(s) only.  If you have 
received this email in error, please notify the sender immediately and then 
delete it.  If you are not the intended recipient, you must not keep, use, 
disclose, copy or distribute this email without the author's prior permission.  
We have taken precautions to minimize the risk of transmitting software 
viruses, but we advise you to carry out your own virus checks on any attachment 
to this message.  We cannot accept liability for any loss or damage caused by 
software viruses.  The information contained in this communication may be 
confidential and may be subject to the attorney-client privilege. If you are 
the intended recipient and you do not wish to receive similar electronic 
messages from us in future then please respond to the sender to this effect.


As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.