RFID Technology Research Project

page: 1
11

log in

join

posted on Aug, 8 2005 @ 04:44 PM
link   
There has been much inetrest recently in RFID technology. In response to this interest I am researching this technology. This is my introduction to this project. I plan to cover the following topics:

What is it
History
Use in products
Use in animals
Use in humans
Conspiracy factor

Goal
To determine what RFID is and how it will affect us in its applications.

Summary
RFID technology can be traced back to the development of radio waves and possibly even before then. It has been identified as many things from a remarkable timesaving device to the mark of the beast foretold in the last book of the Bible. The use of this technology has produced a very emotional response from people who fear that these devices will cost us our freedom. A thorough understanding of RFID technology is necessary to understand the implications produced by this technology.

Participation
Anyone who is interested in participating in this project can U2U me with your ideas.

What is RFID?

The RFID (Radio Frequency Identification) is a way of identifying objects using radio waves. It is often associated with a group of anti-theft devices called EAS (Electronic Article Surrvelience) anti-theft devices. We are probably familiar with the electro-magnetic security strips found inside of most DVD cases. These strips are deactivated at the checkout stand. If not, they will cause the security stands at the exit to activate an alarm. An RFID tag is a more sophisticated device. It uses an antenna to to send and/or receive electronic information from an RFID transceiver. It is the next generation of EAS anti-theft devices with a potential for so much more. RFID technology has a future in products, animal and humans.

The RFID system consists of two components; a tag which has a microchip with an antenna and a reader which has an antenna, software and often is connected to a computer network. Some people consider the antenna and the computer network that connects the readers as separate components. However, for simplicity's sake, this researcher will not. The tag antenna is tuned to receive the electromagnetic waves that are generated by the reader. The microchip is a small silicon chip which contains a radio receiver, a radio modulator and some memory. The chip, which holds the encoded information, receives and converts or modulates these waves and sends them back to the reader. The reader then converts this information into digital data.

There are two types of RFID tags; passive and active. The passive tags have no power source and are limited to a brief response. They are also limited in the distance at which they can be read, usually less than 20 feet. Since they have no battery, they have a longer shelf life and cost less. Active tags contain a battery which powers the microchip and communication with the reader. There is also a semi-passive tag. This tag is usually grouped with the active tag since it utilizes a battery to power the microchip, but it still requires the electromagnetic field supplied by the reader to communicate. Active and semi-passive tags have a much longer range than passive tags. The shelf life of the batteries is only a few years.

The signals from the tags are the data stored in the microchip's memory. The RFID readers use software to translate these signals from the tags into digital data. The reader can be used in close proximity or over remote distances, depending on the type of tag. The readers must be tuned to the same frequency as the tag.


History

A quick overview of RFID development:


The Decades of History of RFID:
• 1940 - 1950 Radar refined and used, major World War II development effort.
• RFID invented in 1948.
• 1950 – 1960 Early explorations of RFID technology, laboratory experiments.
• 1960 – 1970 Development of the theory of RFID. Start of applications field trials.
• 1970 – 1980 Explosion of RFID development. Tests of RFID accelerate. Very early adopter implementations of RFID.
• 1980 – 1990 Commercial applications of RFID enter mainstream.
• 1990 – 2000 Emergence of standards. RFID widely deployed. RFID becomes a part of everyday life.

www.rfidsurvival.com...

Technology similar to RFID was introduced by the Brittish in 1939 in their IFF (Identification Friend or Foe) and was used extensivly by allied forces durinig WWII. IFF is still in use today by military aircraft.


The IFF system traditionally used coded radar signals (also known as interrogations) to automatically trigger the aircraft's transponder in an aircraft "painted" by the radar. A transponder responds,
• in a military aircraft (other military vehicles or units similarly equipped) equiped with an IFF capable transponder, by returning a correctly coded reply signal only when the incoming interrogation is identified as part of the friendly forces network;
• if no IFF response is generated a civil interrogation is generated and the aircraft, by returning a proper code can then be identified.
In an IFF network both the interrogation and reply are verified as friendly. Interrogation validation prevents an interrogator from using a transponder's replies for tracking purposes.

en.wikipedia.org...

In 1948 an engineer by the name of Harry Stockman produced his research into powering a mobile transmitter utilizing the strength of a received radio signal. He is credited as being the first researcher to have the forsight of applications of RFID technology.


An early, if not the first, work exploring RFID is the landmark paper by Harry Stockman, "Communication by Means of Reflected Power", Proceedings of the IRE, pp1196-1204, October 1948. Stockman stated then that "Evidently, considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored."

www.aimglobal.org...

The technology for RFID would not be completed until many years later. The history of the technology required for RFID is as follows: the intoduction of the transistor (invented in 1947), the integrated circuit (simultaneously invented by two different men in 1958 and 1959), the microprocessor (invented in 1971) and the development of communication networks ( developed in Japan for cellular phones in 1979). Each of theses developments were vital for the development of RFID technology.
The research into the technology for RFID did not remain idle however, since as early as the 1960, RFID devices were implemented as EAS devices. As the technology for smaller devices developed, the technology if RFID improved.

Researchand development for RFID in the 1960s:

R. F. Harrington, "Field measurements using active scatterers" and "Theory of loaded scatterers" 1963-1964.
Robert Richardson, "Remotely activated radio frequency powered devices" 1963.
P. Vinding, "Interrogator-responder identification system" 1967.
H. Vogelman, "Passive data transmission techniques utilizing radar beams" 1968.
Otto Rittenback, "Communication by radar beams" 1969.
In the late 1960’s companies such as Sensormatic and Checkpoint began producing EAS anti-theft devices for use in retail stores to counter shop lifting.

Research and development for RFID in the 1970s:


Work on RFID systems as we know them began in earnest in the 1970s. In
1972, Kriofsky and Kaplan .led a patent application for an “inductively coupled
transmitter-responder arrangement.”3 This system used separate coils for
receiving power and transmitting the return signal. In 1979, Beigel .led a new
application for an “identi.cation device” that combined the two antennas;
many consider his application by to be the landmark RFID application because
it emphasized the potentially small size of RFID devices.

www.awprofessional.com...

Raytheon's "Raytag" 1973.
RCA and Fairchild with Richard Klensch of RCA developed an "Electronic identification system" 1975.
Alfred Koelle, Steven Depp and Robert Freyman, Los Alamos, "Short-range radio-telemetry for electronic identification using modulated backscatter" 1975.
F. Sterzer of RCA developed an "Electronic license plate for motor vehicles" 1977.
Thomas Meyers and Ashley Leigh of Fairchild developed a "Passive encoding microwave transponder" 1978.

Research and development for RFID in the 1980s:

Research and development in the United States concentrated on transportation, personnel access, and to a lesser extent, for animals. In 1987 Europe introduced the first commercial application of RFID for the collection of tolls. Norway quickly followed as did The United States with the RFID toll collection on the Dallas Turnpike in 1989 and the Port Authority in New York and New Jersey.

Research and development for RFID in the 1990s:

In the United States and Europe, RFID toll collection was expaned throughout the countries. Texas Instruments began developing a system used in many vehicles for the control of starting the vehicle’s engine. Other companies began developing this system for use in other applications.

Research and development for RFID in the 21st century:

Research and development continues today with tracking software and the implantable chip for animals and humans.


For a full history on the RFID this article is an excellent source.
Other sources:
www.rfidjournal.com...

Some ATS related topics:
www.abovetopsecret.com...
www.abovetopsecret.com...
www.abovetopsecret.com...
www.abovetopsecret.com...
There are many more, just do an ATS search on RFID

To view some RFID products, go to this page.

Next instalment: RFID use in products.




posted on Aug, 9 2005 @ 01:00 PM
link   
What does Wrigley’s Chewing gum, The Smithsonian, and barcodes have in common?


In the Smithsonian Museum of American History in Washington, D.C. there's an exhibit that features a pack of Wrigley's Chewing Gum. The significance: That very pack of gum was the first product ever scanned by a barcode reading system. The gum was scanned successfully back in June of 1974 at a supermarket in Ohio.


www.wallstreetsecretsplus.com...


Barcodes are identification tags. They are printed on labels, packaging and products and are read by barcode reading systems. The barcode scanner reads the patterns of light and dark on the barcode labels and translates this information into a database. The database returns the information associated with the barcode. This is how the store’s cash register knows how much to charge for an item. So every pack of Wrigley’s Spearmint Chewing Gum has the same barcode.

RFID tags utilize a en.wikipedia.org..." target="_blank" class="postlink" rel="nofollow">GUID (Globally Unique Identifier) which is a pseudo-random number used in software applications. While the GUID numbering system cannot guarantee that each number will be unique, “the total number of unique keys is so large that the possibility of the same number being generated twice is virtually zero.” This means that unlike a barcode, each tag has its own unique identifier. This also means that each individual product can be tracked instantly as long as the reader is in range.

GUIDs allow chips to be tracked in cascading hierarchies. For example a truck, ship container or rail car tag could contain information on multiple pallets. Each pallet tag could contain information on multiple boxes. Each box tag could contain information on multiple products. Each product tag would contain information on that particular product. A reader with variable frequencies or the use of multiple readers could instantaneously confirm the accuracy of a manifest. Once the shipment has arrived at the warehouse or store, it allows for instantaneous logging in of the inventory. This application allows for tracking of a product from the time it leaves the manufacturer to the time it arrives at the consumer’s home. At this point, the RFID tag with the packaging is normally disposed of.

RFID tags, it would appear are superior to barcodes. Like barcodes, the RFID reader is connected to a database that associates certain data with the information received from the FRID tag. Unlike barcodes, they can be scanned from a greater distance and can be read through boxes and crates. However, since barcodes are much cheaper that RFID tags, it is unlikely that they will be phased out in the near future. As the use of RFID tags increase in consumer products, I am certain that the increase in cost will be passed along to the consumer. It is likely that barcodes and RFID tags will co-exist for many years.
The price of a passive RFID tag averages at about $0.50 per tag. One way to reduce the cost of RFID tags would be standardization. There is a company that is trying to do just that.


EPCglobal Inc., which has taken over for the MIT Auto ID Center, is the non-profit organization that is working to standardize electronic product codes and RFID technology.


This article describes how EPCglobal intends to standardize RFID tags through five fundamental elements. The components are the EPC (Electronic Product Code) also known as the GUID, the RFID tag, the ONS (Object Name Service) which tells the reader where to find the data associated with the EPC, the PML (Physical Markup Language) an XML based language used to define the data, and Savant the software used to co-ordinate the system. Standardization can be difficult due to the multiple applications of RFID tags.

Applications of RFID tags



• High-frequency RFID tags are used in library book or bookstore tracking, pallet tracking, building access control, airline baggage tracking, and apparel item tracking. High-frequency tags are widely used in identification badges, replacing earlier magnetic stripe cards. These badges need only be held within a certain distance of the reader to authenticate the holder. The American Express Blue credit card now includes a high-frequency RFID tag, a feature American Express calls ExpressPay.
• UHF RFID tags are commonly used commercially in pallet and container tracking, and truck and trailer tracking in shipping yards.
• Microwave RFID tags are used in long range access control for vehicles.
• RFID tags are used for electronic toll collection at toll booths with California's FasTrak, Illinois' I-Pass, the expanding eastern state's E-ZPass system, and the Philippines South Luzon Expressway E-Pass. The tags are read remotely as vehicles pass through the booths, and tag information is used to debit the toll from a prepaid account. The system helps to speed traffic through toll plazas.
• Sensors such as seismic sensors may be read using RFID transceivers, greatly simplifying remote data collection.
• In January 2003, Michelin began testing RFID transponders embedded into tires. After a testing period that is expected to last 18 months, the manufacturer will offer RFID enabled tires to car makers. Their primary purpose is tire-tracking in compliance with the United States Transportation, Recall, Enhancement, Accountability and Documentation Act (TREAD Act).
• Some smart cards embedded with RFID chips are used as electronic cash, e.g. Octopus Card in Hong Kong and the Netherlands and United Kingdom (In the form of the London Underground Oyster Card) to pay fares in mass transit systems and/or retails.
• Starting with the 2004 model year, a Smart Key option is available to the Toyota Prius and some Lexus models. The key fob uses an active RFID circuit which allow the car to acknowledge the key's presence within 3 feet of the sensor. The driver can open the doors and start the car while the key remains in a purse or pocket.
• In August 2004, the Ohio Department of Rehabilitation and Correction (ODRH) approved a $415,000 contract to evaluate the personnel tracking technology of Alanco Technologies. Inmates will wear wristwatch-sized transmitters that can detect if prisoners have been trying to remove them and send an alert to prison computers. This project is not the first such rollout of tracking chips in US prisons. Facilities in Michigan, California and Illinois already employ the technology.

Quote from Wikipedia

RFID Inc is a RFID supplier based in Aurora, CO. This company has been in business since 1984 and was incorporated in 1997. They provide products for a number of well know companies. Their list of customers can be found here.

R4 Global Solutions is a RFID supplier based in San Francisco, CA. Here is a list of their customers.

There are many other suppliers of RFID technology.

From this article, Wal-Mart, one of the biggest retailer in the United States, announced in June of 2004, that they would expand their EPC and RFID technology to six distribution centers and 250 Wal-Mart and Sam’s Club locations by June of 2005. They expect that number to jump to 13 distribution centers and 600 retail stores by October of 2005. “Wal-Mart said the technology gives retailers greater inventory visibility from supplier to distribution center to a store's back room.” Wal-Mart is requiring its suppliers to place RFID tags on their cases and pallets shipped to them.

Denmark uses RFID technology to handle 149 busses which operate on 35 routes with 800 arrivals and departures per day. This article examines how RFID technology was used to solve their problems with real time information.

FedEx uses RFID wristbands to unlock the doors on their trucks. This article describes how RFID solved the problems FedEx drivers were experiencing with fumbling for their keys while carrying armloads of packages.

Another article tells how a library in Farmington Hills, MI, utilizes RFID technology.

Whether it is tracking products in the supply chain or automatically paying your toll, RFID technology has been involved in our daily lives more than most people are aware. They are used by consumers from the Department of Defense to Disney World. The technology is global. Tags can be disposable or reusable; read only or rewriteable. But RFID technology is not limited to products and service. The next installment will cover RFID application in animals.




Other Sources
www.rfidjournal.com...
www.jefflindsay.com...



posted on Aug, 10 2005 @ 01:47 PM
link   
What is Animal Tagging?

Animal tagging is a method of marking an animal for identification. Prior to electronic tagging, animals were branded or cut for identification purposes. These markings were used to prevent theft and prove ownership. Each owner had his own distinct marking that designated him as the owner of the animal marked. Markings were vital in proving ownership in court proceedings. Written documentation was sometimes held by owners. This documentation described the animal and the marking assigned to it. Theft of livestock has been taken very seriously by most societies.

From the Code of HammurabiIf c. 1780 B.C.E. “If any one steal cattle or sheep, or an ass, or a pig or a goat, if it belong to a god or to the court, the thief shall pay thirtyfold; if they belonged to a freed man of the king he shall pay tenfold; if the thief has nothing with which to pay he shall be put to death.”

Body markings were also used in tracking animals for disease. Diseased animals were marked, and usually slaughtered. The surviving animals were examined and marked. An in-depth history of animal tracing and marking can be found here.

APHIS (Animal and Plant Health Inspection Service) began utilizing ear tags, back tags, tattoos, and face brands in the 1960s to track diseased animals. In an article on animal identification, this agency explains the need for livestock identification as:



• Foreign Animal Disease control, surveillance, and prevention
• Biosecurity protection of the national herd
• Identification of livestock vaccinated or tested under official disease control or eradication program
• Official identification of animals in interstate or international commerce
• Accurate identification of blood and tissue specimens
• Improvement of laboratory diagnostic and reporting capabilities
• Health status certification of herds, States, and Regions
• Effective regionalization and risk assessment in support of international trade

Current methods of identifying livestock can include ear tags, back tags, neck chains, tail tags, freeze brands, tattoos, paint marks, and leg bands which are non-electronic. Electronic methods of identification include barcode and RFID.

Lowry Computer Products has an excellent slideshow presentation on how RFID tagging works.

The US Animal Identification Plan is a program being introduced to track animals in the food chain. This program, if implemented, “sole intent is to create the ability to track animal disease to its source within a 48-hour period.”

RFID in Wildlife Tracking:

For decades, scientist have been tagging and releasing fish, birds and other wildlife. This practice of humane capture, tag and release has been a tremendous tool for researchers. It allows them to track migration routes, health, and habits of these animals. This research is useful in conservation studies. The introduction of RFID technology makes it easier for researchers to track these animals. Although RFID tagging will not replace non-electronic tagging, it is an important tool for scientist and other researchers.

An article entitled High Tech Animal Tracking describes a program which uses satellites and RFID tags to track animals in their natural habitat. It does not replace field work, but “it can greatly extend the scope of biological studies and reveal information that would be otherwise extremely difficult, or in some cases even impossible, to obtain by any other means.”

The USDA has begun a tagging program on deer and elk in the US to determine how they are contracting wasting disease.

This article describes some of the challenges of capturing and tagging manatees along the west coast of Florida.

Europe is concerned about livestock disease and is utilizing RFID in animal tracking.

An article on satellite tagging marine life and the importance of the program.

This article on bee tagging discusses the use of rf tagged bees to locate unexploded land mines.

RFID in Pet Tracking:

In 2002 there were over 60 million pet dogs and nearly 70 million pet cats in the United States. This figure comes from U.S. Pet Ownership & Demographics Sourcebook (2002 Edition). That’s a lot of Fidos and Fluffies. One site estimates that 1.5 to 2 million pets are stolen per year. Pet-ID offers an RFID tag solution for recovering lost and stolen pets. This could get expensive if you raise rabbits.

Avid is another RFID supplier for pet tracking and identification.

RFID in Lab Animal Tracking:

Trovan offers RFID tagging for lab animals for economic reasons and ensure the validity of research results.

From cattle to lab rats, RFID tagging can be adapted to fit your every animal tracking need. Whether the chip is implanted in an ear tag or implanted under the skin, you can be sure that your animal will be quickly and easily located and recovered.

Next installment: RFID applications in humans.



posted on Aug, 10 2005 @ 10:49 PM
link   
I'll just add this ATSNN Story:

Texas Introduces Bill to Require RFID Certificates on Every Car

I'm not sure if the Bill passed.
.



posted on Aug, 11 2005 @ 03:41 PM
link   
Who are you?

With the forming of the first society, there was a need to answer this question. The first type of identifier was most likely the census. The word “census” comes from the Latin word “censere” which means to value or to tax. Census taking can trace its origins to the ancient history of Babylonia, China, Egypt, Palestine, and Rome. The first census in the United States took place in 1790. Then society began to think up more ways to identify you.

In 1903 The United Kingdom introduced the Motor Car Act. This was the beginning of government regulation concerning licensing of motor vehicles and drivers.

On December 1, 1936, the first social security record was established for John D. Sweeney, Jr., age 23, of New Rochelle, New York. His number was 055-09-0001. Although his was probably not the first number issued, Mr. Sweeney holds the distinction of holding the first registered number.

During World War II, the United Kingdom established The National Registration Act which required all persons to carry a national ID card. It was established to “facilitate identification of aliens.” The Act was repealed in 1952.

We are now a world of numbers. We have social securitynumbers, driver’s license numbers, credit card numbers, telephone and cell phone numbers, zip codes, employee numbers, etc. . . . Apparently, though, that is not enough. Now we need to be tagged.


Tagging Humans

If you think that you have not been tagged because you do not have an implant, think again. Do you utilize electronic toll collections? Do you own or operate a vehicle that is equipped with a smart key or Michelin tires? Do you have to wear an ID wristband or card at your job? Do you have a smart card?

Let’s start with the smart card. First view . First view this short video "Did You Know?" Video Series: Fun Facts About RFID. Wasn’t that fun? Now let’s take a closer look at smart cards. From the Fredal Smart Card Tutorial we can see the history of the smart card. Quoted from the Overview section:

1970 - Dr. Kunitaka Arimura of Japan filed the first and only patent on the smart card concept.
1974 - Roland Moreno of France files the original patent for the IC card later dubbed the “smart card”.
1977 - Three commercial manufacturers, Bull CP8, SGS Thompson, and Schlumberger began developing the IC card product.
1979 - Motorola developed the first secure single chip microcontroller for use in French banking.
1982 - Field testing of serial memory phone cards took place in France—the world’s first major IC card test.
1984 - Field trials of ATM cards with chips were successfully conducted.
1986 - In March, 14,000 cards equipped with Bull CP8 were distributed to clients of the Bank of Virginia and the Maryland National Bank. Also, 50,000 cards were distributed to clients of the First National Palm Beach Bank and the Mall Bank.
1987 - First large-scale smart card application implemented in the United States with the U.S. Department of Agriculture’s Nationwide Peanut Marketing Card.
1991 - First Electronic Benefits Transfer (EBT) smart card project launched for the Wyoming Special Supplemental Nutritional Program for Women, Infants, and Children (WIC).
1992 - A nationwide prepaid (electronic purse) card project (DANMONT) was started in Denmark.
1993 - Field test of multi-function smart card applications in Rennes, France, where the Telecart function (for public phones) was enabled in a Smart Bank Card.
1994 - Europay, MasterCard and Visa (EMV) published joint specifications for global micro-chip based bank cards (smart cards). Germany began issuance of 80 million serial memory chip cards as citizen health cards.
1995 - Over 3 million digital mobile phone subscribers worldwide began initiating and billing calls with smart cards. First of 40,000 multi-functional, multi-technology MARC cards with chips were issued to U.S. Marines in Hawaii.
1996 - Over 1.5 million VisaCash stored value cards were issued at the Atlanta Olympics. MasterCard and Visa began sponsorship of competing consortia to work on solving the problems of smart card interoperability; two different card solutions were developed: the JavaCard backed by Visa, and the Multi Application Operating System (MULTOS)backed by MasterCard.
1998 - In September 1998, the U.S. Government’s General Services Administration and the United States Navy joined forces and implemented a nine-application smart card system and card management solution at the Smart Card Technology Center in Washington D.C. The Technology Center’s primary purpose is to demonstrate and evaluate the integration of multi-application smart cards with other types of technology, showcasing systems available for use in the Federal Government. Microsoft announced its new Windows smart card operating system. France began piloting a smart health card for its 50 million citizens.
1999 - The U.S. Government General Services Administration began a true multi-application JavaCard pilot in the Washington, DC metropolitan area.

And quoted from the application section, we can get an idea of what this card can be used for.

Financial - Electronic Purse to replace coins for small purchases in vending machines and over-the-counter transactions. Credit and/or Debit Accounts, replicating what is currently on the magnetic stripe bank card, but in a more secure environment. Securing payment across the Internet as part of Electronic Commerce.
Communications - The secure initiation of calls and identification of caller (for billing purposes) on any Global System for Mobile Communications (GSM) phone. Subscriber activation of programming on Pay-TV.
Government Programs - Electronic Benefits Transfer using smart cards to carry food stamps and WIC food benefits in lieu of paper coupons and vouchers. Agricultural producer smart marketing cards to track quotas.
Information Security - Employee access card with secure passwords and the potential to employ biometrics to protect access to computer systems.
Physical Access - Employee access card with secured ID and the potential to employ biometrics to protect physical access to facilities.
Transportation - Driver’s license, Mass Transit Fare Collection Systems, and Electronic Toll Collection Systems.
Retail and Loyalty - Consumer reward/redemption tracking on a smart loyalty card, that is marketed to specific customer profiles and linked to one or more specific retailers serving that profile set.
Health Card - Consumer health card containing insurance eligibility and emergency data.
University - All purpose student ID card containing a variety of applications such as electronic purse (for vending and laundry machines), library card, and meal card.

About those Micheline tires, Micheline announced, in October of 2004, its intentention of embedding RFID tags in their tires. As of the date of the press release, none of those tires had been sold to the general public, although an earlier article stated that Michelin plans to offer automakers the option of purchasing the RFID embedded tires after tests have been completed.

You may be feeling rather smug now, if you can honestly say you haven’t been tagged. May I suggest that you check the labels of you clothes? A site dedicated to exposing RFID technology in retail items, Spychips, is concerned with the hidden RFID tags in clothing. On this page are pictures of clothing labels removed from some of the clothes. Notice how some of them are not marked “RFID”.


In March, 2003, Benetton announced that they would begin implanting RFID tags in clothing.

In July, 2005, Lauren Scott has come up with a system for keeping tabs on the kiddies. The system is priced at around $500.00 US.


Lauren Scott of California is blazing a new trail in children's wear. The $2 million-a-year apparel division of DST Media Inc. will launch a line of pajamas with radio-frequency identification tags sewn into the hems. Readers positioned at various points throughout a house, such as doorways and windows, will be able to scan the tags within a 30-foot radius, and an alarm will be triggered when boundaries are breached.
"You look at these kids and think, 'I would do everything to protect them,'" says proprietor Lauren Scott, who licensed the RFID technology from SmartWear Technologies Inc., a manufacturer and supplier of personal security systems. "I'm confident other manufacturers in children's wear will follow within the next year." Scott will introduce the sleepwear in her spring 2006 collection. An estimated 250,000 pieces will begin shipping to various retail stores in December and are expected to be available to consumers by February.

But wait! There's more! Texas HB 2893 is a bill introduced into the Texas State Legislature requiring that the Texas Inspection stickers are imbedded with RFID tags.


Sec. 601.507.INSPECTION CERTIFICATES. (a)
Commencing not later than January 1, 2006, the department shall issue or contract for the issuance of special inspection certificates to be affixed to motor vehicles that are inspected and found to be in proper and safe condition under Chapter 548. (b) An inspection certificate under this section must contain a tamper-resistant transponder, and at a minimum, be capable of storing: (1) the transponder's unique identification number; and (2) the make, model, and vehicle identification number of the vehicle to which the certificate is affixed. (c) In addition, the transponder must be compatible with: (1) the automated vehicle registration and
certificate of title system established by the Texas Department of Transportation; and (2) interoperability standards established by the Texas Department of Transportation and other entities for use of the system of toll roads and toll facilities in this state. Sec. 601.508. CIVIL PENALTY. (a) If an electronic reading
device detects and identifies a motor vehicle to which a special inspection certificate is affixed that is not covered by a motor vehicle liability insurance policy that provides the minimum coverages required by this chapter, on verification of the information and issuance of a written notice of noncompliance, the registered owner of the vehicle is liable to the state for the payment of a civil penalty in the amount of $250. (b) In connection with the same vehicle, until the 60th day
after the date of issuance of a written notice under Subsection (a), the registered owner is not liable for the payment of another civil penalty under this subchapter if that vehicle is subsequently detected and identified by an electronic reading device and determined not to be covered by an appropriate motor vehicle liability insurance policy. Sec. 601.509.


Last action on this www.capitol.state.tx.us..." target="_blank" class="postlink" rel="nofollow">bill House Committee report was sent to Calendars.

The latest; Brit License Plates Get Chipped!


The British government is preparing to test new high-tech license plates containing microchips capable of transmitting unique vehicle identification numbers and other data to readers more than 300 feet away.
Officials in the United States say they'll be closely watching the British trial as they contemplate initiating their own tests of the plates, which incorporate radio frequency identification, or RFID, tags to make vehicles electronically trackable.

Tags and cards can be lost, misplaced or stolen. The real RFID security can only come with the RFID chip implanted into your body

Next Installment: RFID Applications in Humans Part 2: Implants

Other Sources:
www.sph.uth.tmc.edu...
www.privacyinternational.org...
www.ssa.gov...



posted on Aug, 12 2005 @ 12:57 PM
link   
On Being Micro-managed

Human implants are nothing new. This site claims that facial implants have been used for centuries. Breast implants date back to the 1880 where a variety of items (including glass balls, ivory, rubber, etc. . .) were inserted to increase breast size. The first pacemaker was implanted in the 1960s. Since then over 2 million pacemakers have been implanted worldwide. The first dental implants took place in 1965. None of these procedures kicks up as much controversy as the latest implants on the market: the microchip implant.

On October 14, 2004, an article from The Register announced the US Food and Drug Administration (FDA) has approved human implantation of the VeriChip, a product of Applied Digital Solutions.

Applied Digital Solutions calls themselves a provider of innovative identification and security products for consumer, commercial and government sectors worldwide. Their Digital Angel “is a leading provider of sensor and communications technologies that enable secure and accurate identification, tracking, and condition monitoring of high-value mobile assets. Applications for the company’s products include: pet identification using its patented FDA-approved implantable microchips; livestock identification and tracking using visual and RFID ear tags; real-time tracking of fixed- and rotor-winged aircraft through its FAA-approved satellite-based flight tracking and messaging system; and wireless emergency location of military aircraft and watercraft.” In a 2001 article from World Net Daily the author states in an interview with Dr. Lawrence Webber of Digital Angel Corp., that Digital Angel is “no longer pursuing implant technology for humans.”

Welcome to the next step: the VeriChip. The VeriChip is a small passive RFID device encased in a glass vial. The entire implantable device is about the size of a grain of rice. The implant procedure is described as no more physically uncomfortable than getting a shot. The VeriChip is being used in two applications at the moment: the VeriMed and the VeriGuard.

The VeriMed is being targeted towards health officials whom, the company hopes, will be able to convince patients to get chipped. Marketed as a solution to communication barriers, Applied Digital Solutions claim that the VeriMed can “provide healthcare professionals with a patient's name and pertinent personal information when he or she can’t speak, can’t remember, or is unconscious.” Much the same way, I might add, as Medical alert jewelry. ADS claims that unlike traditional devices, the implanted chip cannot be lost, stolen or counterfeited (more on counterfeiting in a later installation).

The VeriGuard comes in attachable (for item security), wearable (for temporary use) and implantable (for permanent use) devices. From their www.verichipcorp.com...(Jul2005a).pdf" target="_blank" class="postlink" rel="nofollow">pdf:


And VeriGuard is not just access control. Using the real-time location and tracking capabilities, you can track and protect assets, staff, and visitors within your facility simultaneously with your perimeter, floor, and/or room protection. With a range of product and ID options to suit your needs and budget, VeriGuard delivers the ultimate security for your organization and access control never possible before.


Brave New World

In this article the author states:


The key to RFID's broad adoption, from cases to single items, is dropping its cost from the current 30 cents to 50 cents per tag. (Benefit of doubt: I assume he means from 50 cents to 30 cents.) "Nanotechnology could really help accomplish the goal of five-cent RFIDs for ubiquitous use," Steven Van Fleet, Micromem's senior RFID adviser, said.

The article states that with nanotechnology, the silcon microchip could be replaced by an ink-based RFID circuit lowering cost to a penny or less. Known as the organic RFID, proponents claim that these could become reality within the next five years.

Tag, You’re IT!

Who would get an implant and why would they do so? The first human chip implant was inserted on August 24, 1998. The recipient was Professor Kevin Warwick, director of cybernetic at the University of Reading in the United Kingdom. The implant, described as about 23mm by 3mm, was inserted in the professor’s left arm. The chip was removed nine days later. The nine day trial was an experiment to determine feasibility of replacing smart cards with RFID implants.

Perhaps one of the best-known chipped personalities is Tommy Thompson. According to this article dated July 19, 2005, the former Governor of Wisconsin and Health and Human Services Secretary during Bush’s first term has announced his intention to get chipped. Why would he do such a thing? On July 7, 2005, Applied Digital Solutions announced Mr. Thompson’s appointment to their Board of Directors.

The BBC reported on chipping at the Baja Beach Club in Barcelona, Spain. BBC’s Science Producer, Simon Morton reports his chipping experience, which was administered by a nurse, at the club.


The night club offers its VIP clients the opportunity to have a syringe-injected microchip implanted in their upper arms that not only gives them special access to VIP lounges, but also acts as a debit account from which they can pay for drinks.
This sort of thing is handy for a beach club where bikinis and board shorts are the uniform and carrying a wallet or purse is really not practical.

There is also a web site bulletin board for those who have been tagged.kaos.gen.nz..." target="_blank" class="postlink" rel="nofollow">tagged.

There have also been a few hoaxes on line. A commentary on chipping the homeless was later proven by snopes.com to be an April Fool’s joke. A google search unveiled a likely candidate for this research. However, clicking on the Library Journal link proved fruitless.

From products to animals to humans, RFID tagging has become a worldwide phenomenon. Fear of the chip ranges from concerns over data security to submitting to the mark of the beast. How safe is this chip? Are we being misled? Is this a product of the NWO? I hope to answer these and other questions in future installment.

Next Installment: RFID Technology and Privacy.



posted on Aug, 15 2005 @ 02:04 PM
link   
While some people wish for fame and fortune, most of us prefer to remain anonymous. We find security in being unknown. Scroll through the different forums and threads on this site. Notice that member’s user names are usually not their real names. Most user names are cryptic and/or androgynous. Avatars are not pictures of how we really look, but symbols that have a meaning to us. Sometimes the avatar owner is the only one who knows what it means. There is certain freedom in anonymity. We want our privacy and feel violated when we are exposed. Anonymity makes us feel safe. We have a deep psychological need to feel safe and secure. Whenever that need is not met, we feel fear and anxiety.

The Right to Privacy

Civil Liberties are protections granted to us by our governments. Our protection is only as good as our government. Most free countries have a provision in their constitution or laws that protect their citizens’ privacy. The secret ballot used in elections is an excellent example governmental protection of privacy rights.

Article 8 from the European Convention on Human Rights, adopted 1950:



1. Everyone has the right to respect for his private and family life, his home and his correspondence.
2. There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.


The Privacy Act of 1974:


(b) Conditions of disclosure
No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, unless disclosure of the record would be--
(1) to those officers and employees of the agency which maintains the record who have a need for the record in the performance of their duties;
(2) required under section 552 of this title;
(3) for a routine use as defined in subsection (a)(7) of this section and described under subsection (e)(4)(D) of this section;
(4) to the Bureau of the Census for purposes of planning or carrying out a census or survey or related activity pursuant to the provisions of Title 13;
(5) to a recipient who has provided the agency with advance adequate written assurance that the record will be used solely as a statistical research or reporting record, and the record is to be transferred in a form that is not individually identifiable;
(6) to the National Archives and Records Administration as a record which has sufficient historical or other value to warrant its continued preservation by the United States Government, or for evaluation by the Archivist of the United States or the designee of the Archivist to determine whether the record has such value;
(7) to another agency or to an instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law, and if the head of the agency or instrumentality has made a written request to the agency which maintains the record specifying the particular portion desired and the law enforcement activity for which the record is sought;
(8) to a person pursuant to a showing of compelling circumstances affecting the health or safety of an individual if upon such disclosure notification is transmitted to the last known address of such individual;
(9) to either House of Congress, or, to the extent of matter within its jurisdiction, any committee or subcommittee thereof, any joint committee of Congress or subcommittee of any such joint committee;
(10) to the Comptroller General, or any of his authorized representatives, in the course of the performance of the duties of the General Accounting Office;
(11) pursuant to the order of a court of competent jurisdiction; or
(12) to a consumer reporting agency in accordance with section 3711(e) of Title 31.


There are many reasons for wanting privacy. We may want to protect our information from fraud. We want medical privacy, political privacy, credit privacy, personal privacy, privacy from corporations and government interference. However, most of all, we want privacy because it is our business and no one else’s. We want to choose what we reveal about ourselves to others. When our private life or information becomes public, we lose our sense of security. The fear of losing our privacy can cause anxiety.

Identity Theft

Who steals my purse steals trash; 'tis something, nothing;
'Twas mine, 'tis his, and has been slave to thousands:
But he that filches from me my good name
Robs me of that which not enriches him
And makes me poor indeed.

Shakespeare, Othello - Iago to Othello, Act III scene 3

Hackers, thieves and vandals also want anomyity. Millions of people were notified this year alone, that their personal information had been lost or stolen. Identity theft is rampant. Security breeches are so common that the United States Congress is increasing their efforts to protect citizens’ from information theft. In an article from PCWorld


Congress has drafted new bills and held hearings to try to determine what it or other government agencies should do to protect us. For the first time, there's a bill on the table that more directly addresses regulating information brokers, not just telling consumers about problems after the fact or setting standards for procedures like proper Social Security number use.


Firewalls, Malware, ant-virus, and encryption tools appear as more a challenge than a deterrent to hackers, thieves and vandals. Even the United States Department of Defense is vulnerable.

DoD hacker jailed for 21 months “A US hacker convicted of infecting Department of Defense with a computer worm was last week sentenced to 21 months imprisonment.”

HACK ATTACK “In 2002, the Department of Justice indicted (in absentia) a resident of the UK, Gary McKinnon, of hacking into DOD and NASA computers and causing almost a million dollars worth of damages. Yesterday, they got around to trying to extradite him for trial.”

Technology to the Rescue

"Security Through Innovation" Strategy Unveiled at Saturday's Delray Beach Event Applied Digital unveils their marketing strategy. Marketing has little to do with the product being sold and everything to do with selling emotions. AD is using our fear to sell their product.


"We have developed a suite of advanced technology solutions for many of the most challenging security issues facing the international community today," said Scott R. Silverman, Applied Digital's Chairman and CEO. "Through Digital Angel (AMEX
OC), we protect animals (companion pets, fish and livestock) using our proprietary microchip, eartag and scanner technologies. This same technology allows us to monitor, identify and evaluate food chains and their safety. VeriChip, the first implantable microchip for humans, provides security for people, their personal information, their identity, their medical records (pending FDA approval), and their financial information. VeriChip also provides security for building access and facility monitoring, as reflected by the recent 'chipping' of Attorney General of Mexico, Rafael Macedo de la Concha and some of his staff."

Silverman continued, "Through Digital Angel's Signature Industries, we manufacture a leading Search and Rescue Beacon- SARBE- for the security of fighter jets and their pilots. We also provide security for the Department of Homeland Security, specifically The Border Patrol and U.S. Customs. Digital Angel's OuterLink subsidiary provides spread spectrum location and communication technology to these agencies as well as Shell Oil Company. Our GTI subsidiary sells and maintains secure telecomm infrastructure to numerous agencies of the Federal Government. This is just part of how Applied Digital provides 'Security Through Innovation'."


By implanting chips in humans, AD assures us that they will solve the problems of lost, misplaced and stolen RFID tags. The implant contains a tiny microchip with an antenna. The chip is a passive type, that is, it is not battery operated and requires an electromagnetic field supplied by the reader. A passive chip is limited by the amount of information it can carry. The reader is dependent on the database, which it is connected to supply the data connected to the RFID tag. So that means that your implant is safe from theft, right? Wrong!

A group of students from John Hopkins University wrote an academic paper describing their experiment into hacking RFID codes. The following is an implication they made based on the results of their experiment.


Example 3 (SpeedPassTM theft via active attack). Eve carries a reader and short-range antenna
with her onto a subway car. (Alternatively, Eve could carry a large “package” with a
concealed antenna in some public place.) As she brushes up near other passengers, she harvests
chosen challenge-response pairs (along with the serial numbers of target devices) from any
SpeedPassTM tokens they may be carrying. Later, at her leisure, Eve recovers the associated
cryptographic keys. She programs the keys into a software radio, which she uses to purchase
gasoline. To allay suspicion, she takes care to simulate a compromised SpeedPassTM only once.
Additionally, she hides the tag simulator itself under her clothing, interacting with the pump
reader via an antenna passing through a sleeve up to an inactive SpeedPassTM casing.


What would prevent someone from remote scanning your implant, and then encoding the same information onto an RFID card? Hey, now I can be you. Will the next step be the government telling us that the only way to prevent this type of counterfeit would be to require everyone to have an implant and discontinue use of all cards?

Your Data is Not Safe

All of our lives are on file and for sale to someone. It is not just hackers but sometimes employees of the company you trust your information. Information Week reported last year that an employee at a financial datacenter was charged with selling customers’ credit information.

www.businessweek.com..." target="_blank" class="postlink" rel="nofollow">Hackers demonstrated their skills this month in Las Vegas. Defcon, the hacker vs. feds competition, is supposed to be an idea sharing on how to make the internet safer. In actuality, it is a chance for hackers to show their expertise


A group of twenty-somethings from Southern California climbed onto the hotel roof to show that RFID tags could be read from as far as 69 feet. That's important because the tags have been proposed for such things as US passports, and critics have raised fears that kidnappers could use RFID readers to pick traveling US citizens out of a crowd.
RFID companies had said the signals didn't reach more than 20 feet, said John Hering, one of the founders of Flexilis, the company that conducted the experiment.

Waves of the Future
One GUID number should be able to tie you into several databases. For instance, if the police scan your chip, they can have access to your driver’s license record, your traffic violation history, and any warrants against you that may be on file. On the other hand, your doctor could scan the same implant and be provided with your complete medical history. It depends on the database connected to the scanner. Are we there yet? Not even close. Besides, how does the emergency room in Aruba get access to my medical records in Texas unless there were global databases?

Our information is everywhere and it is not secure. Using RFID technology will not change this. Hacker prevention is a problem whose solution could be accomplished by removing the criminals’ anonymity. On some military bases, US Government computers are using smart card technology. The user must insert their card before they can log on. Passwords may still be required. Once a hacker is identified by his implant when logging on to the internet, his anonymity has been compromised. This would require all citizens to be chipped and all computers fitted with devices that read the implants before allowing internet access. What price are you willing to pay for security?

Next installment: RFID Technology and Privacy Part2: Big Brother is Watching You



posted on Aug, 16 2005 @ 12:06 PM
link   
Every breath you take
Every move you make
Every bond you break
Every step you take
I’ll be watching you

Every single day
Every word you say
Every game you play
Every night you stay
I’ll be watching you

Police- Every Breath You Take

In June of 1949, readers were introduced to George Orwell’s fictitious Big Brother in his book 1984. Big Brother is the all seeing government that knows all. It is the epitome of surveillance. Our fear of mass surveillance is evident in books such as Orwell’s 1984, Phillip K. Dick’s Minority Report, and movies such as Blue Thunder. There is a reason for our fear, mass surveillance or any surveillance is a violation of our privacy and violates our need to feel safe and secure. The government is telling us that surveillance will make us safe. Many programs are all ready in place to do this.

A History of Surveillance and Information Gathering

Although armies have used spies since the first battle, organized military surveillance and information gathering in the United States began during the Civil War. By World War I it had grown tremndously and by WWII it had grown large enough to justify its own recognized organization. This new unit, the FBI (Federal Bureau of Investigation), dedicated itself to civilian counterespionage after the war. Due to concerns of electron surveillance, Congress passed the first law defining the proper use in 1968. Its premise was to balance the governments needs in law enforcement with the privacy needs of the individual citizen. 1986 saw the passage of another privacy law that allowed the use of newer technology in law enforcements ever growing battle against crime.

Today video surveillance is everywhere. In most public places, throughout the world, whether it is a bank, a store, the airport, or even our public schools, either video recorders or cctv will be there. We know that the government is watching us and recording information about us. Most of us have come to accept this. As Orwell stated in his book 1984: “There was of course no way of knowing whether you were being watched at any given moment... You had to live -- did live, from habit that became instinct -- in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.” We may or may not believe our government when they tell us that this surveillance is for our own good. The Big Brother of fiction has slowly become a reality. We worry about what they may know about us. We worry because we know that their databases are not safe from hackers.

Big Brother Invades Retail

Imagine going shopping in your favorite store. You pick up all of the items that you normally buy. When you get to the register, your items are bagged and you are given a receipt. You did not have to actually pay because the store’s sensors recorded all of the items in your cart and automatically deducted the cost from your bank account. There was a commercial recently in the US that depicted this same scenario. Imagine the speed and convenience of shopping this way. This is the way that retailers want you to see RFID tagging. Not as an invasion of your privacy, but as a quick and convenient way to shop. Now imagine that along with this speed and convenience the store has actually created their own database on you that gets upgraded every time you shop there. The unique identity numbers in each item have been directly linked with your information and ultimately with you.

From the testimony of Jacki Snyder, Manager of Electronic Payments for Supervalu, Inc., chairof the Food Marketing Institute's Electronic Payments Committee, and a member of the National Automated Clearinghouse Association's EBT council.at a congressional hearing on THE FUTURE OF ELECTRONIC PAYMENTS: ROADBLOCKS AND EMERGING PRACTICES


Radio frequency is another technology that supermarkets are already using in a number of places throughout the store. We now envision a day where consumers will walk into a store, select products whose packages are embedded with small radio frequency UPC codes, and exit the store without ever going through a checkout line or signing their name on a dotted line.


Imagine the ultimate goal; every item in the world is embedded with an RFID tag, and can be traced to who purchased it. Imagine every person in the world is embedded with an RFID tag and Big Brother is watching.

The New Alibi

The trails the government follows are numerous: debit card payment, ATM withdrawals, telephone call records, building access, video-surveillance, e-mail traffic, internet traffic, store value cards, etc. . . Once everyone is chipped, they can be tracked by readers placed in virtually every place you can imagine.

Alanco Technologies, Inc. installed its first commercial system in a Michigan juvenile facility in March of 2002.


TSI PRISM technology addresses the weaknesses of conventional correctional facilities security and safety with state-of-the-art wireless RFID and tracking technology, providing real-time identification and tracking of inmates and staff at two-second intervals twenty-four hours per day, 365 days per year.


This same company has made arrangements to install its system in the L.A. County Jail in May of 2005.


In prison networks with such technology, RFID readers are planted throughout a jail in such large numbers that bracelet-wearing inmates can be continually tracked. When an inmate comes within range of a sensor, it detects his or her presence and records the event in a database. Thus, if an assault occurs at night, prison officials can look at the RFID logs and identify who was at the scene at the time of the incident. Tampering with the bracelet sends an alarm to the system. The system can also warn of gang gatherings.


Complaints have caused some companies to cancel one or more of their RFID tagging programs. Katherine Albrecht, the founder and director of Consumers Against Supermarket Privacy Invasion and Numbering, or CASPIAN, does not believe that the potentials of RFID tagging outweigh Orwellian concerns about privacy. Her book, Spychips stands as a warning to how government and major corporations will have the ability to track our every move.

Opponents claim that RFID tagging of humans is dehumanizing. The Romans used to brand and later tattoo slaves. Opponents point out that tagging humans equates us with cattle and claim that proponents are using scare tactics in pushing this technology. Proponents for the technology claim that the Columbine shooting may have been prevented with RFID tagging in our schools and claim that opponents are paranoid.

Ignorance is a major cause of fear. I personally know of no global databases with all of your private information. I could find no proof that the government or major corporations are using RFID technology to spy on the world’s citizens. However, the possibility of RFID surveillance does exist. It could happen within the next three to five years as technology increases. The line between caution and paranoia seems very thin.

This just in: Man convicted in massive database theft

Next installment: RFID Technology and the NWO

Other Sources:
www.library.ca.gov...
en.wikipedia.org...
news.com.com...

Edited html link.

[edit on 8/16/2005 by darkelf]



posted on Sep, 13 2005 @ 08:54 PM
link   
What is The New World Order?

According to infinite, ATS’s F.S.M.E. on the NWO, the NWO is:


Its the theory based around a one world government. Some say its already here, other say its still to come, but the way it will work is basicly an international police state based around a Hitler type of figure as leader.


There are many theories on who or what composes the NWO. Conspiracy theories range from David Icke’s reptilians to the Bible’s Anit-Christ. For a thorough understanding of the NWO and the many theories, visit infinite’s excellent work on the NWO forum.

The goal of the NWO is to rule the world. This reminds me of all of the TV shows I saw and comic books I read as a child. The evil person always had a plan to rule the world, but some superhero would always save the day by capturing the evil menace and thwarting his plans. According to the NWO conspiracy theorists, the NWO is the evil menace. Unfortunately, there are no superheroes to rescue us if the NWO theorists are right.

The Shape of Things to Come

What will be one of the signs of an NWO takeover? Once again, I defer to infinite:


what will be the first steps of action? well, police or NWO troops number will increase on the streets, especially at night. People who are against the nwo will be rounded up, camps will be opened and a police state will swing into action.


Maybe like this?


Under the banner of "homeland security," the military and intelligence communities are implementing far-reaching changes that blur the lines between terrorism and other kinds of crises and will break down long-established barriers to military action and surveillance within the U.S.


Or this


Under the Justice Department's new definition of "enemy combatant"—which won the enthusiastic approval of the president and Defense Secretary Donald Rumsfeld—anyone defined as an "enemy combatant," very much including American citizens, can be held indefinitely by the government, without charges, a hearing, or a lawyer. In short, incommunicado.


And once again from infinite:


RFID would become a tracking device tool. The NWO will bring it in and say "it’s for our protection" but this technology will have two faces to it. The tracking side of it, is what I’m worried about




What is Real About Reality TV

In my last installment, I linked surveillance to Orwell’s Big Brother. If you were to ask a Baby Boomer (roughly, those born between 1945 and 1965) who Big Brother is, they would possibly think in Orwellian terms. Their experience is enmeshed in memories of the aftermath of World War II, Hitler, Stalin and the Cold War. They may tend to think of people who did not have the freedom to act or speak due to governmental constraints. If you were to ask a Generation X’er (roughly, those born between 1965 and 1980) they may remember Vietnam and the Cold War. Their disdain may not be as strong as a Boomer’s, but most will probably not think favorably of Big Brother type tactics. Ask the question of a Generation Y’er (those born since 1980) and you may be surprised at their response. They have lived, until recently, in relative peace and safety. Most Generation Y’ers relate Big Brother to Reality TV.

Reality TV is not new. In 1973, the BBC presented a documentary series An American Family. Craig Gilbert shot 300 hours of footage in the home of the Loud family in seven months. However, only 12 hours of footage was aired. Over 10 million viewers tuned in to watch the documentary, which included the marital breakup of Bill and Pat Loud and the coming out of their son Lance.

In an article on reality TV, the author states that in 1992 when MTV cast their first show of The Real World “they initially had a hard time finding people willing to have their lives taped nearly 24 hours a day for several months. That was 1992. Now they hold auditions in college towns and thousands of young people form lines snaking for blocks just for the chance to audition.” To date, over 35,000 twenty-somethings have auditioned to have their lives exposed to the world.

Reality TV puts us in the role as observers. We are the ones doing the surveillance. Something strange happens to us when we do this. Although intellectually we know that these are real people, we tend to view them as characters. We depersonalize them. Consider William Hung’s interpretation of Ricky Martin. Hung’s audition for American Idol was met by Simon Cowel’s “You can’t sing, you can’t dance, so what do you want me to say?” Hung’s reply “I already gave my best, and I have no regrets at all,” made him an instant celebrity. Of Hung’s numerous fans, how many view him as a real person and not a character? The reality of reality TV is that we view surveillance as entertainment. In true NWO mind control style, we are being anesthetized to the dangers of surveillance. We willingly embrace it. We have come a long way since 1948’s Candid Camera.

RFID, Katrina, and The NWO

On August 29, 2005, Hurricane Katrina made landfall in the gulf coast. The hardest hit area affected by Katrina ranged from Southeastern Louisiana to Alabama. The devastation was contained in an area of about 90,000 square miles. The official death toll has not yet been released, but forecast range from several hundred to 15,000 dead. Many people refused or were unable to evacuate. The search for bodies continues. In the aftermath of Katrina, many questions have been raised and conspiracy theories abound. Some of these theories involve the possibility that the events of the aftermath of Katrina were orchestrated by the NWO.

Issues from the evacuation of survivors and the retrieval of the dead have brought up many reasons for the required implantation of RFID chips. Each issue can be easily remedied by the implantation of RFID chips.

1. Locating survivors and the dead: If each person had an RFID chip, rescue workers could scan each area in a grid like fashion. The survivors could be rescued systematically. Debris fields could be scanned for the living and the dead. Areas that contained dead bodies could be marked for later retrieval. The dead could be instantly identified.
2. Evacuees without personal records: Many of the people evacuated from New Orleans have no identification on them. Children have been separated from their parents. Implanted RFID chips could be read at evac centers and identification verified.
3. Evacuees without medical records: RFID chip implants could give doctors a patient history to ensure that the patient’s needs are met.
4. Criminal element: Criminals would most likely be the first to remove a required RFID chip. Anyone found without a chip could be incarcerated. RFID scanners used in conjunction with infrared or FLIR could help officials to locate suspicious individuals.
5. Gun owners: RFID chips could grant officials access to the database, which houses information on legal gun owners. Those with guns that are not in the database could be detained or incarcerated. This technology could also be used to locate citizens with legal firearms to disarm them.

The Matrix
A matrix can be defined as a surrounding substance within which something else originates, develops, or is contained. In the movie, The Matrix, the Matrix is a virtual reality controlled by a super artificial intelligence. In real life, the Matrix is our belief system and it is just as controlling as the Matrix in the movie. This is a world where we believe that public schools educate our children, that our politicians have our best interest at heart. It is a belief that innocent people do not go to jail, and that doctors do not prescribe anything that would hurt us.

Hopefully, the incidents that have taken place in the last few weeks have compelled more people to come out of the Matrix and into the real world.

Next installment: RFID Technology and the Mark of the Beast

Other Sources:
educate-yourself.org...
www.government-propaganda.com...
www.freedomdomain.com...



posted on Nov, 12 2006 @ 05:51 AM
link   
RFID technology is feared by those who do not understand it. It is also feared by those who do and see its potential for misuse. As with nuclear and biological weaponry, knowing and understanding your enemy is the best way to fight it. I hope that my previous posts have given you a working knowledge of what RFID technology is and its potential uses. This section deals with Biblical prophecy and interpretations of that prophecy. I will be using the King James Version unless otherwise noted. Please keep in mind that when dealing in issues of faith and spirituality, much of the information will be subjective. I will try to stay as objective as possible in dealing with all sides of this issue.

A large number of people are concerned with RFID technology. Some are concerned with loss of privacy, while others promote the technology as time-saving and efficient. Many Christians see the RFID chip as the “mark of the Beast” and refuse to ever allow the implant. Are their fears valid and is the implantable micro-chip the feared “Mark of the Beast?”

In order to understand this fear of the RFID implant, I will have to provide some background. We must first answer these questions; who is the beast and what is his mark?

Who is the Beast?

The Bible predicts that many anti-christs will walk the earth. There is one, however, who is prophesied to be the worst of all anti-christs. The story of the Beast of Revelation (also referred to as The Anti-Christ) has confused many. His story is prophesied in both the Old Testament and New Testament. This beast will rise in power and rule the world.

Not only will everyone be required to receive a “mark” but will also be required to worship the Beast and his engraved image. This Beast is said to be the embodiment of Satan.


Revelation 13
1And I stood upon the sand of the sea, and saw a beast rise up out of the sea, having seven heads and ten horns, and upon his horns ten crowns, and upon his heads the name of blasphemy.
2And the beast which I saw was like unto a leopard, and his feet were as the feet of a bear, and his mouth as the mouth of a lion: and the dragon gave him his power, and his seat, and great authority.
3And I saw one of his heads as it were wounded to death; and his deadly wound was healed: and all the world wondered after the beast.
4And they worshipped the dragon which gave power unto the beast: and they worshipped the beast, saying, Who is like unto the beast? who is able to make war with him?
5And there was given unto him a mouth speaking great things and blasphemies; and power was given unto him to continue forty and two months.
6And he opened his mouth in blasphemy against God, to blaspheme his name, and his tabernacle, and them that dwell in heaven.
7And it was given unto him to make war with the saints, and to overcome them: and power was given him over all kindreds, and tongues, and nations.
8And all that dwell upon the earth shall worship him, whose names are not written in the book of life of the Lamb slain from the foundation of the world.
9If any man have an ear, let him hear.
10He that leadeth into captivity shall go into captivity: he that killeth with the sword must be killed with the sword. Here is the patience and the faith of the saints.
11And I beheld another beast coming up out of the earth; and he had two horns like a lamb, and he spake as a dragon.
12And he exerciseth all the power of the first beast before him, and causeth the earth and them which dwell therein to worship the first beast, whose deadly wound was healed.
13And he doeth great wonders, so that he maketh fire come down from heaven on the earth in the sight of men,
14And deceiveth them that dwell on the earth by the means of those miracles which he had power to do in the sight of the beast; saying to them that dwell on the earth, that they should make an image to the beast, which had the wound by a sword, and did live.
15And he had power to give life unto the image of the beast, that the image of the beast should both speak, and cause that as many as would not worship the image of the beast should be killed.
16And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads:
17And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.
18Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is Six hundred threescore and six.
Source


The chapter begins with the Apostle John’s continued vision. He sees a beast rise out of the sea. He later describes another beast rising from the land. In the previous chapter, we see the dragon appearing in the heavens.


Revelation 12: 3 And there appeared another wonder in heaven; and behold a great red dragon, having seven heads and ten horns, and seven crowns upon his heads.

Source


When taken in context, we see three beast; one from the heavens, one from the sea, and one from the land. Many students of eschatology (the study of Bible prophecy) believe that this represents the unholy trinity or triunity of Satan. This is the attempt by Satan to recreate himself in God’s image. The dragon is Satan as God, the first beast (Anti-Christ) is Satan as the Messiah, and the third beast (False Prophet) is Satan as the Spirit of God. Since our focus is the Anti-Christ, we will deal primarily with the first beast.

The beast who rises from the sea has seven heads and ten horns and ten crowns on his horns and the name of blasphemy on his heads. Chapter 17 of Revelation explaind theses heads and horns:


Revelation 17:
1And there came one of the seven angels which had the seven vials, and talked with me, saying unto me, Come hither; I will shew unto thee the judgment of the great whore that sitteth upon many waters:
2With whom the kings of the earth have committed fornication, and the inhabitants of the earth have been made drunk with the wine of her fornication.
3So he carried me away in the spirit into the wilderness: and I saw a woman sit upon a scarlet coloured beast, full of names of blasphemy, having seven heads and ten horns.
4And the woman was arrayed in purple and scarlet colour, and decked with gold and precious stones and pearls, having a golden cup in her hand full of abominations and filthiness of her fornication:
5And upon her forehead was a name written, MYSTERY, BABYLON THE GREAT, THE MOTHER OF HARLOTS AND ABOMINATIONS OF THE EARTH.
6And I saw the woman drunken with the blood of the saints, and with the blood of the martyrs of Jesus: and when I saw her, I wondered with great admiration.
7And the angel said unto me, Wherefore didst thou marvel? I will tell thee the mystery of the woman, and of the beast that carrieth her, which hath the seven heads and ten horns.
8The beast that thou sawest was, and is not; and shall ascend out of the bottomless pit, and go into perdition: and they that dwell on the earth shall wonder, whose names were not written in the book of life from the foundation of the world, when they behold the beast that was, and is not, and yet is.
9And here is the mind which hath wisdom. The seven heads are seven mountains, on which the woman sitteth.
10And there are seven kings: five are fallen, and one is, and the other is not yet come; and when he cometh, he must continue a short space.
11And the beast that was, and is not, even he is the eighth, and is of the seven, and goeth into perdition.
12And the ten horns which thou sawest are ten kings, which have received no kingdom as yet; but receive power as kings one hour with the beast.
Source


The woman is Babylon (symbolic of commerce or prosperity?), the seven heads are the seven mountains which represent seven kings or kingdoms, and the ten horns are ten king or kingdoms who rule under the beast. Hence, the beast is not only a man who rules the world, but is symbolic of the world system that he rises from. Rome sits on seven hills and was the kindom in power when John had his visions.

Five are fallen: the Egyptian, Assyrian, Babylonian, Medo-Persian, and Greek Empires. One is: the Roman Empire. The other is not yet come: could be the Ottoman Empire, although some people would argue that the seventh is the New World Order. The eighth was, and is not, is of the seven. The six empires that have been identified were all rulers of what is know today as the Middle East. If the seventh is the Ottoman Empire, then the eighth could very well be both the Anti-Christ and the New World Order of which he will rule.



[edit on 11/12/2006 by darkelf]



posted on Nov, 12 2006 @ 05:55 AM
link   
(Continued from previous post)

In a world of increasing religious intolerance, the idea of a global society actually worshiping not only a man but also his image is difficult to believe. Many Christians not only believe this scenario, but believe that it will happen soon.

Who could possibly unite a world of differing political, social, and religious ideologies and how could he do it? Verse three says that the world will wonder after the beast. Everyone will admire and possibly even idolize this man. What could he do to earn the admiration, love and worship of the entire world?

The answer could be found in the Old Testament. Daniel chapter 8 verse 25, speaking of this beast, says: “and by peace shall destroy many.” Few people outside of the Christian community believe that one man could possibly bring peace to the entire world. Men have tried for centuries to bring peace to the world but to no avail. The Middle East is a bubbling cauldron of violence that could soon boil over engulfing the entire world. Any one man who could unite the world in peace would be revered, loved and perhaps even worshipped by most of thee world. Those who are deceived into worshipping this man will be the first to willingly take his mark.

Next Installment: What is the Mark?

[edit on 11/12/2006 by darkelf]



posted on Jul, 27 2010 @ 07:19 AM
link   
Now that I have my scholar status again, I will be continuing this series and adding updates in the next few days. To anyone who has additional information on RFID, or who has a thread on this subject; please send me a U2U with links.

Thank you
darkelf

Edit to add:

If you have scholar status, please do not post to this thread. Send me a U2U and your work will be credited in this thread.

[edit on 7/27/2010 by darkelf]



posted on Jul, 30 2010 @ 03:10 PM
link   
RFID Technology and the Mark of the Beast Part 2

What is the “Mark of the Beast”?

The word “mark” as used here is the Greek word cavragma. It means a stamp or imprint or engraving. Historically Christians have believed this mark to be a tattoo of the name or number of the beast etched on the hand or forehead. This tattoo has been described as anything from 666 to a barcode. As technology continues to soar, however, many Christians are leaning to the belief that the mark will be the RFID implant. How does a mark evolve to an implant? The answer lies in the logic applied to the REAL ID.

September 11, 2001, marked the day that the world changed. The events of that day and the subsequent events that it spawned have changed the world for everyone. Political, social, and religious ideologies are no longer restricted to the area of their origin but affect the world as a whole. As Chris Matthews from MSNBC says “We’re living in a pinball machine.” Things happen quickly in the world now and their affects are felt world wide.

The peace and safety of the world is teetering on a dangerous precipice. A slight nudge could tumble that peace into the abyss of a world war like nothing in the history of mankind. The world is afraid and fear will cause men to undertake and accept acts that they would normally resist. The Patriot Act, Eminent Domain, surveillance laws, and the plethora of bills recently passed in the U.S. have lead to not only a loss of privacy but the loss of American constitutional rights.

NWO (New World Order) conspiracy followers and Christians claim that this is just the path that must be taken to open the door for a world government. The REAL ID ACT is just the next step on the stairway of global domination.

The National or REAL ID


The Real ID act started off as H.R. 418, which passed the House (261-161-11) and went stagnant. It was then attached as a rider on a military spending bill (H.R. 1268) by Representative Sensenbrenner (R) of Wisconsin (the author) and was voted upon (100-0) . It was signed into public law (109-13) on May 11, 2005.
The THOMAS bill summaries for both H.R. 418 and H.R. 1268 show voting records and show who are supporters and proponents of this act and why they do or do not support it. It should be noted that cosponsors of the original legislation to which REAL ID was attached do not necessarily support this bill.
On March 2, 2007, it was announced that enforcement of the Act would be postponed for two years.[8] The provisions of the bill will be delayed from going into effect until December 2009. On January 11, 2008, it was announced that the deadline has been extended again, until 2011, in hopes of gaining more support from states. Source


Fear of terrorist, terror attacks and a general fear of the unknown have left legislators in a dilemma of how to best protect the American citizen from terrorist attacks. One solution is the ability to determine who is here legally from those who are not. A national identification card that would be difficult to forge could be the vehicle that solves the problem of determining legal status.

Most Americans need some type of picture ID. My mother, who recently passed away at the age of 78, never drove a car in her life. However, as early as the 1970s, she realized that she needed a state ID card to perform such tasks as opening a bank account or cashing a check. We need a picture ID to board a plane, get a job, open a bank account, buy alcohol and tobacco, and numerous other “every day” tasks. Current IDs are not difficult to forge. A national ID would have to be mandatory for all citizens and would have to have:


Physical security features designed to prevent tampering, counterfeiting, or duplication of the document for fraudulent purposes.
A common machine-readable technology, with defined minimum data elements (the details of which are not spelled out, but left to the Secretary of Homeland Security, in consultation with the Secretary of Transportation and the States, to regulate). Source


Eventually though, the ID will be lost, stolen or forged. Many people fear that the solution to this problem will be the RFID implant. Citizens will be unable to buy, sell or conduct any legal business without it.

In a world where one man is considered to be the architect of world peace, people will willingly give up their concerns and see the logic in taking this man’s mark. Loss of personal privacy and control will not trouble them. This man who epitomizes peace and security will sooth all fears and instill trust.

Consequences of Taking the Mark

The Book of the Revelation of Jesus Christ to His Apostle John is widely known as the story of the coming tribulation and end of the world as we know it. This is the ultimate story of the battle between good and evil. The story pits Satan, the ultimate deceiver, against God, the Creator of all things, in a battle for mankind’s souls. Each person has the opportunity to align themselves with Satan or God. Those who choose to accept the mark align themselves with Satan.


Revelation 14
9And the third angel followed them, saying with a loud voice, If any man worship the beast and his image, and receive his mark in his forehead, or in his hand,
10The same shall drink of the wine of the wrath of God, which is poured out without mixture into the cup of his indignation; and he shall be tormented with fire and brimstone in the presence of the holy angels, and in the presence of the Lamb:
11And the smoke of their torment ascendeth up for ever and ever: and they have no rest day nor night, who worship the beast and his image, and whosoever receiveth the mark of his name. Source


The mark will be mandatory for all people on earth. Failure to comply will result in death. Many will take the mark because they believe in the Beast. Others will take the mark by reason of convenience, obeying the law, or out of fear of death. Once you have taken the mark, there is no backing out. It is a symbol of your alliance and will result in eternal damnation.

Many Christians believe that the “true believer” will be raptured off the earth before these things take place. Other Christians believe that the concept of the rapture is a false teaching and that all Christians will have to endure this period of tribulation. The rest of the world looks on this literal interpretation of the Bible with feelings ranging from amusement to disdain.

IS the RFID chip the Mark?

The mark is described as being placed in the right hand or the forehead. However, the most appropriate site for placement of the RFID chip is in a fleshy spot such as the upper arm or between the shoulder blades. Anyone who has ever had a staple in their scalp knows how uncomfortable or painful any item between the skin and the skull can be.

Invisible Tatoos



Always wanted a tattoo but afraid of what your boss will say? Thanks to a fascinating new technique you can cover yourself in body art and no one will be the wiser – unless they see you in the dark, which is the only time these tattoos are visible. The new technique uses blacklight reactive ink, which is reactive to UV light. It’s kinda freaky but imagine the fun you could have after dark. by Billy T
Source


Invisible tattoos are the next possibility as the mark of the beast. A tattoo on the hand or forehead that would only be seen under the exposure of a black light would eliminate the distaste that many have for tattoos. But this is only the beginning. Let’s take the invisible tattoo on step further:



Somark Innovations announced biocompatible RFID (Radio Frequency Identification) ink, which can be used to tattoo cattle and laboratory rats and can be read through animal hair.
It might even be used on humans eventually.
This is a passive RFID technology that contains no metals; the tattoos themselves can be colored or invisible. Source



Invisible RFID Ink Safe For Cattle And People, Company Says
The process developed by Somark involves a geometric array of micro-needles and an ink capsule, which is used to 'tattoo' an animal. The ink can be detected from 4 feet away. Source


Chipless RFID tattooing brings to mind the numbering tattoos used during the holocaust. The tattooing was just another method of dehumanizing the prisoners. Perhaps the invisible ink used in these newer tattoos are the companies way of answering the negative response of those who do not wish to see history repeat itself.

In Conclusion

We live in a fast paced world where conditions change daily. The fear that has caused us to give up our constitutional rights is constantly being attacked and magnified. Giving up our rights has not made us feel any safer. Yet, many people believe that world peace is possible. As technology is used to oppress us, will it also damn our eternal souls?

I originally doubted that the mark of the beast as portrayed in Revelations would be the RFID chip. However, I have no doubt that this chip will eventually be used to enslave us all to government control. The mark is just that, a mark. It could very well be the chipless RFID tattoo. It will signify those who follow the beast of Revelation. It is taken by choice, even when that choice is to accept it or die. The RFID chip will, no doubt be part of this control, but does not fall within the parameters of what the mark will be. I still believe that the mark is probably a tattoo. Will the prophecies of the Bible come to pass as outlined in Revelation? I guess you will have to just wait and see.





top topics
 
11

log in

join