posted on Jul, 5 2012 @ 11:07 AM
reply to post by Advantage
Glad to see someone else who is knowledgeable has chimed in!
RFID cards that are commercially available (credit cards, debit cards, smart cards, etc....) all use passive technology. Nearly all of these are on a
13.56 Mhz frequency that literally needs a reader within 3 cm to pass data. You can get some longer range readers that will extend this to about 3
feet, but anything beyond that MUST have a battery or power source built into the transponder. That alone is just looking at reader distance...
Again, if a drone were going to "spy" on chipped data, it would need access to security keys because of the encryption on smart card technology.
Currently, the 3 types of smart card technology that are used commercially are the HiD iCLASS, a compatible MIFARE, or an open source MOCA. MOCA
cards are also encryptable. Below is a little blurb about how authentication of security keyes happens. As you can see, this process is highly
unlikely through a drone....especially when you consider the enormity of programming "exceptions" it would require to deal with every case type of
security key/retailer it could encounter.
Both iCLASS and MIFARE are “contactless smart cards” by definition. When either of the cards is read in their normal functional mode, there is
an additional security step. The reader and the card go through a complex mathematic process where they compare security keys carried within both the
card and reader. This process is called Mutual Authentication. It ensures that the communication between the card and reader can never be copied and
repeated back to the reader. If the key in the reader matches the key in the card, then the reader will extract the binary data format from the card
and send it on to the controller. If the keys DO NOT match, the mutual authentication process is terminated and the reader shows no reaction at