It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: mysterioustranger
a reply to: Quantum12
I am a 1st responder in disaster response, an EMT and Emergency Response Team member, FEMA/Homeland Security trained through the Emergency Management Institute in Washington D.C.
I volunteer as well for city government, and am a dispatcher, and search and rescue responder as well too.
MS
EMT/ERT-1st Responder
Advanced Disaster Life Support
FEMA/Dept of Homeland Security
Region 2 South, Wayne County Michigan
originally posted by: YachiruKusajishi
The issue I have is remembering who makes you insert the chip and who still has the slide the card style. I waste more time that way than anything else.
RFID tags can already be found in a wide variety of personal devices, including access cards, contact-less credit cards, passports, and driver's licenses. In many cases, RFID tags store sensitive personally identifiable information. For example, a US passport stores the name, nationality, date of birth, digital photograph, and (optionally) fingerprint of its user. When stored on an RFID tag, such information can easily be subject to clandestine eavesdropping and unauthorized reading. This data can then be used in order to track the owner of the tag. In addition, the information gleaned from an RFID enabled device may also be utilized to clone the tag, which provides adversaries with the capability to impersonate users. Perhaps even more troubling is the fact that RFID tags are susceptible to "ghost-and-leech" relay attacks. In this type of an attack, an adversary, called a "ghost," relays the information surreptitiously read from a legitimate RFID device to a colluding entity known as a "leech." The leech can then transmit the forwarded information to a corresponding legitimate reader and vice versa. Thus, a ghost and leech pair can succeed in impersonating a legitimate RFID device without actually possessing the device, which violates the security these devices are designed to provide. Although cryptography may be used to address the problem of promiscuous tag transmissions, ghost-and-leech attacks are more stubborn as all known reader-to-tag authentication protocols are vulnerable to this type of attack
www.cs.columbia.edu...
Although we demonstrate the viability of our motion detection method on low cost RFID devices, the method is not limited solely to RFID devices. It extends easily to more traditional mobile devices such as laptops, cell phones, personal fitness aids, MP3 players, and video game remote controls. Out of these, mobile phones, fitness aids, and video game controllers are the most likely to come pre-equipped with accelerometers.
originally posted by: TNMockingbird
a reply to: Bigburgh
You guys are cracking me up with all the
chips, initials and government agent stuff...
*backs quietly out of thread*
originally posted by: YachiruKusajishi
a reply to: Gothmog
Really? I have used BoA for about 2 years now and only just recently got the chip card In February of this year! The only reason I got it then was because my husband and myself were part of a potential security leak.