Homeland Security using RFID at the border



Cnet news is reporting that the department of Homeland Security is using RFID at U.S. borders. The RFID chips are implanted in the “Customs and Border Protection Form I-94A” document which is used to keep track of comings and goings of foreign visitors.



The “comings and goings” information is logged to a government database and there is no personally identifiable information, logging only a serial number. Only U.S. Government officials have the ability to go in and pin that serial number to a name. (So there IS personally identifiable information, it just takes an extra step and is not easily accessible by anyone.)

It’s an interesting application, the big advantage I see is being able to know if person X has left the country when they were supposed to. Of course the problem with it is making sure that every “foreign visitor” gets said form.

Related Posts

Blog Traffic Exchange Related Posts
  • Leading browser coders get together on internet security This is one of those stories that you never thought you'd see (especially after the Microsoft-Netscape "wars")... Developers from four of the most prominent web browsers, Internet Explorer, Mozilla/Firefox, Opera and Konqueror (much of the foundations for Safari are in the Konqueror codebase)... have got together and talked about different......
  • Registrars not verifying contact information on domains? According to a GAO report one of the reasons that phishing and scam websites are because of a lack of enforcement and policing by registrars of accurate contact information. According to their study over 5% of sites had been registered with false data. ~2.5% had been registered with incomplete information.......
  • How to Remove Personal Security | Personal Security Removal Guide Personal Security is a rogue antivirus application that comes from the same (dreaded) family as the Cyber Security rogue. It usually installs on the users computer without the permission of the computer user. Once installed on the system it will then perform supposed scans finding lots of virus infected files......
Blog Traffic Exchange Related Websites
  • Is Social Security a Ponzi Scheme? (Part 2: An Explanation of Social Security Works) The following is a continuation of the Is Social Security a Ponzi Scheme? (Part 1). That article dealt with the history of Charles Ponzi and the original Ponzi scheme. In this article we'll cover the Social Security system in general. Social Security also works best as a pyramid There is......
  • Manufacturing Jobs Coming Back To The US I read a lot of financial news and newsletters on a regular basis. One of the paid newsletters I subscribe to is Capital & Crises by Chris Mayer which discusses safe, non-speculative stock market investments. Today I got an email quoting Mr. Mayer which was pretty interesting. It was about......
  • How to Identify Old Coins Whether you have years of experience and thousands of coins or have just entered the hobby of coin collecting, it is likely that you have or will soon come across a few mysterious old coins in your collection. Mystery coins are typically old coins that you cannot identify easily; they......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site