Radio Frequency Identification (RFID) technology is gaining rapid acceptance as a means to track a wide array of manufactured objects. Currently, RFID technologies have shown promise in transportation (e.g., smart fare cards) and commerce (e.g., inventory control) for a variety of uses and are likely to find many new applications in both military and civilian areas if and when current technical issues are resolved. There are a number of policy concerns (e.g., privacy), however, that will become more crucial as the technology spreads. This report presents a summary of a workshop, held by the NRC at the request of the Defense Advanced Research Projects Agency, to explore many of the key technical and policy issues. Several important themes that are likely to govern expansion of RFID technology emerged from the workshop and are discussed.
Transcripts of the first congressional hearing on a very exciting and a complex new technology application. Radio Frequency Identification, or RFID, as it is commonly known, is frankly a World War II-era technology that has begun to find new commercial and government application in just the last few years. In basic terms, the most common commercial application of RFID used radio waves to transmit data from a transmitting device called a ''tag'' to a scanning device called a "reader" which can be networked with a computer data base. These RFID tags can be attached to products and packaging individually. Readers are able to activate tags via radio signals and receive tag data without "line-of-sight" scanning, which is a limitation for the common barcode. In terms of the data embedded in the tags, work is being done to develop common standards known as the Electronic Products Code or "EPC" to create unique numerical identifiers for individual items. This would allow RFID readers to receive EPC data from tags on items and products that can be matched through a data base for identification and for other purposes. This is a global effort and, in theory, could lead to a seamless supply chain and logistics management in global trade. While still far off, such possibilities have led some to comment that because EPC identifies a product much like an IP address identifies a computer, RFID and EPC, in effect, are creating an internet for physical items rather than just for data. For manufacturing and retail applications, RFID technology is gradually being rolled out for tracking large bulk containers and pallets along the supply chain. And if technical and cost feasibility issues can be addressed, RFID readers, for example, could have the ability to read instantaneously not only pallets but also each unique individual product they contain. This could be done without having to unload any product contents, with inventory being updated in real time. Forecasting would become obsolete, shelves would always be stocked with the most popular brands, and cost savings would be passed on to the consumer. Now this is just one future possibility. Currently, RFID technology is being used in such diverse applications as automatic traffic tolls, and in anti-theft immobilizers on the latest automobiles. There also are plans to use RFID technology for counterfeit drug detection as well as tracking port cargo and hazardous substances for homeland security purposes. One possible future application that seems to generate excitement for anyone who has ever stood endless in line at the grocery store, involves using readers at checkout. In this application, readers placed at checkouts would allow customers to pass straight through with their RFID tagged items loaded in their shopping carts. Customer accounts would be automatically updated leaving them free to head straight for the parking lot - without even stopping for so much as a candy bar at the checkout or buying that little magazine.
The U.S. Special Operations Command (SOCOM) was formed in response to the failed rescue attempt in 1980 of American hostages held by Iran. Among its key responsibilities, SOCOM plans and synchronizes operations against terrorist networks. Special operations forces (SOF) often operate alone in austere environments with only the items they can carry, which makes equipment size, weight, and power needs especially important. Specialized radios and supporting equipment must be carried by the teams for their radio-frequency (RF) operations. As warfighting demands on SOCOM have intensified, SOCOM's needs for significantly improved radio-frequency (RF) systems have increased. Toward a Universal Radio Frequency System for Special Operations Forces examines the current state of the art for both handheld and manpackable platform-mounted RF systems, and determines which frequencies could be provided by handheld systems. The book also explores whether or not a system that fulfills SOF's unique requirements could be deployed in a reasonable time period. Several recommendations are included to address these and other issues.
Radio Frequency Identification (RFID) technology is gaining rapid acceptance as a means to track a wide array of manufactured objects. Currently, RFID technologies have shown promise in transportation (e.g., smart fare cards) and commerce (e.g., inventory control) for a variety of uses and are likely to find many new applications in both military and civilian areas if and when current technical issues are resolved. There are a number of policy concerns (e.g., privacy), however, that will become more crucial as the technology spreads. This report presents a summary of a workshop, held by the NRC at the request of the Defense Advanced Research Projects Agency, to explore many of the key technical and policy issues. Several important themes that are likely to govern expansion of RFID technology emerged from the workshop and are discussed.
The security of the U.S. commercial aviation system has been a growing concern since the 1970's when the hijacking of aircraft became a serious problem. Over that period, federal aviation officials have been searching for more effective ways for non-invasive screening of passengers, luggage, and cargo to detect concealed explosives and weapons. To assist in this effort, the Transportation Security Administration (TSA) asked the NRC for a study of emerging screening technologies. This report-the third of four-focuses on currently maturing millimeter-wavelength/terahertz imaging and spectroscopy technologies that offer promise in meeting aviation security requirements. The report provides a description of the basic operation of these imaging systems, an assessment of their component technologies, an analysis of various system concepts, and an implementation strategy for deployment of millimeter-wavelength/terahertz technology screening systems.
The global spread of science and technology expertise and the growing commercial access to advanced technologies with possible military application are creating potentially serious threats to the technological superiority underpinning U.S. military strength. Key to dealing with this situation is the ability of the U.S. intelligence community to be able to provide adequate and effective warning of evolving, critical technologies. To assist in performing this task, the Technology Warning Division of the Defense Intelligence Agency (DIA) asked the National Research Council (NRC) to undertake a study examining technology warning issues. This report provides the first part of that study. It presents an assessment of critical, evolving technologies; postulates ways potential adversaries could disrupt these technologies; and provides indicators for the intelligence community to determine if such methods are under development. The intention of this report is to establish the foundation for a long-term relationship with the technology warning community to support the examination of technology warning issues.
The mission of the United States Army is to fight and win our nation's wars by providing prompt, sustained land dominance across the full range of military operations and spectrum of conflict in support of combatant commanders. Accomplishing this mission rests on the ability of the Army to equip and move its forces to the battle and sustain them while they are engaged. Logistics provides the backbone for Army combat operations. Without fuel, ammunition, rations, and other supplies, the Army would grind to a halt. The U.S. military must be prepared to fight anywhere on the globe and, in an era of coalition warfare, to logistically support its allies. While aircraft can move large amounts of supplies, the vast majority must be carried on ocean going vessels and unloaded at ports that may be at a great distance from the battlefield. As the wars in Afghanistan and Iraq have shown, the costs of convoying vast quantities of supplies is tallied not only in economic terms but also in terms of lives lost in the movement of the materiel. As the ability of potential enemies to interdict movement to the battlefield and interdict movements in the battlespace increases, the challenge of logistics grows even larger. No matter how the nature of battle develops, logistics will remain a key factor. Force Multiplying Technologies for Logistics Support to Military Operations explores Army logistics in a global, complex environment that includes the increasing use of antiaccess and area-denial tactics and technologies by potential adversaries. This report describes new technologies and systems that would reduce the demand for logistics and meet the demand at the point of need, make maintenance more efficient, improve inter- and intratheater mobility, and improve near-real-time, in-transit visibility. Force Multiplying Technologies also explores options for the Army to operate with the other services and improve its support of Special Operations Forces. This report provides a logistics-centric research and development investment strategy and illustrative examples of how improved logistics could look in the future.
Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.