Author Topic: RFID Nightmare Video-- Airport Employees To Chipped  (Read 19909 times)

0 Members and 1 Guest are viewing this topic.

Offline ekimdrachir

  • Member
  • *****
  • Posts: 7,144
    • Go Outside
RFID Nightmare Video-- Airport Employees To Chipped
« on: April 11, 2010, 11:07:12 pm »

RFID nightmare - Airport workers to get mark of the beast

Revelation 13:16-18

16 And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: 17 And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. 18 Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his More..number is Six hundred threescore and six.

Don't take the RFID chip!

Can anyone else compile information regarding these airport RFID chips? its pretty obvious theyre being rolled out by the billion now, medichips, travelchips, creditchips, drivingchips, pretty soon it wont be a matter of choice, your shoes and tshirts and kitchen utinsels will all be transmitting user preference data to facebook earth! i mean unisys

I wonder if I want to travel at all..


  • Guest
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #1 on: April 13, 2010, 04:28:11 pm »
Remember this golden rule of Technology, that i abide by for I used to be a hacker of DBS and DSS satellite systems and other gizmos back in the day.

"If man can make it, man can break it"

for every negative technology made, there will always be positive technology.
1 example: RADAR Guns brought RADAR detectors
couple of us now currently trying to design a wearable emitter (strictly hobbyist) that will hopefully block any and all RF's w/out consequences to the human body.
I used to be excited about the future, now I fear it.


  • Guest
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #2 on: April 13, 2010, 04:30:28 pm »
Completely forgot to mention I have a friend out west, know what he does???
He works for a company thats putting RFID inside Las Vegas Poker chips.....Poker chips....amazing

Offline ekimdrachir

  • Member
  • *****
  • Posts: 7,144
    • Go Outside
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #3 on: April 14, 2010, 12:55:55 pm »
Completely forgot to mention I have a friend out west, know what he does???
He works for a company thats putting RFID inside Las Vegas Poker chips.....Poker chips....amazing

Shuffle Master plans to use RFID-implanted chips with optical card readers embedded into the company's automated shuffling products; casinos will get better game security against chip counterfeiting and card counting. It will also improve the ability of casino managers to determine average wagers and win/loss percentage for any given individual player - not just the high-rollers, who have been tracked by hand for years.

Yoseloff isn't concerned about being perceived as Big Brother. "I think it's more intrusive to know what brand of toothpaste or what brand of intimate product a consumer is using than collecting wagering data," he said. "This technology gives the casino an accurate read on a customer so they can reward them properly."

Don't be too sure about poker players and surveillance. Science fiction readers may recall the bugged money from Bruce Sterling's 1998 novel Distraction. In the novel, American cash was known to be bugged; no one would play with it or accept it for ordinary use. You might also be interested in taking a look at the Polybot-based gambling robot; if you are interested in placing a wager for your grandchildren to collect, try the Long Bets Foundation web site. From Shuffle Master acquires RFID patents to track table play.

Scroll down for more stories in the same category. (Story submitted 1/6/2005)

OpenPCD is a free hardware design for Proximity Coupling Devices (PCD) based on 13,56MHz communication. This device is able to screen informations from Proximity Integrated Circuit Cards (PICC) conforming to vendor-independent standards such as ISO 14443, ISO 15693 as well as proprietary protocols such as Mifare Classic. Contactless cards like these are for example used in the new electronic passports.


The intention of the OpenPCD project is to offer the users full hardware control of the RFID signal and to provide different output signals for screening the communication. With already existing Free Software from the OpenMRTD project for implementing the PCD side protocol stack of various RFID protocols, this project will happily extend the free toolchain around RFID verification.


OpenPCD first release
    OpenPCD first release

The OpenPCD hardware design is based on the CL RC632 Multiple Protocol Contactless Reader IC from Philips, which supports ISO 14443 A&B, ISO 15693, Mifare and ICODE protocols. This reader IC is connected via SPI to an ARM Microcontroller. We chose the AT91SAM7S128 with a 32-bit RISC processor architecture, 128 kbytes Flash and 32 kbytes SRAM. The Microcontroller is accessible via USB-B-MINI plug and optionally via a 20-pin JTAG header. The design provides several interesting interfaces for monitoring and studying the RFID signal:


    * serial RS232/TTL interface on 1x5 header
    * two-wire I2C interface on 1x4 header
    * SAM-BA reset control on 1x4 header
    * 4 analog inputs on a 1x5 header
    * bootloader reset via push-button
    * HF output of the trigger signal on U.FL connector
    * HF output of the AUX signal (intermediate demodulated steps) on U.FL connector
    * HF output of the MFOUT signal (demodulated digital signals) on U.FL connector
    * optional 1x3 header for an external antenna


  • Guest
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #4 on: April 14, 2010, 01:04:32 pm »

Shuffle Master plans to use RFID-implanted chips with optical card readers embedded into the company's automated shuffling products; casinos will get better game security against chip counterfeiting and card counting. It will also improve the ability of casino managers to determine average wagers and win/loss percentage for any given individual player - not just the high-rollers, who have been tracked by hand for years.

Yoseloff isn't concerned about being perceived as Big Brother. "I think it's more intrusive to know what brand of toothpaste or what brand of intimate product a consumer is using than collecting wagering data," he said. "This technology gives the casino an accurate read on a customer so they can reward them properly."

Don't be too sure about poker players and surveillance. Science fiction readers may recall the bugged money from Bruce Sterling's 1998 novel Distraction. In the novel, American cash was known to be bugged; no one would play with it or accept it for ordinary use. You might also be interested in taking a look at the Polybot-based gambling robot; if you are interested in placing a wager for your grandchildren to collect, try the Long Bets Foundation web site. From Shuffle Master acquires RFID patents to track table play.

Exact place he works @...small werld...

lmao.....luv the photoshopped audio headphones

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately


  • Guest

Offline DeathToNWO

  • Member
  • *
  • Posts: 25
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #7 on: April 28, 2010, 01:44:02 pm »
LOL, some of these are just crazy!

The chips will be everywhere soon. No doubt about it.  Its clearly predicted in the boo of Revelation.

I won't be accepting it though you can count on that.

Thanks for sharing everyone!

Offline ekimdrachir

  • Member
  • *****
  • Posts: 7,144
    • Go Outside
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #8 on: May 01, 2010, 12:43:18 pm »

What happens for people who already have RFID in their clothes, bank cards, phones, drivers licenses, passports and vehicles? I am concerned over the implimentation of such advanced technology, connected to the hive mind.

Offline DeathToNWO

  • Member
  • *
  • Posts: 25
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #9 on: May 01, 2010, 02:35:10 pm »
Dude, it gets even crazier when you learn of the future plans of the elite.  They have already been experimenting with BRAIN CHIPS on people (search on Infowars). They plan on having people's brains chipped and have everyone connected via radio waves or whatever, into kind of like a global mind.

It just gets more and more insane everyday.

Offline flaming_red_pill

  • Member
  • ****
  • Posts: 416
  • it's my *
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #10 on: May 01, 2010, 02:55:18 pm »

Its preparations are concealed, not published. Its mistakes are buried, not headlined. Its dissenters are silenced, not praised. No expenditure is questioned, no rumor is printed, no secret is revealed.

-President John F. Kennedy on the Global Conspiracy

Offline ekimdrachir

  • Member
  • *****
  • Posts: 7,144
    • Go Outside
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #11 on: May 01, 2010, 04:06:43 pm »
Creepy Xbox photo

Check this out

Rumor: New Xbox Console in 2010 - We Tell You the Truth
By: César A. Berardini - "Cesar"
Share This Article
Jun. 15th, 2009 9:19 pm
1UP reported on Monday that Microsoft plans to release a new Xbox console as early as next year, featuring beefed-up Xbox 360 hardware and built-in Project Natal technology. From the 1UP report:

    Microsoft will not only release Natal as an add-on for the Xbox 360, it will come standard with the next Xbox console.

    Yes, there will be a new Xbox console next fall.

    However, the new console won't just be an Xbox 360 with a camera, though -- we've heard it will be considered a new platform and carry a new name (Xbox Natal?). It's not clear what sort of upgrades we might see, but some have suggested it will be an slight upgrade of the current Xbox 360 technology.

1UP speculates on the idea that Microsoft could try a similar move such as the one done by Nintendo, which basically built the Wii around the GameCube hardware, with the motion-sensing "Wiimote" being the real addition:

    Current Xbox 360 games would be playable on it, but future games would be able to take advantage of the added muscle. Similar to what we see in the PC space, games played on the more advanced Xbox would look or perform better, but publishers will still be able to support owners of both systems. Some developers have complained that they've already maxed out the Xbox 360; perhaps this will give them room to expand.

    Make no mistake, we wouldn't be talking about the sort of hardware leap we've seen with Xbox (or most other) platforms in the past, and we're not talking about Microsoft ending one console cycle and starting another. We're talking about an evolution of the Xbox 360; similar hardware but upgraded, repackaged, and rebranded.

Over recent years, we have received information on Microsoft's future plans for the Xbox platform, and that's why, among other topics, we extensively covered 3DV Systems' Z-Cam. Avid readers know we were the first publication to report that Microsoft signed IBM to create the CPU for the Xbox 360 (at a time when no one would believe Microsoft and IBM would work together or that the Xbox platform would use a non-x86 CPU) and that Microsoft was doing research on video-based motion sensing.

Today, I can tell you that I have obtained the first details on the next Xbox (info that we'll reveal in the coming weeks) and that's why we can confirm that the rumor reported by 1UP is false. Microsoft is NOT launching a new, upgraded Xbox 360 disguised as a new Xbox in 2010 (although built-in Natal technology is a possibility for a new edition of the Xbox 360, similar to the Elite or Arcade flavors).

It's not our intention to tease you, but for now the only thing I'm going to say about everything I heard regarding the next Xbox is that it won't launch until a certain type of television becomes more widespread because... (be sure to check out our Twitter account to learn more)

so im looking for ibm video-based motion sensing and the first thing i get?

Digital Video Surveillance

( and something is messing with my browser making links go elsewhere.. grr)

anyhow, Digital Video Surveillance:
enhancing physical security with
analytic capabilities

by IBM global services 2008

Today’s Surveillance Challenges
In today’s environment, virtually every municipality, agency, educational
institution, mass transportation center, financial institution, utility plant and
medical center must plan for threats and protect the security of its property,
employees, customers, citizens and IT infrastructure. Additionally, businesses
in every sector face challenges in protecting their customers, employees, and
assets while working to reduce operating costs, improve productivity and
increase profit as well as customer satisfaction. Examples of security risks
and business issues that may be managed more effectively using surveillance
methods include:
• Public Safety/Security: Increased threats have caused many government
agencies to deploy surveillance cameras and sensors, providing situational
awareness around critical facilities. School campuses must deal with pro-
tecting entry and exit points, maintaining IT network security, preventing
vandalism and avoiding authorization issues.
• Airports/Seaports/Railways: Mass transit businesses and agencies
must protect passengers, staff, and physical assets from terrorist threats
and security breaches, and adhere to regulatory requirements.
• Retail Stores: The retail industry monitors establishments to reduce
fraud, theft, and administrative errors. Retail stores also use video and
analytic information to determine the effectiveness of promotional
displays and count people in various areas to optimize store layouts as
well as sale effectiveness.
• Financial Institutions: Many banks have 24—hour human surveillance
requirements for inside operations and Automated Teller Machines (ATMs).
Surveillance and analytics are being used to reduce threats of robbery as
well as fraud. Many banks are consolidating security controls across bank
branches by monitoring video, voice and transactional information from a
central command and control center.

An Evolution of Surveillance
Organizations have used surveillance for decades as a deterrent to criminal
activities such as theft, fraud, and violence. In the last ten years, surveillance
technology has been developed that not only helps organizations detect and
respond to threats sooner, but also helps them focus on improving business
operations. The three generations of surveillance are often described as:
• Analog
• Digital
• Smart or Intelligent
We will explore each of these in greater detail to help you better understand
how we arrived at today’s environment and where we plan to go in the future.
Analog Video Surveillance
Video surveillance has typically involved the placement of analog video
cameras in sensitive or strategic areas of a particular business, coupled with
closed-circuit television (CCTV) for live monitoring. This serves not only as
a deterrent to crime, but also to record the movement of people and property.
Mobile methods of video surveillance, such as mounting cameras in patrol
cars, buses and trains are also often utilized to record events.
The use of analog video cameras results in the creation of hundreds of video-
tapes that then must be viewed by security guards. The cost of employing
security personnel to monitor hundreds of cameras, in addition to storing a
high volume of videotapes can be prohibitive. Additionally, videotapes can
have poor image quality and deteriorate over time.
More importantly, studies have shown that a person assigned to sit in front of
a video monitor for several hours a day and watch for particular events is an
ineffective security system. Tests have demonstrated that after only 20 minutes

of watching and evaluating monitor screens, the attention of most individuals
has degenerated to well below acceptable levels.1 Monitoring video screens is
both boring and mesmerizing. Furthermore, manual searches of tapes can take
too long to provide vital information needed to assist in investigations.
Also, video can often only be viewed from a single end point that is not shared.
This limits the ability to distribute information across an enterprise, which
could help minimize company-wide threats and alerts. Finally, analog video
systems cannot extract business intelligence from security data.
Digital Video Surveillance
Today, video surveillance remains as vital as ever, but it assumes a new role.
The emergence of digital video, IP video cameras, networked video recorders,
web video, consumer cameras and video-based intelligence is opening up a
wide range of applications providing enhanced functionality and business
value to organizations.
Digital video surveillance (DVS) enables clients to establish effective risk
management strategies that will help them manage and safeguard business
information and technology assets, anticipate vulnerabilities and risk, and
maintain timely access to information.
Many organizations have piecemeal solutions, and are challenged by
having multiple systems that do not communicate with each other. Often,
the separation of IT and physical security does not allow organizations to
take advantage of existing IT infrastructures and applications, such as
identification (ID) management and transactional systems that may already
be in place. Operating totally separate, disparate systems for IT and physical
security is not only less effective, but also more labor intensive and costly.

Figure 1. Digital video surveillance drives intelligence through integration, which can
enhance your ability to respond.
Migrating to a DVS solution will help address some of the limitations of a tape-
based analog system. DVS can help organizations achieve better returns on
their security investments by:
• Enabling real-time detection and potential prevention of security incidents
through enhanced intelligence gathering
• Using event-based viewing for investigative purposes, eliminating the need
to chronologically review videotapes
• Reducing the need to monitor video cameras and change tapes
• Increasing product security by deterring potential shoplifters and
monitoring staff
• Providing evidence against fraudulent claims
• Increasing indoor and parking lot security

Smart Surveillance
Smart surveillance, intelligent video surveillance, video analytics, intelligent
video and intelligent analytics are typical names used to describe the concept
of applying automated signal analysis and pattern recognition to video cameras
and sensors, with the goal of automatically extracting “usable information”
from video and sensor streams.

IBM Smart Surveillance Solution (SSS) helps optimize security by integrating
hardware, software and services within an organization, thereby enabling the
convergence of physical and IT security. An integral part of SSS is a software
component developed by IBM Research known as IBM Smart Surveillance
Analytics (SSA), which provides capabilities that enable real-time decision
making and post-event correlation of people and activities.
Usage Scenarios
IBM Smart Surveillance Analytics has many unique features to help clients
manage security issues and prevent problems before they occur, such as:
• Open framework—A comprehensive security and surveillance plan may
involve multiple modalities of events captured from various video analytic
technologies, non-video sensors and event systems like TLOG in the retail
environment. SSA has been designed with an open framework that enables
event-based surveillance and can make the integration of events simple
and easy.
• Behavior factory—Many vendors provide a set of behaviors, such as
“large fast vehicle” and “stopped vehicle.” These behaviors have been
designed with a limited customer set in mind. SSA’s ability to alert based
on “database indexed metadata” of all events occurring across a series of
camera feeds allows the user to customize behaviors to their environment
through an easy-to-use interface.
• Attribute search—The intelligent video industry has approached surveil-
lance based on a limited set of known threat models; hence, the emphasis
on “tripwires and abandoned objects” and very limited functionality
to support investigation of “unknown threats.” SSA, through its unique
and patent pending metadata search, supports a wide range of queries on
events that may or may not have been previously defined as alerts. This is
possible because SSA is capturing metadata on event activity, not just on
pre-defined alerts.


• Entertainment solutions—The capability of SSA to track people can be
used at sporting events to generate enhanced statistics, visualizations
and interactive gaming. Clients that may be interested in this capability
include casinos, sporting leagues and television stations.
IBM Smart Surveillance Solution Architecture
As stated above, the integral software component of SSS is IBM Smart
Surveillance Analytics. The analytic framework of SSA is comprised of
two core components: Middleware for Large Scale Surveillance (MILS)
and Smart Surveillance Engine (SSE). They will be discussed later in
this paper.
SSA provides the unique capability to carry out efficient data analysis of
video sequences, either in real-time or recorded video. Based on open
standards-based middleware, the open standards-based software platform
is designed to allow monitoring and analysis of real-world events via sensors
(like video cameras, radar or audio inputs).
All SSA functionality is Web-based, allowing virtually “anytime, any-
where” access to both real-time and historical event data from the system.
Figure 2 shows the high-level conceptual architecture of IBM Smart
Surveillance Solution. It illustrates how Smart Surveillance Analytics
integrates with existing video cameras and capture systems to provide:
• Video/sensor analytics capabilities
• A framework for integrating event information from multiple
related sources
• A framework for building client-specific solutions drawing upon the video
and sensor events and integrating these into the client’s business process

Figure 2. IBM Smart Surveillance Solution—a conceptual architecture
SSA provides the following types of functions to the end user:
• Real-time alerts: Users can specify “alert definitions” that include multiple
conditions from a single camera/sensor or across multiple cameras and
sensors. SSA uses its analytics capabilities to evaluate events occurring
in relevant sensors against the alert definition. Each time the “alert
definition” is triggered, SSA can provide the user with prompt notification
of the event.
• User-driven queries: Users (both human and applications) can use SSA to
perform content-based queries against event metadata that is archived by
SSA. For example, SSA can retrieve all events from a camera where “a red
car” was driving across the parking lot.

Figure 3. SSA Functionality
• SSA Functionality: There are several types of video analysis technologies
that are part of SSA. Typically, each of these analytics involves sophisti-
cated algorithms that process the video/sensor signals to extract
information and structure the information to support the real-time alert
and search functionalities of SSA. The video analysis technologies are:
– Behavior analysis: These analytics are intended to analyze the move-
ment of objects within the field of view of a camera. This is based on the
ability to detect and track multiple moving objects across the camera,
classify these objects, and extract various object attributes like color,
shape and size. The extracted information is used to provide a variety of
alerts while recording information from all events (for example, motion
detection, tripwire, abandoned object) and search functions
(for example, find red cars).

– License plate recognition (LPR): This analysis capability is tailored to
detect the presence of text within a given video frame, and apply optical
character recognition technology to extract the license plate number.
LPR needs to be customized to the character set (for example, English,
Arabic), style, format and appearance of the license plate, which varies
significantly across geographies. In order to correctly operate, LPR
requires a minimum resolution across the license plate and adequate
illumination and viewing angle.
– Face detection: This analysis capability is designed to automatically
detect images of human faces from the video. The face detection
capability creates an index in the video and marks the time at which
the face was present in the video. The system generates a key frame to
represent the face, thus producing a catalog of faces for all the people
who appeared within a camera field of view (approaching the camera.)
– Event integration: This capability allows the integration of events
from the analysis of other sensors (like automatic door sensors, HVAC
sensors, audio) with event streams from other IT systems (like point-of-
sale, telephone call logs). Once integrated, the event information can be
cross-correlated to video-based events like behavior analysis, LPR
and face detection.

Figure 4. SSA Software Architecture
SSA has the following core components:
1. Smart Surveillance Engine (SSE): The Smart Surveillance Engine (SSE)
is a C++ framework for capturing events that are observed by sensors such
as cameras. Every physical camera in your environment is assigned to an
analytic engine running on an SSE server. One SSE Server can handle
multiple cameras. In general, SSE is designed to process streams of video
in real-time, automatically extracting event (activity in the camera’s field

of view) metadata and evaluating user-defined alerts. The specific user
functionality associated with each camera is based on the profile which is
configured for use by the analytic engine associated with the camera. The
following profile types are available:
• Behavior analysis (Outdoor Far-field, Outdoor Near-field, Indoor
• Face detection (Face Tracking, Sensitive Face Tracking)
• License plate analysis (via integrated IBM Business Partner technology)
The information extracted by SSE from the camera’s field of view is used to
classify objects according to the profile type, providing metadata on object
type, object size, object speed, etc.
SSE alerts are conditions which have been specified by the user as being
of interest. SSE supports both basic video alerts and compound metadata-
based alerts. Currently, we support the following basic video alerts:
• Motion detection-detects motion within a specified region of view
• Tripwire-detects directional crossing of user-defined tripwire
• Region-detects certain specified behavior within a specified zone,
such as entering, leaving, starting and stopping
• Abandoned object-detects when an object has been left behind
• Object removal-detects when an object has been taken away
• Directional movement-detects when objects are moving in a user-
specified direction
• Camera move/blind-detects changes in camera state such as movement
or obstruction
• Camera movement stop-detects when a pan-tilt-zoom (PTZ) camera
stops moving

2. Middleware for Large Scale Surveillance (MILS): Each installation of
the IBM Smart Surveillance Solution, which includes SSA, has a MILS
Server. MILS is a J2EE framework application built around IBM’s DB2®,
WebSphere® application server and MQ platforms. In addition to metadata
management, MILS provides system management, user management
and various extensibility services, including a web services application
programming interface (API).
MILS can help provide consolidated backend data management capabilities
and store metadata that describes key activities discovered while ingesting
video data. It can also create and manage a full index of the ingested video
data. This index has a full set of event attributes that can be searched to
support forensic analysis. The index attributes can also be used to define
composite metadata-based alerts by combining the metadata in various
ways to define complex behavioral patterns.
MILS operates on top of a software middleware stack, either IBM Web-
Sphere Remote Server (WRS) or IBM Central Site Server. Both provide
a middleware platform with a J2EE application server called WebSphere
Application Server Network Deployment, integrated with:
– WebSphere MQ for an assured message delivery component
– DB2 Workgroup Server Edition as a relational database
management system
3. Applications: These are mainly web applications (HTML, Java, JSP, applets,
Javascript) which use the web services enabled by MILS to provide the
functionality needed by the user.

IBM Smart Surveillance Analytics can also allow administrators to add
new metadata schemas to the system, thus enabling new analytic engines
to send sensor/event metadata. The metadata from all analytic engines
can be consolidated allowing users to search across modalities. These
advanced indexing capabilities offer a unique and powerful differentiator
from virtually all other available surveillance solutions.
Return on Investment (ROI) by Industry
Implementing IBM Smart Surveillance Solution, which includes Smart
Surveillance Analytics, offers many benefits, including the potential to
increase return on investment (ROI). ROI successes fit into three cate-
gories: managing risk, growing the bottom line and growing the top line.
ROI highlights in various industries include the following scenarios:
1. Retail
In today’s retail environment, product shrink dramatically affects the
top and bottom line. Globally, on average, 1% to 3% of all retail sales are
affected by product shrink, due to conditions including crime, employee
fraud, and damaged goods.2 This results in a significant impact on retail
margins, especially for those businesses running on a 1% to 3% margin.
IBM Smart Surveillance Solution can serve as a loss prevention tool as
well as a source of retail intelligence data. It can provide video techno-
logy to help manage profit and loss at the cash registers, under the
cash registers and throughout the store. Retailers can implement SSS
to determine promotion effectiveness, cashier monitoring and people
counting. Grocers can use the technology to help reduce Bottom of Basket
(BOB) losses. One grocer has reduced BOB by more than 80%, integrating
IBM’s optical recognition and an IBM Business Partner Point-of-Sale
(POS) system.3

all for profit.. but what do you expect when you find this, searching for the next xbox

Offline TheProxy

  • Member
  • ****
  • Posts: 294
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #12 on: May 02, 2010, 02:14:27 pm »
NO I can see where RID's would be great in CHIPS at the casinos.. But not the people.. And as for the Airport Employees.. It's called "beta" testing the few first people they did this to was "Alpha" testing..
I bring a message Those who would try to take our freedom... Pray.

Offline ekimdrachir

  • Member
  • *****
  • Posts: 7,144
    • Go Outside
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #13 on: May 02, 2010, 03:24:07 pm »
Its too bad, they are doing it anyways.


Weber Introduces Line Of RFID Smart Labels

Weber Marking Systems Inc. announced the availability of its exclusive SmartTrak RFID smart labels, a line of pressure-sensitive labels that include embedded RFID inlays that can be encoded with large amounts of variable information. Weber SmartTrak labels are pressure-sensitive labels with RFID inlays inserted between the label face stock and its release liner. Weber inserts the inlays as part of its label conversion process, and uses fully tested and verified inlays from manufacturers like Alien Technology, Omron, and UPM Rafsec.

SmartTrak RFID labels address various protocols for RFID encoding, including EPC Class 1. The 96-bit, read/write inlays are available in various sizes from 4" x 2" to 4" x 6" long. In addition, Weber provides SmartTrak Starter Kits for companies that are in the initial phases of establishing RFID programs. Kits consist of a small roll of RFID smart labels and a thermal-transfer printer ribbon to aid in pilot testing.


ID Technology's RFID Reject Module for Gen 2

ID Technology introduced the 250r, an RFID printer applicator that reads, writes, and verifies RFID tags prior to printing and dispensing the tag/label onto a tamp pad for automatic application of the tag/label to a case or carton. If the RFID tag cannot be verified, the reject module's plate moves in front of the tamp pad and the bad tag/label is blown onto the reject plate, which then returns to the home position.

The IDT 250r printer applicator features the same modular component configuration as the original IDT 250 Series printer applicator as well as "hot swap" spare assemblies that install in minutes. The result is an RFID enabled printer applicator that adapts to your production environment. All installed ID Technology RFID printer applicators can be upgraded to EPC Generation 2 protocol, and all current ID Technology RFID printer applicators are shipped Gen 2 Ready.


PowerID releases new line of battery-assisted RFID products

Thursday, March 4, 2010 in News

PowerID announced the release of two new RFID tags to add into its battery-assisted, passive RFID product lineup: the PowerM-604 and the PowerP-703.

The PowerM-604 is a rugged, long-life metal-mount tag, targeted at tracking items such as reusable pallet containers, unit load devices, shipping containers, and roll-cages. The ultra-high frequency tag has a lifetime of five years and features IP67 encasing, with a read range of up to 200 feet.

The PowerP-703 is credit-card sized person tracking tag that is plastic-coated on both sides for durability, and features customized printing.

Both are compliant with the EPCglobal Class 1, Generation 2 protocol and with the ISO 18000-6C standard. [end]


Tortilla manufacturer wrapped in RFID

Thursday, April 15, 2010 in News

Tortilla manufacturer, Mission Foods, deployed Intermec RFID technology to improve warehouse operations and account for its reusable plastic containers.

The company used Intermec IF61 RFID readers, along with Intermec antennas, labels and PM4i printers to enhance tracking of over 20,000 reusable containers across three of its plants.

Packaged products are loaded onto RFID-labeled containers and then loaded onto pallets, at which point an RFID label is encoded by the Intermec PM4i printer and applied to the pallet.

Intermec IF61 readers in outbound portals record the pallets and associated containers as forklifts load the route trucks bound for distribution centers.

When trucks return, they are processed through an inbound portal to account for all reusable plastic containers. [end]


Upcoming events to showcase RFID in health care industry

Friday, April 30, 2010 in News

Registration is now open for two RFID Health Care conferences, which is focused on helping health-care providers understand how technology can help improve hospital efficiencies and cut costs.

Each of the one-day events will feature end user presentations with objective case studies exploring the different types of RFID technology and how they can optimize hospital operations and improve patient outcomes.

RFID in Health Care West will be held on June 15 at the Renaissance Hollywood Hotel & Spa, located in Los Angeles, California. RFID in Health Care East will take place on October 12 at the Radisson Plaza-Warwick Hotel in Philadelphia Pennsylvania.

Seminars will be held at the events covering various topics, such as patient monitoring, asset tracking and verification, as well as automated billing – all with the use of RFID technology.

For more information, please visit the RFID in Health Care Web site. [end]


Sirit selected for RFID-enabled toll collection

Thursday, April 29, 2010 in News

Sirit announced that it has been selected for the upgrade of an in-lane toll collection system on the 91 express lanes in Orange County California.

To ensure the free flow of traffic, customers of the express lane pay tolls from pre-paid accounts using the RFID-enabled FasTrak transponder device mounted to their vehicle’s windshield.

The project, valued at approximately $1.8 million, is expected to be complete later this year. [end]


BrainWave's update on the easy-bake oven

Thursday, April 29, 2010 in News

Yankee Design’s BrainWave desktop microwave brings back memories of the easy-bake ovens, minus those where your hand gets stuck and burned to high heaven, according to Ubergizmo.

This modernized version of the famous childhood toy comes with a USB port and RFID scanner built-in. You simply open the pre-packed food and get the RFID-enabled utensil out, scan it on the microwave, and the device will automatically know how long it needs to heat up the food for you.

The USB is so you can hook it up to your computer, and have it notify you of when your food is ready, as if the smell of burning good was a dead give away.

To read more click here. [end]


Facebook lets your Presence be known

Wednesday, April 21, 2010 in News

As part of something called the Facebook Presence, attendees of this year’s F8 conference received an RFID tag affixed to their conference badge, according to a Tech Crunch post.

The system allows attendees to check in at the various locations around the conference by simply swiping their badge. The post didn’t elaborate on what specific type of RFID the badge is using.

Attendees can log in to their Facebook account and link the tag number to their profile so that their location is updated in real-time, and then imported into their profile.

By simply tapping the tag to readers throughout the venue, attendees can share their activity, tag themselves in photos, connect pages, and more.

The Facebook f8 conference is where developers and entrepreneurs collaborate on the future of personalized and social technologies, exploring a variety of topics including new tools and techniques, business growth strategies and open technologies.

To read more click here. [end]

Today at Facebook’s f8 conference in San Francisco, the company have given all attendees a small RFID tag attached to their conference badge. This tag is a part of something called “Facebook Presence” which allows you to “check-in” at various places around the conference simply by swiping your badge. Yes, it’s location.

This is actually the same thing Facebook uses for its infamous keg bot at its headquarters. Employees have been using this for a long time, now they’re letting the rest of us in on the fun. To use it, you go to this page and manually type in your tag number to link it to your Facebook account. Then, everytime you swipe your badge somewhere, it goes right to your profile. Apparently, you can also tag yourself in photos this way.

While we’ve known for a while that Facebook would use QR codes as a part of its location strategy, it’s not clear if this is actually something Facebook plans on using more widescale. Certainly needing to carry around a tag with you is a barrier to entry — as is getting venues to install these readers. Hopefully we’ll hear more about this during the conference today.

Read more:

Offline ekimdrachir

  • Member
  • *****
  • Posts: 7,144
    • Go Outside
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #14 on: May 02, 2010, 03:25:39 pm »
Facebook, The App Store, And The Sound Of Inevitability

    * 29

by MG Siegler on May 1, 2010

“That is the sound of inevitability…“

I’m reminded of this quote from The Matrix as I read headline after headline around the blogosphere about how Facebook and Apple and their (at least relatively) closed ecosystems are going to destroy the fabric of the web as we know it. Me? I’m not worried in the slightest bit. Why? Because it occurs to me that what’s going on now is just a part of a cycle. A necessary cycle. Yes, the web (by which I mean the entire Internet), it seems to me, is cyclical.

Just as the United States goes through periods where conservatives being in power gives way to liberals being in power, the web is currently transitioning from open systems dominating to closed systems taking over. Nowhere is this more evident than with Apple’s App Store, and Facebook. The masses, for whatever reason (and there are reasons, more on that later), are embracing these restricted platforms. And obviously, it has some people scared shitless.

And while it’s good for some people to worry in order to keep the soon-to-be ruling powers in check, I’m certain that one day in a few years (or maybe less), we’ll be back to the so-called “open” web again. It has happened before. You don’t even have to go back that far to find it.

In the early 1990s there was no World Wide Web. Well, there was, but no one you know used it because there was no widely-used web browser. Instead, the Internet mainly existed as things such as Usenet, Gopher, and FTP. The system was open. Sure, there was some barriers to entry (such as a modem), but the real barrier to entry was that basically no one knew what “online” was, and even fewer knew how to get there.

Then the companies Prodigy, CompuServe, GEnie, and America Online came along. In 1991, all of these services worked on DOS (Microsoft’s operating system before Windows), and offered a relatively easy way to get online. More importantly, it gave them something to do there, such as read structured news in article form. But, in return for the ease-of-use, each of these services had access fees. This was a closing of the Internet — but people didn’t care. These services grew quickly.

None grew faster than AOL. A key aspect to their service was a nice user interface that anyone could understand (CompuServe, by comparison, was oriented more towards the tech community). They also put an emphasis on being able to communicate with other AOL members (but only other AOL members) through chat rooms. Usage quickly exploded. Again, a closed system.

The fact of the matter is that closed systems are useful in certain circumstances. One key one is mainstream appeal. AOL was appealing to people because it was easy to understand and seemed (relatively) safe. People started using Facebook because it was easy to understand and seemed (relatively) safe. People are now using the App Store because it is easy to understand and seems (relatively) safe. You get the picture.

This is the type of system needed to take mainstream adoption to the highest levels. (Notice I only said “take” not necessarily keep them there.)

Closed systems can also adapt and change faster than open systems. To return to politics for a second. It’s a bit like how a government under a King is more efficient that one under a Republic. Governing by committee is slow, a King can rule on something and it’s done. But yes, a King can also make mistakes faster — there are pluses and minuses.

This ties into what Joe Hewitt, the famed web/iPhone developer (now with Facebook), said yesterday in a long rant on Twitter against the current state of web development. “I want desperately to be a web developer again, but if I have to wait until 2020 for browsers to do what Cocoa can do in 2010, I won’t wait,” Hewitt said. His point is that the state of web languages as presided over by the W3C (the Republic) are moving too slow. Cocoa, a framework presided over by Apple (the King) is a good 10 years ahead of it.

Maybe Hewitt’s right, maybe he’s wrong, or maybe he’s just exaggerating. It doesn’t matter. The fact of the matter is that something will come along and force these closed systems open again — or they will perish.

Speaking of perishing, let’s go back to AOL. By the mid-1990s, it was dominating. Once they switched to a flat monthly fee (instead of an hourly fee — yes, they had that in place for a long time and people still used it) usage soared into the tens of millions. This may not seem like a lot when you consider that Facebook is approaching 500 million users, but this was a much different time. Many people signing up for AOL were using the Internet for the first time ever. By 2000, AOL was so powerful and had so much money thanks to its winning (again, closed) model that it actually bought Time Warner for $164 billion. Then everything started falling apart.

A few years earlier, AOL added a feature that would be its eventual downfall, the web browser. Yes, at one point in the 90s, a lot of people were browsing the web from within AOL’s walled-garden. But the web was open, and AOL didn’t block you from going anywhere on it. Content on the web started growing so quickly, and got so diverse, that people started to question if they actually needed AOL at all. When the telephone and cable companies started offering always-on access to the Internet that people could get to directly through a web browser (cutting off AOL), the only reason a lot of people still kept the service was for their AOL email address.

This was no longer a sustainable model. AOL’s profits started diving as their dial-up access business did. The open web had won — and in part because AOL gave it a window to operate. But without AOL (or some company like it) you could argue that people would have been slower to adopt the Internet, and the web as we know it today would have been slower to evolve.

Does any of that sound familiar? Think about the iPhone. It’s a walled-garden (though much more open than AOL was as third-party developers can work within it, provided they follow the rules), but it too has an open window to the outside: the web. The Safari web browser is the iPhone’s peephole. And Apple even plays that up at times. If people criticize them for now allowing certain apps, they note that anyone can build apps using HTML5 that will work on Safari. Apple doesn’t regulate those at all.

As Hewitt notes, HTML5 is not mature enough yet to produce apps that are on par with native apps. But some are getting fairly impressive. It could well be that in a few years, HTML5 leads to the fall of the App Store model as we know. I’m not saying the model will crash and burn as AOL’s did — Apple may adapt and take down their walls (or do something else) before that happens. But I do believe HTML5 (or some other technology we’re not even thinking about right now) will lead to an opening back up of the system.

Facebook is a slightly different matter. Whereas they were a fairly closed system at first, they’ve been opening up more in recent years. First we got the Facebook Platform, which allowed third-party developers to play within Facebook’s walls. Then we got Facebook Connect, which allowed other sites to play within Facebook’s walls. And now we have the Open Graph, which seem to extend Facebook’s walls to the broader web (at least those sites that adopt it). Yes, the system is still closed in that Facebook still has control of much of the data flowing in and out, but there are parts of it that are open too.

I happen to think that Facebook may have found the right mixture of open and closed with the Open Graph. It’s open enough that they can continue to extend their reach beyond their already incredible (nearly) 500 million members. And yet it’s closed enough that some semblance of order is maintained and people (at least for now) will keep using it.

Thanks in part to their closed roots where a system of trust was built, Facebook was able to establish and grow the ultimate social graph. Like AOL’s mail and chat systems before it, this is a form of lock-in for users. AOL failed because it was too slow to open up their system and realize that they already had hooks in place to keep users from leaving. Facebook doesn’t appear to be making the same mistake. They already won the social networking wars, so now they can afford to open up and go after the larger web. And Google.

So while everyone fears what the Facebook-ification of the web will mean, I’d argue that the only way Facebook can continue to grow and keep their users is if they continue to open up. At some point, I’d bet that it won’t be in their best interest from a business perspective to do that, and that’s when they may start to decline. But there’s a wild-card. If the company can figure out a Google AdSense-type way to make money while continuing the march towards open, they may be able to hold on.

In both of these “closed” examples, Facebook and the App Store, they key to longevity is a movement towards open. If either Facebook or Apple resist that, they’ll become AOL. Something will come along and shove them out of way. It has happened before. It will happen again. And it will keep happening. It’s inevitable.

Read more:

Offline L2Design

  • Member
  • *****
  • Posts: 2,148
    • Graphic Design/Printing
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #15 on: September 02, 2010, 07:07:01 pm »
The chips in dogs are causing cancers in those spots...
Make it so!

Offline ekimdrachir

  • Member
  • *****
  • Posts: 7,144
    • Go Outside
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #16 on: September 02, 2010, 08:13:25 pm »

Chip Implants Linked to Animal Tumors

The Associated Press
Saturday, September 8, 2007; 2:04 PM

-- When the U.S. Food and Drug Administration approved implanting microchips in humans, the manufacturer said it would save lives, letting doctors scan the tiny transponders to access patients' medical records almost instantly. The FDA found "reasonable assurance" the device was safe, and a sub-agency even called it one of 2005's top "innovative technologies." But neither the company nor the regulators publicly mentioned this: A series of veterinary and toxicology studies, dating to the mid-1990s, stated that chip implants had "induced" malignant tumors in some lab mice and rats. "The transponders were the cause of the tumors," said Keith Johnson, a retired toxicologic pathologist, explaining in a phone interview the findings of a 1996 study he led at the Dow Chemical Co. in Midland, Mich. Leading cancer specialists reviewed the research for The Associated Press and, while cautioning that animal test results do not necessarily apply to humans, said the findings troubled them. Some said they would not allow family members to receive implants, and all urged further research before the glass-encased transponders are widely implanted in people. To date, about 2,000 of the so-called radio frequency identification, or RFID, devices have been implanted in humans worldwide, according to VeriChip Corp. The company, which sees a target market of 45 million Americans for its medical monitoring chips, insists the devices are safe, as does its parent company, Applied Digital Solutions, of Delray Beach, Fla. "We stand by our implantable products which have been approved by the FDA and/or other U.S. regulatory authorities," Scott Silverman, VeriChip Corp. chairman and chief executive officer, said in a written response to AP questions. The company was "not aware of any studies that have resulted in malignant tumors in laboratory rats, mice and certainly not dogs or cats," but he added that millions of domestic pets have been implanted with microchips, without reports of significant problems. "In fact, for more than 15 years we have used our encapsulated glass transponders with FDA approved anti-migration caps and received no complaints regarding malignant tumors caused by our product." The FDA also stands by its approval of the technology.

Offline Femacamper

  • Member
  • *****
  • Posts: 10,398
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #17 on: September 03, 2010, 12:56:16 am »
The chips in dogs are causing cancers in those spots...

Shut up and take your poison, slave!   ;)

Offline phasma

  • Member
  • *****
  • Posts: 7,197
  • Have a H.A.A.R.P.Y DAY !
Re: RFID Nightmare Video-- Airport Employees To Chipped
« Reply #18 on: September 05, 2010, 01:37:33 pm »
Ok - this is some scary assed stuff!

Most important info we need is

1) How to ID these things in items / ?ourselves without buying a massively expensive machine
2) How to remove one without damaging the thing you bought or living tissue should we get jabbed with one at some point
Things are not what they appear to be: nor are they otherwise - Surangama Sutra