Security Newswire

Can RFID Tags Compromise Consumer Privacy?

Two information security experts at Purdue University say putting special electronic inventory tracking tags on individual retail items could be a threat to customer privacy.
Several of the world's largest retailers have been using radio frequency identification (RFID) tags to track pallets of merchandise through its supply systems. Many retailers are examining the cost-saving efficiency measure of placing the RFID tags on individual items on the floor. Beginning this month one large retailer is attaching RFID tags to menswear. Privacy advocates say the tags can be easily used to track customer movement through a store and even monitor what consumer products are in a person's home.
A Purdue professor who advises the White House and Pentagon on national security issues related to cybercrime and abuse says a relatively inexpensive device can read some tags from up to hundreds of feet away. Eugene H. Spafford, director of the Center for Education and Research in Information Assurance and Security (CERIAS), says if the tags aren't removed or permanently disabled at the time of sale, they can potentially be read by someone in the store parking lot, from a passing car, or from the street in front of a customer's home. "Someone interested in what you are doing - to snoop, to market to you or to use that knowledge for gain - might be very interested in detecting what you buy without the risk of being noticed watching you at the store," he said.
Spafford says as use of the RFID technology is expanded, it will become increasingly easy for parties such as marketers, thieves, insurance companies, employers, bill collectors, litigants, ex-spouses, or government agencies to know your purchasing habits for such items as pharmaceuticals, birth control devices, reading materials, luxury items, alcohol, and unhealthy foods. "The goal of at least one influential retailer is to eventually manage all inventory with the tags," Spafford says.
Privacy researcher Lorraine Kisselburgh, an assistant professor of communication, says the RFID technology could give retailers the ability to track customers through space, creating new privacy risks to the individual and anyone else for whom the individual shops, such as children and spouses. Kisselburgh says that members of the millennial generation she has studied are surprised and concerned by this possible loss of their locational privacy. They describe the tracking scenario as "creepy" and "stalking."
"Research indicates consumers are willing to make certain tradeoffs of their privacy for benefits such as convenience and discounts," Kisselburgh said. "But individuals want to know when there is a potential that their privacy might be at risk, and they want to retain control of the choice to change that level of risk." Kisselburgh's research includes the social implications of emerging technologies, privacy, social networks. She says that even younger adults are not comfortable with the possibility of "always-on" tracking of their locational behavior and generally are willing to do this only when they know and decide who will be seeing the data about their behaviors.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.