Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Setting an RFID Paradigm

By Priyanka Gouthaman
October 4, 2006
Research and developments concerning radio frequency identification, as well as commercial developments, will make enterprises grab at the business advantages of RFID.


Not so suddenly, radio frequency identification (RFID) has taken on an increased security business and security role in enterprises in home security efforts.

Homeland security initiatives have traditionally had a significant impact on commercial applications looking to adopt similar technology platforms. Early adopters within the commercial corporate markets are basing their smart card applications on the Homeland Security Presidential Directive-12 (HSPD-12) and the Federal Information Processing Standard-201 (FIPS-201) to ensure interoperability. The U.S. government backed initiatives possess the advantage of inciting industry levels standards in light of their operational scale and scope.

CUSTOMIZING FRONTIERS

RFID is one of the technologies considered for authenticating government-issued travel documents in proof of concept programs such as the US VISIT initiative. US VISIT is a continuum of security measures employed to collect biometric and biographic information from visitors upon their arrival in and departure from U.S. air, sea and land border ports. The initiative is focused on testing the ability of the equipment to read information from RFID tags embedded in CBP forms such as I-94A.

The Western Hemisphere Travel initiative is another identity management program initiative by the United States federal government that is expected to employ RFID technology. The RFID embedded border crossing cards or laser visas are proposed to be used in lieu of the passport for travel or re-entry within the western hemisphere. However, the relatively high cost of such cards presents a significant challenge for immediate widespread deployment.

SUPPLY CHAIN DISRUPTIONS

Globalization and increasing trade volumes across national borders is a significant factor to be considered in national security initiatives. While there has been an intensified focus on homeland security issues, the emphasis has not permeated to address supply chain disruptions and cargo security. Highly competitive trade margins and legislative factors limiting the liability of carriers have impeded investments in cargo security thus far.

Government initiatives such as the Customs Trade Partnership Against Terrorism (C-TPAT), aimed at improving supply chain security, have ensured that almost 40 percent of all imports in 2005 were accounted by C-TPAT members. However, the legislation is yet to meet its initial expectations due to the absence of mandatory compliance requirements and guidance from agencies including the U.S. Customs and Border Protection, Transportation Security Administration and DHS. RFID holds definite promise to meet changing paradigms of supply chain management in terms of enhanced security and business efficiency.

E-PASSPORT INITIATIVE

The U.S State Department proposed the electronic passport initiative in 2005 wherein all U.S. passports issued after October 2006 would include embedded RFID tags. The passports are expected to possess a storage capacity of 64 kilobytes to enable future additions and biometric information. The data encoded are expected to be in compliance with specifications by the International Civil Aviation Organization to ensure interoperability of operations across geographies.

Privacy concerns have been a key challenge, especially with the e-passport initiative. There have been significant developments to ensure the security of data encoded within the tags through public key infrastructure and digital signatures. The security features incorporated, as a part of the e-passport initiative, is likely to address similar privacy concerns across different application and vertical markets.

FIRST RESPONDERS AND RFID

The National Institute of Standards and Technology has been researching the potential for RFID applications to enable effective navigation among firefighters and other first responders. The research envisions the use of mobile readers to detect RFID devices at fixed locations thereby indicating the position of the person carrying the reader. The RFID backed system prototype is expected to employ inertial sensors such as accelerometers and gyroscopes to facilitate navigating in hazardous conditions.

Security has been the fundamental driver for a majority of government backed initiatives since 2001, and the increasing interest in employing RFID for documents such as passports, national identification cards and visas is likely to enable a pervasive use of the technology. Increased standardization and inter-operability have been positive developments in response to the potential demand expected in homeland security markets.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Priyanka Gouthaman, with Frost & Sullivan, San Antonio, is a widely recognized expert in the automatic identification industry, with primary expertise in radio frequency identification.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • RFID: Technology that Disrupts

    See More
  • data loss prevention

    Move to higher ground before the data tsunami hits: A paradigm shift for managing federal data

    See More
  • Changing the Insurance/Arrests/Alarms Paradigm

    See More

Related Products

See More Products
  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing