Radio Frequency Identification RFID



             


Saturday, December 29, 2007

RFID in Rochester

What is the current state of RFID deployment in Rochester?

In general, local companies describe a high degree of interest, but only a modest level of integration.

Why the discrepancy between what local companies want to do with RFID and what they are actually doing? I spoke with some of Rochester’s early adopters to put a local face on track-and-trace.

Leading folding carton manufacturer Diamond Packaging

(Henrietta, NY) is currently evaluating available technologies for in-line applications of RFID tags. “Without question, RFID is one of the hottest topics in packaging”, says Dennis Bacchetta, Marketing Manager at Diamond. “Companies are moving from ‘Does it make sense?’ to ‘How can we implement RFID?’ ”

Indeed, RFID seems to make sense to many of the markets Diamond serves. Interest in item-level RFID tagging has been driven primarily by the pharmaceutical, personal care and cosmetic industries, which are particularly vulnerable to theft and counterfeiting. RFID tags are virtually incorruptible and almost impossible to counterfeit. Other obvious benefits include impeccable accountability from the point of manufacture to the point of sale, and precise, real-time inventory control.

If a company decides that RFID makes sense for them, what are some of the implementation issues they may deal with? According to Bacchetta, “The primary challenge is ensuring compatibility with various vendors in the supply chain.”

RFID technology is so diverse in form and function that what might later be a strength is actually a limitation right now. Rick Howe, VP of Sales and Marketing at Hover-Davis, agrees. “RFID is evolving differently than a lot of people expected. There are dozens of different technologies. There are dozens of different markets, each with different needs.”

Howe is certainly in a position to make that assessment. Hover-Davis is a Rochester-based company that produces world class feeding systems for silicon wafers, including those used in RFID tags.

Although RFID applications currently represent less than 1% of Hover-Davis’s market, Howe sees significant growth potential once RFID integration is purified. “RFID is evolving in a step function like a lot of disruptive technologies do. There needs to be a lot more maturation of technologies before item-level tagging can happen.”

In order to advance business interests in balance with consumer concerns, EPCglobal developed and published their Guidelines on EPC for Consumer Products, designed “to allow EPC to realize its potential for consumers, retailers and suppliers, by addressing privacy concerns prompted by the current state of the technology while establishing principles for dealing with its evolution and implementation.”

Rochester’s own Wegmans Food Markets is well-known for demonstrating strong principles of community involvement. In addition to exploring internal applications for RFID, Wegmans continues to support the larger community by taking an active role in developing RFID standards.

Marianne Timmons is the director of Business to Business at Wegmans. “Wegmans is a member of EPCglobal and is exploring opportunities for a future implementation. Today Wegmans is focused on building a solid foundation for the future of EPC through their Data Synchronization efforts.”

Interroperability may be the primary challenge of wide-scale RFID deployment, but it certainly isn’t the only one. Bacchetta identified two others: “A secondary concern is cost implications and the ability to ensure ROI. Finally, considerable work needs to be done to assess and compare the various tag technologies currently available.”

Howe agrees that cost and technology diversity have caused people to redefine their understanding of RFID, and shift the benefit expectation from an item-level intervention to a middle-market tool, at least for now. “Many people thought that item-level tagging was going to become the utopia of the RFID industry. It’s actually going much more in the direction of middle-market segments—pets, airline and ship cargo—seeping into middle-volume markets. RFID is not going to go from infancy to soup cans overnight.”

Birds Eye Foods, the nation’s leader in frozen vegetables, is a Rochester-based company actively using RFID in their supply chain management. As local market experience continues to grow, we can expect to find more companies following suit.

Rochester is far from the brink of an RFID revolution, but everyone I spoke with for this article are optimistic about the future of RFID. “These are all challenges that are typical of any emerging technology”, Bacchetta remarked. “None are insurmountable, and I expect that all will be resolved within the next few years.”

Sally Bacchetta - Freelance Writer/Sales Trainer

Sally Bacchetta is an award-winning sales trainer and freelance writer. She has published articles on a variety of topics, including RFID, selling skills, motivation, and pharmaceutical topics.

Visit her RFID blog for an exploration of the ethical and social considerations of RFID. Or read her article Informed Consent: Ethical Considerations of RFID.

Labels: , , ,

Wednesday, December 26, 2007

RFID: A Closer View

Within the last few years RFID (Radio Frequency Identification) has steadily migrated from the inner circles of science and technology into the public consciousness. RFID is now well-integrated into the food you eat, the clothes you wear, the car you drive... even what’s in your medicine cabinet.

What is it? RFID refers to a network of microchip transponders, readers and system software that enables the mainstream exchange of more — and more specific — data than ever before.

Each RFID transponder, commonly called a tag, is embedded with an integrated circuit (IC) and an antenna. The IC is encrypted with a unique electronic product code (EPC) that is the equivalent of an electronic pedigree, differentiating the tagged item from any other in the world. When a tag passes within range of an RFID reader, proprietary information is transmitted through the antenna to the reader, which in turn feeds the data to a central computer for processing.

RFID technology was originally developed for the military during World War II, and since then it has expanded into the retail, medical, education, automotive, defense, fast food and travel industries. RFID has been described as “wireless bar coding”, but in fact, even basic RFID far surpasses bar coding capabilities.

A bar code-based tracking system is limited to gross classification and is labor intensive; items must be manually scanned one at a time. RFID systems are self-powered and require no human intervention. They can simultaneously scan multiple items and provide fingerprint-specific information about each.

For example, a bar code simply identifies an item as a can of vegetable soup. An RFID tag differentiates that specific can from every other can of vegetable soup and retains a complete history of its movement from point of manufacture to point of purchase.

The Difference is in the Details
To fully appreciate the potential of RFID, we need to more closely examine the specifics of the technology. RFID systems are most commonly differentiated by:

• Storage and retrieval capabilities – read only or

read/write
• Power source – passive or active
• Frequency – LF (low frequency), HF (high-frequency) or UHF (ultra-high frequency)

Storage and retrieval
Read only tags are limited to retrieval of stored data, such as product lot number or an item description. Read only systems can effectively streamline basic production and supply chain operations. They have been extensively tested in the retail environment, specifically for inventory management and anti-theft monitoring.

Read/write tags are designed with both read and write capabilities, which means that each time a reader retrieves an EPC from a tag, that retrieval becomes part of the EPC’s dynamic history. This constant imprinting provides real-time tracking of a tagged item at any point in its lifespan.

Current applications of read/write systems include EZ-Pass toll collection, airport luggage transfer, package delivery, wildlife management, child safety and hospital security.

Power Source
In a passive system the RFID reader generates an energy field that activates and powers the tag. A passive system is less powerful and somewhat less dependable than an active system; however, it costs less to operate and offers adequate functionality for many mainstream applications.

An active system features batteries embedded in the tags to power the transfer of data between tag and reader. Active systems are more sophisticated than passive systems, offering longer read ranges and additional features such as temperature sensing and longer operating life. Predictably, they are also more costly to operate.

Frequency
Radio waves behave differently at different frequencies, and LF, HF and UHF tags each offer unique benefits and limitations. LF tags are the slowest, at 125 KHz. Although they have a limited read range— twelve inches or less— LF tags are better able to penetrate some substances than higher-frequency tags. They use the least power and are the least expensive tags to use.

HF tags operate at 13.56 MHz. They can be read from as far as three feet and are less sensitive to environmental noise than LF tags. HF tag data transfer rates are slowed by metal and water. Tag prices range from $.20 to $.30 U.S.

UHF tags are the newest generation of RFID tags. They operate at 850-900 MHz and offer extended read ranges of up to 20 feet. UHF tags cost as little as $.10 per tag, but they require the most power to operate. Like HF tags, UHF data transfer is degraded by metal and water.

Once again, form follows function. RFID systems can be designed with any configuration of storage/retrieval capacity, power source and frequency, depending on the end-user’s performance requirements.

RFID in the Community
Wal-Mart was one of the first retail giants to recognize the potential benefits of RFID. Their early financial and empirical support has been fundamental to the evolution of RFID in the retail sector. In 1999 Wal-Mart partnered with the Auto-ID Center at the Massachusetts Institute of Technology (MIT) to refine the technology for commercial applications.

Laboratory and field-level pilot tests were successful, and in 2003 Wal-Mart issued a mandate requiring its top 100 suppliers to become RFID compliant by January 2005. Although they have since revised their compliance timeline, Wal-Mart continues to champion RFID as the next generation system of supply chain and inventory management.

The list of commercial interests who have followed suit and adopted RFID track and trace technology includes: Benetton, Coca Cola, CVS, Federal Express, Gap, The Gillette Company, Home Depot, Kohl’s, Marks and Spencer (UK), McDonald’s, Metro (Germany), Mobil, Phillip Morris, Procter & Gamble, Target and Tesco (UK).

The retail sector is not the only one to recognize the potential benefits of RFID. In October 2003 the U.S. Department of Defense announced their RFID Policy, requiring suppliers to implement passive pallet-level or item-level tagging systems by January 2005.

Although RFID is fully operational in some sectors of the DOD, not all of its suppliers were able to meet the original compliance deadline. According to Alan Estevez, Deputy Undersecretary of Defense for Supply Chain Integration, the DOD implementation timeline has been revised to 2007.

In February 2004 the U.S. Food and Drug Administration’s Counterfeit Drug Task Force released its report “Combating Counterfeit Drugs”. In the report FDA Commissioner Mark McClellan recommended full-scale implementation of RFID technology by 2006. Updates on the FDA initiative can be found at www.fda.gov/fdac/features/2005/205_rfid.html.

RFID is also on deck with the Department of Homeland Security. The U.S. State Department recently published an Electronic Passports proposal, and according to Jim Harper of Privacilla.org, "The State Department intends to start issuing RFID-chipped passports, with unencrypted personal information on the chips, later this year."

The U.S. Federal Aviation Administration (FAA) is moving forward with its plans to incorporate RFID into the monitoring of aircraft traffic and safety.

Looking Ahead
Worldwide spending on RFID is expected to top $3 billion by 2008, almost triple the market of 2003. The widespread adoption of RFID in diverse industries has made one thing abundantly clear. Frequency standards must be established to facilitate the full potential of RFID implementation.

EPCGlobal, an international consortium of RFID technology manufacturers and suppliers, has established EPC protocols which they intend to submit to ISO for acceptance as international standards.

Supporters embrace RFID’s positive impact on the business bottom line, including reduced labor costs, increased supply chain accountability and improved product availability to the customer. Some privacy advocates and consumer groups have raised concerns about potential abuses of RFID and erosion of personal security.

Like the Internet, RFID enables significant advances to our business and personal lives. And like the Internet, it can be misdirected with negative consequences. As with any technology, it is incumbent upon each one of us to become educated and remain involved in the implementation of RFID in our communities.

Sally Bacchetta - Freelance Writer/Sales Trainer

Sally Bacchetta is an award-winning sales trainer and freelance writer. She has published articles on a variety of topics, including RFID, selling skills, motivation, and pharmaceutical topics.

Visit her RFID blog for an exploration of the ethical and social considerations of RFID. Or read her feature article Informed Consent: Ethical Considerations of RFID.

Labels: , ,

Sunday, December 23, 2007

RFID Sensors to Protect Water Supplies

Recently the US Military has developed a special set of sensors for water supplies for troops. Any time a base camp is set up it is important to monitor the water supplies and test them. You cannot simply test them when you arrive you need constant monitoring so that insurgents or enemies do not pollute the water or put poison in it. The three most common pathogens of water supplies are; Vibrio Cholerae, e. Coli and Giardia intestinalis and believe me you don’t want any in your drinking water.

Two companies; Phase IV Engineering and Sporian Microsystems both in Boulder Colorado have developed a bio-sensor system which is RFID based. The device, which floats is connected to a Radio Frequency antenna and it is attached to a sensor housing which is submerged which is also connected to an anchor line. These water sensors can detect pollutants up to 1 part per million.

I propose these be used in the United States to protect our rivers and lakes, which contain drinking water. It is also important to have them in our wetlands and areas such as the Bayous in Louisiana and the everglades in Florida. Now then let us look at the efforts of the WHO, UN and World Bank; can we put these in third world nations to prevent waterborne diseases which kill millions of humans annually? If we can get the costs down significantly thru mass buying and economies of scale we are well on our way to eliminating the horrible issues that expanding populations in the third world face from polluted water and waterborne pathogens. As we see more severe and severe droughts in the world we will need to address these issues. We know have technology ready to be transferred thanks to our military expenditures thru DARPA.

We must continue to fund such research and boost such budgets of DARPA so that all of mankind can benefit in the offshoot transfer technologies. Think on this, something must be done.

"Lance Winslow" - Online Think Tank forum board. If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/. Lance is a guest writer for Our Spokane Magazine in Spokane, Washington

Labels: , , , , , , , ,

Thursday, December 20, 2007

Integrating RFID Into Your Packaging

Market forces such as the RFID mandates from Target, Wal-Mart, the Food and Drug Administration (FDA), and the U.S. Department of Defense (DOD) have many manufacturers and suppliers focused on RFID simply as a compliance tool, overlooking the significant additional benefits of automatic identification technology.

In fact, by design, RFID enables superior supply chain efficiency and inventory management, resulting in increased productivity and accountability, decreased shrinkage, and a more robust bottom line.

A packaging supplier who is knowledgeable about evolving RFID technology and applications is a valuable resource to help you maximize ROI with your RFID integration.

RFID systems are completely customizable with infinite combinations of hardware and software. Each system is comprised of a transponder, a reader and software. (Click here to read RFID: A Smart Tag Primer for a complete explanation of RFID technology.) In this article we compare several forms of the RFID transponder and discuss possible applications of each.

RFID transponders are available in a variety of mediums, including:

 

  • Smart tags
  • Chipless tags
  • Smart labels
  • Conductive ink
  • Traceless taggants

     

    A smart tag is a microchip RFID transponder, which includes an integrated circuit (IC) and an antenna, encased in a protective coating. Smart tags most commonly contain a silicon-based IC and a copper coil antenna, although demand for less expensive tags has spurred the development of organic alternatives and chipless tags.

    Smart tags can be applied to pallets, cases or item-level units at any point in the supply chain, or integrated into the product packaging at the point of production. They are readable through most materials (except liquid and metal) and many smart tag systems include anti-collision software, to enable multiple tags to be read simultaneously.

    A basic smart tag offers a 96-bit EPC, which provides more than enough data storage capacity to track-and-trace items from point of manufacture to point of sale. Gen 2 tags offer a 256-bit EPC code, appropriate for specialized applications that require extensive data storage, such as the prescription drug pedigree.

    Smart tags can be applied either externally to product packaging or imbedded within the package or case. They are unobtrusive and do not interfere with graphic design elements, making them an easy addition to most consumer goods packaging.

    Smart tags can also be implanted in key chain fobs or rigid plastic cards. Automobile keyless entry and Mobil Speed Pass are two well-known examples.

    A chipless tag is an RFID tag that transmits data via either a conductive polymer or a reflective material instead of an IC microchip. Conductive polymer tags operate the same way as RFID smart tags do, differing only in component material.

    Reflective tags return a radio wave image to a computer that compares it with the identifying image on file for that item. A positive match means the item is correctly identified. Tags with RF reflecting fibers can be woven into paper or fabric for specialized applications.

    Although chipless tags typically cost less than silicon-based tags, their use in supply chain management is limited by their inability to read multiple tags at one time.

    A smart label is simply a label with an RFID tag integrated into it. An RFID microchip is sandwiched between a paper substrate and an adhesive, resulting in an RFID transponder that can be printed and applied like a traditional label.

    Smart labels are frequently used for “slap and ship”, which is the term for affixing an RFID label to a case or pallet just before it is shipped from the supplier to the retailer. Because the label is applied externally (to the case or pallet) as the final step before shipping, benefits of “slap and ship” have generally been limited to compliance with retailer requirements.

    However, if you think of a smart label as a flexible, printable RFID device, it is easy to imagine creative ways to incorporate it into individually packaged products.

    Conductive ink, also called RFID ink, is considered by many to be the most exciting recent development in the printing industry. Precisia and Parelec are two of the companies that have developed conductive metal-based inks.

    So far, conductive inks have been limited to printing RFID antennas directly onto labels and packaging through conventional printing methods. Research is ongoing to devise a method of printing the IC with RFID ink.

    Use of conductive ink significantly lowers the cost of RFID tagging, and offers smart tag security with exceptional application flexibility.

    The newest form of RFID tag is Creo’s Traceless® taggant. Traceless® is a powder that is mixed with ink or other fluid and applied to product packaging during manufacturing. Suspending the powder particles in fluid allows them to form a random pattern known as the “taggant image signature”. A computer records/retains this signature as the item’s unique identifier, like the EPC of traditional RFID.

    When the item passes by a Traceless® reader, the reader first confirms the presence of the taggant powder (the pass/fail portion of the security test), and then matches the “taggant image signature” with the one on file for that item.

    What really distinguishes Traceless® is that it is undetectable, making it virtually impossible to counterfeit or tamper with. Using proprietary methods, Creo mixes a ratio of taggant in solution that is too small to be perceived visually or chemically, and is detectable only by Traceless® readers.

    From inventory management to anti-theft control to pharmaceutical pedigrees, RFID technology is revolutionizing the packaging industry. Awareness and education are the keys to maximizing your ROI with RFID.

    Dennis Bacchetta is the Marketing Manager at Diamond Packaging, a leading folding carton and contract packaging supplier. He frequently writes on a variety of topics, including industry news and emerging technologies.

    You may contact him at dbacchetta@diamondpkg.com or visit the Diamond Packaging website

  • Labels: , , , , ,

    Tuesday, December 18, 2007

    RFID for Beginners

    RFID technology is used frequently today and has been around since the 1920s, but not many people know about, or understand it. RFID stands for Radio Frequency Identification and is used to store and retrieve information. This information is stored and retrieved using RFID tags or transponders. RFID tags are small and can be incorporated into many products. The tags have antennas that allow them to receive and respond to radio-frequency queries from an RFID transceiver.

    Two Types of RFID Tags

    There are two types of RFID tags; active tags, and passive tags. Passive tags do not have their own power supply, but rather receive their power from a tiny electrical current present in the antenna that is induced by an incoming radio frequency scan. Because of the small power present in the system, passive RFID tags are used only in short distances (such as an ID card).

    Active RFID tags have a power source and therefore are much stronger and can be used over larger distances and are therefore more highly effective. Active RFID tags also have the potential to store more information than their passive counterparts. Some active RFID tags have a battery life of up to ten years.

    The System of RFID

    RFID works off of a system that relies on tags, tag readers, tag programming stations, sorting equipment, circulation readers, and tag inventory wands. RFID is generally used in security, because security gates are programmed to read the RFID tags and then either open or close accordingly. The system helps the information be easily transmitted via an RFID device. Systems have evolved over the years along with RFID chips. The hope is that RFID will one day be available to everyone (meaning consumers) because it will be more efficient and cost effective to implement RFID processes.

    Where is RFID Used?

    RFID can be found almost everywhere. RFID can be found in bookstores and CD stores. The little alarm that sounds if a CD has not been scanned is made possible by an RFID chip. RFID chips are found on animal tags, on books in libraries, in car alarms and car lock systems. RFID can also be used to detect motion. This could be very useful in the coming years in terms of prisons. In 2004 the Ohio Department of Rehabilitation and Correction (ODRH) approved a $415,000 contract to test RFID technology in prisons. The idea is that the prisoners will ware wristbands that will watch their movement. If there is any movement, which is out of the ordinary, security will be alerted. This technology will be employed in many states in the coming years.

    Conclusion

    RFID technology seems to have endless possibilities. Some critics of RFID technology say that it violates the privacy of citizens. This is based on the fact that RFID can be used to track whereabouts of people and obtain personal information. Putting all of this power into a little chip makes it undetectable. However, RFID can also possibly be used in driver’s licenses for faster police scanners, and as a way to monitor hospital patients. With every potentially harmful application of RFID, there are several wonderful applications. It will be interesting to see all of the wonderful applications of RFID in the future.

    Amie Kandowski is very interested in RFID Technology and loves writing about RFID

    Labels: , , , , , , , , ,

    Saturday, December 15, 2007

    RFID: AT90RF135602- Smallest RFID Reader

    The AT90RF135602 definitely needs a nickname. Even in 8-point type it's too big a title for the world's smallest RFID reader!

    AT90RF135602 (see what I mean?) is the latest RFID collaboration of California-based Atmel and UK-based Innovision Research & Technology. This single chip RFID reader is a mere 12mm by 12mm by 2mm. (For those of you who like to travel ultra-light, check out the scaled down 6mm by 8mm by 1.5mm version).

    The AT90RF135602 reads and writes to 13.56 MHz RFID tags and smart labels, is optimised for a 2.8V battery operation, and is compliant to ISO/IEC 14443-A parts 2 & 3, making it especially suited for small, battery-powered handheld devices.

    I can see how this smaller-than-dime-sized RFID reader may be helpful for NAVI (Navigation Assistance for the Visually Impaired) and other handheld applications. Smaller readers make handheld devices less obtrusive and more comfortable to carry. Good news for those using NAVI or taking self-guided museum or walking tours.

    I can see how the AT90RF135602, priced at a relatively low $3 per unit (in quantities of 10,000) may be attractive to RFID managers trying to achieve maximum efficiency at minimum expense. It's inexpensive to operate, field programmable and upgradeable, so it's an investment that will grow with your operation.

    I also see that as RFID readers become smaller they become more difficult to see. Easier to forget. Or never become aware of.

    RFID tags continue to shrink, and in some cases have disappeared altogether, replaced by smart labels and smart inks. Too many consumers aren't even aware of RFID tags yet, and it's becoming more and more difficult to see them.

    Technology naturally trends toward more power in a smaller footprint. That's one of the ways we measure progress.

    As we trend toward ever-more progress, let us also trend toward ever-more citizen awareness. Let's make sure that we can look back on the AT90RF135602 as a really cool RFID reader that advanced our culture and improved the quality of our lives. And had a great nickname.

    Sally Bacchetta - Freelance Writer is an award-winning freelance writer and sales trainer. She has published articles on a variety of topics, including RFID, selling skills, motivation, and pharmaceutical sales.

    Visit her RFID blog for an exploration of the ethical and social considerations of RFID.

    Labels: , , , , , , , ,

    Thursday, December 13, 2007

    RFID: Electronic Pharmaceutical Pedigree

    A growing number of U.S. states are formalizing electronic pedigree requirements in order to comply with the FDA's anti-counterfeiting initiatives.

    A new two-phase RFID authentication platform introduced by Texas Instruments (TI) and VeriSign should make it easier for pharmaceutical manufacturers, suppliers, distributors and pharmacies to meet the FDA drug pedigree requirements. It may also make it easier for consumers to accept RFID technology in their prescription packaging.

    Mikael Ahlund, director of RFID healthcare for TI, says that the platform is unique in providing two layers of protection against counterfeiting. The model enhances system security by digitally certifying the authenticity of 13.56 MHz RFID tags via a cryptographic Public Key Infrastructure (PKI) available through VeriSign. "The beauty of this approach is that because the elements for the private key are preprogrammed into the tag and the reader is preprogrammed for the public key, the authentication is actually done off-network," says Ahlund.

    "We're using multiple layers of protection," says Graham Gillen, senior product manager for VeriSign. "Ultimately, it's about making the tag, and hence the product, hard to fake or reproduce."

    The platform is non-proprietary and can be implemented by any RFID system and PKI provider. That can save drug manufacturers and suppliers the considerable infrastructure costs associated with deploying most RFID systems. The additional security may relieve some consumers' fears that their personal and private information may be intercepted by electronic hackers.

    The idea of using RFID in the prescription drug pipeline has had consumers and pharmaceutical manufacturers/suppliers hotly at odds. The TI/Verisign model suggests that when used with care, RFID may indeed be protective without being invasive.

    Sally Bacchetta is an award-winning freelance writer and sales trainer. She has published articles on a variety of topics, including RFID, selling skills, motivation, and pharmaceutical sales.

    Visit her RFID blog for an exploration of the ethical and social considerations of RFID.

    Labels: , , , , , , , , ,

    Friday, December 7, 2007

    RFID: NAVI (Navigation Aid for the Visually Impaired)

    Thanks to an engineering professor and a group of students at the University of Rochester, Rochester, New York, RFID may play a significant role in increasing independence for people who are visually impaired or blind.

    Jack Mottley, Ph.D., Electrical and Computer Engineering, supervised a student research project to develop NAVI (Navigation Aid for the Visually Impaired). The team successfully designed an RFID prototype that makes it easier for blind and visually impaired people to navigate the corridors and tunnels of the U of R buildings and campus.

    Most commercial applications of RFID utilize a fixed reader and mobile, item-level tags or transponders. Mottley's team has reversed positions for their system.

    NAVI consists of multiple fixed-position RFID transponders (tags) located throughout the testing hallway, and a hand-held RFID reader (transceiver), which emits low-frequency radio signals. When a reader passes near a transponder, the transponder detects the radio signal and sends back a unique, pre-defined electronic code. Each code activates a different site-specific audio recording, used to orient the NAVI user.

    For example, as a NAVI user proceeds through a campus building, periodically passing transponders along the way, they will hear recordings that say, "Elevator is located 20 feet straight ahead", or "Proceed straight ahead ten feet, turn right, stairway directly ahead."

    The NAVI system gives blind and visually impaired people the freedom to navigate the campus-- including unfamiliar buildings-- unescorted. That's quite an impact on quality of life!

    RFID technology holds considerably more promise than current applications represent. Improvements in read distance and cost will be key to accelerating the adoption of NAVI-type systems on other campuses, museums, hospitals, and other public buildings.

    NAVI is an impressive example of the power of RFID to benefit our lives. It is free from the privacy concerns related to commercial applications of RFID. It does not raise any issues of government surveillance, HMO interference or consumer monitoring. It is simply a good thing. Hopefully, it is the first of many.

    Sally Bacchetta - Freelance Writer/Sales Trainer

    Sally Bacchetta is an award-winning freelance writer and sales trainer. She has published articles on a variety of topics, including RFID, selling skills, motivation, and pharmaceutical sales.

    You can contact her at sb14580@yahoo.com and read her latest articles on her website.

    Labels: , , , , , , ,

    Wednesday, December 5, 2007

    RFID: Blink!

     

    JP Morgan Chase & Co. will begin issuing contactless "blink" cards to millions of MasterCard and Visa credit cardholders next month.

    A "blink" card looks like a regular credit card, but is embedded with an RFID chip that allows the bearer to wave the card at an RFID-enabled terminal rather than swipe it or hand it to a cashier.

    If you already wave cards at toll collection booths and gas station pumps, the "blink" card may be an easy transition for you. I envy you that. I have yet to find anything about RFID that is an easy transition for me.

    I'm actually less concerned about the security of "blink" cards than I am about many other RFID applications. The selected interface protocol supports a read range of only a few inches, so any would-be identity pirate would have to be stationed between my hand and the reader in order to steal my information. I'm confident that even if I'm temporarily overwhelmed by the joy of saving ten seconds during checkout, I would notice them there.

    Chase's initial plan is to link "blink" cards only to credit card accounts, not debit or bank cards. I don't know if this decision is motivated by consumer interest or Chase's self-interest. Either way, it provides a layer of personal security. If a crafty digital thief does manage to slip in when I'm blinking, they will be plundering my Chase credit card account, not my personal bank account.

    The June fleet of "blink" cards is slated for Chase account members in two undisclosed cities. Chase is keeping the undisclosed target cities undisclosed for undisclosed reasons.

    I can't help but note that Merriam-Webster defines "blink" as:

    1 to look with half-shut eyes
    2 to shine dimly or intermittently
    3 to look with too little concern

    Sally Bacchetta - Freelance Writer/Sales Trainer

    Sally Bacchetta is an award-winning freelance writer and sales trainer. She has published articles on a variety of topics, including RFID, selling skills, motivation, and pharmaceutical sales.

    You can contact her at sb14580@yahoo.com and read her latest articles on her website.

    Labels: , , , , , , , , ,

    Use of RFID Technology in Libraries: An Automated Metheod of Circulation, Security, Tracking and...

     
    Introduction

    RFID is an acronym for Radio Frequency Identification. It is a technology that allows an item, for example a library book to be tracked and communicated with by radio waves. This technology is similar in concept to a Cell Phone.

    Radio frequency identification, or RFID, is a broad term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna (the chip and the antenna together are called an RFID transponder or an RFID tag). The antenna enables the chip to transmit the identification information to a reader. The reader converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can make use of it.

    2.Concept of RFID for Libraries

    RFID (Radio Frequency Identification) is the latest technology to be used in library circulation operations and theft detection systems. RFID-based systems move beyond security to become tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster charge and discharge, inventorying, and materials handling.

    This technology helps librarians reduce valuable staff time spent scanning barcodes while checking out and checking in borrowed items.

    RFID is a combination of radio -frequency-based technology and microchip technology. The information contained on microchips in the tags affixed to library materials is read using radio frequency technology regardless of item orientation or alignment (i.e., the technology does not require line-of-sight or a fixed plane to read tags as do traditional theft detection systems). The RFID gates at the library exit(s) can be as wide as four feet because the tags can be read at a distance of up to two feet by each of two parallel exit gate sensors.

    2.1 Components of an RFID System
    A comprehensive RFID system has four components:

    (1) RFID tags that are electronically programmed with unique information;

    (2) Readers or sensors to query the tags;

    (3) Antenna; and

    (4) Server on which the software that interfaces with the integrated library software is loaded.

    2.1.1Tags

    The heart of the system is the RFID tag, which can be fixed inside a book's back cover or directly onto CDs and videos. This tag is equipped with a programmeable chip and an antenna. Each paper-thin tag contains an engraved antenna and a microchip with a capacity of at least 64 bits. There are three types of tags: "read only", "WORM," and "read/write.

    "Tags are "read only" if the identification is encoded at the time of manufacture and not rewritable.

    "WORM" (Write-Once-Read-Many)" tags are programmed by the using organization, but without the ability of rewriting them later.

    "Read/write tags," which are chosen by most libraries, can have information changed or added. In RFID library, it is common to have part of the read/write tag secured against rewriting, e.g., the identification number of the item.

    2.1.2 Readers
    The reader powers an antenna to generate an RF field. When a tag passes through the field, the information stored on the chip in the tag is interpreted by the reader and sent to the server, which, in turn, communicates with the Integrated library system when the RFID system is interfaced with it.

    RFID exit gate sensors (readers) at exits are basically two types. One type reads the information on the tag(s) going by and communicates that information to a server. The server, after checking against the circulation database, turn on an alarm if the material is not properly checked-out. Another type relies on a "theft" byte in the tag that is turned on or off to show that the item has been charged or not. It is then not necessary to communicate with the circulation database.

    Readers in RFID library are used in the following ways:

    Conversion station-where library data is written to the tag;

    Staff workstation at circulation- used to charge and discharge library materials;

    Self check-out station-used to check-out library materials without staff assistance;

    Self check-in station-used to check in books etc. without staff assistance;

    Exit sensors- to verify that all the books etc. leaving the library have been checked-out;

    Book-drop reader- used to automatically discharge library materials and reactivate security.

    Sorter and conveyor-automated system for returning books etc. to proper area of library;

    Hand-held reader-used for inventorying and verifying that books etc. are shelved correctly.

    2.1.3 Antenna
    The antenna produces radio signals to activate the tag and read and write data to it. Antennas are the channels between the tag and the reader, which controls the system’s data acquisitons and communication. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continually. Antennas can be built into a doorframe to receive tag data from person’s things passing through the door.

    2.1.4 Server
    The server is the heart of some comprehensive RFID systems. It is the communications gateway among the various components. It receives the information from one or more of the readers and exchanges information with the circulation database. Its software includes the SIP/SIP2 (Session Initiation Protocol), APIs (Applications Programming Interface) NCIP or SLNP necessary to interface it with the integrated library software. The server typically includes a transaction database so that reports can be produced.

    2.2 Optional Components

    Optional RFID system includes the following three components:

    1. RFID Label Printer

    2. Handheld Reader

    3. External Book Return

    1. RFID label Printer

    An RFID-printer is used to print the labels with an individual barcode, library logo etc. When the print is applied, it simultaneously programmed the data in to the chip. After this process, the RFID label is taken from the printer and self-adhered to the book. It also checks each RFID label for function.

    2. Handheld Reader/Inventory Wand

    The portable Handheld Reader or inventory wand can be moved along the items on the shelves without touching them. The data goes to a storage unit, which can be downloaded at a server later on, or it can go to a unit, which will transmit it to the server using wireless technology. The inventory wand will cover three requirements:

    · Screen the complete book collection on the shelves for inventory control.

    · Search for books, which are mis-shelved.

    · Search for individual book requested.

    Other applications can be written for the inventory wand, since the system utilizes a personal data terminal (PDT).

    3. External Book Return

    Libraries can offer a distinct service, which is very useful for users like ability to return books during off hours. External book return is a machine with a slot with a chip RFID reader integrated into the wall. It works the same way as the Self Check –Out Station. The user identifies himself/herself (if required by the library), and then puts the book(s) in to the slot. Upon completing his/her return, the user will receive a receipt showing how many and which books were returned. Since they have already been checked-in, they can go directly back onto the shelves. These units can also be used with sorter and conveyor systems.

    3. Key Features of RFID in library

    The reliability of the system, its ease of operation, and the flexibility of tagging all kinds of media easily, is important criteria in choosing an RFID system. The main aim for today's libraries to adopt RFID is the need to increase efficiency and reduce cost. Automation and self-service can help libraries of all sizes toward achieving these aims, and RFID has the added advantage that it can also provide security for the range of different media on offer in libraries. The technology can also improve circulation and inventory control, which helps to optimise the allocation of labour and financial resources. This means that libraries can relieve their professional employees of routine work and operational tasks.

    All of the tags used in RFID technology for libraries are "passive." The power to read the tags comes from the reader or exit sensor (reader), rather than from a battery within the tag.

    A few libraries use "smart" card, which is an RFID card with additional encryption, is an alternative to merely adding an RFID tag on staff and user identification cards. Not only does that identify users for issue and return of library materials, but also for access to restricted areas or services. This would make it possible to make it into a "debit" card, with value added upon pre-payment to the library and value subtracted when a user used a photocopier, printer, or other fee-based device, or wished to pay fines or fees.

    3.1 Speedy and Easy User self-charging/discharging

    The use of RFID reduces the amount of time required to perform circulation operations. This technology helps librarians eliminate valuable staff time spent scanning barcodes while checking out and checking in borrowed items. For the users, RFID speeds up the borrowing and returns procedures. The Library professionals, instead of scanning bar codes all day long in front of a queue of users, are released for more productive and interesting duties. Staff is relieved further when readers are installed in book drops.

    3.2 Reliability

    The readers are highly reliable. Several vendors of RFID library systems claim an almost 100 percent detection rate using RFID tags.

    Some RFID systems have an interface between the exit sensors and the circulation software to identify the items moving out of the library. Were a library user to run out of the library and not be catched, the library would at least know what had been stolen. If the user card also has an RFID tag, the library will also be able to determine who removed the items without properly charging them.

    Other RFID systems encode the circulation status on the RFID tag. This is done by designating a bit as the "theft" bit and turning it off at time of charge and on at time of discharge. If the material that has not been properly charged is taken past the exit gate sensors, an immediate alarm is triggered. Another option is to use both the "theft" bit and the online interface to an integrated library system, the first to signal an immediate alarm and the second to identify what has been taken out.

    3.3 High-speed inventorying

    A unique advantage of RFID systems is their ability to scan books on the shelves without tipping them out or removing them. A hand-held inventory reader can be moved rapidly across a shelf of books to read all of the unique identification information. Using wireless technology, it is possible not only to update the inventory, but also to identify items, which are out of proper order.

    3.4 Automated materials handling

    Another application of RFID technology is automated materials handling. This includes conveyor and sorting systems that can move library materials and sort them by category into separate bins or onto separate carts. This significantly reduces the amount of staff time required to ready materials for re-shelving.

    3.5 Tag life

    RFID tags last longer than barcodes because, the technology does not require line-of-sight. Most RFID vendors claim a minimum of 100,000 transactions before a tag may need to be replaced.

    4. Demerits of RFID Systems

    4.1 High cost

    The major disadvantage of RFID technology is its cost. While the readers and gate sensors used to read the information typically cost around $1,500 to $2,500 each; and the tags cost $.40 to $.75 each.

    4.2 Accessibility to compromise

    It is possible to compromise an RFID system by wrapping the protected material in two to three layers of ordinary household foil to block the radio signal. It is also possible to compromise an RFID system by placing two items against one another so that one tag overlays another. That may cancel out the signals. This requires knowledge of the technology and careful alignment.

    4.3 Removal of exposed tags

    RFID tags are typically affixed to the inside back cover and are exposed for removal. This means that there would be problems when users become more familiar with the role of the tags. In Indian libraries this is a major challenge to keep the tags intact.

    4.4 Exit gate sensor (Reader) problems

    While the short-range readers used for circulation charge and discharge and inventorying appear to read the tags 100 percent of the time, the performance of the exit gate sensors is more problematic. They always don’t read tags at up to twice the distance of the other readers. There is no library that has done a before and after inventory to determine the loss rate when RFID is used for security.

    4.5 Invasion of User Privacy

    Privacy concerns associated with item-level tagging is another significant barrier to library use of RFID tags. The problem with today’s library RFID system is that the tags contain static information that can be relatively easily read by unauthorized tag readers. This allows for privacy issues described as “tracking” and “hotlisting”.

    Tracking refers to the ability to track the movements of a book (or person carrying the book) by “correlating multiple observations of the book’s bar code” or RFID tag. Hotlisting refers to the process of building a database of books and their associated tag numbers (the hotlist) and then using an unauthorized reader to determine who is checking out items in the hotlist.

    4.6 Reader collision

    One problem meet with RFID is the signal from one reader can interfere with the signal from another where coverage overlaps. This is called reader collision. One way to avoid the problem is to use a technique called time division multiple access, or TDMA. In simple terms, the readers are instructed to read at different times, rather than both trying to read at the same time. This ensures that they don't interfere with each other. But it means any RFID tag in an area where two readers overlap will be read twice.

    4.7 Tag collision

    Another problem readers have is reading a lot of chips in the same field. Tag clash occurs when more than one chip reflects back a signal at the same time, confusing the reader. Different vendors have developed different systems for having the tags respond to the reader one at a time. Since they can be read in milliseconds, it appears that all the tags are being read simultaneously.

    4.8 Lack of Standard

    The tags used by library RFID vendors are not compatible even when they conform to the same standards because the current standards only seek electronic compatibility between tags and readers. The pattern of encoding information and the software that processes the information differs from vendor to vendor, therefore, a change from one vendor’s system to the other would require retagging all items or modifying the software.

    5. Best Practices guidelines for Libraries

    As libraries are implementing RFID systems, it is important to develop best practices guidelines to utilize the technology in best way and to keep the privacy concern away. The following may be the best practices guidelines for library RFID use:

    · The Library should be open about its use of RFID technology including providing publicly available documents stating the rational for using RFID, objectives of its use and associated policies and procedure and who to contact with questions.

    · Signs should be pasted at all facilities using RFID. The signs should inform the public that RFID technology is in use, the types of usage and a statement of protection of privacy and how this technology differs from other information collection methods.

    · Only authorized personnel should have access to the RFID system.

    · No personal information should be stored on the RFID tag.

    · Information describing the tagged item should be encrypted on the tag even if the data is limited to a serial number

    · No static information should be contained on the tag (bar code, manufacturer number) that can be read by unauthorised readers.

    · All communication between tag and reader should be encrypted via a unique encryption key.

    · All RFID readers in the library should be clearly marked.

    · ISO 18000 mode-2 tags should be used rather than ISO 15693.

    6. Installations

    While there are over 500,000 RFID systems installed in warehouses and retail establishments worldwide, RFID systems are still relatively new in libraries. Fewer than 150 had been installed as of the 2004.

    Most installations are small, primarily in branch libraries. The University of Connecticut Library; University of Nevada/Las Vegas Library, the Vienna Public Library in Austria, the Catholic University of Leuven in Belgium, and the National University of Singapore Library are the only sites that appear to have tagged more than 500,000 items each. So far in India only two University libraries have Installed the RFID system. First among them is Jayakar Library of Pune University and second is Dhanvantri Library of Jammu University. The use of RFID throughout Indian libraries will take at least four to five years.

    7. Recent Developments

    Recent developments in hardware and software for RFID systems have increased the potential of this technology in library automation and security. 'Today, the one important result for libraries is the ability to use non-proprietary systems, now that the new generation of RFID-chips with standard ISO 15693 (to be integrated into ISO 18000-3) is available,' explains Dr Christian Kern, system development manager of Bibliotheca RFID Library Systems, a Swiss company specialising in such systems for libraries. 'With this technology, libraries do not have to depend on one single supplier for tags. As libraries make a long-term investment, which mainly consists of the quantity of tags needed, this is a very important requirement.'

    8. Vendors

    The products of six manufacturers of library RFID systems are available in India through their business associates: Bibliotheca, Checkpoint, ID Systems, 3M, X-ident technology GmbH represented by Infotek software and systems in India and TAGSYS— the last represented by Tech Logic, Vernon, Libsys in India and VTLS .

    There are several other companies that provide products that work with RFID, including user self-charging stations and materials handling equipment.

    Conclusion

    It is quite clear from the above discussion that an RFID system may be a comprehensive system that addresses both the security and materials tracking needs of a library. RFID in the library is not a threat if best practices guidelines followed religiously, that it speeds up book borrowing and inventories and frees staff to do more user-service tasks. The technology saves money too and quickly gives a return on investment.

    As far as privacy issue is concerned it is important to educate library staff and library users about the RFID technology used in libraries before implementing a program.

    It may be good for librarians to wait and watch the developments in RFID for some time before the cost of tags comes down to $.20 or less, the figure which librarians has determined is the key to their serious consideration for the use of technology.

    While library RFID systems have a great deal in common with one another, including the use of high frequency (13.56 MHz), passive, read-write tags. Lack of Standard and Compatibility of tags produced by different vendors is a major problem in implementation of RFID in Libraries. Current standards (ISO 15693) apply to container level tagging used in supply chain applications and do not address problems of tracking and hot listing. Next generation tags (ISO 18000) are designed for item level tagging. The newer tags are capable of resolving many of the privacy problems of today’s tags. However, no library RFID products are currently available using the new standard. Apart from that cost of the RFID Tags and equipments is also a major problem for libraries to implement the same in a developing country like India.

    References:

    Ayre, Lori Bowen, The Galecia Group (August 2004) Position paper: RFID and libraries. Retrived from http://www.galecia.com/weblog/mt/archives/cat_rfidandwireless.php

    Berkeley Public Library (n.d.) Berkeley Public Library: Best Practices for RFID technology. Retrieved from http://berkeleypubliclibrary.org/BESTPRAC.pdf.

    BIBLIOTHECA RFID Library Systems AG (2003) RFID Technology Overview Retrieved from http://www.bibliotheca-rfid.com

    Boss. R. W. (2003). RFID technology for libraries [Monograph]. Library Technology Reports. November-December 2003.

    Boss. R. W. PLA Tech Notes (May 14, 2004) RFID Technology for libraries. Retrieved from http://www.ala.org/ala/pla/plapubs/technotes/rfidtechnology.htm

    FAQ RFID Journal (OnlineVersion) Retrieved from http://www.rfidjournal.com/article/articleview/207

    Koppel, T. (March 2004). Standards in Libraries: What’s Ahead: a guide for Library Professional about the Library Standards of Today and the Future. The Library Corporation. Retrieved from http://www.tlcdelivers.com/tlc/pdf/standardswp.pdf.

    Molnar, D., Wagner, D. A. (June 2004). Privacy and security in library RFID: Issues, practices and architectures. Retrieved from http://www.cs.berkeley.edu~dmolnar/library.

    Sarma, E. S. Weis, S. A., Engels, D.W. (November 2002). White paper: RFID systems, security & privacy implications. Cambridge, MA: Massachusetts Institute of Technology, AUTO-ID Center.

    Author is presently working as Assistant Librarian, University of Jammu, Jammu-180006, India

    Syed Md. Shahid
    Assistant Librarian, University of Jammu, Jammu-180006
    smshahid20032yahoo.co.in

     

    Labels: , , , , , , , , , ,

    Monday, December 3, 2007

    Documenting the Undocumented with RFID Chips or Cards

    Here is an idea which came out of one of our recent thinking groups meetings regarding border security, which seems to be appropriate. First we seal off the borders and only allow crossing thru certain border check points. Robots patrol, if they see you they warn you to stop and go back in Spanish, then warn one more time. Then shoot non-lethal shot. If the perpetrator continues to the next zone, they are warned to go back twice and then if they continue they are shot dead. Running persons in reverse direction and back the country can continue without hassle as long as they keep moving out of the zones.

    Any person coming over the border into our country must go thru approved points of entry and must have an RFID enabled card or implanted Chip. Which has all their information on it, including name, dates of shots and last check up, job and regional location where they will be, basic humanly identifiers such as: Finger Prints, Facial Recognition, DNA sample, retina scan. Also encoded would be various other information as we see fit.

    If someone who is undocumented is caught without their card anywhere in the country, they are deported. If they commit a crime they are deported. Upon deportation a sample of DNA, retina scan and finger prints are taken and logged in. This person can never come back to the US and is barred from lifetime re-entry. Anyone caught with an RFID Chip, which is forged is to be biometrically identified and then sent back. Anyone caught with someone else's card is sent out of the county and card confiscated and barred from lifetime re-entry after they work off their fees they were suppose to pay in the first place as listed below.

    To get an RFID Card or chip, you must have shots against known diseases, no criminal record, a skill, and $500.00 on person if going to work. $100.00 on person if going to shop. You must also pay if you donot have shots $60.00 to get shots and $155.00 for the Card or $50.00 for the Chip which goes under the skin.

    Card is good for 2 years. A new card must be attained and another fee of $155.00 or $50.00 (implant version RFID) is paid, with updated information.

    These tags ping the satellite on Fri, Sat, Sun nights and on Wednesday, with random variations during the week days sometimes Mon, sometimes Thurs, sometimes Fri, sometimes Tuesdays.

    Once a person has a card they may come and go as they please provided they have $100.00 on person, ATM Card or credit card balance with them when entering. The reason being if you have no money, then you might have to do something illegal on the way to where you are going to work. If you are going to shop you will need funds or you cannot come to the country. The fees can be paid by someone else, such as a sponsor. If paid by someone else that person is guarantee their will be no criminal activity for 3 months (90 Days) if there is a fine of $10,000 goes to that person which must be paid before any Government Services are rendered to them. This includes, health care, education, social security, etc.

    Businesses can sponsor workers too, the company is then liable for the $10,000 catch and release across border fee, which must be paid. This way businesses will try to hire locals first, if not the cross border workforce will be considered second.

    There are 35% Illegal aliens in CA and AZ prisons. For every year one of these people is there, we could send six young men or women to a University for that same year. Crime has a rippling effect on our economy and economic development.

    This system satisfies the need for Mexicans shopping here and helps bring back the money flowing out of the country into Mexico for various things.

    If a person makes it without any major law violations for 4 consecutive terms of RFID Tag 2 year programs or (8-years). They can become a US Citizen.

    If they lose their job, they must replace it within 4 weeks and notify the system, join our military or surrender card and go back. Failure to do this means deportation. Deportation means lifetime exile from the greatest nation in the history of mankind.

    IF...? We are really serious about Homeland Security then we must do something about the borders, if we are simply using this for another reason to create fear, spend money or control power base, then there is no reason for a border at all, because it leaks like a garden hose on full blast during a drought. With an estimated 15.7 million illegal aliens in this country now, something must be done if we are serious, if not simply open up the borders and stop the charade. The cost of illegal immigration is higher than we think along with the out of country money flows going back into Mexico, it spells economic disaster, increased debt, government bankruptcy and collapse of social services.

    "Lance Winslow" - Online Think Tank forum board. If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/. Lance is a guest writer for Our Spokane Magazine in Spokane, Washington

    Labels: , , , , , ,

    Saturday, December 1, 2007

    Magazine in Spokane, Washington

    National Archives Needs to Embed RFID Tags in Ink

    Perhaps we should have printers with ink which has metallic properties which would simulate RFID Tags in pages scattered throughout the reports and papers of secret documents, then if one decides to do something unethical to steal the paper work then the report itself will trigger an alarm, even if one puts it in their socks or underwear, under a hat. As one leaves the building through a detector like at the bookstores, gotcha!!

    These technologies are being developed now, so we may as well put them to good use. It is fascinating that we even have these problems with those instilled with the citizen trust to serve us, yet not so unpredictable, this could answer the problem of secret information leakage in FBI, Pentagon, CIA, National Archives, even DOE, Los Alamos, Defense Contractors and may as well apply it to library, especially for the two most books stolen: "The Bible" and "The Joy of Sex". Yes this is true, and it shows how clearly divided we are a species between morals and desires, guilt and honor, power and force, flesh and abstinence.

    Certain books in libraries would be sprinkled with some type of odor smart dust, which would also prevent decay of the paper and set off an odor detector on the way out. There are mini odor detectors used now for nuclear material, explosives, bio-pathogens, anthrax and a multitude of other things, used for anti-terrorism, illegal immigration, drug trafficking, etc.

    The National Archives are a national treasure and should be guarded as such. We need to put this technology to work to keep integrity of our system, our government and our leadership.

    "Lance Winslow" - Online Think Tank forum board. If you have innovative thoughts and unique perspectives, come think with Lance; www.WorldThinkTank.net/. Lance is a guest writer for Our Spokane Magazine in Spokane, Washington

    Labels: , , , , , ,