[97405] in Discussion of MIT-community interests

home help back first fref pref prev next nref lref last post

See what-officials are saying you need to do to protect your-identity

daemon@ATHENA.MIT.EDU (IdentityFence)
Mon Apr 24 13:58:57 2017

Date: Mon, 24 Apr 2017 13:53:24 -0400
From: IdentityFence <identityfence@newprotectiononlineinfo.com>
To:   <mit-talk-mtg@charon.mit.edu>

------=_Part_190_1822564075.1493056397197
Content-Type: text/html; charset=us-ascii
Content-Transfer-Encoding: quoted-printable

<html>
 <head>=20
  <title>ID-Protection</title>=20
  <meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-885=
9-1" />=20
  <style type=3D"text/css">
#Eusu8w {
=09font-family: Georgia, "Times New Roman", Times, serif;=20
=09font-size: 15px;=20
}
#Eysjuwh72 {
=09font-family: Georgia, "Times New Roman", Times, serif;=20
=09font-size: 7.8px;=20
=09text-align: center;=20
}
#Bdjwu8s {
=09font-family: Georgia, "Times New Roman", Times, serif;=20
=09font-size: 22px;=20
=09font-weight: bold;=20
=09text-align: center;=20
}
#Duwks8h1j {
=09font-family: Georgia, "Times New Roman", Times, serif;=20
=09font-size: 17px;=20
=09text-align: center;=20
}
</style>=20
 </head>=20
 <body bgcolor=3D"#FFFFFF" leftmargin=3D"0" topmargin=3D"0" marginwidth=3D"=
0" marginheight=3D"0">=20
  <table id=3D"Table_01" width=3D"595" height=3D"585" border=3D"0" cellpadd=
ing=3D"0" cellspacing=3D"0">=20
   <tbody>
    <tr>=20
     <td id=3D"Bdjwu8s">RFID-Scanner Theft has become an issue for people a=
ll over the country. But now <span style=3D"font-style: italic">FINALLY</sp=
an> someone has invented something to fight-back!</td>=20
    </tr>=20
    <tr>=20
     <td>=20
      <center>
       <a href=3D"http://www.newprotectiononlineinfo.com/discoverers-attorney/13ew86Q3dCeUeaxguV_VKxw_gVsFMtKlihzguVzONWd40"><img src=3D"http://www.newprotectiononlineinfo.com/42bG7a_3eu0MeaJguV_VKxw_gVsFMtKlihzguVzONW4ee/vested-renovate" width=3D"378" height=
=3D"222" alt=3D"" /></a>
      </center></td>=20
    </tr>=20
    <tr>=20
     <td id=3D"Duwks8h1j"><p><br /> These new-devices, called &quot; digita=
l-pickpockets&quot; are using smartphones to scan people's wallets-and purs=
es without ANY actual-physical contact and getting immediate-access to pero=
nal bank-account information as well as creditcard numbers.</p> <p>So exact=
ly what can you do to prevent this?</p> <p>&quot; Identity Fence&quot; is a=
 company that come up with an RFID-scanner and they are currently giving aw=
ay FREE-samples to promote their launch!</p> <p><br /> <span style=3D"font-=
weight: bold"><a href=3D"http://www.newprotectiononlineinfo.com/discoverers-attorney/13ew86Q3dCeUeaxguV_VKxw_gVsFMtKlihzguVzONWd40">Get Your Identity-Fence RFID-Protect R=
ight Here</a></span></p></td>=20
    </tr>=20
    <tr>=20
     <td id=3D"Eusu8w"><p>&nbsp; </p> <p>&nbsp; </p> <p>&nbsp; </p> <p>&nbs=
p; </p> <p>&nbsp; </p> <p>&nbsp; </p> <p>&nbsp; </p> <p>&nbsp; </p> <p>&nbs=
p; </p> <p>&nbsp; </p> <p>&nbsp; </p> <p>&nbsp; </p> <p>&nbsp; </p> <p>&nbs=
p; </p> <p>&nbsp; </p> <p>If you want.to.end future-idads-you <a href=3D"=
http://www.newprotectiononlineinfo.com/c9b89rH3dSfieaAguV_VKxw_gVsFMtKlihzguVzONWbba/marketing-editorials">can.go.here</a>.<br /> #-2885 Sanford-Avenue S.W. No.4O44=
2.<br /> Grandville.<br /> Michigan - ZIP:#49418.</p> <p>&nbsp; </p></td>=
=20
    </tr>=20
    <tr>=20
     <td id=3D"Eysjuwh72"><p>&nbsp; </p> <p>&nbsp; </p> <p>RFID (radio freq=
uency identification) is a technology that incorporates the use of electrom=
agnetic or electrostatic coupling in the radio frequency (RF) portion of th=
e electromagnetic spectrum to uniquely identify an object, animal, or perso=
n. RFID is coming into increasing use in industry as an alternative to the =
bar code. The advantage of RFID is that it does not require direct contact =
or line-of-sight scanning. An RFID system consists of three components: an =
antenna and transceiver (often combined into one reader) and a transponder =
(the tag). The antenna uses radio frequency waves to transmit a signal that=
 activates the transponder. When activated, the tag transmits data back to =
the antenna. The data is used to notify a programmable logic controller tha=
t an action should occur. The action could be as simple as raising an acces=
s gate or as complicated as interfacing with a database to carry out a mone=
tary transaction. Low-frequency RFID systems (30 KHz to 500 KHz) have short=
 transmission ranges (generally less than six feet). High-frequency RFID sy=
stems (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) offer longer transmission=
 ranges (more than 90 feet). In general, the higher the frequency, the more=
 expensive the system.</p> <p>How Does RFID Technology Work? Technology Exp=
lained RFID hand 1As a self-confessed tin-hatter and someone who has worked=
 with asset management and inventory controls, I've got a lot of interest i=
n RFID technology. Why the tin-hatter bit? I'll get to that in a few paragr=
aphs. First off, you need to know what RFID is an initialization of ? Radio=
 Frequency Identification Tag. The initialization is pronounced ARE-FID. So=
 what are these things for? Well, they are a way of assigning unique data t=
o whatever they are applied to. Like a barcode or an ISBN number in some wa=
ys. The problem with things like bar codes is that they can get damaged or =
even switched. Some people do that to try to get expensive things cheaper ?=
 highly illegal. An RFID tag can be as small as a grain of black pepper and=
 be embedded right into a product's packaging, or the product itself. So yo=
u can start to see some of the benefits here. Most RFID's do not have an in=
ternal power source, like a battery, but some do. I'm going to cover the on=
es that don't, as they are the ones that are most popular. The RFID technol=
ogy has two components ? the reader and the tag. The reader has two parts ?=
 a transceiver and an antenna. The transceiver generates a weak radio signa=
l that may have a range from a few feet to a few yards. The signal is neces=
sary to wake or activate the tag and is transmitted through the antenna. Th=
e signal itself is a form of energy that can be used to power the tag.</p> =
<p>The transponder is the part of the RFID tag that converts that radio fre=
quency into usable power, as well as sends and receives messages. When the =
transponder is hit by the radio waves, the waves go up and down the length =
of the transceiver, oscillating. You might know that when a wire passes thr=
ough any sort of magnetic or electric field, it can convert and conduct tha=
t field down its length. Like those flashlights, where you shake them and a=
 magnet goes back and forth through a copper coil, creating electromotive f=
orce. Now that the RFID has some power to work with, it wakes up the transp=
onder. The transponder immediately upon being woken up, spews out all the i=
nformation it has stored on it. This whole process can take as little as a =
few milliseconds. Imagine having friend who was hypnotized to wake up upon =
hearing a code word, tell you his name and phone number, and then fall imme=
diately back to sleep. Yet he wouldn't do this no matter what else you said=
 Funny, yes it is. That's pretty much what RFID technology does. Now that =
the RFID has some power to work with, it wakes up the transponder. The tran=
sponder immediately upon being woken up, spews out all the information it h=
as stored on it. This whole process can take as little as a few millisecond=
s. Imagine having friend who was hypnotized to wake up upon hearing a code =
word, tell you his name and phone number, and then fall immediately back to=
 sleep. Yet he wouldn't do this no matter what else you said. Funny, yes it=
 is. That's pretty much what RFID technology does.</p> <p>I'm not saying th=
at they are going to be used for nefarious purposes, but the potential is c=
ertainly there. Consider that Hitachi can make RFID tags that will hold 128=
 bits of information, enough for an identification number, like a SIN numbe=
r, that is small enough to possibly be inhaled. Certainly, it could be put =
on you, or anything else, without you noticing. In the picture, all those d=
ots are the Hitachi Powder RFID'sand the black line is a human hair. To me,=
 that's scary.</p></td>=20
    </tr>=20
   </tbody>
  </table> =20
 <img src=3D"http://www.newprotectiononlineinfo.com/exercising-theoretical/8be85hp3en1KkeaVguV_VKxw_gVsFMtKlihzguVzONW1a7" alt=3D""/></body>
</html>

------=_Part_190_1822564075.1493056397197--


home help back first fref pref prev next nref lref last post