National Academies Press: OpenBook
« Previous: Covert Tags
Suggested Citation:"Electronic Tags." National Research Council. 2004. Summary of the Sensing and Positioning Technology Workshop of the Committee on Nanotechnology for the Intelligence Community: Interim Report. Washington, DC: The National Academies Press. doi: 10.17226/11032.
×
Page 4

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

SECURITY TECHNOLOGIES OVERVIEW 4 Forensic Level Tags Forensic level tags involve a complex authentication process and are often undetectable by normal methods. One example is DNA analysis, in which a strand binds with its complement and gives a machine-readable signal or a machine-readable hologram. When asked whether a person's environment affects his body in an identifiable way, Jotcham noted that there is ongoing work on analyzing the bacteria that colonize the body and relating them to unique strains that may inhabit specific local environments. Product Characteristic Tags In-product analysis or authentication can be used to identify a specific product and determine if it has been diluted or subjected to other forms of tampering. The product itself can be characterized (by, for example, colorimetric testing, isotopic identification, spectroscopic fingerprinting, elemental analysis, and so on) or it can be identified by adding taggants such as molecules with hydrogen/deuterium isotope ratios (or ratios of other stable isotopes) that do not occur in nature. Commercial companies tend to be more interested in tracking the intermodal transportation of the aggregates through the supply chain rather than in tracking individual products per se. Coding Tags Coding (e.g., bar coding) provides a way for manufacturers to attach unique data or variable information to a product that creates a data stream as it moves through the supply chain. Bar coding had many skeptics when it was first proposed, but it is now inexpensive and ubiquitous and supported by a well-developed infrastructure. Unique identification data can be coded with an inkjet, and laser coding of identification data onto a product creates a tag that cannot easily be removed. Two-dimensional bar codes can be made very small (invisible to the eye) and may contain many times the information contained in one-dimensional bar codes. Electronic Tags Electronic tags can be used to identify a product's current position to track its history of environmental changes and additions, and help to predict its future location and composition. Commercial industry primarily uses these tags to better control their supply chain dynamics and inventory. The best example is Dell Computer, which transformed the computer industry's use of supply chain management to cut its operating costs and excess parts inventories. Jotcham discussed four levels of ID tags that can be used: the individual package (level 1); the display carton (level 2); the shipping case (level 3); and the pallet (level 4). With electronic tags, it is possible to read a level 1 code without opening the level 4 packaging. The best systems can alert the manufacturer when tampering has taken place. He pointed out that individuals can also be tracked by data generated in their everyday lives: drivers' licenses, bill paying, insurance information, and payment of tolls and parking fees, as well as health care, schools, and work products. Electronic tracking can be divided into chipless tags—for example, magnetic, electromagnetic, and antitheft electronic article surveillance (EAS) devices—and chip-containing tags, which may be passive, active, or smart active. In addition, there are electronic product codes (EPCs), which are tiny

Next: NETWORKED SENSORS FOR THE BATTLEFIELD »
Summary of the Sensing and Positioning Technology Workshop of the Committee on Nanotechnology for the Intelligence Community: Interim Report Get This Book
×
 Summary of the Sensing and Positioning Technology Workshop of the Committee on Nanotechnology for the Intelligence Community: Interim Report
Buy Paperback | $21.00 Buy Ebook | $16.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

The emergence of nanotechnology as a major science and technology research topic has sparked substantial interest by the intelligence community. In particular the community is interested both in the potential for nanotechnology to assist intelligence operations and threats it could create. To explore these questions, the Intelligence Technology Innovation Center asked the National Research Council to conduct a number of activities to illustrate the potential for nanotechnology to address key intelligence community needs. The second of these was a workshop to explore how nanotechnology might enable advances in sensing and locating technology. This report presents a summary of that workshop. In includes an overview of security technologies, and discussions of systems, natural chemical/biological tags, passive chemical/biological tags, and radio/radar/optical tags.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!