You are on page 1of 6

Jim Waters

Mrs. Newport

4/18/17

Annotated Bibliography:

Radio Frequency Identification Device (RFID) technology has been around since

the early 1940s. Initially implemented by governments around the world, RFID was used to

identify aircrafts, vehicles, navy vessels, service members, and other government personnel. This

paper emphasizes how RFID tags have evolved into the new age of technology, the current

applications of RFID, and the relevant threats purposed by the implantation of these devices in

U.S. citizens. The sources provided below are mainly scholarly reviews, current legislation, and

major and independent news sources.

BCL, Lisa B. SC. "Life on the Grid: Implanting Humans. A Look at the Ethical & Moral

Considerations for Relative Legislation in Ireland Relating to Implanted RFID Tags."

(2014).

The article illustrated by Ing Lisa of Dublin City University, Life on the Grid:

Implanting Humans. A Look at the Ethical & Moral Considerations for Relative Legislation in

Ireland Relating to Implanted RFID Tags. References to current legislation around the world,

yet focuses on a few major countries, including the United States. Lisa specializes in Biomedical

Engineering. Lisa also studies Biomaterials in the vascular and bone tissue systems of the human

body.
I selected this article to obtain a better understanding of the current legislation in place in

the United States that may support the overall RFID chipping of the American people. This

article focused on a few major countries to compare and which countries may be the most likely

to fully RFID tag their citizens. I demonstrated this in the section labeled, The Future or The

Present?

Foster, Kenneth R., and Jan Jaeger. "Ethical Implications of Implantable Radio Frequency

Identification (RFID) Tags in Humans." The American Journal of Bioethics 8.8 (2008):

44-48. Copyright Taylor & Francis Group, LLC. Web. 4 May 2017.

The article written by Kenneth Foster and Jan Jaeger, Ethical Implications of

Implantable Ratio Frequency Identification (RFID) Tags in Humans, reflects on a few different

health concerns that could occur with imbedding RFID tags in the human body. Foster is a

Bioengineer at Penn Engineering. He has a BS in Physics 1967, from Michigan State University

and obtained his PhD in Physics in 1971 at Indiana University. His specialties are Biomedical

applications, Electromagnetics, and Safety. With an emphasis on nonionizing radiation from

audio through microwave frequency ranges, health, and safety aspects of electromagnetic fields

as they interact with the human body.

I selected this article do gain a better understanding of how and/or what possible health

concerns we should be considering, when it comes to the implantation of RFID tags in the

human body. This article helped support my claim that there are far to many unknowns when it

comes to the constant transmitting of radio frequency waves and the damages it could cause to

the human body over a long period of time. I demonstrated this under the section of the paper

labeled RFID Tags in the Medical and Business World.


Greenwald, Glenn. "NSA collecting phone records of millions of Verizon customers daily." The

Guardian 6.5 (2013): 13.

The Article illustrated by Glenn Greenwald, NSA collecting phone records of millions

of Verizon customers daily. Infers the nature of a totalitarian infrastructure, when it comes to

your personal phone records. Greenwald is a former columnist for The Guardian, that focused on

civil liberties and US national security issues. He was also a constitutional lawyer and the author

of the book, How Would a Patriot Act? (May 2006) which was a critique of former President

George W. Bushs administrations use of executive power. He also wrote the book, A Tragic

Legacy (June 2007) which examined the Bush family legacy.

I selected this article from The Guardian to better explain how this totalitarian

infrastructure has been exposed for the mass collection of data of US citizens and why I believe

this data is categorized and was being kept a secret from the American people. This article also

helped me reflect the knowledge I introduced and supported my claim that we are currently

living under the power of technological tyranny. I exhibit this claim under the section labeled A

History of Tyranny.

House Judiciary Committee Staffers in Cooperation with Staff Attorneys from the Office of the

Legislative Counsel. "Patriot Act." Wikipedia. Wikimedia Foundation, 02 May 2017.

Web. 05 May 2017.


The Patriot Act, was a bill introduced into office during George W. Bushs presidency.

This bill was introduced and passed by the House on Oct. 24th 2001, then passed by the Senate

Oct. 25th 2001, and then signed into law by former President Bush on Oct. 26th 2001. It was

created in effort to try and prevent and/or anticipate, when and where the next major terrorist

attack may be. However, this Act, seems to have very many flaws and regulation issues that

infringe on the rights and privacy of the American people.

I utilized this this law to further explain how the current legislation could have paved the

way for what is known as turn key tyranny. This law is a direct violation of many of our

individual civil rights, liberties, and constitutional rights as well. I illustrated a few key points of

this law and its infringements on our civil rights and liberties, in the section labeled, The Patriot

Act and The Patriot Sunsets Extensions, to better support my stance on RFID tag implications.

Kamphuis, Arjen. "How NSA Invites Totalitarianism." Consortiumnews. N.p., 17 Jan. 2014.

Web. 23 Apr. 2017 https://consortiumnews.com/2014/01/17/how-nsa-invites-

totalitarianism/

The article illustrated by Arjen Kamphuis, How the NSA Invites Totalitarianism

displays how the US government openly admits to conducting foreign and domestic surveillance.

Kamphuis is the co-founder and Chief Technology Officer of Gendo. He studied Science and

Policy at Utrecht University and worked for Twynstra and IBM. He also specializes in the

planning and strategic assessments of emerging technologies such as bio and nanotechnology.
I selected this article to gain a better understanding of how the NSA operates without

restriction. This article gave me some incite as to why this was as well as, how the idea of if you

have nothing to hide, then you have nothing to fear is a very common approach, when it comes

to the enforcement of this type of technology. I explain this under the section labeled A History

of Tyranny.

Mohd-Yasin, F., M. K. Khaw, and Md Mamun Ibne Reaz. "Radio frequency identification."

Microwave Journal 49.6 (2006): 56-70.

The article illustrated by Yasin, Khaw, and Reaz. "Radio frequency identification." In the

Microwave Journal, exemplifies some of the benefits in the business, distribution, and

throughout the pharmaceutical world. The Microwave Journal is a source that provides cutting

edge research, technology, events, news and educational seminars about radio frequency

developments. Dr. Mohd-Yasin of Griffith University has his doctorate in engineering and is an

expert in Microelectronics, Integrated circuits, and Microelectromechanical systems (MEMS).

He teaches Practical Electronics, Integrated Circuit Design, and Data and Computer

Communications.

I selected this article to gain a better understanding of how long RFID technology has been

around, what its past and present applications are, and some of the current implications that

follow the implementation of RFID tags in the business, distribution, and throughout the

pharmaceutical world. I utilized this article in my paper to emphasize my claim as well as

support a few of my reasons.


Shaver, Andrew. "Youre More Likely to Be Fatally Crushed by Furniture than Killed by a

Terrorist." The Washington Post. WP Company, 23 Nov. 2015. Web. 23 Apr. 2017.

The article written by Andrew Shaver, youre more likely to be fatally crushed by

furniture than killed by a Terrorist. Demonstrates the actual treat level of becoming deceased by

the act of a terrorist. Shaver is a PhD candidate in public policy at Princeton University. He also

once held a position as a Pentagon analyst and foreign affairs fellow with the U.S. Senate.

I selected this article out of The Washington Post, to indicate the truth when it comes to

the actual threat level of being killed by a terrorist attack. I utilized this source to better illustrate

the mass hysteria caused after the attacks of Sept. 11, 2001. In order to force a totalitarian

ideological agenda in the name of necessary security measures. This is demonstrated in the

section labeled Total Surveillance.