SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
C O M M E N TA RY




                                                                 By IAN ANGELL and
                                                                 JAN KIETZMANN



RFID AND THE
END OF CASH?
Thinking about buying a new car with cash? RFID-embedded
How about paying school fees? Don’t bother. money is likely
Such money is not welcome. Western banks
today treat all large cash deposits as “suspicious to mean the end
transactions,” covering their backs by immedi- of anonymous
ately reporting cash-loaded customers to the transactions and
authorities for carrying sums far less than the with it one of
minimum amounts required by regulations.
Governments say “Only the guilty deal in the last bastions
cash.” Consequently, sensible businesses avoid of personal
large cash deals. Depositing cash into the anonymity.
banking system means everything is electroni-
cally recorded. New anti-money-laundering regulations, especially
since the terror attacks of September 11, 2001, identify these
deposits as the entry point of an audit trail of suspicious transac-
tions. What is going on?
Illustration by R OLAND S ARKANY




                                               COMMUNICATIONS OF THE ACM December 2006/Vol. 49, No. 12   91
Legislators in the West have decided                                    in the U.S., much of the increase
that the deregulation of the past decades,                                  due to the use of ATMs and
particularly concerning money (such as                                      demand from abroad [5]. Govern-
the loosening of exchange controls), has                                    ments don’t easily give up on their
gone too far. Despite profiting substan-                                    tax take, developing tactics for
tially from seigniorage, including the                                      eroding anonymity, fungibility,
profit resulting from the difference in the             HE MORE  T          and the ability to store value that
cost of printing money and the money’s                                      make cash so attractive to tax
face value, governments grudgingly issue
                                                    DETAILED THE            evaders.
exchangeable money; or else other private RECORDING OF                       RFID
                                                                               Cash has no provenance.
groups would. Harking back to Plato and                                     Unlike with checks and credit
his moneyless utopian Republic, govern-
                                                  TRANSFERS THE          ,  cards, it is very difficult in cash
ments today prefer a perfect society with        TIGHTER THE NET            transactions to associate a pur-
a nonconvertible currency that (they                                        chaser with a purchase or a partic-
claim) safeguards their economies from             BECOMES AND       ,      ular purchase with other
external meddling and from losing the                 THE MORE              purchases. Audit trails have to be
wealth of those dissidents who choose to                                    separately      and     expensively
escape what they see as state oppression.        LIMITATIONS THAT           imposed. Roman Emperor Ves-
New technology raises the spectre of the           ARE PLACED ON            pasian 2,000 years ago may have
state gaining total control over money,                                     believed pecunia non olet (money
achieving this nominal collectivist heaven       THE INDIVIDUAL S                ’
                                                                            doesn’t stink), but modern govern-
by destroying the essence of cash—the           ABILITY TO REMAIN ments sense the possibility of cash
cornerstone of individual freedom.                                          giving off the unmistakable odor
    This scenario seems paradoxical given           ANONYMOUS                .
                                                                            of each identifiable bearer, making
that global telecommunications is bring-                                    it a de facto identity card and
ing about the death of distance. Busi-                                      negating the personal freedom
nesses, along with some individuals, have                                   encapsulated in anonymous
become truly international. Today’s con-                                    money.
vergence of the Internet, mobile technol-                                      Although individual bank
ogy, and electronic payment schemes                                         notes have unique identification
makes everyone a trader, a global business elite that is numbers, they are not tracked from the moment of
of one mind: arbitrage the new opportunities to min- issue. Indeed, until recently it was too costly to track
imize their tax liability.                               the cash transactions of individuals (even their checks
                                                         and credit card transactions), except in special high-
                                                         priority cases. Now there is computerized profiling,


H
          owever, most governments are addicted to data mining, and radio-frequency identification
          taxation. Democracies are no exception; how (RFID). The government’s long-term aim may be to
          else could they afford to subsidize the bene- turn society into a Panopticon, using it as an analogy
fits they deliver to preferred voters and contributors? for a prison in which an unseen guard observes all
Increased regulation makes the state even more costly prisoners without them knowing they are being
to run, so the tax take must increase. The state is a observed. By constructing a complete record of the
Faustian pact, where the individual submits to its personal debits and credits of all its citizens, thereby
“legitimate violence” in return for protection and spinning a web connecting all buyers and sellers, the
security [12]. The government, from its side of this Internal Revenue Service and its equivalents outside
bargain, demands ownership of its citizens and the the U.S. not only calculate every tax bill but are able
monopolistic right to tax them at whatever level to seize payment from those operating in both the
whenever it wishes, calling it “balancing the budget.” official economy and the underground “shadow
However, taxing cash is complicated due to its three economy.”
interrelated properties: anonymity, fungibility, and        In a democratic regime, this assault on individual
ability to store value.                                  freedom must appear benign so as to avoid popular
    Although credit and debit cards do away with the discontent. Democracies are obliged to profess supe-
need for cash, the amount of cash in circulation is rior morality and/or utility in order to convince citi-
increasing in almost all countries. As of July 2004, zens of the rightness of their legitimate violence [12].
U.S.$730 billion in coins and notes was in circulation The enforcers of state power—the police, national

92     December 2006/Vol. 49, No. 12 COMMUNICATIONS OF THE ACM
security services, and tax collectors—may be given the        tag that uniquely identifies any item bearing the tag.
right, nay the obligation, to invade the privacy of cit-      So-called “smart tags” are used to track or trace
izens with impunity.                                          objects. Worldwide in 2003, they helped keep track of
   How do democratic governments get their citizens           about 100 million pets and 20 million livestock [3].
to accept a wholesale loss of privacy? The trick is to
convince them that such intrusion is in their own self-


                                                              T
interest and may even deliver personal benefits. Some                  he Auto-ID Center, established in 1999 as an
politicians seize the moral high ground by stirring up                 academic research project at the Massachusetts
a smokescreen of public outrage against drug traffick-                 Institute of Technology, developed the archi-
ing, terrorism, corporate greed, pedophilia, and coun-        tecture for creating a seamless global network of all
terfeiting. They also make the highly suspect claim           physical objects (www.autoidlabs.org/aboutthelabs.
that the pairing of regulation and technology will cure       html). The technology has since been transferred to
these social ills, protecting the individual from fraud       EPCglobal (www.epcglobalinc.org), which oversees
and theft. Unfortunately, this duo comes at a cost. For       development of standards for electronic product code
example, of the £250 billion estimated to have been           (EPC) tags. These tags are used for every imaginable
laundered through the U.K., the government has                item—from clothes to medicine, electronics, food,
recovered a mere £46 million, at a cost of £400               motor vehicles, books, door locks, and airplanes—
million [2].                                                  revolutionizing logistics and supply-chain and inven-
   The USA PATRIOT Act of 2001 and in the U.K.                tory management worldwide. For example,
the Regulation of Investigatory Powers Act of 2000            Legoland in Denmark uses RFID and 802.11
and the Proceeds of Crime Act of 2002 were all                WLAN technology to find lost children [4], and
approved with atypical haste. Legislators have learned        U.S. forces employ Texas Instruments wristbands to
the lesson of the 1931 conviction of Al Capone by the         help track wounded U.S. soldiers and prisoners of
U.S. Department of the Treasury. If you can’t catch a         war in Iraq.
criminal in the act, “follow the money” instead. Invert           The turn of the century saw substantial gains in
the burden of proof. The accused (in fact everyone) is        the efficiency of power conversion in circuits, pro-
guilty until proven innocent, where proof of inno-            viding power for cryptographic operations. The least
cence is nothing less than the unconditional surrender        expensive and least powerful tags (such as basic EPC
of all personal and financial information. No surprise        tags) provide no layers of security. More advanced
that anti-money-laundering regulations, especially the        and costly tags require additional power for cryptog-
“know your customer” rules, demand that every bank            raphy (such as for static key operations in PINs and
official act as a secret policeman for the government.        passwords, symmetric key encryption, and crypto-
   Should the privacy dissident operate in electronic         graphic co-processors). These extra levels of security
cash? No. E-cash is hopelessly compromised, with              enable novel opportunities, not only for commercial
issuers intimidated into insinuating an audit trail in        transactions but for money itself.
the encrypted data; it is just a glorified debit card. Per-       An RF-emitting tag can be small enough to fit
haps the dissident should stay well away from the gov-        into bank notes so as to uniquely identify each one
ernment-regulated banking system, using only                  as it passes within range of a sensor. The authorities
high-denomination bank notes. Unfortunately, this             claim its purpose is to combat counterfeiting and
well-used tactic no longer provides the desired level of      identify money transfers between suspicious parties.
anonymity, owing to its convergence with another              RFID readers interrogate multiple tags simultane-
technology.                                                   ously. Every time notes are passed to or from a bank,
   RFID’s ability to perform as an auto-identification        RFID readers identify and record them, linking this
technology was first utilized by the Royal Air Force in       data with the person who presented or received
World War II to differentiate between friendly and            them. The government has the potential to know
enemy aircraft. Friendly planes were equipped with            not only exactly how much cash is being carried
bulky “active” RFID transponders (tags) energized by          out/in the door but who is carrying it and who car-
an attached power supply and interrogated by an               ried it previously. By comparing the respective iden-
RFID transceiver (reader). Applications today rely on         tification numbers to entries in their database (for
similar communication between RFID tag and reader,            authentication purposes, of course), the authorities
although the tags (miniscule microchips attached to           can draw a link between the last recorded holder of
antennae) are generally “passive,” powered by an elec-        the note and the current one.
tromagnetic field emitted by the reader. Radio signals            This web of contact information is also incom-
inform nearby readers of a serial number stored on the        plete. It misses out on the numerous cash transac-

                                                                  COMMUNICATIONS OF THE ACM December 2006/Vol. 49, No. 12   93
tions not captured by banks, including those that                weigh the hazards through a marketing blitz aimed at
occurred as the note was passed hand to hand, start-             gaining widespread public acceptance.
ing with the party who issued it and ending with
whoever returned it to the bank. To increase the accu-


                                                                 I
racy of their records, authorities will indeed expect                t’s not only that passive RFID tag technology is
intermediate retail and service outlets to identify cus-             rapidly maturing among a passive (some might say
tomers, then read and report their tags. Cash registers              apathetic) public. Innovators predict huge public
can record all transactions, good and bad, legal and             demand for the products of the convergence of per-
illegal, honest and dishonest, and identify notes that           sonal RFID readers and mobile telephones. The
enter their system, flagging those that are either coun-         mobile telephony industry senses a killer application.
terfeit or no longer accepted as legal tender. The new           Who wouldn’t pay to locate misplaced keys, specta-
RFID-based technology gives the authorities the                  cles, gloves, or socks (conveniently tagged by their
power to cancel a particular note. The more detailed             manufacturers)? By marrying an asynchronous reader
the recording of RFID transfers, the tighter the net             with a synchronous mobile phone, the emergent
becomes, and the more limitations that are placed on             device would be able to read and transfer tag data
the individual’s ability to remain anonymous.                    anywhere in near real time. Connecting phones
    A 2004 Internet hoax involved $20 bills with an              and/or tags would make it possible to send and
RFID tag in Andrew Jackson’s eye [10]. So it’s all a             receive electronic funds. Accessing a tag might also
ruse? Not at all. The 10,000-yen bills (~$100) of                trigger a connection to the manufacturer or retailer’s
2004 were to be implanted with Hitachi’s 0.4mm2,                 Internet presence through a mobile phone. Applica-
60-micron-thick “␮-chip” [8], each costing around                tions for mobile phones equipped with RFID readers
50 yen [9]. Plausibly, as the price of tags decreases fur-       are endless, promising to introduce huge new revenue
ther, they will be embedded into smaller-denomina-               streams to handset manufacturers, application devel-
tion bank notes to increase the recording and                    opers, and service providers.
monitoring of yet more cash transactions. The Euro-                 The security infrastructure surrounding this tech-
pean Union considered implanting tags in its notes by            nology, balancing privacy against commercial applica-
the end of 2005, though this is on hold, and the                 tions, is a major concern. RFID does not require
Swedish National Bank has announced a similar idea.              line-of-sight for reading tags, operating instead on
Is the U.K. or U.S. next?                                        radio frequency. Hence, private data about people
    No more anonymous cash. But worse, two other                 and their belongings and shopping behavior can be
properties of cash—fungibility and stored value—are              received simply by waving a reader near their clothes,
also under attack. Each bank note, whatever its                  handbags, and other personal items. The size of their
denomination, should be as good as any other, but                shirts is no longer their personal secret, nor is the
not if it’s rejected, discounted, or terminated. By              amount of cash they are carrying. By collecting tag
insisting that only bank notes with operational tags             data on the person being RF-interrogated, the “data
are legal tender, governments may cancel the cash of             voyeur” might create a complete commercial, and,
targeted individuals.                                            worse, personal profile.
    What a great method for instantly taxing citizens.              One may argue that this problem would be solved
Governments calculate the tax owed and take the cor-             by disabling each tag when it leaves a shop, but this is
rect sum straight out of each taxpayer’s pocket by can-          neither in the interest of the retailer nor, in fact, of the
celing bank notes, then reprinting and reissuing new             customer. Tags will store warranty information (paper
ones bearing different RFID tags. The possibilities are          receipts will no longer be accepted) and, more impor-
limitless. By giving each note an expiration date, gov-          tant, the rights of ownership (a stolen item is easily
ernments may force bearers of cash to spend their                identified). It is thus in the interest of the purchaser
money. The government can also hold out the threat               to keep tags alive. Furthermore, using RFID-enabled
of instant devaluation, with the value of a bank note            phones in the exchange of goods and money is both a
being not the numbers printed on the note itself but             guarantee and a proof of the transfer of ownership.
the amount coded into the tag, drastically transform-            Only a troublemaker would want to destroy or dis-
ing the notion of stored value.                                  able such useful data.
    Why doesn’t everyone object loudly and publicly?                So there are very real general benefits in RFID
It’s not just ignorance of the technology. A very real           technology. However, this does not mean that the
opportunity presents itself, as RFID technology finds            mixing of cash and mobile RFID will receive strong
its way into the home at a price all can afford. The             support. As with many new technologies, innovators
viral message is going out that the benefits far out-            promise utopia; meanwhile, governments may declare

94     December 2006/Vol. 49, No. 12 COMMUNICATIONS OF THE ACM
that only tagged items are secure, and                                  identify individual travelers through
industry proclaims the convenience                                      the tagged cash and goods they carry.
and savings made possible through                                       There will be no more slipping
mobile RFID readers. It is not surpris-                                 through customs without paying duty
ing that two main supporters of RFID                                    or carrying suitcases full of money to
are the U.S. Department of Defense                                      Switzerland.
and Wal-Mart and are likely to be                                          However, because RFID technol-
joined by the mobile technology sec-         B    Y COLLECTING          ogy doesn’t require a physical connec-
tor and others once new revenue                                         tion between tag and reader, officials
streams are more apparent.                       TAG DATA ON            will be able to validate a person’s iden-
   Benefits to major corporations and        THE PERSON BEING tity not only at the port or airport but
governments will not in and of them-                                    also in any public or private space
selves generate public acceptance of       RF-                          ,
                                                  INTERROGATED within the limited range of the RFID
                                                 “
tagged cash. That acceptance is essen- THE DATA VOYEUR                  ”
                                                                        tag/readers, all without the express
tial if the technology is to overcome                                   permission or even awareness of the
privacy objections. Hence the issue of          MIGHT CREATE            person. As the range at which tags may
mobile RFID and tagged bank notes,                A COMPLETE            be read increases and the technology
while contributing to decreased                                         improves, will unreasonable search
anonymity, is being marketed to indi-            COMMERCIAL         ,   and seizure become imperceptible
viduals as a self-evident personal
advantage. Once people are proffered
                                                     ,
                                                 AND WORSE         ,    search and seizure?

a bank note, their mobile phones read               PERSONAL
                                                             .
                                                                               B
the tag, establish a connection to the               PROFILE                   ut it’s not only the government
authority’s database, and receive con-                                         watching from the shadows.
firmation of the note’s authenticity                                           Privacy advocates argue that
and validity and of the legitimacy of                                   mobile RFID readers can lead to
the bearer. Fraud will decrease dra-                                    increased identity theft, high-tech
matically. As a byproduct of the                                        stalking, and commercial data collec-
process, the government will obtain                                     tion [11], perhaps with the intent of
yet more information for its database                                   hijacking the seemingly good inten-
of cash transfers from private citizens, as well as from tions of RFID-tagged goods and cash. Indeed, retail-
the banking, retail, and service sectors. As tagged ers are concerned that thieves equipped with mobile
product purchases find their way into our homes, we RFID devices will create new and sophisticated ways
will be only a step away from installing indoor of shoplifting. Anarchists have long dreamed of the
receivers into our shelves, floors, and doorways [1]. destruction of the state by destroying its power to
The net on anonymity will continue to tighten. The issue and control money. In “chaos attacks,” they hope
criticism of Katherine Albrecht, founder and director to damage tags embedded in cash to render it practi-
of an advocacy group called Consumers Against cally invalid until exchanged at banks for good money
Supermarket Privacy Invasion and Numbering with valid tags, causing major inconvenience and dis-
(www.spychips.com), and others have convinced ruption. Global retail chains (such as McDonald’s),
Auto-ID Labs around the world to address the grow- for years targets of environmental activists, would find
ing concern and work on ways to deal with the pri- collecting and then validating large amounts of cash a
vacy issue.                                               constant headache.
   This is just as well, because the databases of tags      When only fully functioning tagged money will be
and their bearers maintained by various governments good money, what happens when a tag is destroyed,
don’t stop with money. In the name of homeland whether by accident or on purpose? General access to
security, new U.S. passports will contain standard the government’s provenance database of money
passport data in an embedded tag that can trigger the (needed to replace genuinely damaged bank notes)
respective name, address, and digital picture. will introduce unimagined levels of complexity into
Although not encrypted, security will be warranted the system, along with the likelihood of database fail-
through digital signatures [11]. The world’s national ure. How do we ensure that thieves do not screen the
borders will be equipped with readers, thereby tagged content of our wallets to find out if we are
increasing control of the transnational flow of people. worth robbing? Innocents will need to engage in
By extension, immigration officials will be able to countermeasures: wallets will contain RFID shielding

                                                                 COMMUNICATIONS OF THE ACM December 2006/Vol. 49, No. 12   95
material for personal security reasons,                                                   potential for use in small denomina-
and people will carry RFID blockers                                                       tions—real cash money. Maybe
or tag jammers to disrupt transmis-                                                       Hayek’s vision of the “denationalisa-
sion of information to scanning                                                           tion of money” [6] will become a
devices.                                                                                  reality. As a substitute for govern-
   We will soon be living in a world of                                                   ment-issued bank notes, we may
tags, with different ones serving differ-                                                 instead just deal in yet another,
ent purposes. EPC tags will store                                                         untagged currency to maintain our
Global Trade Identification Numbers                                                       anonymity. c
to give each item a unique identifica-
tion number. RFID-tagged items will
                                                           HOW DO WE                      REFERENCES
be as ubiquitous as barcoded products              ENSURE THAT THIEVES                  1. Albrecht, K. Supermarket cards: The tip of the
                                                                                           retail surveillance iceberg. Denver University Law
are today but be even more pervasive.               DO NOT SCREEN THE                      Review 79, 4 (Summer 2002), 534–539 and
However, unlike barcodes, multiple                                                         558–565.
RFID tags can be read simultaneously,                TAGGED CONTENT                     2. Bawden, T. U.K.’s bid to trace dirty money is
                                                                                           ‘pathetic.’ Times Online (Mar. 15, 2005); busi-
each distinctively identifying the                  OF OUR WALLETS TO                      ness.timesonline.co.uk/article/0,,8209-
bearer at once without the need for                                                        1525951,00.html.
                                                                                        3. Booth-Thomas, C. The see-it-all chip. Time
line-of-sight or direct contact between             FIND OUT IF WE ARE                     Online       Edition      (Sept.    14,     2003);
reader and tag. Each of us will be a
walking mountain of tags, and it will
                                                     WORTH ROBBING?                        www.time.com/time/globalbusiness/article/0,9171,
                                                                                           1101030922-485764,00.html.
                                                                                        4. Collins, J. Lost and found in Legoland. RFID
be impossible to isolate them all from                                                     Journal (Apr. 28, 2004); www.rfidjournal.
being read. Moreover, due the conver-                                                      com/article/articlview/921/1/1/.
                                                                                        5. Federal Reserve Bank of New York. How Cur-
gence of the pervasive mobile tele-                                                        rency Gets into Circulation. Aug. 2004; newyork-
phone and RFID readers, everyone                                                           fed.org/aboutthefed/fedpoint/fed01.html.
will be able to obtain all manner of                                                    6. Hayek, F. The Denationalisation of Money. Insti-
                                                                                           tute of Economic Affairs, London, 1976.
information about everyone else—                                                        7. Hayek, F. The Road to Serfdom. University of
from passports, clothes, personal data,                                                    Chicago Press, Chicago, 1972.
                                                                                        8. Hitachi. The World’s Smallest RFID IC. Hitachi,
and, in particular, cash.                                                                  Ltd., Tokyo, 2004; www.hitachi.co.jp/Prod/mu-
                                                                                           chip/.
                                                                                        9. Leyden, J. Japan yens for RFID chips. The Regis-




W
                                                                                           ter (July 30, 2003); www.theregister.co.uk/
             ill the convergence of money, mobile tele-                                    2003/07/30/japan_yens_for_rfid_chips/.
             phony, and RFID inexorably lead to the              10. McCullagh, D. RFID Industry Tries to Debunk ‘Exploding $20 Bill’
                                                                     Myth. Association for Automatic Identification and Mobility, Inc.,
             end of cash as we know it? Is this “the                 Warrendale, PA, Mar. 18, 2004; www.prisonplanet.com/031804
complete delivery of the individual to the tyranny of                _RFID_industry_tries_to_debunk_exploding_$20_bill_myth.html.
the state, the final suppression of all means of escape,         11. Singel, R. American passports to get chipped. Wired.com news (Oct.
                                                                     21, 2004); www.wired.com/news/privacy/0,1848,65412,00.html.
not merely for the rich, but for everybody” [7]? Possi-          12. Weber, M. Politics As a Vocation. Hackett Publishing Co., Indianapo-
bly. The technology will ensure that personal credit                 lis, IN, 2004.
devices no longer come in the shape of cards but as
tags in keychain fobs, stickers, and implants. Cash as
we know it will be an anachronism. RFID develop-                 Ian Angell (i.angell@lse.ac.uk) is a professor of information
                                                                 systems in the Department of Management in the London School of
ments in the name of supply-chain management and                 Economics.
national security will complement the worldwide                  Jan Kietzmann (j.h.kietzmann@lse.ac.uk) is a researcher in the
flood of tags. The public will be ready—enthusiasti-             Department of Management in the London School of Economics.
cally armed with RFID-reading mobile phones to
                                                                 Permission to make digital or hard copies of all or part of this work for personal or
scan items in shops and the money they handle, as                classroom use is granted without fee provided that copies are not made or distributed
well as information about one another.                           for profit or commercial advantage and that copies bear this notice and the full cita-
                                                                 tion on the first page. To copy otherwise, to republish, to post on servers or to redis-
   Can the stampede of privacy-invading mobile                   tribute to lists, requires prior specific permission and/or a fee.
technology along Friedrich Hayek’s Road to Serfdom
[7] be stopped? After all, money does not have to be
created legal tender by governments. Due to low
transaction costs, organizations can issue money, pos-
sibly as a percentage of their equity. To a certain
extent this is already happening with large-denomina-
tion bonds, but new technology introduces the                    © 2006 ACM 0001-0782/06/1200 $5.00



96     December 2006/Vol. 49, No. 12 COMMUNICATIONS OF THE ACM

Weitere ähnliche Inhalte

Ähnlich wie RFID and Cash

Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)Jon Matonis
 
Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Juan Llanos
 
Cryptocurrency-recommended coins and purposes
Cryptocurrency-recommended coins and purposesCryptocurrency-recommended coins and purposes
Cryptocurrency-recommended coins and purposeswatt promj
 
Cryptocurrency - Recommended Coins and Purposes.pdf
Cryptocurrency - Recommended Coins and Purposes.pdfCryptocurrency - Recommended Coins and Purposes.pdf
Cryptocurrency - Recommended Coins and Purposes.pdfChandraShekhar215220
 
How to make money with cryptocurrency in 2022.pdf
How to make money with cryptocurrency in 2022.pdfHow to make money with cryptocurrency in 2022.pdf
How to make money with cryptocurrency in 2022.pdfNerajKumar2
 
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...Investments Network marcus evans
 
Combating money laundering & terror financing case of nigeria- adv. chitengi...
Combating money laundering & terror financing  case of nigeria- adv. chitengi...Combating money laundering & terror financing  case of nigeria- adv. chitengi...
Combating money laundering & terror financing case of nigeria- adv. chitengi...cjnsipho
 
4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY
4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY
4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCYSteven Rhyner
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
The Master Guide To NFT Investing .pdf
The Master Guide To NFT Investing .pdfThe Master Guide To NFT Investing .pdf
The Master Guide To NFT Investing .pdfAliSayed71
 
The case for Electronic Cash - Coincenter
The case for Electronic Cash - CoincenterThe case for Electronic Cash - Coincenter
The case for Electronic Cash - CoincenterJosu San Martin
 
LEOcoin Brochure (English)
LEOcoin Brochure (English)LEOcoin Brochure (English)
LEOcoin Brochure (English)Imani Mamalution
 
Whitepaper On Crypto Currencies
Whitepaper On Crypto CurrenciesWhitepaper On Crypto Currencies
Whitepaper On Crypto CurrenciesKapil Sanghi
 
UnMoney: The Value of Everything
UnMoney: The Value of EverythingUnMoney: The Value of Everything
UnMoney: The Value of Everythingsparks & honey
 
Letter to Hon. Steve Mnuchin from Blockchain.com
Letter to Hon. Steve Mnuchin from Blockchain.comLetter to Hon. Steve Mnuchin from Blockchain.com
Letter to Hon. Steve Mnuchin from Blockchain.comJason Karsh
 
A.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyA.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyVladislav Solodkiy
 
Is the world destined to become a cashless society?
Is the world destined to become a cashless society?Is the world destined to become a cashless society?
Is the world destined to become a cashless society?CogitoMedia
 

Ähnlich wie RFID and Cash (20)

Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
Digital Cash and Monetary Freedom - Libertarian Alliance (Economic Notes 63)
 
Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23Madrid - Digital Currency Summit 2015-04-23
Madrid - Digital Currency Summit 2015-04-23
 
Cryptocurrency-recommended coins and purposes
Cryptocurrency-recommended coins and purposesCryptocurrency-recommended coins and purposes
Cryptocurrency-recommended coins and purposes
 
Cryptocurrency - Recommended Coins and Purposes.pdf
Cryptocurrency - Recommended Coins and Purposes.pdfCryptocurrency - Recommended Coins and Purposes.pdf
Cryptocurrency - Recommended Coins and Purposes.pdf
 
How to make money with cryptocurrency in 2022.pdf
How to make money with cryptocurrency in 2022.pdfHow to make money with cryptocurrency in 2022.pdf
How to make money with cryptocurrency in 2022.pdf
 
F0312010140044
F0312010140044F0312010140044
F0312010140044
 
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
Security and Crypto-currency: Forecasting the Future of Privacy for Private I...
 
A Strategist's Guide to Blockchain
A Strategist's Guide to BlockchainA Strategist's Guide to Blockchain
A Strategist's Guide to Blockchain
 
Combating money laundering & terror financing case of nigeria- adv. chitengi...
Combating money laundering & terror financing  case of nigeria- adv. chitengi...Combating money laundering & terror financing  case of nigeria- adv. chitengi...
Combating money laundering & terror financing case of nigeria- adv. chitengi...
 
4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY
4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY
4 REASONS WHY YOUR NATION WILL KILL CASH FOR A DIGITAL CURRENCY
 
Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
The Master Guide To NFT Investing .pdf
The Master Guide To NFT Investing .pdfThe Master Guide To NFT Investing .pdf
The Master Guide To NFT Investing .pdf
 
W3coins
W3coinsW3coins
W3coins
 
The case for Electronic Cash - Coincenter
The case for Electronic Cash - CoincenterThe case for Electronic Cash - Coincenter
The case for Electronic Cash - Coincenter
 
LEOcoin Brochure (English)
LEOcoin Brochure (English)LEOcoin Brochure (English)
LEOcoin Brochure (English)
 
Whitepaper On Crypto Currencies
Whitepaper On Crypto CurrenciesWhitepaper On Crypto Currencies
Whitepaper On Crypto Currencies
 
UnMoney: The Value of Everything
UnMoney: The Value of EverythingUnMoney: The Value of Everything
UnMoney: The Value of Everything
 
Letter to Hon. Steve Mnuchin from Blockchain.com
Letter to Hon. Steve Mnuchin from Blockchain.comLetter to Hon. Steve Mnuchin from Blockchain.com
Letter to Hon. Steve Mnuchin from Blockchain.com
 
A.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyA.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new money
 
Is the world destined to become a cashless society?
Is the world destined to become a cashless society?Is the world destined to become a cashless society?
Is the world destined to become a cashless society?
 

Mehr von Simon Fraser University

Consumer generated Intellectual Property
Consumer generated Intellectual PropertyConsumer generated Intellectual Property
Consumer generated Intellectual PropertySimon Fraser University
 
Using simulations in the marketing classroom
Using simulations in the marketing classroom Using simulations in the marketing classroom
Using simulations in the marketing classroom Simon Fraser University
 
Is it all a game? Understanding the principles of gamification
Is it all a game? Understanding the principles of gamificationIs it all a game? Understanding the principles of gamification
Is it all a game? Understanding the principles of gamificationSimon Fraser University
 
3D Printing - Disruptions, Decisions, and Destinations
3D Printing - Disruptions, Decisions, and Destinations3D Printing - Disruptions, Decisions, and Destinations
3D Printing - Disruptions, Decisions, and DestinationsSimon Fraser University
 
Generation-C - Innovation, UGC, IP laws, Social Media, Hacking, iPhone, DRM, ...
Generation-C - Innovation, UGC, IP laws, Social Media, Hacking, iPhone, DRM, ...Generation-C - Innovation, UGC, IP laws, Social Media, Hacking, iPhone, DRM, ...
Generation-C - Innovation, UGC, IP laws, Social Media, Hacking, iPhone, DRM, ...Simon Fraser University
 
Nomen est omen: formalizing customer labeling theory
Nomen est omen: formalizing customer labeling theoryNomen est omen: formalizing customer labeling theory
Nomen est omen: formalizing customer labeling theorySimon Fraser University
 
Understanding and Managing Electronic Word of Mouth (EWOM)
Understanding and Managing Electronic Word of Mouth (EWOM)Understanding and Managing Electronic Word of Mouth (EWOM)
Understanding and Managing Electronic Word of Mouth (EWOM)Simon Fraser University
 
Social media? Get serious... Functional Blocks of Social Media
Social media? Get serious... Functional Blocks of Social MediaSocial media? Get serious... Functional Blocks of Social Media
Social media? Get serious... Functional Blocks of Social MediaSimon Fraser University
 
Minding the gap: Bridging Computing Science and Business Studies with an Inte...
Minding the gap: Bridging Computing Science and Business Studies with an Inte...Minding the gap: Bridging Computing Science and Business Studies with an Inte...
Minding the gap: Bridging Computing Science and Business Studies with an Inte...Simon Fraser University
 
For those about to tag: mobile and ubiquitous commerce
For those about to tag: mobile and ubiquitous commerceFor those about to tag: mobile and ubiquitous commerce
For those about to tag: mobile and ubiquitous commerceSimon Fraser University
 
Interactive Innovation of Technology for Mobile Work
Interactive Innovation of Technology for Mobile WorkInteractive Innovation of Technology for Mobile Work
Interactive Innovation of Technology for Mobile WorkSimon Fraser University
 

Mehr von Simon Fraser University (20)

Consumer generated Intellectual Property
Consumer generated Intellectual PropertyConsumer generated Intellectual Property
Consumer generated Intellectual Property
 
Financial services & Ucommerce
Financial services & UcommerceFinancial services & Ucommerce
Financial services & Ucommerce
 
Leaking secrets
Leaking secretsLeaking secrets
Leaking secrets
 
à votre santé
à votre santéà votre santé
à votre santé
 
Using simulations in the marketing classroom
Using simulations in the marketing classroom Using simulations in the marketing classroom
Using simulations in the marketing classroom
 
Social Media and Innovation
Social Media and InnovationSocial Media and Innovation
Social Media and Innovation
 
Is it all a game? Understanding the principles of gamification
Is it all a game? Understanding the principles of gamificationIs it all a game? Understanding the principles of gamification
Is it all a game? Understanding the principles of gamification
 
Branded Flash Mobs
Branded Flash MobsBranded Flash Mobs
Branded Flash Mobs
 
3D Printing - Disruptions, Decisions, and Destinations
3D Printing - Disruptions, Decisions, and Destinations3D Printing - Disruptions, Decisions, and Destinations
3D Printing - Disruptions, Decisions, and Destinations
 
Jan's rules for writing
Jan's rules for writingJan's rules for writing
Jan's rules for writing
 
Generation-C - Innovation, UGC, IP laws, Social Media, Hacking, iPhone, DRM, ...
Generation-C - Innovation, UGC, IP laws, Social Media, Hacking, iPhone, DRM, ...Generation-C - Innovation, UGC, IP laws, Social Media, Hacking, iPhone, DRM, ...
Generation-C - Innovation, UGC, IP laws, Social Media, Hacking, iPhone, DRM, ...
 
Nomen est omen: formalizing customer labeling theory
Nomen est omen: formalizing customer labeling theoryNomen est omen: formalizing customer labeling theory
Nomen est omen: formalizing customer labeling theory
 
Understanding and Managing Electronic Word of Mouth (EWOM)
Understanding and Managing Electronic Word of Mouth (EWOM)Understanding and Managing Electronic Word of Mouth (EWOM)
Understanding and Managing Electronic Word of Mouth (EWOM)
 
Mobile Communities of Practice
Mobile Communities of PracticeMobile Communities of Practice
Mobile Communities of Practice
 
Unpacking the social media phenomenon
Unpacking the social media phenomenonUnpacking the social media phenomenon
Unpacking the social media phenomenon
 
Social media? Get serious... Functional Blocks of Social Media
Social media? Get serious... Functional Blocks of Social MediaSocial media? Get serious... Functional Blocks of Social Media
Social media? Get serious... Functional Blocks of Social Media
 
Panopticon revisited
Panopticon revisitedPanopticon revisited
Panopticon revisited
 
Minding the gap: Bridging Computing Science and Business Studies with an Inte...
Minding the gap: Bridging Computing Science and Business Studies with an Inte...Minding the gap: Bridging Computing Science and Business Studies with an Inte...
Minding the gap: Bridging Computing Science and Business Studies with an Inte...
 
For those about to tag: mobile and ubiquitous commerce
For those about to tag: mobile and ubiquitous commerceFor those about to tag: mobile and ubiquitous commerce
For those about to tag: mobile and ubiquitous commerce
 
Interactive Innovation of Technology for Mobile Work
Interactive Innovation of Technology for Mobile WorkInteractive Innovation of Technology for Mobile Work
Interactive Innovation of Technology for Mobile Work
 

Kürzlich hochgeladen

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 

Kürzlich hochgeladen (20)

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 

RFID and Cash

  • 1. C O M M E N TA RY By IAN ANGELL and JAN KIETZMANN RFID AND THE END OF CASH? Thinking about buying a new car with cash? RFID-embedded How about paying school fees? Don’t bother. money is likely Such money is not welcome. Western banks today treat all large cash deposits as “suspicious to mean the end transactions,” covering their backs by immedi- of anonymous ately reporting cash-loaded customers to the transactions and authorities for carrying sums far less than the with it one of minimum amounts required by regulations. Governments say “Only the guilty deal in the last bastions cash.” Consequently, sensible businesses avoid of personal large cash deals. Depositing cash into the anonymity. banking system means everything is electroni- cally recorded. New anti-money-laundering regulations, especially since the terror attacks of September 11, 2001, identify these deposits as the entry point of an audit trail of suspicious transac- tions. What is going on? Illustration by R OLAND S ARKANY COMMUNICATIONS OF THE ACM December 2006/Vol. 49, No. 12 91
  • 2. Legislators in the West have decided in the U.S., much of the increase that the deregulation of the past decades, due to the use of ATMs and particularly concerning money (such as demand from abroad [5]. Govern- the loosening of exchange controls), has ments don’t easily give up on their gone too far. Despite profiting substan- tax take, developing tactics for tially from seigniorage, including the eroding anonymity, fungibility, profit resulting from the difference in the HE MORE T and the ability to store value that cost of printing money and the money’s make cash so attractive to tax face value, governments grudgingly issue DETAILED THE evaders. exchangeable money; or else other private RECORDING OF RFID Cash has no provenance. groups would. Harking back to Plato and Unlike with checks and credit his moneyless utopian Republic, govern- TRANSFERS THE , cards, it is very difficult in cash ments today prefer a perfect society with TIGHTER THE NET transactions to associate a pur- a nonconvertible currency that (they chaser with a purchase or a partic- claim) safeguards their economies from BECOMES AND , ular purchase with other external meddling and from losing the THE MORE purchases. Audit trails have to be wealth of those dissidents who choose to separately and expensively escape what they see as state oppression. LIMITATIONS THAT imposed. Roman Emperor Ves- New technology raises the spectre of the ARE PLACED ON pasian 2,000 years ago may have state gaining total control over money, believed pecunia non olet (money achieving this nominal collectivist heaven THE INDIVIDUAL S ’ doesn’t stink), but modern govern- by destroying the essence of cash—the ABILITY TO REMAIN ments sense the possibility of cash cornerstone of individual freedom. giving off the unmistakable odor This scenario seems paradoxical given ANONYMOUS . of each identifiable bearer, making that global telecommunications is bring- it a de facto identity card and ing about the death of distance. Busi- negating the personal freedom nesses, along with some individuals, have encapsulated in anonymous become truly international. Today’s con- money. vergence of the Internet, mobile technol- Although individual bank ogy, and electronic payment schemes notes have unique identification makes everyone a trader, a global business elite that is numbers, they are not tracked from the moment of of one mind: arbitrage the new opportunities to min- issue. Indeed, until recently it was too costly to track imize their tax liability. the cash transactions of individuals (even their checks and credit card transactions), except in special high- priority cases. Now there is computerized profiling, H owever, most governments are addicted to data mining, and radio-frequency identification taxation. Democracies are no exception; how (RFID). The government’s long-term aim may be to else could they afford to subsidize the bene- turn society into a Panopticon, using it as an analogy fits they deliver to preferred voters and contributors? for a prison in which an unseen guard observes all Increased regulation makes the state even more costly prisoners without them knowing they are being to run, so the tax take must increase. The state is a observed. By constructing a complete record of the Faustian pact, where the individual submits to its personal debits and credits of all its citizens, thereby “legitimate violence” in return for protection and spinning a web connecting all buyers and sellers, the security [12]. The government, from its side of this Internal Revenue Service and its equivalents outside bargain, demands ownership of its citizens and the the U.S. not only calculate every tax bill but are able monopolistic right to tax them at whatever level to seize payment from those operating in both the whenever it wishes, calling it “balancing the budget.” official economy and the underground “shadow However, taxing cash is complicated due to its three economy.” interrelated properties: anonymity, fungibility, and In a democratic regime, this assault on individual ability to store value. freedom must appear benign so as to avoid popular Although credit and debit cards do away with the discontent. Democracies are obliged to profess supe- need for cash, the amount of cash in circulation is rior morality and/or utility in order to convince citi- increasing in almost all countries. As of July 2004, zens of the rightness of their legitimate violence [12]. U.S.$730 billion in coins and notes was in circulation The enforcers of state power—the police, national 92 December 2006/Vol. 49, No. 12 COMMUNICATIONS OF THE ACM
  • 3. security services, and tax collectors—may be given the tag that uniquely identifies any item bearing the tag. right, nay the obligation, to invade the privacy of cit- So-called “smart tags” are used to track or trace izens with impunity. objects. Worldwide in 2003, they helped keep track of How do democratic governments get their citizens about 100 million pets and 20 million livestock [3]. to accept a wholesale loss of privacy? The trick is to convince them that such intrusion is in their own self- T interest and may even deliver personal benefits. Some he Auto-ID Center, established in 1999 as an politicians seize the moral high ground by stirring up academic research project at the Massachusetts a smokescreen of public outrage against drug traffick- Institute of Technology, developed the archi- ing, terrorism, corporate greed, pedophilia, and coun- tecture for creating a seamless global network of all terfeiting. They also make the highly suspect claim physical objects (www.autoidlabs.org/aboutthelabs. that the pairing of regulation and technology will cure html). The technology has since been transferred to these social ills, protecting the individual from fraud EPCglobal (www.epcglobalinc.org), which oversees and theft. Unfortunately, this duo comes at a cost. For development of standards for electronic product code example, of the £250 billion estimated to have been (EPC) tags. These tags are used for every imaginable laundered through the U.K., the government has item—from clothes to medicine, electronics, food, recovered a mere £46 million, at a cost of £400 motor vehicles, books, door locks, and airplanes— million [2]. revolutionizing logistics and supply-chain and inven- The USA PATRIOT Act of 2001 and in the U.K. tory management worldwide. For example, the Regulation of Investigatory Powers Act of 2000 Legoland in Denmark uses RFID and 802.11 and the Proceeds of Crime Act of 2002 were all WLAN technology to find lost children [4], and approved with atypical haste. Legislators have learned U.S. forces employ Texas Instruments wristbands to the lesson of the 1931 conviction of Al Capone by the help track wounded U.S. soldiers and prisoners of U.S. Department of the Treasury. If you can’t catch a war in Iraq. criminal in the act, “follow the money” instead. Invert The turn of the century saw substantial gains in the burden of proof. The accused (in fact everyone) is the efficiency of power conversion in circuits, pro- guilty until proven innocent, where proof of inno- viding power for cryptographic operations. The least cence is nothing less than the unconditional surrender expensive and least powerful tags (such as basic EPC of all personal and financial information. No surprise tags) provide no layers of security. More advanced that anti-money-laundering regulations, especially the and costly tags require additional power for cryptog- “know your customer” rules, demand that every bank raphy (such as for static key operations in PINs and official act as a secret policeman for the government. passwords, symmetric key encryption, and crypto- Should the privacy dissident operate in electronic graphic co-processors). These extra levels of security cash? No. E-cash is hopelessly compromised, with enable novel opportunities, not only for commercial issuers intimidated into insinuating an audit trail in transactions but for money itself. the encrypted data; it is just a glorified debit card. Per- An RF-emitting tag can be small enough to fit haps the dissident should stay well away from the gov- into bank notes so as to uniquely identify each one ernment-regulated banking system, using only as it passes within range of a sensor. The authorities high-denomination bank notes. Unfortunately, this claim its purpose is to combat counterfeiting and well-used tactic no longer provides the desired level of identify money transfers between suspicious parties. anonymity, owing to its convergence with another RFID readers interrogate multiple tags simultane- technology. ously. Every time notes are passed to or from a bank, RFID’s ability to perform as an auto-identification RFID readers identify and record them, linking this technology was first utilized by the Royal Air Force in data with the person who presented or received World War II to differentiate between friendly and them. The government has the potential to know enemy aircraft. Friendly planes were equipped with not only exactly how much cash is being carried bulky “active” RFID transponders (tags) energized by out/in the door but who is carrying it and who car- an attached power supply and interrogated by an ried it previously. By comparing the respective iden- RFID transceiver (reader). Applications today rely on tification numbers to entries in their database (for similar communication between RFID tag and reader, authentication purposes, of course), the authorities although the tags (miniscule microchips attached to can draw a link between the last recorded holder of antennae) are generally “passive,” powered by an elec- the note and the current one. tromagnetic field emitted by the reader. Radio signals This web of contact information is also incom- inform nearby readers of a serial number stored on the plete. It misses out on the numerous cash transac- COMMUNICATIONS OF THE ACM December 2006/Vol. 49, No. 12 93
  • 4. tions not captured by banks, including those that weigh the hazards through a marketing blitz aimed at occurred as the note was passed hand to hand, start- gaining widespread public acceptance. ing with the party who issued it and ending with whoever returned it to the bank. To increase the accu- I racy of their records, authorities will indeed expect t’s not only that passive RFID tag technology is intermediate retail and service outlets to identify cus- rapidly maturing among a passive (some might say tomers, then read and report their tags. Cash registers apathetic) public. Innovators predict huge public can record all transactions, good and bad, legal and demand for the products of the convergence of per- illegal, honest and dishonest, and identify notes that sonal RFID readers and mobile telephones. The enter their system, flagging those that are either coun- mobile telephony industry senses a killer application. terfeit or no longer accepted as legal tender. The new Who wouldn’t pay to locate misplaced keys, specta- RFID-based technology gives the authorities the cles, gloves, or socks (conveniently tagged by their power to cancel a particular note. The more detailed manufacturers)? By marrying an asynchronous reader the recording of RFID transfers, the tighter the net with a synchronous mobile phone, the emergent becomes, and the more limitations that are placed on device would be able to read and transfer tag data the individual’s ability to remain anonymous. anywhere in near real time. Connecting phones A 2004 Internet hoax involved $20 bills with an and/or tags would make it possible to send and RFID tag in Andrew Jackson’s eye [10]. So it’s all a receive electronic funds. Accessing a tag might also ruse? Not at all. The 10,000-yen bills (~$100) of trigger a connection to the manufacturer or retailer’s 2004 were to be implanted with Hitachi’s 0.4mm2, Internet presence through a mobile phone. Applica- 60-micron-thick “␮-chip” [8], each costing around tions for mobile phones equipped with RFID readers 50 yen [9]. Plausibly, as the price of tags decreases fur- are endless, promising to introduce huge new revenue ther, they will be embedded into smaller-denomina- streams to handset manufacturers, application devel- tion bank notes to increase the recording and opers, and service providers. monitoring of yet more cash transactions. The Euro- The security infrastructure surrounding this tech- pean Union considered implanting tags in its notes by nology, balancing privacy against commercial applica- the end of 2005, though this is on hold, and the tions, is a major concern. RFID does not require Swedish National Bank has announced a similar idea. line-of-sight for reading tags, operating instead on Is the U.K. or U.S. next? radio frequency. Hence, private data about people No more anonymous cash. But worse, two other and their belongings and shopping behavior can be properties of cash—fungibility and stored value—are received simply by waving a reader near their clothes, also under attack. Each bank note, whatever its handbags, and other personal items. The size of their denomination, should be as good as any other, but shirts is no longer their personal secret, nor is the not if it’s rejected, discounted, or terminated. By amount of cash they are carrying. By collecting tag insisting that only bank notes with operational tags data on the person being RF-interrogated, the “data are legal tender, governments may cancel the cash of voyeur” might create a complete commercial, and, targeted individuals. worse, personal profile. What a great method for instantly taxing citizens. One may argue that this problem would be solved Governments calculate the tax owed and take the cor- by disabling each tag when it leaves a shop, but this is rect sum straight out of each taxpayer’s pocket by can- neither in the interest of the retailer nor, in fact, of the celing bank notes, then reprinting and reissuing new customer. Tags will store warranty information (paper ones bearing different RFID tags. The possibilities are receipts will no longer be accepted) and, more impor- limitless. By giving each note an expiration date, gov- tant, the rights of ownership (a stolen item is easily ernments may force bearers of cash to spend their identified). It is thus in the interest of the purchaser money. The government can also hold out the threat to keep tags alive. Furthermore, using RFID-enabled of instant devaluation, with the value of a bank note phones in the exchange of goods and money is both a being not the numbers printed on the note itself but guarantee and a proof of the transfer of ownership. the amount coded into the tag, drastically transform- Only a troublemaker would want to destroy or dis- ing the notion of stored value. able such useful data. Why doesn’t everyone object loudly and publicly? So there are very real general benefits in RFID It’s not just ignorance of the technology. A very real technology. However, this does not mean that the opportunity presents itself, as RFID technology finds mixing of cash and mobile RFID will receive strong its way into the home at a price all can afford. The support. As with many new technologies, innovators viral message is going out that the benefits far out- promise utopia; meanwhile, governments may declare 94 December 2006/Vol. 49, No. 12 COMMUNICATIONS OF THE ACM
  • 5. that only tagged items are secure, and identify individual travelers through industry proclaims the convenience the tagged cash and goods they carry. and savings made possible through There will be no more slipping mobile RFID readers. It is not surpris- through customs without paying duty ing that two main supporters of RFID or carrying suitcases full of money to are the U.S. Department of Defense Switzerland. and Wal-Mart and are likely to be However, because RFID technol- joined by the mobile technology sec- B Y COLLECTING ogy doesn’t require a physical connec- tor and others once new revenue tion between tag and reader, officials streams are more apparent. TAG DATA ON will be able to validate a person’s iden- Benefits to major corporations and THE PERSON BEING tity not only at the port or airport but governments will not in and of them- also in any public or private space selves generate public acceptance of RF- , INTERROGATED within the limited range of the RFID “ tagged cash. That acceptance is essen- THE DATA VOYEUR ” tag/readers, all without the express tial if the technology is to overcome permission or even awareness of the privacy objections. Hence the issue of MIGHT CREATE person. As the range at which tags may mobile RFID and tagged bank notes, A COMPLETE be read increases and the technology while contributing to decreased improves, will unreasonable search anonymity, is being marketed to indi- COMMERCIAL , and seizure become imperceptible viduals as a self-evident personal advantage. Once people are proffered , AND WORSE , search and seizure? a bank note, their mobile phones read PERSONAL . B the tag, establish a connection to the PROFILE ut it’s not only the government authority’s database, and receive con- watching from the shadows. firmation of the note’s authenticity Privacy advocates argue that and validity and of the legitimacy of mobile RFID readers can lead to the bearer. Fraud will decrease dra- increased identity theft, high-tech matically. As a byproduct of the stalking, and commercial data collec- process, the government will obtain tion [11], perhaps with the intent of yet more information for its database hijacking the seemingly good inten- of cash transfers from private citizens, as well as from tions of RFID-tagged goods and cash. Indeed, retail- the banking, retail, and service sectors. As tagged ers are concerned that thieves equipped with mobile product purchases find their way into our homes, we RFID devices will create new and sophisticated ways will be only a step away from installing indoor of shoplifting. Anarchists have long dreamed of the receivers into our shelves, floors, and doorways [1]. destruction of the state by destroying its power to The net on anonymity will continue to tighten. The issue and control money. In “chaos attacks,” they hope criticism of Katherine Albrecht, founder and director to damage tags embedded in cash to render it practi- of an advocacy group called Consumers Against cally invalid until exchanged at banks for good money Supermarket Privacy Invasion and Numbering with valid tags, causing major inconvenience and dis- (www.spychips.com), and others have convinced ruption. Global retail chains (such as McDonald’s), Auto-ID Labs around the world to address the grow- for years targets of environmental activists, would find ing concern and work on ways to deal with the pri- collecting and then validating large amounts of cash a vacy issue. constant headache. This is just as well, because the databases of tags When only fully functioning tagged money will be and their bearers maintained by various governments good money, what happens when a tag is destroyed, don’t stop with money. In the name of homeland whether by accident or on purpose? General access to security, new U.S. passports will contain standard the government’s provenance database of money passport data in an embedded tag that can trigger the (needed to replace genuinely damaged bank notes) respective name, address, and digital picture. will introduce unimagined levels of complexity into Although not encrypted, security will be warranted the system, along with the likelihood of database fail- through digital signatures [11]. The world’s national ure. How do we ensure that thieves do not screen the borders will be equipped with readers, thereby tagged content of our wallets to find out if we are increasing control of the transnational flow of people. worth robbing? Innocents will need to engage in By extension, immigration officials will be able to countermeasures: wallets will contain RFID shielding COMMUNICATIONS OF THE ACM December 2006/Vol. 49, No. 12 95
  • 6. material for personal security reasons, potential for use in small denomina- and people will carry RFID blockers tions—real cash money. Maybe or tag jammers to disrupt transmis- Hayek’s vision of the “denationalisa- sion of information to scanning tion of money” [6] will become a devices. reality. As a substitute for govern- We will soon be living in a world of ment-issued bank notes, we may tags, with different ones serving differ- instead just deal in yet another, ent purposes. EPC tags will store untagged currency to maintain our Global Trade Identification Numbers anonymity. c to give each item a unique identifica- tion number. RFID-tagged items will HOW DO WE REFERENCES be as ubiquitous as barcoded products ENSURE THAT THIEVES 1. Albrecht, K. Supermarket cards: The tip of the retail surveillance iceberg. Denver University Law are today but be even more pervasive. DO NOT SCREEN THE Review 79, 4 (Summer 2002), 534–539 and However, unlike barcodes, multiple 558–565. RFID tags can be read simultaneously, TAGGED CONTENT 2. Bawden, T. U.K.’s bid to trace dirty money is ‘pathetic.’ Times Online (Mar. 15, 2005); busi- each distinctively identifying the OF OUR WALLETS TO ness.timesonline.co.uk/article/0,,8209- bearer at once without the need for 1525951,00.html. 3. Booth-Thomas, C. The see-it-all chip. Time line-of-sight or direct contact between FIND OUT IF WE ARE Online Edition (Sept. 14, 2003); reader and tag. Each of us will be a walking mountain of tags, and it will WORTH ROBBING? www.time.com/time/globalbusiness/article/0,9171, 1101030922-485764,00.html. 4. Collins, J. Lost and found in Legoland. RFID be impossible to isolate them all from Journal (Apr. 28, 2004); www.rfidjournal. being read. Moreover, due the conver- com/article/articlview/921/1/1/. 5. Federal Reserve Bank of New York. How Cur- gence of the pervasive mobile tele- rency Gets into Circulation. Aug. 2004; newyork- phone and RFID readers, everyone fed.org/aboutthefed/fedpoint/fed01.html. will be able to obtain all manner of 6. Hayek, F. The Denationalisation of Money. Insti- tute of Economic Affairs, London, 1976. information about everyone else— 7. Hayek, F. The Road to Serfdom. University of from passports, clothes, personal data, Chicago Press, Chicago, 1972. 8. Hitachi. The World’s Smallest RFID IC. Hitachi, and, in particular, cash. Ltd., Tokyo, 2004; www.hitachi.co.jp/Prod/mu- chip/. 9. Leyden, J. Japan yens for RFID chips. The Regis- W ter (July 30, 2003); www.theregister.co.uk/ ill the convergence of money, mobile tele- 2003/07/30/japan_yens_for_rfid_chips/. phony, and RFID inexorably lead to the 10. McCullagh, D. RFID Industry Tries to Debunk ‘Exploding $20 Bill’ Myth. Association for Automatic Identification and Mobility, Inc., end of cash as we know it? Is this “the Warrendale, PA, Mar. 18, 2004; www.prisonplanet.com/031804 complete delivery of the individual to the tyranny of _RFID_industry_tries_to_debunk_exploding_$20_bill_myth.html. the state, the final suppression of all means of escape, 11. Singel, R. American passports to get chipped. Wired.com news (Oct. 21, 2004); www.wired.com/news/privacy/0,1848,65412,00.html. not merely for the rich, but for everybody” [7]? Possi- 12. Weber, M. Politics As a Vocation. Hackett Publishing Co., Indianapo- bly. The technology will ensure that personal credit lis, IN, 2004. devices no longer come in the shape of cards but as tags in keychain fobs, stickers, and implants. Cash as we know it will be an anachronism. RFID develop- Ian Angell (i.angell@lse.ac.uk) is a professor of information systems in the Department of Management in the London School of ments in the name of supply-chain management and Economics. national security will complement the worldwide Jan Kietzmann (j.h.kietzmann@lse.ac.uk) is a researcher in the flood of tags. The public will be ready—enthusiasti- Department of Management in the London School of Economics. cally armed with RFID-reading mobile phones to Permission to make digital or hard copies of all or part of this work for personal or scan items in shops and the money they handle, as classroom use is granted without fee provided that copies are not made or distributed well as information about one another. for profit or commercial advantage and that copies bear this notice and the full cita- tion on the first page. To copy otherwise, to republish, to post on servers or to redis- Can the stampede of privacy-invading mobile tribute to lists, requires prior specific permission and/or a fee. technology along Friedrich Hayek’s Road to Serfdom [7] be stopped? After all, money does not have to be created legal tender by governments. Due to low transaction costs, organizations can issue money, pos- sibly as a percentage of their equity. To a certain extent this is already happening with large-denomina- tion bonds, but new technology introduces the © 2006 ACM 0001-0782/06/1200 $5.00 96 December 2006/Vol. 49, No. 12 COMMUNICATIONS OF THE ACM