Skip to main content

Passive Human ICT Implants: Risks and Possible Solutions

  • Chapter
  • First Online:
Human ICT Implants: Technical, Legal and Ethical Considerations

Part of the book series: Information Technology and Law Series ((ITLS,volume 23))

  • 1026 Accesses

Abstract

Despite the advantages that the use of Radio Frequency IDentification (RFID) technology entails, privacy stemming from its mass deployment causes concern both in society and the academic community. Although non-implantable passive RFID devices in general remain more advanced than implantable, glass capsule types, both generally have fundamental technological limitations that mean they are susceptible to similar issues. Indeed, the security and privacy implications of RFID for a variety of applications have been well explored; however, the use of them inside the body serves to further aggravate some of the known issues. Whilst the numbers of people with such implanted devices are still small, the commercialisation of this technology means that they could become commonplace and so these concerns are paramount. In this chapter, these issues are described, and it is argued that controls and measures can be developed and engineered now in order to minimise such risks. In addition, the medical risks specific to implantation of these devices is explored in light of recent research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Halamka et al. 2006, p 699.

  2. 2.

    “Class II Special Controls Guidance Document: Implantable Radiofrequency Transponder System for Patient Identification and Health Information.” U.S. Department of Health and Human Services, Food and Drug Administration, Center for Devices and Radiological Health, December 10, 2004.

  3. 3.

    Studies on larger population indicated a lower percentage (1% among over 4,200 mice, while 10% among 177 mice).

  4. 4.

    Wustenberg 2007.

  5. 5.

    Albrecht 2007.

  6. 6.

    Stajano and Anderson 1999.

  7. 7.

    Juels et al. 2003.

  8. 8.

    Rieback et al. 2005.

  9. 9.

    Juels and Brainard 2004; Garfinkel 2002.

  10. 10.

    “Privacy Impact Assessment Framework for RFID applications” available at: http://ec.europa.eu/information_society/policy/rfid/index_en.htm

  11. 11.

    European Commission 2009.

    http://ec.europa.eu/information_society/policy/rfid/documents/recommendationonrfid2009.pdf

References

  • Albrecht K (ed) (2007) Microchip-induced tumors in laboratory rodents and dogs: a review of the literature 1990–2006. http://www.antichips.com/cancer. Accessed 15 Apr 2011

  • Garfinkel SL (2002) An RFID bill of rights. Technol Rev 150(8): October

    Google Scholar 

  • Halamka J, Juels A, Stubblefield A, Westhues J (2006) The security implications of VeriChip cloning. J Am Med Inform Assoc 13:699–707

    Article  Google Scholar 

  • Juels A, Brainard JG (2004) Soft blocking: flexible blocker tags on the cheap. In: Proceedings of the 2004 ACM workshop on privacy in the electronic society, pp 1–7

    Google Scholar 

  • Juels A, Rivest RL, Szydlo M (2003) The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM conference on Computer and communications security, pp 103–111

    Google Scholar 

  • Rieback M, Crispo B, Tanenbaum AS (2005) Keep on blockin in the free world: personal access control for low-cost RFID tags. Security Protocols Workshop, pp 51–59

    Google Scholar 

  • Stajano F, Anderson RJ (1999) the resurrecting duckling: security issues for Ad-hoc wireless networks, Security Protocols Workshop, pp 172–194

    Google Scholar 

  • Wustenberg W (2007) Effective carcinogenicity assessment of permanent implantable medical devices: lessons from 60 years of research comparing rodents with other species

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pawel Rotter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 T.M.C. ASSER PRESS, The Hague, The Netherlands, and the author(s)

About this chapter

Cite this chapter

Rotter, P., Daskala, B., Compañó, R. (2012). Passive Human ICT Implants: Risks and Possible Solutions. In: Gasson, M., Kosta, E., Bowman, D. (eds) Human ICT Implants: Technical, Legal and Ethical Considerations. Information Technology and Law Series, vol 23. T.M.C. Asser Press, The Hague, The Netherlands. https://doi.org/10.1007/978-90-6704-870-5_5

Download citation

Publish with us

Policies and ethics

Societies and partnerships