An Anonymous Patron writes “Cameron Sturdevant, eWEEK Columnist, thinks using RFID tags in library books is a bad idea.
Today, the tags can be limited in range (the library is specifying a transmission range of 1 to 30 inches) and the amount of information they carry. In addition, the library wants the tags to carry only one unique item identifier and a 1-bit read/write security toggle. However, even with such limits, it takes a determined act of self-deception not to see how RFID tags could carry much more information over much greater distances in the near future.”
Recent Posts
- E-Books Can Subvert Book Bans, But Corporate Profit-Seeking Stands in the Way March 10, 2024
- Ten Stories That Shaped 2023 December 15, 2023
- War Sows Disruption at the National Book Awards November 16, 2023
- “No one else is saving it”: the fight to protect a historic music collection November 16, 2023
- No, I Don’t Want to Join Your Book Club November 9, 2023
- Iowa election 2023: Pella Public Library retains independence November 9, 2023
- A door at a Swedish library was accidentally left open 446 people came in, borrowed 245 books. Every single one was returned November 9, 2023
Recent Comments
- Examining Arab and Muslim librarians in fiction – Pop Culture Library Review on Librarian Combats Muslim Stereotypes
- St. Paul libraries face moment of reckoning – LISNews – News For Librarians on Secret and mysterious libraries
- Ellie on Just How Gross Are Library Books, Exactly?
- Prodigious1one on The Teaching Librarian Versus The Teacher
- Jason on Ten Stories That Shaped 2019
- centaurea on Libraries using Internet Trust Tools
LISNews Archives
- March 2024 (1)
- December 2023 (1)
- November 2023 (5)
- October 2023 (1)
- September 2023 (1)
- August 2023 (22)
- February 2023 (3)
- January 2023 (20)
- December 2022 (6)
- February 2022 (3)
- December 2021 (1)
- December 2020 (1)
- July 2020 (11)
- June 2020 (11)
- January 2020 (1)
- December 2019 (2)
- November 2019 (4)
- October 2019 (1)
- June 2019 (1)
- May 2019 (4)
- April 2019 (3)
- March 2019 (11)
- February 2019 (41)
- January 2019 (31)
- December 2018 (6)
- November 2018 (11)
- October 2018 (15)
- September 2018 (9)
- August 2018 (22)
- July 2018 (1)
- June 2018 (1)
- May 2018 (7)
- April 2018 (8)
- March 2018 (5)
- February 2018 (17)
- January 2018 (13)
- December 2017 (8)
- November 2017 (16)
- October 2017 (18)
- September 2017 (11)
- August 2017 (8)
- July 2017 (8)
- June 2017 (21)
- May 2017 (39)
- April 2017 (22)
- March 2017 (15)
- February 2017 (21)
- January 2017 (40)
- December 2016 (20)
- November 2016 (9)
- October 2016 (20)
- September 2016 (48)
- August 2016 (48)
- July 2016 (55)
- June 2016 (61)
- May 2016 (39)
- April 2016 (67)
- March 2016 (81)
- February 2016 (85)
- January 2016 (69)
- December 2015 (90)
- November 2015 (126)
- October 2015 (107)
- September 2015 (85)
- August 2015 (42)
- July 2015 (32)
- June 2015 (35)
- May 2015 (39)
- April 2015 (14)
- March 2015 (60)
- February 2015 (75)
- January 2015 (44)
- December 2014 (30)
- November 2014 (39)
- October 2014 (43)
- September 2014 (30)
- August 2014 (36)
- July 2014 (59)
- June 2014 (46)
- May 2014 (62)
- April 2014 (58)
- March 2014 (52)
- February 2014 (37)
- January 2014 (42)
- December 2013 (41)
- November 2013 (25)
- October 2013 (43)
- September 2013 (28)
- August 2013 (32)
- July 2013 (61)
- June 2013 (51)
- May 2013 (50)
- April 2013 (52)
- March 2013 (68)
- February 2013 (62)
- January 2013 (62)
- December 2012 (53)
- November 2012 (64)
- October 2012 (111)
- September 2012 (109)
- August 2012 (128)
- July 2012 (57)
- June 2012 (75)
- May 2012 (163)
- April 2012 (158)
- March 2012 (109)
- February 2012 (125)
- January 2012 (136)
- December 2011 (109)
- November 2011 (74)
- October 2011 (82)
- September 2011 (95)
- August 2011 (106)
- July 2011 (93)
- June 2011 (102)
- May 2011 (94)
- April 2011 (105)
- March 2011 (100)
- February 2011 (92)
- January 2011 (110)
- December 2010 (124)
- November 2010 (83)
- October 2010 (118)
- September 2010 (115)
- August 2010 (110)
- July 2010 (108)
- June 2010 (113)
- May 2010 (78)
- April 2010 (121)
- March 2010 (191)
- February 2010 (182)
- January 2010 (168)
- December 2009 (129)
- November 2009 (116)
- October 2009 (131)
- September 2009 (149)
- August 2009 (162)
- July 2009 (166)
- June 2009 (189)
- May 2009 (112)
- April 2009 (164)
- March 2009 (185)
- February 2009 (151)
- January 2009 (173)
- December 2008 (200)
- November 2008 (155)
- October 2008 (252)
- September 2008 (267)
- August 2008 (193)
- July 2008 (208)
- June 2008 (161)
- May 2008 (208)
- April 2008 (253)
- March 2008 (201)
- February 2008 (246)
- January 2008 (185)
- December 2007 (200)
- November 2007 (208)
- October 2007 (241)
- September 2007 (227)
- August 2007 (269)
- July 2007 (201)
- June 2007 (205)
- May 2007 (157)
- April 2007 (217)
- March 2007 (250)
- February 2007 (183)
- January 2007 (181)
- December 2006 (163)
- November 2006 (180)
- October 2006 (170)
- September 2006 (215)
- August 2006 (210)
- July 2006 (202)
- June 2006 (257)
- May 2006 (280)
- April 2006 (271)
- March 2006 (347)
- February 2006 (284)
- January 2006 (300)
- December 2005 (267)
- November 2005 (238)
- October 2005 (364)
- September 2005 (349)
- August 2005 (377)
- July 2005 (382)
- June 2005 (403)
- May 2005 (371)
- April 2005 (420)
- March 2005 (367)
- February 2005 (368)
- January 2005 (346)
- December 2004 (311)
- November 2004 (260)
- October 2004 (308)
- September 2004 (228)
- August 2004 (319)
- July 2004 (395)
- June 2004 (338)
- May 2004 (288)
- April 2004 (364)
- March 2004 (348)
- February 2004 (438)
- January 2004 (266)
- December 2003 (222)
- November 2003 (226)
- October 2003 (281)
- September 2003 (317)
- August 2003 (315)
- July 2003 (278)
- June 2003 (282)
- May 2003 (265)
- April 2003 (271)
- March 2003 (249)
- February 2003 (283)
- January 2003 (210)
- December 2002 (186)
- November 2002 (184)
- October 2002 (222)
- September 2002 (210)
- August 2002 (207)
- July 2002 (184)
- June 2002 (166)
- May 2002 (160)
- April 2002 (195)
- March 2002 (183)
- February 2002 (195)
- January 2002 (203)
- December 2001 (203)
- November 2001 (238)
- October 2001 (183)
- September 2001 (153)
- August 2001 (204)
- July 2001 (243)
- June 2001 (176)
- May 2001 (92)
- April 2001 (116)
- March 2001 (153)
- February 2001 (142)
- January 2001 (131)
- December 2000 (110)
- November 2000 (124)
- October 2000 (128)
- September 2000 (132)
- August 2000 (138)
- July 2000 (166)
- June 2000 (135)
- May 2000 (120)
- April 2000 (121)
- March 2000 (181)
- February 2000 (163)
- January 2000 (54)
- November 1999 (37)
True Thoughts…
I am a library student at the University of South Florida. I have to do a project on RFID tags in libraries. What are your personal thoughts on this issue? Do you really think that are an invasion of privacy even though the tags are turned off when the items are checked out, or do you think they are a great way to increase productivity in collection maintenance? Anyone is welcome to comment.
Thank you!
Re:True Thoughts…
Technology enables someone with the right equipment to sit outside a home and eavesdrop on phone calls, overhear conversations inside the home, possibly intercept and decipher the signal from a computer, detect and locate persons by their body heat, etc. The U.S. has tended to rely on laws to discourage antisocial behavior instead of outlawing technology.
RFID Tags are great!
I think that these tags are a great idea. One great use for them would be to find misshelved books in the library. If your library was missing their copy of, “Stories of XYZ,” it would be great to be able to walk around the library with a transmitter that was searching for that book and when you got within ten feet of the book that was misshelved you could detect it.
I really don’t understand the privacy argument. Who is going to be scanning my books for information and where are they going to do it? Not at the library because they already know what books I have. I think the privacy issue with these devices is a phantom one.
Re:True Thoughts…
But they aren’t turned off when the items are checked out. They are just leaving the vicinity of the library’s tag readers.
You might want to get a better understanding of how RFID tags operate before you get too far into the ethical ramifications. Here are a few good places to start.
Quick primer: …
The tags are read passively. The scanner’s transmission is what provides power to the RFID tag, which enables the tag to transmit its ID code so that the scanner can read it. ANY proper scanner can activate, and thus, read the tag. Just because the tag in the book is not in the library does not mean that it can not be read by another scanner at some other location. Potentially, a library patron’s checked out books may declare themselves to the sales associate’s cash register at the Bennetton at the mall. Or to the FastTrak toll both on the highway. Or the ID-badge reader at someone’s workplace. Or
The way to disable this kind of RFID tag is to overload it. Use the same frequency as the scanner uses, but more powerfully. The power circuit in the tag then burns out like a fuse, disabling the tag permanently. Putting it in a microwave oven is an often-cited example method. It is not possible to temporarily disable the tag. These are not the same thing as the tattle-tags many library systems employ.
Re:RFID Tags are great!
If you look at the Anon. Patron’s post above you can see some of the potential problems with RFID. Someone with the right equipment can detect what you have checked out and where you got it from. Another post above mentions that the RFID can be disabled but not turned off, which is more of a conundrum for retail from what I understand. For example, if you take that box of Wheaties home, presumably your tv could download some ads for Wheaties-related products, and your neighbors’ computer (or your health insurance office) could snoop to see what you’re eating,. You can expand this scenario outward into ever increasing realms of big-brother-ness.
I can definitely see the use for tracking down books in the library and for speeding up checkouts, but I don’t like the idea of this kind of tracking in the consumer sphere.
Re:RFID Tags are great!
For someone to know what you are reading they would have to be connected to the library’s automated system.
I would not store anything on this tag but a barcode and a checked in/out bit.
Anyone who has access to the system would not need to follow someone home to find this out, they would simply type in their name or a book title. So I don’t see what the issue is.
I’m looking forward to being able to find lost books more easily and to know WHAT is being stolen as it walks out the door.
Re:True Thoughts…
If all that is on the tag is a barcode number who cares who else reads it? The toll booth reader somehow detects your book. What do they see? 7200437 Wow, that is useful you have something with the barcode 7200437, now we know everything about you?
I have to go there is a black helicopter outside my house.
Re:True Thoughts…
Thank you for your thoughts.
In every library that I researched their RFID tags were not high tech enough to be read by the library beyond the exit gates. And all of their RFID tags are encoded to only be read by their own readers. Meaning they can’t be read by a scanner at the Benetton store. I understand that there are a number of different types of RFID technology. Michelin Tires has the budget to afford the RFID technology that can track the locations of their tires even after they have been purchased and installed on vehicles. Libraries don’t have the budget to incorporate that kind of higher RFID technology. I have plenty of valid information from interviews by librarians and RFID vendors, I know the technology that I am researching, specific to libraries not to large corporations.
I’m not posting to get information about RFID tags; I am posting to get your opinion about them as a librarian.
Re:True Thoughts…
It’s not just a barcode number. No other item in the world will have that RFID number. 2^256 has enough digits to assign a different number to every atom in the universe.
The toll booth reader doesn’t need to know, it just has to remember. Pegging you with the book can happen later. It might go something like this:
The toll-both sensor easily detects your book because its tag responds to the signal when you get in range. It sees:
The toll booth doesn’t recognize the digits, because all EZpass IDs have “1baba81d” at the beginning of the last block. But because of heightened transportation security concerns, all toll booths are now saving every RFID read for posterity. It also picked up IDs from the domestic and foreign money in your wallet, your car’s tires, your underwear, the several other library books you have, the package of new quadruple-trac razor blades you recently bought, your employee ID badge (unlocks the doors when you get close enough), and quite a few other items including, of course, your EZpass. It saves ALL these tag IDs in its records about you and associates them with your EZpass ID.
Later on, your spouse files for divorce and subpoenas your EZpass records because he is trying to prove that you have been draining your joint account and having an affair with someone who lives up the thruway. (Oh, by the way, the NY State Highway patrol called, they said your EZpass somehow made it between the traffic flow readers at mileposts 65 and 75 in less than 8 minutes. Please send your speeding ticket payment to…)
Your spouse’s legal team cross-checks the tags against public and private databases including the one that reveals:
RFID tag manufactured by Legic Systems (dc49892d); on contract for Texas Instruments (ac993e48) on some date in 2004 (6097e3); blah blah batch number blah blah; Legic’s data has 2a8b4c8b through 2a8d312e going to Auto-Graphics, Inc. a library automation consultant. Auto-Graphics reveals the tag was in a lot they sold to the Pelham Free Library (ab61d016). A dectective walks the stacks with a hand-held reader until he gets a match. Or, if that fails, subpoenas the Library for the title that the RFID is assigned to (no need for the patron circ record, just the title will do, thank you).
So, your perusal of Hide Your Assets and Disappear: A Step-by-Step Guide to Vanishing Without a Trace is now a matter of court record. They don’t include for the record the other titles you had on you that cover surviving spousal abuse, because you bought them at a bookstore that doesn’t yet use RFID tags.