Congressional Record: March 23, 2004 (Senate)
Page S2989-S2990
RFIDS AND THE DAWNING MICRO MONITORING REVOLUTION
Mr. LEAHY. Mr. President, today I outlined some of the privacy
challenges we will soon face as new micro monitoring technologies begin
to proliferate in our society. I spoke in particular about
breakthroughs in Radio Frequency Identification, also known as RFID.
My remarks were offered at Georgetown University Law Center, during a
conference on the legal and technological challenges of video
surveillance. Micro monitoring is a subject that deserves the attention
of the Senate and of the American people, and I ask unanimous consent
the text of my address be printed in the Record in the interest of
advancing this discussion.
There being no objection, the material was ordered to be printed in
the Record as follows:
The Dawn of Micro Monitoring: It's Promise, and its Challenges to
Privacy and Security
In our post-9/11 world, technology often has been our
crucial but silent partner in helping us to ramp up our law
enforcement and national security capabilities. We in this
city are profoundly aware of the new risks we face. But we
also need to do it right. The public does not want false
assurances, nor do they want to be unduly alarmed. What the
American people want is to actually be safer. And we still
have a way to go in accomplishing that.
Tension Between Liberty And Security
In our constitutional system there is always tension
between liberty and security and never more so than since
September 11th. One of the difficult challenges we face is to
strike the right midpoint. Our constitutional checks and
balances are intended to help us do that.
The video technologies you are discussing today offer tools
that are better, faster and smarter, on scales of magnitude
that are unprecedented. As an advocate of emerging
technologies who also has a keen interest in them, I watch
these breakthroughs with great interest.
I have sought to find ways to encourage the commercial
sector to create new products and opportunities, and I have
promoted use of new technologies by law enforcement agencies,
while also protecting consumer privacy and constitutional
freedoms. That was the balance I sought to strike in my work
on CALEA and in other legislation that blends law
enforcement's needs, the needs of our robust technology
sector, and the privacy interests of the American people. The
hands-off approach to the Internet that I have favored is
another example, and right now I am working with others to
extend the Internet tax moratorium, to keep the Internet free
from discriminatory and multiple state and local taxes.
On The Cusp Of A Micro-Monitoring Revolution
The marriage of information-gathering technology with
information storing technology, manipulated in increasingly
sophisticated databases, is beginning to produce the defining
privacy challenge of the information age. Modern databases,
networks and the Internet allow us to easily collect, store,
distribute and combine video, audio and other digital trails
of our daily transactions. We are on the verge of a
revolution in micro-monitoring the capability for the highly
detailed, largely automatic, widespread surveillance of our
daily lives.
RFIDs
And one of the most dramatic and dazzling new challenges we
all will be facing soon is the emergence of a relatively new,
surveillance-related technology called radio frequency
identification--R-F-I-D for short.
RFID tags are tiny computer chips that can be attached to
physical items in order to provide identification and
tracking by radio. Their potential invasiveness is obvious
from their size, which already is surprisingly small. And
they will only get smaller.
In their basic function, RFID chips are like barcodes,
which by now are ubiquitous in our stores and offices and
crime labs and manufacturing plants.
Barcodes On Steroids
But RFID chips are like supercharged barcodes--barcodes on
steroids, if you will. They are so small they can be tagged
onto almost any object. They do not have to be in open view;
RFID receivers just have to be within the vicinity--at a
security checkpoint, in a doorway, inside a mailbox, atop a
traffic light. And RFID chips can carry a lot more
information than barcodes. Some versions are recordable so
that they can carry along the object's entire history.
RFID chips are more powerful than today's video
surveillance technology. RFIDs are more reliable, they are
100 percent automatic, and they are likely to become more
pervasive because they are significantly less expensive, and
there are many business advantages to using them. RFIDs seem
poised to become the catalyst that will launch the age of
micro-monitoring.
I have followed RFID technology for some time and have
welcomed its potential for many constructive uses. I have
supported the use of RFIDs in a Vermont pilot program for
tracking cattle to curtail outbreaks, like mad cow disease,
and our Vermont program
[[Page S2990]]
is now being emulated for a national tracking system. RFID
technology may also help thwart prescription drug
counterfeiting, a use the FDA encouraged in a recent report.
Leading retailers like Wal-Mart and Target--as well as the
Department of Defense--are requiring its use by suppliers for
inventory control. Fifty million pets around the world have
embedded RFID chips. Of course, many of us already have
experience with simpler versions of the technology in ``smart
tags'' at toll booths and ``speed passes'' at gas stations.
But this is just the beginning. RFID technology is on the
brink of widespread applications in manufacturing,
distribution, retail, healthcare, safety, security, law
enforcement, intellectual property protection and many other
areas, including mundane applications like keeping track of
personal possessions. Some visionaries imagine, quote, ``an
internet of objects''--a world in which billions of objects
will report their location, identity, and history over
wireless connections. Those days of long hunts around the
house for lost keys and remote controls might be a
frustration of the past.
These all raise exciting possibilities, but they also raise
potentially troubling tangents. While it may be a good idea
for a retailer to use RFID chips to manage its inventory, we
would not want a retailer to put those tags on goods for sale
without consumers' knowledge, without knowing how to
deactivate them, and without knowing what information will be
collected and how it will be used. While we might want the
Pentagon to be able to manage its supplies with RFID tags, we
would not want an al Qaeda operative to find out about our
resources by simply using a hidden RFID scanner in a war
situation.
Drawing Lines
Of course these are just some of the foreseeable
possibilities, and a lot depends on enhancements in the
technology, reductions in costs, and developments in
voluntary standard-setting, systems and infrastructure to
manage RFID-collected information. But the RFID train is
beginning to leave the station, and now is the right time to
begin a national discussion about where, if at all, any lines
will be drawn to protect privacy rights.
The need to draw some lines is already becoming clear.
Recent reports revealed clandestine tests at a Wal-Mart store
where RFID tags were inserted in packages of Max Factor
lipsticks, with RFID scanners hidden on nearby shelves. The
radio signals triggered nearby surveillance cameras to allow
researchers 750 miles away to watch those consumers in
action. A similar test occurred with Gillette razors at
another Wal-Mart store.
These excesses suggest that Congress may need to step in at
some point. When privacy intrusions reach the point of
behavior that is absurdly out of bounds, we find ourselves
having to deal with such issues as the ``Video Voyeurism
Prevention Act,'' a bill now before Congress that would ban
the use of camera to spy in bathrooms and up women's skirts,
a practice that by now has even been given a name,
``upskirting,'' which I'm sure is as new to you as it is to
most of us in Congress.
Other powerful new technologies are on the horizon, like
sensor technology and nanotechnology. All the more reason to
think about these issues broadly and to establish guiding
principles serving the twin goals of fostering useful
technologies while keeping them from overtaking our civil
liberties.
With RFID technology as with many other surveillance
technologies, we need to consider how it will be used, and
will it be effective. What information will it gather, and
how long will that data be kept? Who will have access to
those data banks, and under what checks-and-balances? Will
the public have appropriate notice, opportunity to consent
and due process in the case mistakes are made? How will the
data be secured from theft, negligence and abuse, and how
will accuracy be ensured? In what cases should law
enforcement agencies be able to use this information, and
what safeguards should apply? There should be a general
presumption that Americans can know when their personal
information is collected, and to see, check and correct any
errors.
These are all questions we need to consider, and it is
entirely possible that Congress may decide that enacting
general parameters would be constructive. It is important
that we let RFID technology reach its potential without
unnecessary constraints. But it is equally important that we
ensure protections against privacy invasions and other
abuses. Technology may also help with the answers--for
example, ``blockers'' that deactivate RFID tags, and software
that thwarts spyware.
Beginning A National Dialogue
There is no downside to a public dialogue about these
issues, but there are many dangers in waiting too long to
start. We need clear communication about the goals, plans and
uses of the technology, so that we can think in advance about
the best ways to encourage innovation, while conserving the
public's right to privacy.
We have seen this time and time again where a potentially
good approach is hampered because of lack of communication
with Congress, the public and lack of adequate consideration
for privacy and civil liberties.
Take for example the so-called CAPPS II program. No doubt
in a post-9/11 world, we should have an effective airline
screening system. But the Administration quietly put this
program together, collected passengers' information without
their knowledge and piloted this program without
communicating with us and before privacy protections were in
place. The result was a recent GAO analysis that showed
pervasive problems in the screening program and admissions
that we are now set back in our efforts to create an
effective screening system.
As another example, the Administration recently funded the
MATRIX program to provide law enforcement access to state
government and commercial databases. This was potentially a
useful crime-fighting tool. But there was insufficient
information about the program and about potentially intrusive
data mining capabilities, and there were unaddressed concerns
about privacy protections. Now 11 out of 16 states
participating in the program have pulled out--many, citing
privacy concerns--thus hampering the effectiveness of the
information sharing program. Again, had some of these issues
been vetted in advance, we may have been able to enhance law
enforcement intelligence.
Just recently, there were reports about the FBI's new
Strategic Medical Intelligence program, in which doctors have
been enlisted to report to the FBI ``any suspicious event,''
such as an unusual rash or a lost finger. The goal of
preventing bio-terrorism is important. But there are many
unanswered questions about the program's privacy protections
and its ability to identify truly suspicious events and not
unrelated personal medical situations. Hopefully, this
program will not be hampered by lack of communication and
oversight.
I have written oversight letters to the Justice Department
and to the Department of Homeland Security on all of these
issues and am waiting for their responses.
I want to make sure that mistakes like those are not
repeated, especially with RFID technology, where there is so
much potential value. That is why I asked to speak with you
today, to begin the process of encouraging public dialogue in
both the commercial and public sectors before the RFID genie
is let fully out of its bottle.
This is a dialogue that should cut across the political
spectrum, and it should include the possibility of
constructive, bipartisan congressional hearings. The earlier
we begin this discussion, the greater the prospects for
success in reaching consensus on a set of guiding principles.
When several of us from both parties banded together years
ago to found the Congressional Internet Caucus, we were
united by our appreciation for what the Internet would do for
our society. Years later, we remain united, we remain
optimistic, and partisanship has never interfered in the
Caucus's work.
That is the spirit in which I hope a discussion can now
begin on micro-monitoring.
Thank you for your interest in these cutting-edge issues,
and thanks for this opportunity to share some ideas with you.
____________________