National Academies Press: OpenBook
« Previous: INTRODUCTION
Suggested Citation:"Covert Tags." National Research Council. 2004. Summary of the Sensing and Positioning Technology Workshop of the Committee on Nanotechnology for the Intelligence Community: Interim Report. Washington, DC: The National Academies Press. doi: 10.17226/11032.
×
Page 3

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

SECURITY TECHNOLOGIES OVERVIEW 3 TOPIC 1: SECURITY TECHNOLOGIES OVERVIEW Two papers on this topic were presented, one by Richard Jotcham, Axess Technologies Ltd., and the other by Michael Kolodny, U.S. Army Research Laboratory. SECURITY TECHNOLOGIES OVERVIEW AND APPLICATIONS Richard Jotcham outlined the various kinds of security tags that are currently used in the commercial world and commented on each. Tags may be added directly to products or be associated with their packaging. The areas discussed were these: • Biometric tags • Covert tags • Forensic level tags • Product characteristic tags • Coding tags • Electronic tags Biometric Tags Biometric identification systems include DNA and fingerprint analysis, iris, hand, and facial recognition, retinal scanning, signature authentication, and speech recognition. All are widely used, although facial recognition technology currently has a high rate of false positives. Covert Tags Examples of covert tags are color-coded plastic particles 20–30 µm on a side distributed throughout a product and gem stones with 10 µm colored spheres inserted between the crystal grains. Another example given was tagging a car by spraying tiny particles containing the vehicle identification number (VIN) all over the underside, to help identify parts that might be later removed and sold by thieves. Many covert tags are read spectroscopically using visible, ultraviolet, or infrared light. For example, documents can be tagged with ultraviolet fluorescent compounds and identified by analyzing the time-resolved fluorescence decay.

Next: Electronic Tags »
Summary of the Sensing and Positioning Technology Workshop of the Committee on Nanotechnology for the Intelligence Community: Interim Report Get This Book
×
 Summary of the Sensing and Positioning Technology Workshop of the Committee on Nanotechnology for the Intelligence Community: Interim Report
Buy Paperback | $21.00 Buy Ebook | $16.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

The emergence of nanotechnology as a major science and technology research topic has sparked substantial interest by the intelligence community. In particular the community is interested both in the potential for nanotechnology to assist intelligence operations and threats it could create. To explore these questions, the Intelligence Technology Innovation Center asked the National Research Council to conduct a number of activities to illustrate the potential for nanotechnology to address key intelligence community needs. The second of these was a workshop to explore how nanotechnology might enable advances in sensing and locating technology. This report presents a summary of that workshop. In includes an overview of security technologies, and discussions of systems, natural chemical/biological tags, passive chemical/biological tags, and radio/radar/optical tags.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!