Sunday, August 19, 2007

... from my new book, "tracking impact" ...

The specific war use of all c3 equipment, will require such equipment to be bonified, scanned and xrayed, to make sure no RFID has been built in. It is most certaintly better to lose some equipment to a potential ennemy, than compromising the position of all the equipment at once, in the c3 chain.

Deterrence from theft or embezelment in peace time, should be built in the systems in such a way that it would use only specific, monitored, and non-civilian emission frequencies, so that the identification of the position would be limited to a signature on the utility lines or a radio-goniometric plot of the single unit missing.

Passive or semi-active systems, like RFID tags, could signal or confirm presence, and therefore may cause great loss. We suggest such technology never be used on operational materials, nor on operational personnel.

Combining RFID technology with cellular phones becomes the ultimate weapon for killers planet wise, hard to miss somebody that has the right cell phone, and the right RFID tag.

Given the above, we suggest updates of international treaties, whereas allied countries promise each other not to infest with bugs allied equipment and personnel, and modification of the national penal codes of war, permitting the trial for treason of such crimes and criminals.

No comments: