zachtheterrible,
QUESTION:
R u saying that the attacker will rupture the pill? What if the person wearing the pill accidently falls on it?
ANSWER:
If the enclosure (pill) is accidentally ruptured then there is no problem. There is no need to report it to the police. The ruptured ISP is just replaced with a new one with a different unique RFID code.
However, if the pill was ruptured during a kidnapping, then those who know the disappeared would report the victim missing. The RFID code for the victim’s ISP would be broadcast like an ‘Amber Alert’ and all networked RFID detectors would search for this unique code. This begins the hunt for the attacker.
The police don’t need to find the body of the victim or the attacker. The police just need to find the victim's RFID tags which hold samples of the attacker's DNA and the police have the RFID code.
QUESTION:
Also, the attacker would have to hit in the exact right place to rupture the pill.
ANSWER:
There are several ways the 'pill' could be ruptured:
1.) The attacker does indeed rupture the ISP by his actions. An ISP can be disguised as a common daily wear item or even skin. He might not recognize the ISP.
2.) The victim deliberately ruptures the ISP in self-defense to warn or drive-off the attacker.
3.) The victim is wearing multiple ISPs some disguised and some obvious. In the struggle multiple ISPs are ruptured either by the victim or the attacker.
STATEMENT:
If this kind of stuff invades my privacy, im gonna make me a little device to zap these tags cuz i hate having my privacy invaded
RESPONSE:
The ISP does not invade privacy. It only identifies the attacker who has ‘stolen’ the victim’s property (RFID tags). The ISP is just a personal security device. It is a statement to potential attackers to “Just leave me alone. If you touch me you will be identified by DNA, hunted wirelessly, and punished”.
Also, the ISP resists to zapping. This is because some of the RFID tags will have a temporary Electro-Magnetic (EM) shield. An example EM shield is a thin layer of iron. Before this iron rusts away it will reflect or absorb EM energy directed at the RFID tags preventing it from being ‘burn out’.
Later on, when the iron has rusted away the RFID tag will be fully functional. There are a variety of such temporary EM shields available with a range of protective times. Several of them can be used in the same ISP.
This temporary EM shield feature prevents the attacker from gathering up the victim’s RFID tags immediately at the crime scene using he own RFID tag detector. While the shield is ‘up’ the RFID will not response to his detector and will resist being ‘burn out’.
Later on, when the police come some of the shields will have degraded enough to enable the police to detect some of the victim’s RFID tags and to recover samples of the attacker’s DNA.
As you can see the attacker would be compelled to return to the crime scene again and again to scan for freshly functional RFID tags which hold his DNA. Returning to the scene of the crime is one of the most risky things a criminal can do.
QUESTION:
How could the government misuse this technology?
ANSWER:
The IIDN would be a tracking system of like no other. Citizens would actively support it and for good reasons:
1. The IIDN could enable the ‘live recovery’ of kidnap victims. After a few spectacular live recoveries no one would oppose the IIDN. Citizens would willingly enable it into their networked devices: mobile phones, wireless hubs, cars, ect.
2. After a few IIDN assisted arrests attacking an ISP bearer would be seen as ‘just plain stupid’. This would reduce violent crime and the fear of it. This is all for the good.
However, the IIDN would grow to encompass all. Miniature sensors which could transmit information on sound, chemicals, vibrations, and other parameters could also utilize this same pervasive network.
For animation on the ISP and a detailed explaination see
www.adiasi.com