An icy sense of dread suddenly grips you, as you frantically search your pockets. Not again! At some point or another, each of us has endured the humbling experience of misplacing an office key, swipe card, or fob. But for many of the 2,000 employees at , this scenario could become a worry of the past.
At Epicenter, employees can now receive a new type of business key鈥娾斺奱 microchip implanted in between one鈥檚 , according to a . Since January 2015, have elected to be microchipped at 鈥榤icrochipping parties,鈥 using syringe injections of microchips that are roughly the size of a grain of rice. According to the AP, this technology is dual-programmed to operate as a swipe key and credit card that can 鈥榦pen doors, operate printers, or buy smoothies with a wave of the hand.鈥
Although simply waving one鈥檚 hand to pay for a smoothie is appealing, is this convenience worth the security risks to our personal and financial information?
Answering that question first requires understanding how the technology works. Epicenter鈥檚 microchips use (NFC), meaning that the technology relies on electromagnetic radio fields to communicate data. At its core, enables 鈥榳ireless communication and data exchange between digital devices like smartphones.鈥 According to the AP, Epicenter鈥檚 NFC device is 鈥渢he same as in contactless credit cards or mobile payments.鈥 Basically, it is a 鈥減assive device鈥 containing information that other devices can read, but it does not actually read any information itself. When activated by a reader a few centimeters (inches) away, a small amount of data flows between the two devices via electromagnetic waves.
However, just because it鈥檚 鈥減assive鈥 doesn鈥檛 mean it is impervious to security vulnerabilities. According to , the technology to eavesdrop on device communication, corrupt or modify data, or intercept attacks.
In this case, is when an unintended third party, like a criminal, 鈥樷渓istens in鈥 on an NFC transaction, happens when criminals tamper with the data being transmitted, and occur when someone intercepts information that鈥檚 being channeled between two NFC devices and modifies it as it passes between the devices. Based on what is currently publicly known about Epicenter鈥檚 microchip implants, we can鈥檛 be sure how well these passive devices are protected against interception attacks. As some general security advice to consumers, 聽that users first ensure that the companies of these devices use secure channels to communicate and encrypt data.
What we do know, however, is that the data flow NFCs generate can pose personal privacy risks in addition to those data security risks. For instance, the that reveal how often employees clock into work as well as how often they buy things. (And you thought that earlier mentioned smoothie purchase sounded so harmless.)
More seriously, according to microbiologist , these chip implants can reveal 鈥渄ata about your health, you could get data about your whereabouts, how often you鈥檙e working, how long you鈥檙e working, if you鈥檙e taking toilet breaks and things like that.鈥 That said, one big question that consumers should be asking is: To what extent could this data be legally shared with third parties and/or with employers?
Part of the reason why the answer to that question is still murky is that the United States Supreme Court has yet to issue a ruling that squarely addresses the treatment of NFC devices as third parties. The third party records doctrine, as articulated by the U.S. Supreme Court in (1979), is founded on the notion that 鈥淸t]he Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed.鈥 The question remains: are these devices third parties or not?
As we wait for Supreme Court clarity, we should explore new technologies like the microchip implants, but consider the potential privacy and security risks as we do so. That goes not only for consumers, but also for the designers of these new technologies. And for guidance on that point, we can look to the past鈥娾斺奱 seminal 1890 by Samuel Warren and Louis Brandeis. In 鈥溾, Warren and Brandeis explained that 鈥淸t]he design of the law must be to protect those persons with whose affairs the community has no legitimate concern, from being dragged into an undesirable and undesired publicity and to protect all persons, whatsoever; their position or station, from having matters which they may properly prefer to keep private, made public against their will.鈥
Here, I鈥檒l add one point to Warren and Brandeis鈥 sage words: the onus can鈥檛 be on the law alone鈥娾斺奺specially when it often takes time for it to catch up with the pace of technological innovation. It鈥檚 also up to the creators of technology to design products with humans truly at the center鈥娾斺妏roducts that protect all users from having personal, financial, and health data made public against their will.
Jessica 鈥淶hanna鈥 Malekos Smith is a M.A. candidate at King鈥檚 College London, Department of War Studies. Previously, she was a Postdoctoral Fellow at the Harvard Kennedy School鈥檚 Belfer Center for Science and International Affairs. She received her B.A. from Wellesley College, where she was a Fellow of the Madeleine Korbel Albright Institute for Global Affairs, and J.D. from the University of California, Davis School of Law.