{"id":741,"date":"2006-02-23T00:00:00","date_gmt":"2006-02-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/23\/dod-plans-to-deploy-rfid-in-operations-with-24-nations\/"},"modified":"2021-12-30T11:38:05","modified_gmt":"2021-12-30T11:38:05","slug":"dod-plans-to-deploy-rfid-in-operations-with-24-nations","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/23\/dod-plans-to-deploy-rfid-in-operations-with-24-nations\/","title":{"rendered":"DoD Plans To Deploy RFID In Operations With 24 Nations"},"content":{"rendered":"<p>The Department of Defense said Thursday it intends to move forward on plans to use active radio frequency identification (RFID) technology to support collaborative military coalition operations with 24 countries.  The group, including Japan, South Korea, Australia, Switzerland and North Atlantic Treaty Organization (NATO) country members will use consistent standards to share information based on International Organization for Standards (ISO) data formats.  The goal to share information and create interoperability between nations hasn&#8217;t been an easy task.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Herding kittens is sometimes easier than getting something like this done,&#8221; Kimball said.<\/p>\n<p>The tag data routing code stored at the beginning of the active RFID tag, which requires a power source to transmit the data signal, will identify the country of origin.<\/p>\n<p>Kimball said unless someone has access to the host nation&#8217;s database that connects the tag number with the manifest.<\/p>\n<p>http:\/\/www.securitypipeline.com\/news\/180207572;jsessionid=SWKNKAMWZQMGSQSNDBCSKHSCJUMEKJVN<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-741","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=741"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/741\/revisions"}],"predecessor-version":[{"id":3228,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/741\/revisions\/3228"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}