Sunteți pe pagina 1din 60

VeriChip

SEMINAR REPORT

Dissertation submitted to the Mahatma Gandhi University Kottayam in Partial

Fulfillment of the requirements for the award of Bachelor Degree in Computer Science.

Submitted by

ASHER GABRIEL JOSE


Reg No: 160021053334

Under the supervision of

MRS.PHEBA T L
(Lecturer in Computer Science)

DEPARTMENT OF COMPUTER SCIENCE


ST THOMAS COLLEGE-KOZHENCHERRY

(Re-accredited by NAAC with A Grade)

JANUARY-2019
ST.THOMAS COLLEGE
KOZHENCHERRY, PATHANAMTHITA-689641

(Affiliated to Mahatma Gandhi University, Kottayam)

DEPARTMENT OF COMPUTER SCIENCE

BONAFIDE CERTIFICATE

This is to certify that the seminar work entitled ”VeriChip” submitted by


ASHER GABRIEL JOSE [Register No: 160021053334], in a partial fulfilment of the
requirements for the award of the degree of Bachelor in Computer Science from Mahatma
Gandhi University, Kottayam, Kerala and has been carried out under our supervision.

Head of Department Lecturer in charge


VeriChip

PREFACE

I have made this report file on the topic” VeriChip”; I have tried my best to elucidate all the
relevant detail to the topic to be included in the report. While in the beginning I have tried to give
a general view about this topic. My efforts and wholehearted co-corporation of each and
everyone has ended on a successful note. I express my sincere gratitude who assisting me
throughout the preparation of this topic. I thank all for providing me the reinforcement,
confidence and most importantly the track for the topic whenever I needed it.

BSc Computer Science


St.Thomas College , Kozhencherry Page 2
VeriChip

ACKNOWLEDGEMENT

The satisfaction and euphoric that accompany the successful completion of any task would be
incomplete, without the mention of the people who made it possible, whose constant guidance
and encouragement crowned the effort with success.

First and foremost we thank god almighty for showering the blessings upon me throughout the
entire seminar work.

I would like to thank respected Mrs. Pheba T L for giving me such a wonderful opportunity to
expand my knowledge for my own branch and giving me guidelines to present a seminar report.

Finally but not at all least I would like to acknowledge to heartfelt efforts. comments, criticisms,
co-operation and tremendous support given to me by our dear friends during the development of
my seminar and also during my presentation without whose support this work would have been
all the more difficult to accomplish.

ASHER GABRIEL JOSE

BSc Computer Science


St.Thomas College , Kozhencherry Page 3
VeriChip

Abstract

VeriChip is the company that invented and an implantable medical scanning device. This

device is simply called an RFID chip (Radio Frequency Identification Device). Its purpose is so

if someone gets injured or hurt, and the ambulance needs to be called in, this chip can be scanned

and it will display all important medical information. This includes anything from allergies, to

past medical operations.

The most exciting future technology is an outcome of the fields of Computer science,

Electronics & Biology. VeriChip a new type of bio-security device to accurately track

information regarding what a person is doing, and who is to accurately track information

regarding what he is doing, and who is actually doing it. It’s no more required with VeriChips

the good old idea of remembering pesky PINs, Passwords, & Social security numbers .No more

matters of carrying medical records to a hospital, No more cash/credit card carrying to the

market place; everything goes embedded in the chip. Everything goes digitalized. No more

hawker tricks on the internet. VeriChip has a variety technique for secured E-money transactions

on the net. The power of VeriChips exists in capability of locating lost children, downed soldiers,

and wandering Alzheimer patients

A single electronic chip may replace everything in your wallet including your cash, your

credit cards, your ATM card, your ID cards, your insurance, and your life! FUTURE One chip,

with your life on it.

BSc Computer Science


St.Thomas College , Kozhencherry Page 4
VeriChip

CONTENTS

CHAPTER 1…………………………...…………………………………………….7

INTRODUCTION………..…………………………..……………………….…….…...7

CHAPTER 2……………………………………………………………………………...……..10
HISTORY…………………………..….…………………………………….…………….………10

CHAPTER 3………………………………………………………………………………….…14
ARCHITECTURE AND METHODS……………………………………………………………………………...14
3.1 THE VERICHIP IMPLANT SYSTEM……………………………………………………………...14
3.2 RF TAGS…………………………………………………………………………………………………………18
CHAPTER 4…………………………………………………………………………………….20
WORKING OF A VeriChip………………………………………………………………………………………...20
4.1 GETTING UNDER THE SKIN………………………………………………………………………………….21
CHAPTER 5…………………………………………………………………………………….23
APPLICATIONS……………………………………………………………………………………………………23
5.1 In Medical Field…………………………………………………………………………………………………..27
CHAPTER 6…………………………………………………………………………………….27
FUTURE APPLICATIONS OF VeriChip………………………………………………………………………...27
CHAPTER 7…………………………………………………………………………………….32
ADVANTAGES AND DISADVANTAGES OF VeriChip……………………………………………………......32
7.1 ADVANTAGES OF VeriChip……………………………………………………………………………..…….32
7.2 DISASDVANTAGES OF VeriChip…………………………………………………………………….………..36
7.3 TYPICAL PROBLEM OF VeriChip……………………………………………………………………………..37
CHAPTER 8…………………………………………………………………………………….39
VeriChip AND 666 (BEHIND THE BARCODE)…………………………………………………………………39

8.1 THE BARCODE………………………………………………………………………………………………….39

8.2 IS THE NUMBER 666 "HIDDEN" IN THE UPC BARCODE?...........................................................................43

CHAPTER 9…………………………………………………………………………………….48
WHAT IS 666!!!?...................................................................................................................... ..................................48

9.1 WHAT DOES BIBLE ACTUALLY SAY ABOUT 666 AND CHIP!!!?..............................................................49

9.2 SO WHAT HAPPENS TO THE ONES WHO ACCEPTS THE MARK?.............................................................50

BSc Computer Science


St.Thomas College , Kozhencherry Page 5
VeriChip

CHAPTER 10……………………………………………………...……………………………56

SO HOW TO GET SAVED?.....................................................................................................................................56

CONCLUSION………………………………………………………………………………....58

REFERENCES………………………………………………………………………………….59

BSc Computer Science


St.Thomas College , Kozhencherry Page 6
VeriChip

CHAPTER 1

INTRODUCTION

THE idea first emerged back in 2001 that people needed to have immediate ways to
identify yourself in case of medical emergency. September of 2001 people started realizing that
firemen were writing their badge number in permanent marker on their chest every time they
went out for a fire call. This was because if they got burnt, lost, hurt or injured they wanted
people to be able to identify them. A new company was then created by December of 2001 called
VeriChip. They specialized in making an implantable chip that could tag a person and hold
information that could be accessed at any point by medical or government programs. The chip
that started the business was RFID microchip that acted like a flash drive with an antenna.

The VeriChip is a commercially produced, human-implantable microchip. It is designed to


serve as an identification device, effectively a kind of wireless barcode or dog tag for people.
About the size of a grain of rice, the VeriChip is surgically implanted under the skin of its bearer,
typically on the back of the arm. When interrogated by a nearby reading device, it communicates
a unique serial number over the air. This serial number may be referenced in a database to
identify its bearer.

BSc Computer Science


St.Thomas College , Kozhencherry Page 7
VeriChip

VeriChip Corporation, the manufacturer of the device, asserts that the VeriChip “cannot be
lost, stolen, misplaced, or counterfeited,” and advocates a range of applications for the device. In
health care settings, the VeriChip can help identify a “Jane Doe” or “John Doe,” that is, an
incapacitated or disoriented patient whose identity is difficult to establish. In private facilities,
the VeriChip can enhance physical access control, as it permits automated identification of
individuals and tracking of their movements in buildings. For example, the Attorney General of
Mexico and members of his staff underwent surgical implantation of VeriChips as a measure to
control access to a federal anti-crime information center. A few years ago, a Mexican distributor
announced plans to create an anti-kidnapping system for children using the VeriChip. The
VeriChip has also seen limited deployment as a payment device, essentially a credit-card
replacement marketed under the product name VeriPay. It has even acquired a degree of chip
among certain technophiles, who are exploring applications in daily life.

The VeriChip lies at the confluence of several technological trends. About fifty million
house pets around the world already bear implanted wireless microchips similar in form and
function to the VeriChip. These chips help shelters and veterinarians identify lost animals. For
human beings, biometric authentication is becoming widespread as a tool for both physical and
logical access control. Popular forms include fingerprint and iris scanning, voice identification,
and face recognition. The VeriChip may be viewed as a kind of “prosthetic biometric”: like a
finger, it cannot be misplaced. At the same time, the VeriChip offers a convenient digital
interface and circumvents the poor reliability of natural biometrics. As a broad technology,
Radio-Frequency Identification (RFID) is proliferating into many applications, including
tracking of crates and pallets in industrial and military supply chains, contactless payment
devices, and anti-theft systems for automobiles.

The spread of RFID has provoked a backlash from privacy advocates concerned about the
increasing presence of tags in the possession of consumers. Because RFID tags respond silently
and automatically to interrogation by readers, they permit some degree of clandestine tracking of
their bearers. (Certain types of RFID tags also convey information about the types of items they
are attached to, e.g., medications, and can thus facilitate invasive inventorying of personal
items.) As a permanent and ever-present device, the VeriChip has proven a lightning rod for
RFID privacy concerns, particularly since its approval for human implantation in 2002 by the
United States Food and Drug Administration (FDA). Religious groups have gone so far as to
claim that the VeriChip may be a realization of the Mark of the Beast as described in the New

BSc Computer Science


St.Thomas College , Kozhencherry Page 8
VeriChip

Testament. Basic RFID tags like the VeriChip are passive. They do not contain an internal source
of power, but instead receive transmission power from an interrogating reader. As such, they
have short read ranges. Some tags can be scanned at distances up to tens of feet. Under ordinary
circumstances, the effective read range of the VeriChip is on the order of several inches. As we
discuss, however, an attacker can potentially capture VeriChip signals from a longer range. The
short read range of the VeriChip diminishes but does not negate privacy concerns: The VeriChip
is effectively a kind of license plate for people.

Privacy is not the only concern that the VeriChip raises. As we explain in this paper, the
VeriChip is vulnerable to a straightforward spoofing attack. By this we mean that an attacker that
scans a VeriChip—or eavesdrops while it is scanned—can program a separate device to emit an
undistinguishable simulation of the VeriChip signal that appears valid at all future times. Such an
attacker can then easily spoof a reader into accepting the simulating device as the target
VeriChip. In fact, in principle an attacker can simulate a VeriChip on the basis of its serial
number alone. We emphasize that by spoofing, we mean emulation of device communication,
not physical duplication. (As a VeriChip reader does not visually perceive a communicating
chip, physical duplication is not necessary for spoofing attacks, and thus not relevant to most of
our security discussion here.) For most security applications, the claim by VeriChip Corporation
that the VeriChip “cannot be counterfeited” is effectively untrue.

BSc Computer Science


St.Thomas College , Kozhencherry Page 9
VeriChip

CHAPTER 2

HISTORY

Radio frequency identification has been around for decades. Learn how it evolved from its
roots in World War II radar systems to today's hottest supply chain technology.

It’s generally said that the roots of radio frequency identification technology can be traced
back to World War II. The Germans, Japanese, Americans and British were all using radar—
which had been discovered in 1935 by Scottish physicist Sir Robert Alexander Watson-Watt—to
warn of approaching planes while they were still miles away. The problem was there was no way
to identify which planes belonged to the enemy and which were a country’s own pilots returning
from a mission.

The Germans discovered that if pilots rolled their planes as they returned to base, it would
change the radio signal reflected back. This crude method alerted the radar crew on the ground
that these were German planes and not Allied aircraft (this is, essentially, the first passive RFID
system).

Under Watson-Watt, who headed a secret project, the British developed the first active
identify friend or foe (IFF) system. They put a transmitter on each British plane. When it
received signals from radar stations on the ground, it began broadcasting a signal back that
identified the aircraft as friendly. RFID works on this same basic concept. A signal is sent to a
transponder, which wakes up and either reflects back a signal (passive system) or broadcasts a
signal (active system).

BSc Computer Science


St.Thomas College , Kozhencherry Page 10
VeriChip

Advances in radar and RF communications systems continued through the 1950s and
1960s. Scientists and academics in the United States, Europe and Japan did research and
presented papers explaining how RF energy could be used to identify objects remotely.
Companies began commercializing anti-theft systems that used radio waves to determine
whether an item had been paid for or not. Electronic article surveillance tags, which are still used
in packaging today, have a 1-bit tag. The bit is either on or off. If someone pays for the item, the
bit is turned off, and a person can leave the store. But if the person doesn't pay and tries to walk
out of the store, readers at the door detect the tag and sound an alarm.

Mario W. Cardullo claims to have received the first U.S. patent for an active RFID tag
with rewritable memory on January 23, 1973. That same year, Charles Walton, a California
entrepreneur, received a patent for a passive transponder used to unlock a door without a key. A
card with an embedded transponder communicated a signal to a reader near the door. When the
reader detected a valid identity number stored within the RFID tag, the reader unlocked the door.
Walton licensed the technology to Schlage, a lock maker, and other companies.

The U.S. government was also working on RFID systems. In the 1970s, Los Alamos
National Laboratory was asked by the Energy Department to develop a system for tracking
nuclear materials. A group of scientists came up with the concept of putting a transponder in a
truck and readers at the gates of secure facilities. The gate antenna would wake up the
transponder in the truck, which would respond with an ID and potentially other data, such as the
driver's ID. This system was commercialized in the mid-1980s when the Los Alamos scientists
who worked on the project left to form a company to develop automated toll payment systems.
These systems have become widely used on roads, bridges and tunnels around the world.

BSc Computer Science


St.Thomas College , Kozhencherry Page 11
VeriChip

At the request of the Agricultural Department, Los Alamos also developed a passive RFID
tag to track cows. The problem was that cows were being given hormones and medicines when
they were ill. But it was hard to make sure each cow got the right dosage and wasn't given two
doses accidentally. Los Alamos came up with a passive RFID system that used UHF radio
waves. The device drew energy from the reader and simply reflected back a modulated signal to
the reader using a technique known as backscatter.

Later, comanies developed a low-frequency (125 kHz) system, featuring smaller


transponders. A transponder encapsulated in glass could be injected under the cows skin. This
system is still used in cows around the world today. Low-frequency transponders were also put
in cards and used to control the access to buildings.

Over time, companies commercialized 125 kHz systems and then moved up the radio
spectrum to high frequency (13.56 MHz), which was unregulated and unused in most parts of the
world. High frequency offered greater range and faster data transfer rates. Companies,
particularly those in Europe, began using it to track reusable containers and other assets. Today,
13.56 MHz RFID systems are used for access control, payment systems (Mobile Speedpass) and
contactless smart cards. They’re also used as an anti-theft device in cars. A reader in the steering
column reads the passive RFID tag in the plastic housing around the key. If it doesn’t get the ID
number it is programmed to look for, the car won't start.

In the early 1990s, IBM engineers developed and patented an ultra-high frequency (UHF)
RFID system. UHF offered longer read range (up to 20 feet under good conditions) and faster
data transfer. IBM did some early pilots with Wal-Mart, but never commercialized this
technology. When it ran into financial trouble in the mid-1990s, IBM sold its patents to Intermec,
a bar code systems provider. Intermec RFID systems have been installed in numerous different
applications, from warehouse tracking to farming. But the technology was expensive at the time
due to the low volume of sales and the lack of open, international standards.

UHF RFID got a boost in 1999, when the Uniform Code Council, EAN International,
Procter & Gamble and Gillette put up funding to establish the Auto-ID Center at the
Massachusetts Institute of Technology. Two professors there, David Brock and Sanjay Sarma,
had been doing some research into the possibility of putting low-cost RFID tags on all products

BSc Computer Science


St.Thomas College , Kozhencherry Page 12
VeriChip

made to track them through the supply chain. Their idea was to put only a serial number on the
tag to keep the price down (a simple microchip that stored very little information would be less
expensive to produce than a more complex chip with more memory). Data associated with the
serial number on the tag would be stored in a database that would be accessible over the
Internet.

Sarma and Brock essentially changed the way people thought about RFID in the supply
chain. Previously, tags were a mobile database that carried information about the product or
container they were on with them as they traveled. Sarma and Brock turned RFID into a
networking technology by linking objects to the Internet through the tag. For businesses, this was
an important change, because now a manufacturer could automatically let a business partner
know when a shipment was leaving the dock at a manufacturing facility or warehouse, and a
retailer could automatically let the manufacturer know when the goods arrived.

Between 1999 and 2003, the Auto-ID Center gained the support of more than 100 large
end-user companies, plus the U.S. Department of Defense and many key RFID vendors. It
opened research labs in Australia, the United Kingdom, Switzerland, Japan and China. It
developed two air interface protocols (Class 1 and Class 0), the Electronic Product Code (EPC)
numbering scheme, and a network architecture for looking up data associated on an RFID tag on
the Internet. The technology was licensed to the Uniform Code Council in 2003, and the
Uniform Code Council created EPCglobal, as a joint venture with EAN International, to
commercialize EPC technology. The Auto-ID Center closed its doors in October 2003, and its
research responsibilities were passed on to Auto-ID Labs.

Some of the biggest retailers in the world—Albertsons, Metro, Target, Tesco, Wal-Mart—
and the U.S. Department of Defence have said they plan to use EPC technology to track goods in
their supply chain. The pharmaceutical, tire, defence and other industries are also moving to
adopt the technology. EPC global ratified a second-generation standard in December 2004,
paving the way for broad adoption

BSc Computer Science


St.Thomas College , Kozhencherry Page 13
VeriChip

CHAPTER 3

ARCHITECTURE & METHODS

The RFID chip made by VeriChip is an injectable identification chip that was originally
used in home domesticated animals. If an animal got lost, any medical vet can scan a chip in
their neck and find all the information about the animal. This chip is meant to go under the skin
of humans and act as a mini flash drive that can wirelessly communicate important information.
The capsule is coated with a porous polypropylene called Biobond. Bio Bond allows for the
capsule to say stationary in the body under the skin thought its life. Think of having a wallet that
is on your body and contains information that could save your life if anything threatens your life.

This chip is made of a harmless polymer that doesn’t affect your skin or cause irritation to
your body. This device is about the size of a grain of rice and is made of 2 parts. The first part is
a small micro antenna that can transmit a signal to a receiver, and the second part is a storage
drive that can hold 300 megabytes of information. The intention of this information is for
medical emergencies where a doctor needs to know key information about you to save your life
in the case of major injury. These receiving stations can even be put into an ambulance so
information can be scanned and processed before arriving at a hospital.

The current, in use, VeriChip implant system is actually a fairly simple device. Today’s
VeriChip implant is basically a small (micro) computer chip, inserted under the skin, for
identification purposes. The VeriChip system is radio frequency identification (RFID) system,
using low-frequency radio signals to communicate between the VeriChip and reader.

3.1 THE VERICHIP IMPLANT SYSTEM CONSISTS OF TWO COMPONENTS:

1. THE TRANSPONDER:

The transponder is the actual VeriChip implant. It is a passive transponder, meaning it


contains no battery or energy of its own. In comparison, an active transponder would provide its

BSc Computer Science


St.Thomas College , Kozhencherry Page 14
VeriChip

own energy source, normally a small battery. Because the passive VeriChip contains no battery,
or nothing to wear out, it has a very long life, up to 99 years, and no maintenance. Being passive,
it's inactive until the reader activates it by sending it a low-power electrical charge. The reader
"reads" or "scans" the implanted VeriChip and receives back data (in this case an identification
number) from the VeriChip. The communication between VeriChip and reader is via low-
frequency radio waves.

The VeriChip transponder consists of four parts:

PERSPECTIVE OF
THE ACTUAL SIZE

Components of the VeriChip

1. Computer Microchip:

The microchip stores a unique identification number from 10 to 15 digits long. The storage
capacity of the current microchips is limited, capable of storing only a single ID number. AVID
(American Veterinary Identification Devices), claims their chips, using an nnn-nnn-nnn format,
has the capability of over 70 trillion unique numbers. The unique ID number is "etched" or
encoded via a laser onto the surface of the microchip before assembly. Once the number is
encoded it is impossible to alter. The microchip also contains the electronic circuitry necessary to
transmit the ID number to the "reader".

BSc Computer Science


St.Thomas College , Kozhencherry Page 15
VeriChip

2. Antenna Coil:

This is normally a simple, coil of copper wire around a ferrite or iron core. This tiny,
primitive, radio antenna "receives and sends” signals from the reader or scanner.

3. Tuning Capacitor:

The capacitor stores the small electrical charge (less than 1/1000 of a watt) sent by the
reader or scanner, which activates the transponder. This "activation" allows the transponder to
send back the ID number encoded in the computer chip. Because "radio waves" are utilized to
communicate between the transponder and reader, the capacitor is "tuned" to the same frequency
as the reader.

4. Glass Capsule:

The glass capsule "houses" the microchip, antenna coil and capacitor. It is a small capsule,
the smallest measuring 11 mm in length and 2 mm in diameter, about the size of an uncooked
grain of rice. The capsule is made of biocompatible material such as soda lime glass. After
assembly, the capsule is hermetically (air-tight) sealed, so no bodily fluids can touch the
electronics inside. Because the glass is very smooth and susceptible to movement, a material
such as a polypropylene polymer sheath is attached to one end of the capsule. This sheath
provides a compatible surface which the bodily tissue fibers bond or interconnect, resulting in a
permanent placement of the VeriChip.

VERICHIP AND SYRINGE

Fig 3.2. VeriChip and stringe

BSc Computer Science


St.Thomas College , Kozhencherry Page 16
VeriChip

The VeriChip is inserted into the subject with a hypodermic syringe. Injection is safe and
simple, comparable to common vaccines. Anesthesia is not required nor recommended. In dogs
and cats, the VeriChip is usually injected behind the neck between the shoulder blades. Trovan,
Ltd., markets an implant, featuring a patented "zip quill", which you simply press in, no syringe
is needed. According to AVID "Once implanted, the identity tag is virtually impossible to
retrieve. . . The number can never be altered."

2.THE READER:

The reader consists of an "exciter" coil which creates an electromagnetic field that, via radio
signals, provides the necessary energy (less than 1/1000 of a watt) to "excite" or "activate" the
implanted VeriChip. The reader also carries a receiving coil that receives the transmitted code or
ID number sent back from the "activated" implanted VeriChip. This all takes place very fast, in
milliseconds. The reader also contains the software and components to decode the received code
and display the result in an LCD display. The reader can include a RS-232 port to attach a
computer.

BSc Computer Science


St.Thomas College , Kozhencherry Page 17
VeriChip

3.2 RF TAGS

RF tags come in all shapes and sizes depending on the application. Animal tracking tags
inserted beneath their skin, can be as small as pencil lead in diameter and 1.3 cm in length. Tags
can be of screw shaped to identify trees or wooden items, or credit cards shaped for use in access
application. The anti-theft hard plastic tags attached to merchandise in stores are RF tags. RF
tags can even be integrated into labels or composite blocks or can be even mounted on non-
ferrous magnets.

There are two types of tags:

1. Passive tags, and


2. Active tags

1. PASSIVE TAGS

Passive tags do not carry on-board power and derive it from the reader to enable
reading and writing to the tag. This gives a tag practically unlimited life but a shorter range.
They are activated only when they are read or interrogated by another device first. Data
storage on a passive tag is a fairly limited. Hence capacity is often measured in bits rather
than bytes. However for most application, a relatively small amount of data is needed to be
codified and stored on the tag. So the limited capacity doesn’t pose a major problem.

Passive tags are ideal for tracking of high value and critical items like designer clothing,
ammunition, computer equipments and chemicals. The range of passive tags is principally
determined by the type and size of reading antenna. These can be read or written from up to
10 meter away. Up to 500 individual tags can be read in a second.

The ability to precisely locate items makes passive tags more conducive to remote
monitoring than conventional bar coding or other inventory tracking methods. Passive tags
don’t require a battery as this draw operating power from the RF beam of the device that reads

BSc Computer Science


St.Thomas College , Kozhencherry Page 18
VeriChip

or interrogates the tags which is why passive tags can be made as small as a grain of rice.
With no battery and no moving parts, Passive tags have a very long life.

The drawbacks of passive tags are limited data storage capacity, small output power
and short range of communication. Also these don’t perform well in electromagnetic
environments.

2. ACTIVE TAGS

Active tags are the true transmitters of the information. These tags can initiate
communication with the antenna and provides faster and higher storage capacity. Active tags
have a built in power cell. These offer a higher communication range but there life is limited to
the life of the power cell. These can be read and updated from hundreds of kilometers away. In
addition to locating items, these systems can determine the physical condition of the items being
tracked and monitored. For this, the tag is connected to multiple sensors used to monitor
temperature, humidity, breakage and other data. The tags can then communicate the data
gathered by the sensors to the users. Active tags must be large enough to accommodate a
powerful battery and are typically more expensive than passive tags. Frequent use of transmitter
tends to shorten their lifetime.

BSc Computer Science


St.Thomas College , Kozhencherry Page 19
VeriChip

CHAPTER 4

WORKING OF A VeriChip

The reader generates a low-power, electromagnetic field, in this case via radio signals,
which "activates" the implanted VeriChip. This "activation" enables the VeriChip to send the ID
code back to the reader via radio signals. The reader amplifies the received code, converts it to
digital format, decodes and displays the ID number on the reader's LCD display. The reader must
normally be between 2 and 12 inches near the VeriChip to communicate. The reader and
VeriChip can communicate through most materials, except metal.

The chips are of the size of an uncooked grain of rice small enough to be injected
under the skin using a syringe needle . They respond to a signal from the detector
held just a few feet away by transmitting an identification number . This number is then
compared with a database listing of registered users.

 An RFID system consists of a tag, which is made up of a microchip with an antenna, and
an interrogator or reader with an antenna.

 The reader sends out electromagnetic waves.

 The tag antenna is tuned to receive these waves.

 A passive RFID tag draws power from field created by the reader and uses it to power the
microchip’s circuits.

 The chip then modulates the waves that the tag sends back to the reader and the
reader converts the new waves into digital data.

BSc Computer Science


St.Thomas College , Kozhencherry Page 20
VeriChip

4.1 GETTING UNDER THE SKIN:-

Hausdorffs chips

Hausdorffs chips are external , but another chip currently under development will
be injected under skin . The chips will allow diabetics to monitor the level of sugar
glucose in their blood . Diabetics currently use a skin prick and a handheld blood test
and then medicate themselves with insulin , depending on the result . The system is
simple and works well , but drawing blood each time is pain full so patients do not test
themselves as often as it is needed .

In contrast, active RFID tags have their own power supply and require no outside energy
to broadcast their information. Because this type of microchip will soon be implanted in the
body, an internal renewable power supply is a must. This is a major challenge and is also big
business.

Commercial devices are coming to market which will be surgically implanted and require
some sort of power supply. This is nothing new, consider the pacemaker. The big difference
though is that a pacemaker runs on batteries, and batteries need to be replaced. Replacement

BSc Computer Science


St.Thomas College , Kozhencherry Page 21
VeriChip

requires another costly operation, which inherently involves risk. The point of an internal
renewable power supply is that the batteries will never have to be replaced.

There is already existing technology that provides a means of creating an electrical current
through the process of temperature change. The Mark of the Beast is said to be in the hand or
forehead and it's no surprise that these are prime areas for hot and cold changes.

Thermo Life owned by Applied Digital Solutions through its purchase of eXI Wireless, is
a technology that converts temperature change into electricity.

"This next-generation Thermo Life™ is a direct result of VeriChip Corp's acquisition of


eXI Wireless. Knowing that the acquisition was in the process, our research and development
personnel aimed to improve the Thermo Life™ product to provide a potential power source for
an active RFID tag for People. “Scott R. Silverman, Chairman and CEO of Applied Digital

Thermo Life is a permanent power supply that operates off temperature fluctuations in the
human body. One of the main advantages of a powered (active) RFID implant is to allow for
tracking. In fact, Applied Digital Solutions is currently hard at work incorporating GPS into their
Verichip for the allowance of global tracking [9]. Thermo Life will likely power these devices.
The name alone is reminiscent of eternal hell fire, exactly what partakers of the Mark of the
Beast can look forward to.

Verichip Corp's implantable products include VeriMed, VeriGuard, and VeriPay.


RoamAlert also comes in an implantable version. Verichip Corp recently pulled all references to
their VeriPay product. They have been known to remove specific references to their products
only to have them resurface when the time is right

BSc Computer Science


St.Thomas College , Kozhencherry Page 22
VeriChip

CHAPTER 5

APPLICATIONS

RFID systems have gained popularity, and notoriety, in recent years. A driving force behind
the rapid development of RFID technology has been the rise of pervasive commerce, sometimes
dubbed the quiet revolution. Pervasive commerce uses technologies such as tracking devices and
smart labels embedded with transmitting sensors and intelligent readers to convey information about
key areas where consumers live and work to data processing systems. To gather this data, retailers
can choose from a range of options.

RFID systems may be roughly grouped into four categories:

 EAS (Electronic Article Surveillance) systems: Generally used in retail stores to sense the
presence or absence of an item. Products are tagged and large antenna readers are placed at
each exit of the store to detect unauthorized removal of the item.
 Portable Data Capture systems: Characterized by the use of portable RFID readers, which
enables this system to be used in variable settings.
 Networked systems: Characterized by fixed position readers which are connected directly to
a centralized information management system, while transponders are positioned on people
or moveable items.
 Positioning systems: Used for automated location identification of tagged items or vehicles.

These RFID systems enable business owners to have real-time access to inventory information,
as well as a broader, clearer picture of consumers' buying habits. RFID technology also enables
retailers and corporations to peek into the lives of consumers in ways that were, until recently, off
limits. Products embedded with RFID tags can continuously transmit information ranging from an
electronic product code (EPC) identifier, to information about the item itself, such as consumption
status or product freshness. Data processing systems read and compile this information, and can even
link the product information with a specific consumer.

BSc Computer Science


St.Thomas College , Kozhencherry Page 23
VeriChip

This composite information is vastly superior-and more invasive-than any data that could be
obtained from scanning bar codes, or even loyalty cards. Frequent shopper cards link consumers to
their purchases, but this limited information gives retailers only a narrow view of a consumers' in-
store purchasing trends. In contrast, RFID systems enable tagged objects to speak to electronic
readers over the course of a product's lifetime-from production to disposal-providing retailers with an
unblinking, voyeuristic view of consumer attitudes and purchase behavior.

As a broad technology, Radio-Frequency Identification (RFID) is proliferating into many


applications, including tracking of crates and pallets in industrial and military supply chains,
contactless payment devices, and anti-theft systems for automobiles. 4

• Tracking and identification devices in animals around 1983 for monitoring fishery

• Now widely used in monitoring pets and animals in zoos

• Implanted under the skin of the animal with a unique ID number


• A VeriChip can store and update financial, medical, demographic data, basically
everything about a person

Many consumers are already familiar with one form of RFID – the toll-pass that drivers
can keep inside their cars to go through toll booths without having to stop to pay.

The chip in the toll-pass sends information to a reader located in the toll booth. This
information, the reader’s location, and the time and date of the reading are then transmitted to a
computer system, which may be linked to databases containing other information such as the toll
fee and the bank account that will be billed for the toll.

Another use of RFID that some consumers are familiar with are payment systems that
allow them to wave a tag in front of a reader on a gas pump to fill up a gas tank. RFID
technology is also being used to control entry into certain buildings.

Some pet owners are having their dogs or cats implanted to help track them in case they
get lost, and the U.S. Food and Drug Administration has approved a tag to be implanted in
humans containing their patient records for use in hospitals.
BSc Computer Science
St.Thomas College , Kozhencherry Page 24
VeriChip

RFID is being used in supply chains to track the movement of products from a
manufacturer to a distributor to a retailer and any points in between. Depending on their intended
use, RFID systems vary in capability, the complexity and cost of the tag, the amount and
sensitivity of the information that the chips contain, and the distance from which readers can pick
up the signals from the tags.

5.1 In Medical Field:

This is a relatively simple device that made it through FDA approval with no problems and
has been on the market since 2004. This chip has been used many times in people (particularly
elderly people) and has help medical personnel to save many lives. More people than can count
were implanted with this device and it proved to be a success in the medical field for about 6
years before the ethical questions emerged.

Passive, or battery-less, RFIDs are available in two main form factors for use in tracking
humans in healthcare settings. Either the chip can be implanted into the body—the VeriChip
being the leading example of this type—or the chip can reside in an identification wristband
worn by patients. Both of these form factors provide significant advantages over the printed
barcodes that they are designed to replace.

Current implantable tags emit a simple identifier, (in the case of VeriChip, this identifier is
a 16 digit number built into the chip) which can be used by a patient’s physician to access the
corresponding database records through an access-controlled Web-based interface. For the most
part, human use has been limited, although passive RFID tags currently serve two applications at
Beth Israel Deaconess Medical Center in Boston. 9

The Beth Israel Deaconess Emergency Department is outfitted with passive RFID scanners
to read implanted chips. If an unconscious, confused, or non-responsive patient arrives for care,
he or she is scanned. If an implanted RFID with a medical record identifier is present, it can be
used to retrieve the patient’s medical history from the medical database. The RFID identifiers in
this system need not serve as definite authenticators: medical records at BIDMC and Verichip
contain the patient’s gender, age, and other demographic information, all of which can serve as a
quick check to ensure that the identification is correct. Additionally, each record contains the

BSc Computer Science


St.Thomas College , Kozhencherry Page 25
VeriChip

social and medical history that the patient has elected to share with clinicians, which may also
help confirm the patient’s identity. The instructions furnished by VeriChip Corporation for their
VeriMed system, which supports scanning of implanted VeriChips in patients, (VeriChip
Corporation, 2006). One can imagine several future uses of implanted RFID tags in healthcare:

 Automated registration: As patients arrive for care in outpatient, inpatient, or emergency


room settings, they can be scanned and automatically registered, bypassing the “clip
board” which patients generally fill out with demographics, insurance and medical
information. Eliminating the clip board is one of the most important problems in
healthcare IT: the Secretary of Health and Human Services recently named it as one of
the three most important healthcare IT goals in 2006.1 Implanted chips offer one potential
solution for identifying patients without imperfect identifiers such as names or sensitive
identifiers such as Social Security numbers.
 Patient safety: Currently, blood samples are taken from patients and medications are
given to patients without confirmation of patient identity. Many hospitals use a system of
stickers with warnings like “Name Check” when several patients with similar names are
admitted concurrently. This problem is exacerbated further if multiple patients with
exactly the same name are admitted. Blood tests and medications could be easily
confused between two John Smiths, causing potential medical error and patient harm. If
each patient is scanned as a blood sample is drawn, the sample can be tagged with
accurate patient identifiers. Similarly, scanning patients prior to the delivery of
medications can eliminate errors of identification. Of course, RFID wristbands could
support these same operations, but implantable tags prevent errors that might result from
inaccurate wrist-banding.
 Patient tracking: As patients move from location to location in the hospital, they could be
scanned with door-frame scanners or hand-held devices. When a patient arrives in the
operating room, the surgeon and anesthesiologist could be automatically paged. When a
patient leaves the Emergency Department and goes for an X-ray in radiology, the
emergency room physician could see the patient’s location on a dashboard, preventing
loss of time to searches for the patient. Active RFID tags (those with a battery) are
already used to track medical personnel and equipment such as patient beds.

BSc Computer Science


St.Thomas College , Kozhencherry Page 26
VeriChip

CHAPTER 6

FUTURE APPLICATIONS OF VeriChip

As citizens, consumers, and corporations, many people have unwittingly been exposed to
applications of VeriChip without realizing it. For example, many companies have adopted
VeriChip for access control and employee ID badge applications. In addition, contactless
smartcards have been widely deployed to speed payment, transit ticketing, and identify people
(such as national ID and healthcare cards) across the world. Other familiar applications include
electronic toll collection, pet tracking, and passports—all supported by VeriChip.

A chip implanted somewhere in human bodies might serve as a combination of credit card,
passport, driver's license, personal diary. No longer would it be needed to worry about losing the
credit cards while traveling.

Setting the stage for controversial tracking technology, the satellite telecommunications
company ORBCOMM has signed an agreement with VeriChip Corp., maker of the world's first
implantable radio frequency identification microchip.

VeriChip, a subsidiary of Applied Digital, will work with ORBCOMM to develop and
market new military, security and healthcare applications in the U.S. and around the world, the
company said. As WorldNetDaily reported, Applied Digital has created and successfully field-
tested a prototype of an implant for humans with GPS, or global positioning satellite, technology.

Once inserted into a human, it can be tracked by GPS technology and the information
relayed wirelessly to the Internet, where an individual's location, movements and vital signs can
be stored in a database for future reference.

"ORBCOMM's relationship with VeriChip provides yet another new and important
industry that will use the ORBCOMM satellite system and its ground infrastructure network to
transmit messages globally," ORBCOMM CEO Jerry Eisenberg said.
BSc Computer Science
St.Thomas College , Kozhencherry Page 27
VeriChip

Initially, after privacy concerns and verbal protests over marketing the
technology for government use, Applied backed away from public discussion about such
implants and the possibility of using them to usher in a "cashless society." In addition, to
quell privacy concerns, the company issued numerous denials, stating it had no plans for
implants.

When WND reported in April 2002 that the company planned such implant technology,
Applied Digital spokesman Matthew Cossolotto accused WND of intentionally printing
falsehoods. Less than three weeks later, however, the company issued a press release announcing
that it was accelerating development on a GPS implant.

When VeriChip first launched their product range, they had four cornerstone application
contexts: (1) VeriPay, (2) VeriMed, (3) VeriGuard, and (4) Corrections. The VeriPay system
allowed end-users the capability to perform cash and credit transactions with the embedded
implant. VeriMed was a user-driven healthcare information portal whereby consumers (i.e.
patients) could maintain their own personal health record (PHR) online. Hospital staff and
emergency services personnel could then access that information to get patient history, as well as
allergic reactions to drugs and more. The VeriGuard application was considered to be versatile
secure access technology which let in authorized persons and blocked out unauthorized persons
(VeriChip 9 October 2003). Finally, VeriChip's ‘Corrections’ product had to do with chipping
people who had committed a crime, were on parole or probation, or were awaiting trial.

The tracking doesn't stop at geographic location either. Heart rate, breathing, temperature,
sleep, and consciousness can all be monitored from any remote location. All of this is already
being used in real world applications.

VeriChip as Glucose Detector: The VeriChip can be integrated with a glucose detector.
The chip will allow diabetics to easily monitor the level of the sugar glucose in their blood.
Diabetics currently use a skin prick and a hand-held blood test, and then medicate themselves
with insulin depending on the result. The system is simple and works well, but the need to draw
blood means that most diabetics don't test themselves as often as they should. Although they may
get away with this in the short term, in later life those who monitored infrequently suffer from
BSc Computer Science
St.Thomas College , Kozhencherry Page 28
VeriChip

blindness, loss of circulation, and other complications. The solution is more frequent testing,
using a less invasive method. The VeriChip will sit underneath the skin, sense the glucose level,
and send the result back out by radio-frequency communication.

Proposed principle of Glucose detection: A light-emitting diode (LED) in the VeriChip


starts off the detection process. The light that it produces hits a fluorescent chemical: one that
absorbs incoming light and re-emits it at a longer wavelength. The longer wavelength of light is
then detected, and the result is sent to a control panel outside the body. Glucose is detected
because the sugar reduces the amount of light that the fluorescent chemical re-emits. The more
glucose there is the less light that is detected.

VeriChip as Oxygen sensor: The VeriChip can also be integrated with an oxygen sensor
.The oxygen sensor will be useful not only to monitor breathing in intensive care units, but also
to check that packages of food, or containers of semiconductors stored under nitrogen gas,
remain airtight.

Proposed principal of Oxygen sensor in VeriChip: The oxygen-sensing chip sends light
pulses out into the body. The light is absorbed to varying extents, depending on how much
oxygen is being carried in the blood, and the chip detects the light that is left. The rushes of
blood pumped by the heart are also detected, so the same chip is a pulse monitor.

VeriChip as a Blood Pressure sensor: In normal situations, The Blood Pressure of a


healthy Human being is 120/80 mm of Hg. A Pressure ratio lower than this is said to be “Low
BP “ condition & A Pressure ratio more than this is “High BP” condition. Serious Effects will be
reflected in humans during Low & High BP conditions; it may sometimes cause the death of a
Person. Blood Pressure is checked with BP Apparatus in Hospitals and this is done only when
the patient is abnormal. However, a continuous monitoring of BP is required in the aged people
& Patients. A huge variety of hardware circuitry (sensors) is available in electronics to detect the
flow of fluid. It’s always possible to embed this type of sensors into a VeriChip. An integration
of Pressure (Blood Flow) detecting circuits with the VeriChip can make the chip to continuously

BSc Computer Science


St.Thomas College , Kozhencherry Page 29
VeriChip

monitor the blood flow rate & when the pressure is in its low or high extremes it can be
immediately informed through the reader hence to take up remedial measures.

Innovative Manufacturing Will Create Durable and Versatile Tags: Advancements in


printed electronics have helped create new classes of extremely thin, flexible RFID tags that
can now be combined with printed sensors, printed batteries, thin-film photovoltaic solar
cells, and other technologies. With new electronic printing and conductive ink technologies,
companies could conceivably print their own chipless RFID tags on site.
There are also companies working on 3D printing technology that would enable direct printing of
electronics in products as they are rendered. While the printing of RFID tags directly inside
products may be several years away, the technology is rapidly evolving to do so.

New Antenna Designs Could Increase Range: The key to good tag performance is the
antenna design. It’s the antenna that helps determine where and how a tag can be used, and how
well it will perform. Over the next few years, expect to see new antennas and inlays as the
competition for RFID antenna design heats up.

Increased Memory Will Create Smart Tags: Building intelligence into the tag and, by
extension, the asset being tagged is another key activity. Expect tags with more memory at a
lower cost to enable these “smart asset” applications. High-value assets will be an early
application for this technology, as the cost of those assets will make it easier to amortize the
increased cost of the more robust tags

Use Sensor Integration to Streamline Your Business: RFID will increasingly be one
part of a whole ecosystem of sensors and communication technologies that will help companies
better monitor and manage assets and shipments. Passive sensors for temperature, moistures,
pressure, vibration and other factors will be combined with RFID to provide even more
intelligence form the edge of the enterprise.

Secure Your Data With New Cloud-Based Capabilities: RFID can potentially enable a
whole host of new applications in the retail, healthcare, manufacturing and other sectors, but one
stumbling block has always been management of the data flowing in from thousands of tags.

BSc Computer Science


St.Thomas College , Kozhencherry Page 30
VeriChip

With cloud-based applications and services taking the heavy lifting of IT support away from the
point of activity, companies can now deploy centrally managed and centrally available solutions
without the traditional support and deployment costs.

Final Thoughts and Takeaways: The RFID industry is about to enter an exciting period
in which increased adoption will provide the means for technology providers to invest in new,
exciting innovations. Along with the new developments described above, advancements in
materials, organic polymers, nano technology, and other areas will change the way RFID is
incorporated into products. Instead of a tag attached to a garment, for example, an RFID
transponder could be printed directly into cloth or packaging using biodegradable conductive
inks.

BSc Computer Science


St.Thomas College , Kozhencherry Page 31
VeriChip

CHAPTER 7

ADVANTAGES AND DISADVANTAGES OF Verichip

7.1 ADVANTAGES OF VeriChip

The RFID chip can be a useful tool, especially when it comes to emergency situations
where instant access to the right medical information can mean the difference between life and
death. Ideally this would be used to store a unique number, which could reference a database on
computer containing an individual’s medical history, financial assets, personal details, biometric
data, etc. This chip could have a wide range of applications, from security clearance and
identification, secure financial transactions, retrieving essential data for medical emergencies,
and the list goes on. Also, because the chip’s radio emission can be tracked by satellite, it also
could be used to locate a person anywhere in the world. GPS circuits are now being
manufactured small enough to fit inside wrist watches, and the next generation of implantable
chips may also utilize this technology.

Quote: “Applied Digital Solutions, maker of what it calls the VeriChip, says that it soon
will have a prototype of a more complex device, one that is able to receive signals from global
positioning system (GPS) satellites and transmit a person’s location. One potential market for
such a device would be kidnapping targets in foreign countries…
An embedded GPS would be slightly larger than a quarter and require actual surgery to install.
Unlike the VeriChip, it also would require Food and Drug Administration approval. That will
slow its U.S. introduction.

But in the meantime, I believe it is entirely possible for current RFID implants to be
tracked by satellite.

BSc Computer Science


St.Thomas College , Kozhencherry Page 32
VeriChip

1. You’ll never again have to worry about losing your wallet

We use RFID chips for many of our daily activities. They are in the cards we use to pay
for things at the store, take public transport, gain access to buildings and borrow books from the
library. The problem with these plastic cards is that we can lose them or they can get stolen. An
implanted RFID chip is impossible to lose or steal.

2. Even easier identification

Our passports, IDs and driver’s licenses already contain microchips and it would require
minimal changes in infrastructures at train- and bus stations and airports to transition from
scanning passports to scanning arms. You will be identified without having to do a thing –
except walk past a reader.

3. Club memberships and access control

The Baja Beach Clubs in Rotterdam, the Netherlands and Barcelona, Spain were the first
clubs to offer micro chipping to VIP clients, allowing them to avoid long waits in lines and
offering easy access to membership features. Members use their chips to keep track of what they
order and even to pay for their food and drinks. Waiters can scan the chips and a computer
automatically debits their bank accounts. Implanted RFID chips are also practical in the
workplace, in hotels, at gyms and anywhere else identification is needed to be granted access.

4. Your medical history will always be easily accessible

An implanted RFID chip can be used to quickly gain access to your medical history: what
antibiotics you’ve had in the past, what you’re allergic to, what medication you take and any
other medical information that’s relevant in medical emergencies, especially when a patient is
unconscious. These implants are particularly useful for people suffering from diabetes,
cardiovascular disease or Alzheimer’s disease. The chip itself doesn’t contain the patient’s entire

BSc Computer Science


St.Thomas College , Kozhencherry Page 33
VeriChip

medical history, but rather a unique code or number that can be used to access the information
from a database.

5. Keeping tabs on patients, children and criminals

It’s not uncommon for babies to get mixed up at hospitals, for the elderly or hospital
patients to wander out of care facilities or for criminals to escape from prison. It is also not
uncommon for children to get lost in a crowd, run away from home or be kidnapped. In these
instances, being able to track people means peace of mind for millions of caregivers, family
members and parents. In the event of a kidnapping, the first 4 hours are the most critical, as
murder usually happens within that time frame. An RFID chip could significantly lower the risk
of something terrible happening.

6. You’ll be able to automatically control many of your devices

Imagine being able to start your car automatically, opening your front door as you
approach it, your favourite TV channel switching on as you sit down on your couch, or your
thermostat making sure the temperature is just right when you come home from work. All this is
possible with an RFID implant, bringing a digital identity into the real world.

7. Nobody but you will be able to use your weapon

Smith & Wesson as well as Browning have already developed an implant system for
firearms that allows only the registered owner to fire his or her weapon. Situations in which a
weapon is stolen and ending up in the wrong hands or kids accidentally finding a weapon will no
longer lead to dangerous situations. Also, the GPS functionality in these weapons will provide
information on where, when and by whom the gun was fired, making the ‘lost weapons’
phenomenon at crime scenes a thing of the past.

Other advantages includes:

BSc Computer Science


St.Thomas College , Kozhencherry Page 34
VeriChip

 To rescue the sick.


 To find lost people..
 To identify person uniquely.
 They can perform thousands of biological reactions operations in few seconds.
 In monitoring health condition of individuals in which they are specifically employed.
 They can perform thousands of biochemical reactions
 The tag does not need to be in line of sight with the receiver to be read (compare to
a barcode and its optical scanner) (Shepard, 2004, p. 58).
 RFID tags can store a lot of information, and follow instructions
 Has the ability to pinpoint location
 Technology is versatile: can be smaller than a thumb tack or can be the size of a
tablet, depending on its use
 According to a report that studied the use of RFID within the average Vendor Managed
Inventory (VMI), carried out by Professor Tsan-Ming Choi of the Hong Kong
Polytechnic University, it was concluded that the use of RFID actually enhanced each
supply chain’s system performance and increased expected profit (2011).

BSc Computer Science


St.Thomas College , Kozhencherry Page 35
VeriChip

7.2 DISADVANTAGES OF VeriChip

1. Microchips may take away our freedom of choice

With RFID implants, we will always have to be on our very best behaviour. No more
driving a little faster than we should, making up an excuse for why we got to work late. In order
to serve the public better, the service provider(s) need to have more access to more information,
which can also severely limit our freedom. For instance, will we still be able to choose to pay
with cash money or our credit card or will we be forced to pay with our RFID implant? What if
receiving microchips becomes mandatory for, say, being able to apply for a job, get insurance,
being admitted to school? How will we be able to remove the implant?

2. Chips may make us prime targets for people with bad intentions

As is the case with most new technological developments, RFID chips are also sensitive to
exploitation. Because they contain so much important information, they can become a prime
target for people with bad intentions, such as hackers. Imagine the information on your chip not
only being readable, but also writable. That would mean your data could be corrupted, wiped or
copied. This means that criminals could use your data and copy it onto or replace it with their
own data, altering your – and their – physical identity.

3. We need to think about who really benefits from human microchipping

Yes, RFID implants could make our lives more efficient, but we should actually ask
ourselves who really benefits from human microchipping. It would make it very easy for Big
Brother to continuously track where we are, what we do, how we do it and whom we’re doing it
with. This could be very valuable information for large corporations and governments. RFIDs
could enable governments, security companies or the police to electronically ‘frisk’ citizens via
chip readers placed in public places or along roadsides and pedestrian areas, etc. RFIDs can
basically be scanned from a few feet away, by anyone who has a reader. This is a legitimate
concern that requires stringent privacy controls and security measures.

BSc Computer Science


St.Thomas College , Kozhencherry Page 36
VeriChip

Other disadvantages include:

 They raise critical issues of personal privacy.


 They may not be supported by large % of people.
 There is a danger of turning every man, women, and child into a controlled slave.
 Through cybernetic VeriChip implants people will think and act as exactly pre-
programmed.
 They can be implanted into one’s body without their knowledge.
 Active RFID can be expensive because of batteries
 There still needs to be regulations about RFID guidelines
 There is a privacy concern towards RFID devices, for example some claim that Wal-Mart
is infringing on natural rights by overseeing what customers buy
 RFID may be easily intercepted, even if it is Encrypted

7.3 Typical Problem of VeriChip: A Solution Proposed –

The Lock: Problem before the world

A chip implant would contain a person’s financial world, medical history, health care — it
would contain his electronic life". If cash no longer existed and if the world’s economy was
totally chip oriented; — there would be a huge "black-market" for chips! Since there is no cash
and no other bartering system, criminals would cut off hands and heads, stealing "rich-folks"
chips.

"It is very dangerous because once kidnappers get to know about these chips, they will
skin people to find them," (New York Times, June 20, 1999). The typical solutions won’t work
well are already proposed by different people:

BSc Computer Science


St.Thomas College , Kozhencherry Page 37
VeriChip

The VeriChip must retain data only if it is placed in a fluid medium like blood & not in
any other medium. This technique is unsuitable for identification of dead bodies (murdered by
the kidnappers) as it loses the data about the social security number.
The data in the VeriChip must be erased if it is exposed to sunlight/air. This technique is
unsuitable as transplantation of VeriChip from genuine to the fraud in darkness (by means of
infrared light) or in the vacuum (by means of oxygen cylinders).And many such…….!!!!!!!!

Our key: A proposed solution-

A generic & existing model of VeriChips consists of only ROM component in it and is
capable of accommodating the data such as social security number, Passport number, bankcard
number etc., which are normally permanent in nature. The induction of RAM component in
addition to ROM & storing the Bankcard, Financial details which causes the problem is a mere
solution. As RAM needs to be continuously charged in order to retain the data, Current can be
supplied to the chip either from the electrical energy produced in the cells or by converting the
heat energy in our body to electrical energy. Once if the chip is taken out from the human body
RAM immediately loses the Power supply from the human body; thus information in the RAM is
lost and therefore is useless for the kidnappers. However this technique will not affect the data in
ROM i.e. Social security number that can be used to detect the address of the dead bodies that
were unidentified.

BSc Computer Science


St.Thomas College , Kozhencherry Page 38
VeriChip

CHAPTER 8

VeriChip AND 666 (BEHIND THE BARCODE)

VeriChip was developed to modify and to upgrade the features of Barcode. Even though
VeriChip has and would replace barcodes, the basic entities such as the Universal Product Codes
(UPC) shows resemblance.

8.1 The Barcode:

What are barcodes? Barcodes, of course, are those ever-familiar "bars" and "numbers"
on virtually everything. In 1973, "Mr. Barcode" (or is it Mrs. Barcode?) quietly strolled into our
world. In just over 25 years, Mr. Barcode has literally taken over the world. Now there's a
barcode for virtually everything. There's short barcodes, and tall barcodes. There's skinny
barcodes and fat barcodes. There's postal barcodes and international barcodes. There's 2-D

BSc Computer Science


St.Thomas College , Kozhencherry Page 39
VeriChip

barcodes. And there's even barcodes for the humble "bumble-bee". From letters, to cokes, from
fishes to smokes - it's "clothed" with friendly "Mr. Barcode".

As someone truthfully said, "If it exists, bar code it".

The primary barcode used in the United States is the UPC (Universal Product Code)
barcode. The UPC is also the "original" barcode. The UPC was designed for the grocery
industry. Because of the large number of items normally "checked-out" at the grocery store, a
method was needed to speed up and eliminate "human" cashier errors. In 1973, the UPC barcode
was born.

To the average person, the barcode looks confusing and complex, but to a "bar-coded"
friendly computer, it's actually very simple.

How a computer-scanner does reads a barcode? A single barcode number is actually


seven units. A unit is either black or white. A unit that is black would display as a "bar". A unit
that is white would display as a "space". Another way of writing a barcode unit is "1" for a single
unit "black bar" and "0" for a single unit "white space". For instance, the number "1" is
composed of the seven units, "0011001" or "space-space-bar-bar-space-space-bar". Remember, a
single barcode number requires seven units.

Also, on a UPC barcode the same numbers on the left-hand side (the Manufacturer Code)
is coded different than the numbers on the right-hand side (Product Code). The left side numbers
are actually the "inverted" or "mirrored" codes of the right side numbers, for instance what is a
"bar" on the right-side, is a "space" on the left-side. The right-side codes are called "even parity"
codes because there is an even number of "black bar" units. For instance the right-side "6" is
"101000" - 2 even-numbered "black bar" units. The left-side is called "odd-parity" because there
is an odd number of "black bar" units. For instance, the left-side "6" is "0101111" - 5 odd-
numbered "black bar" units. Having different coded numbers for each side allows the barcode to
be scanned in either direction.

BSc Computer Science


St.Thomas College , Kozhencherry Page 40
VeriChip

Number System Character: This number is a UPC system number that characterizes
specific types of barcodes. In a UPC barcode it is normally on the left of the barcode. The actual
"barcode" (the "bars" and "spaces") is the first "barcode" after the first "guard bar". The Number
System Character is the blue box on the "Anatomy of a Barcode".

Codes of the Number System Character:

 0 - Standard UPC number.


 1 - Reserved.
 2 - Random weight items like fruits, vegetables, and meats, etc.
 3 - Pharmaceuticals
 4 - In-store code for retailers.
 5 - Coupons

BSc Computer Science


St.Thomas College , Kozhencherry Page 41
VeriChip

 6 - Standard UPC number.


 7 - Standard UPC number.
 8 - Reserved.
 9 - Reserved.

3 Guard Bars: There are "3 guard bars". They are located at the beginning, middle and
end. The beginning and ending guard bars are encoded as a "bar-space-bar" or 101. The middle
guard bar is encoded as "space-bar-space-bar-space" or 01010. The guard bars "tell" the
computer-scanner when the manufacturer and product code begin and end. For example, when
the computer-scanner reads the first "101" or guard bar, the computer knows the next series of
numbers is either the manufacturer or product code. And when the computer reads the "01010"
or middle guard bar, the computer knows another number is coming. The 3 guard bars are also
the supposedly "666" hidden in the barcode (we'll look at this in detail later). The 3 guard bars
are highlighted with a green box on the "Anatomy of a Barcode".

Also, the first guard bar scanned is used by the computer to calculate the "width" of one unit.

Manufacturer Code: This is a five digit number specifically assigned to the manufacturer
of the product. The manufacturer codes are maintained and assigned by the Uniform Code
Council (UCC). Every product the manufacturer makes, carries the same manufacturer code. For
example, the manufacturer code for Kellogg's is 38000. Every product Kellogg makes carries
38000 as the manufacturer code in the bar code. The manufacturer code is yellow on the
"Anatomy of a Barcode".

Product Code: The product code is a five digit number that the manufacturer assigns for a
particular product. Every different product and every different packaging or size, gets a unique
product code. For instance, a 16oz bottle of coke gets a different product code than a 24 oz bottle
of coke. For example: Kellogg's 13.5 oz Rice Krispies barcode is 38000 90530 — the 38000 is
the manufacturer code for Kellogg and the 90530 is the product code for 13.5oz Rice Krispies.
Kellogg's 16oz Mini-Wheats is 38000 02720 — the 38000 is the manufacturer code for Kellogg
(the manufacturer never changes for Kellogg products) and the 02720 is the product code for

BSc Computer Science


St.Thomas College , Kozhencherry Page 42
VeriChip

16oz Mini-Wheats. A manufacturer can have 99,999 unique product codes. The product code is
orange on the "Anatomy of a Barcode".

Check digit: Also called the "self-check" digit. The check digit is on the outside right of
the bar code. The check digit is an "old-programmer's trick" to validate the other digits (number
system character, manufacturer code, and product code) were read correctly. The check digit is
red on the "Anatomy of a Barcode".

8.2 Is the number 666 "hidden" in the UPC barcode?

One of the most popular and shocking accusations concerning the number "666" is that the
number "666" is quietly "hidden" in every UPC barcode. Mary Stewart Relfe's book, "The New
Money System 666", published in 1982, is the "pioneer" of the "666 in the UPC barcode"
teaching. Relfe's book contains over 50 pages of excellant doumentation on the UPC barcodes.
Relfe's discovery is repeated in many publications touching the mark of the beast, within the last
fifteen years. Including tracts published by this author.

Here's a few samples:

Terry Cook, The Mark of the New World Order, 1996:

". . . the entire system [UPC barcode] is very deceptively designed around the infamous
numerical configuration, Biblically known as 666, the mark of the Antichrist or devil (Revelation
13:16-18). . ." (Terry Cook, The Mark of the New World Order, 1996, p. 376)

Bob Fraley, The Last Days in America, 1984:

"The interpretation of the Universal Product Code marks is most revealing in that the three
numbers '666' are the key working numbers for every designed Universal Product Code. Every
group of Universal Product Code marks has in it three unidentified numbers. All three of these
numbers are 6, making the use of the numbers '666' the key to using this identifying marking
system. . .

BSc Computer Science


St.Thomas College , Kozhencherry Page 43
VeriChip

There is no deviation. Every Universal Product Code has three unidentified marks whose number
equivalent '6' encoding it with the code number '666'. " (Bob Fraley, The Last Days in America,
1984, p. 225, 228)

Here's how to "discover" the "hidden 666 in the UPC barcode".

The "hidden" 666 in the Barcode

Notice the three "guard bars" (colored RED) at the beginning, middle and end. Now, notice the
same bar pattern ("bar-space-bar" or "101") for the number 6 (colored BLUE).

By "looking" at the above barcode, the number "666" clearly, appears to be there. . .

But is it?

Is the number 666 TRUTHFULLY "hidden" in the UPC barcode?

Technically, no it is not.

Here's the "technical" truth. . .

The number 6 and the three guard bars are NOT the same. They do "appear" to be identical, but
they are different.

BSc Computer Science


St.Thomas College , Kozhencherry Page 44
VeriChip

GUARD BARS AND THE NUMBER 6

B M 6

123 12345 1234567

101 01010 1010000

Notice. The beginning and ending guard bars are "bar-space-bar" or "101" (the B in the
above table). The middle guard bar is "space-bar-space-bar-space" or "01010" (the M in the
above table). The number six is "1010000" (the 6 in the above table). Remember, technically a
barcode number consists of seven units. The beginning and ending guard bars are
only three units, and middle guard bar is only five units.

So, technically, from a computer's perspective the number "666" is NOT in the UPC barcode.

But. . .

Look again. . . All three guard bars contain the pattern "bar-space-bar" or "101". There is
only ONE number, in TWENTY numbers (remember right and left numbers have different
patterns) that contains the "101" pattern and that number is the right code SIX. Not the number
one, or two, or three, etc. — but ONLY the right code SIX. I do seem to remember something
about a mark on the RIGHT hand (Rev. 13:16).

Technically, from a computer's perspective the number "666" is NOT in the UPC barcode.
. . but from a human's perspective — YES, the "appearance" of 666 is there!

What does the inventor of the UPC barcode say about the number "666" in the UPC barcode?

The inventor of the UPC barcode is George J. Laurer. In 1971, while Mr. Laurer was an
employee with IBM, he was assigned the task "to design the best code and symbol suitable for

BSc Computer Science


St.Thomas College , Kozhencherry Page 45
VeriChip

the grocery industry". In 1973, Mr. Laurer's UPC barcode entered the world, and the rest is
history.

On Mr. Laurer's web site, he has a "Questions" page, where he answers various questions
about the UPC barcode. On the "Questions" page, Mr. Laurer answers the "666" question, as
follows:

Question #8 - Rumor has it that the lines (left, middle, and right) that protrude below the
U.P.C. code are the numbers 6,6,6... and that this is the international money code. I typed a code
with all sixes and this seems to be true. At least they all resemble sixes. What's up with that?

Answer- Yes, they do RESEMBLE the code for a six. An even parity 6 is:

1 module wide black bar 1 module wide white space 1 module wide black bar 4 module
wide white space

There is nothing sinister about this nor does it have anything to do with the Bible's "mark
of the beast" (The New Testament, The Revelation, Chapter 13, paragraph 18). It is simply a
coincidence like the fact that my first, middle, and last name all have 6 letters. There is no
connection with an international money code either. (From website)

Even, Mr. Laurer, the inventor of the UPC barcode admits, "Yes, they do RESEMBLE the
code for a six."

In fact, as I've documented — SIX is the ONLY number they could RESEMBLE.

You would certainly think because of the "antichrist connections" to "666" they would
have picked another number besides '6' to pattern the three 'guard bars' after? Why not 1 or 3, or
5, etc. — any number but '666'. Surely they knew Christians would, sooner or later, "discover"
the clear "appearance" of 666 in the UPC bar code.

Maybe they had no choice?

BSc Computer Science


St.Thomas College , Kozhencherry Page 46
VeriChip

No joke. The developer of the UPC code, George J. Laurer has had to make a public
statement addressing the accusation that the guard bars on UPC’s are a code for “666”. Guard
bars are bit containing patterns at the beginning, middle, and end of each UPC code, which
resemble the coding for the number 6. Laurer has responded to accusations on his website by
saying “there is nothing sinister about this nor does it have anything to do with the Bible’s ‘mark
of the beast.’ It is simply a coincidence like the fact that my first, middle, and last name all have
6 letters.” Having nightmares about UPC codes? Blame George.

BSc Computer Science


St.Thomas College , Kozhencherry Page 47
VeriChip

CHAPTER 9

What is 666!!!!!?

Just Google it and you will find it in a split of seconds…… that it’s the number of the
Beast, the Antichrist. It is only given in the Bible in the book of Revelation.

BSc Computer Science


St.Thomas College , Kozhencherry Page 48
VeriChip

9.1 What Does Bible Actually Say About 666 and Chip!!!?

Revelation-13:16-18
“And he (Antichrist) causeth all, both small and great, rich and poor, free and bond, to
receive a mark (incision) IN their right hand, or IN their foreheads: And that no man might buy
or sell, save he that had the mark, or the name of the beast, or the number of his name. Here is
wisdom. Let him that hath understanding count the number of the beast: for it is the number of a
man; and his number is Six hundred threescore and six (666).”

I will try my best to summarize the information concerning VeriChip, and how this chip –
or its antitype, may fulfil the prophecy concerning the Mark of the Beast…

As we have learned about VeriChip, its use, applications, and its future, the chip is injected
by syringe (incision) under the skin, much like a family pet would be “tagged”. Scientists spent
over 1.5 billion dollars working out the best location to inject the chip into the human body.
They only came up with two places, specifically the right hand, or the forehead. Both these
locations in the body generate the most heat, and therefore are most suitable for the Lithium Ion
batteries.

Quote: “”We believe we have solved the battery issue, which leaves the question of an
antenna that can transmit through skin tissue,” said Applied Digital’s chief scientist, Keith
Bolton. The devices will be powered by lithium ion batteries, which can be charged remotely
from outside the body.

Lithium is also an extremely poisonous metal, and if it comes in contact with the human
body at all, terrible sores erupt in the flesh.

Quote: “GPS technology took a quantum leap with the development of bionics capable of
being tracked by satellite once implanted in animals or humans. These tiny devices, powered by
a lithium battery, could be geographically detected, using Radio Frequency Identification
(RFID), to within inches anywhere on the surface of the planet. Lithium is employed as a
miniature power-plant for the chip since it self-energises through changes in the host’s body

BSc Computer Science


St.Thomas College , Kozhencherry Page 49
VeriChip

temperature. Thus the site for the implant will usually be those body parts demonstrating the
greatest variations in temperature – in the back of the hand or front of the head. Lithium does
have one drawback, experts say. It produces an infection when brought into contact with exposed
organic tissue.

9.2 So What Happens To the Ones Who Accepts The Mark?

Revelation 14: 9-11


Then a third angel followed them, shouting, “Anyone who worships the beast and his statue or
who accepts his mark on the forehead or on the hand must drink the wine of God’s anger. It has
been poured full strength into God’s cup of wrath. And they will be tormented with fire and
burning sulphur in the presence of the holy angels and the Lamb. The smoke of their torment will
rise forever and ever, and they will have no relief day or night, for they have worshipped the
beast and his statue and have accepted the mark of his name.”

The Bible is clear about one thing, that those who do accept the mark will have by
implication, automatically rejected the Lord Jesus, and as a result will never see heaven. They
are marked by God for destruction, and for eternal punishment in the lake of fire.

The reason for receiving the mark is worship and allegiance to the Antichrist. It’s NOT the
"buying and selling"! Most people are busy searching for a "technology" or method to control the
"buying and selling" — and that’s NOT the reason for receiving the mark of the beast. And I’m
going to prove that without any shadow of a doubt. . .

I repeat – the reason for taking the mark of the beast is not so someone can or can NOT
buy or sell.

Here’s the reason "buying and selling" can NOT be the main purpose for the mark.
Because according to Rev. 14:9-11 — whoever receives the mark "shall drink of the wine of the
wrath of God . . . shall be tormented with fire and brimstone . . . their torment ascendeth up for
ever and ever".

BSc Computer Science


St.Thomas College , Kozhencherry Page 50
VeriChip

Revelation 14:9-11 And the third angel followed them, saying with a loud voice, “If any man
worship the beast and his image, and receive his mark in his forehead, or in his hand,
The same shall drink of the wine of the wrath of God, which is poured out without mixture into
the cup of his indignation; and he shall be tormented with fire and brimstone in the presence of
the holy angels, and in the presence of the Lamb:
And the smoke of their torment ascendeth up for ever and ever: and they have no rest day nor
night, who worship the beast and his image, and whosoever receiveth the MARK of his name.”

Do you understand the seriousness of what you just read? Whoever receives the mark
"shall drink of the wine of the wrath of God . . . shall be tormented with fire and brimstone . . .
their torment ascendeth up for ever and ever".

This begs the obvious question – is a Holy, Righteous, Just, God going to "torment
someone with fire and brimestone, for ever and ever" for receiving a "mark" to "buy or sell".

Please, let’s not forget . . . Our God is LOVE.

The Bible says in 1 John 4:16 – "… God is LOVE…"

1 John 4:16: "And we have known and believed the love that God hath to us. GOD IS
LOVE; . . ."

The Bible says in familiar John 3:16, "For God SO LOVED the world…"

The Bible says in Psalms 86:5, that God is "good, ready to forgive, and plenteous in
mercy".

"For thou, Lord, art good, and ready to forgive; and PLENTEOUS IN MERCY unto all
them that call upon thee." Psalms 86:5

In the "light" of these verses (and there are thousands of wonderful verses just like them) –
would a "God of LOVE"; a God, "ready to FORGIVE; a God, "plenteous in MERCY" —

BSc Computer Science


St.Thomas College , Kozhencherry Page 51
VeriChip

"torment someone with fire and brimestone, for ever and ever" for simply receiving a "mark" or
"VeriChip" to "buy or sell"?

NO. Absolutely NOT. A thousand times — NEVER!

What is the real purpose of the mark of the beast?

What is it about the mark of the beast, that so "disturbs" a just and holy God, that He
would justly "torment someone in fire and brimestone for all eternity" for receiving the mark?

The purpose of the mark of the beast is a "mark" of allegiance and worship of the
Antichrist. And it is a rejection of a holy God. To receive the mark of the beast you must FIRST
worship the beast. Look at the following verses:

Rev. 14:9 "If any man worship the beast and his image, and receive his mark. . . "

Rev. 14:11" . . . who worship the beast and his image, and whosoever receiveth the mark."

Rev. 16:2 “. . . which had the mark of the beast, and upon them which worshipped his
image."

Rev. 19:20" . . . them that had received the mark of the beast, and them
that worshipped his image. . ."

Rev. 20:4" . . . which had not worshipped the beast, neither his image, neither had
received his…"

Only ONE verse connects "buying and selling" with the mark. But there are many verses
that connect the mark to WORSHIP.

True. No one can buy or sell without the mark, but that’s not the REASON for receiving
the mark. The "no man might buy or sell" is the CONSEQUENCE of NOT receiving the mark –
not the REASON for receiving it.

BSc Computer Science


St.Thomas College , Kozhencherry Page 52
VeriChip

But I believe this mark will only be made compulsory during the tribulation period by the
Antichrist himself, therefore if the Rapture happens before the tribulation period, those who have
trusted Christ have no reason for concern.

So here we have God, who has clearly identified His servants by a mark, not visibly but
symbolically, through the Holy Spirit indwelling them. Similarly, those who accept the Mark of
the Beast will do so with a conscious decision, willing to become the property of the Antichrist,
to worship him in the place of God.

I believe if the public agreed, politicians would bring the mark/chip in tomorrow.
Countries around the world are already working on ID schemes, albeit limited to public
acceptance. In Britain they are still trying to bring in the new chipped Passports, which will
inevitably become compulsory to own, even if you aren’t planning to leave the country. They are
even testing a scheme to chip car licence plates.

There is no doubt, a chip in the hand would solve an awful lot of problems. For example,
credit card fraud, locating missing persons, immigration problems, identifying and treating
people after natural disasters, etc. But the public won’t yet accept a chip because they believe it
intrudes on their privacy, and they don’t trust the government not to abuse their confidential
information. That is, until a world crisis arises (genuine or engineered) which “persuades”
everyone that this is the best course of action, for the “benefit” of mankind.

We are told a little about why a chip will eventually be brought in to tag mankind. “He
causeth all”. The Antichrist will be will be the person who will make it compulsory to have this
chip. And the reason given is, so “that no man might buy or sell” unless he had the mark. These
words were written over 2000 years ago, yet only within the last 5 years have we properly
understood the significance of them due to technological advancements.

On the 30th of October, 2006, a group of British academics published a report for the UK
Information Commissioner, warning that within 10 years, unless regulations were brought in to

BSc Computer Science


St.Thomas College , Kozhencherry Page 53
VeriChip

control this new surveillance technology, Britons could find themselves facing the prospect of
having compulsory identification implants…

Quote: “For the past six years European countries have been using RFID chips to identify
pet animals. However, its use in humans has already been trialled in America, where the chips
were implanted in 70 mentally-ill elderly people in order to track their movements. And earlier
this year a security company in Ohio chipped two of its employees to allow them to enter a
secure area. The glass-encased chips were planted in the recipients’ upper right arms and ‘read’
by a device similar to a credit card reader. In their Report on the Surveillance Society, the
authors now warn: “The call for everyone to be implanted is now being seriously debated.”

There could be a number of reasons why we will eventually have a cashless society. One
of the reasons could be that an economic collapse would make cash and gold worthless. We are
told in the book of James that those who have heaped together treasure of the last days would
find it worthless.

James-5:1-3
Go to now, ye rich men, weep and howl for your miseries that shall come upon you. Your
riches are corrupted, and your garments are moth-eaten. Your gold and silver is cankered; and
the rust of them shall be a witness against you, and shall eat your flesh as it were fire. Ye have
heaped treasure together for the last days.

Ezekiel-7:19
They shall cast their silver in the streets, and their gold shall be removed: their silver and
their gold shall not be able to deliver them in the day of the wrath of the LORD: they shall not
satisfy their souls, neither fill their bowels: because it is the stumbling block of their iniquity.

With all the disasters befalling earth during this time, for instance; nuclear war, asteroid
impacts, earthquakes, it’s easy to see how we could have a world economic collapse. Estimates
are that world oil reserves will only last another 20 years, and the world economy, if not the

BSc Computer Science


St.Thomas College , Kozhencherry Page 54
VeriChip

balance of power, is based on who controls the oil. The Bible tells us that during the tribulation,
inflation will rise so high that a day’s wages will only buy the equivalent of a loaf of bread.

Revelation-6:5-6
And when he had opened the third seal, I heard the third beast say, Come and see. And I
behold, and lo a black horse; and he that sat on him had a pair of balances in his hand. And I
heard a voice in the midst of the four beasts say, A measure of wheat for a penny (a day’s
wages), and three measures of barley for a penny; and see thou hurt not the oil and the wine.

Another reason the chip may be brought in that has already been discussed is for security
reasons. If you can control who can buy and sell, you can effectively control who lives and dies.
So, much like a Social Security number, a chip in the hand could stop “terrorists” travelling,
working, and buying food. The “global terrorist” phenomenon does seem to be a particular
characteristic of this new century. What better way to unite the world, than to have a common
threat needing to be resisted by all?

Another reason which has already been partly discussed is locating missing people. The
Bible tells us in 1st Thessalonians 4:13-18 and John 14:1-6, that those who have trusted Christ as
Saviour will one day be caught up to be with Him in heaven. I believe for a number of reasons
that this will happen prior to the beginning of the seven year tribulation period. Could millions of
missing Christians cause a world crisis of such magnitude, that every person would be persuaded
to have a chip implanted in their body so they can identify who is missing and who remains? Or
could this be used as an excuse so that if another crisis occurs, people can be easily located?

The possibility of these events occurring are in the news every day, they are no longer the
realm of science fiction. Are you ready to meet God when it comes to the crunch-time?

BSc Computer Science


St.Thomas College , Kozhencherry Page 55
VeriChip

CHAPTER 10

SO HOW TO GET SAVED!!?

As I have mentioned above, the implantation of the chip will only be made compulsory
during the tribulation period by the Antichrist, only after the “Rapture”. Those who accept the
mark of the beast on their hands or foreheads are condemned and will be cast into the lake of fire
as per the bible. The only way to escape from the wrath of God is to get saved by accepting Jesus
Christ as one’s personal savior and get cleansed of his sins by getting washed by the blood of
Jesus Christ as soon as possible and by living a pure life, so as to get raptured in the second
coming of Jesus Christ.

One can attain this salvation by admitting himself a sinner before Lord Jesus Christ and
asking for forgiveness of his sins by faith. In Romans 10:09 of the Bible it says – that if you
confess with your mouth Jesus as Lord, and believe in your heart that God raised Him
from the dead, you will be saved. With faith we invite Jesus Christ to come into our heart and
take control of our life and with mouth we profess our faith and thus we get saved.

In Matthew chapter 24:3-14

Now as He sat in the Mount of Olives, the disciples came to Him privately, saying, “Tell
us, when will these things be? And what will be the sign of Your coming, and of the end of the
age?” And Jesus answered and said to them: “Take heed that no one deceives you. For many
will come in My name, saying, ‘I am Christ,’ and will deceive many. And you will hear of wars
and rumors of wars. See that you are not troubled; for all these things must come to pass, but the
end is not yet. For nation will rise against nation, and kingdom against kingdom. And there will
be famines, pestilences, and earthquakes in various places. All these are the beginning of
sorrows. “Then they will deliver you up to tribulation and kill you, and you will be hated by all
nations for My name’s sake. And then many will be offended, will betray one another, and will
hate one another. Then many false prophets will rise up and deceive many. And because

BSc Computer Science


St.Thomas College , Kozhencherry Page 56
VeriChip

lawlessness will abound, the love of many will grow cold. But he who endures to yhe end shall be
saved. And this gospel of kingdom will be preached in all the world as a witness to all the
nations, and then the end will come.

And also in II Timothy chapter 3:1-5

But know this, that in the last days perilous times will come: For men will be lovers of
themselves, lovers of money, boasters, proud, blasphemers, disobedient to parents, unthankful,
unholy, unloving, unforgiving, slanderers, without self-control, brutal, despisers of good,
traitors, headstrong, haughty, lovers of pleasure rather than lovers of God, having a form of
godliness but denying its power. And from such people turn away!

So didn’t we see that these things are being fulfilled word by word? So is also the coming
of the mark of the beast. And these things depicts us not the fact, but the truth that the end of the
world is near. So we have to lead a pure and fruitful life to get saved. But since we are having a
flesh of weaknesses and desires to sin, we cannot do this by our own! Only the overflowing love
of Jesus Christ can help us! Jesus said, “Come to me and I will come to you.”

In John 3:15-17

“That whoever believes in Him should not perish but have eternal life. For God so loved
the world that He gave His only begotten Son, that whoever believes in Him should not perish
but have everlasting life. For God did not send His Son into the world to condemn the world, but
that the world through Him might be saved.”

So the only way to life is……. Jesus said, “I am the way, the truth and the life!”

BSc Computer Science


St.Thomas College , Kozhencherry Page 57
VeriChip

CONCLUSION

A chip implanted somewhere in human bodies might serve as a combination of credit


card, passport, driver's license, personal diary. No longer would it be needed to worry about
losing the credit cards while traveling. A chip inserted into human bodies might also give us
extra mental power.

The really fascinating idea is under fast track research "but we're close.” The day in which
we have chips embedded in our skins is not too far from now. "This is science fiction stuff."
”This is a true example to prove science really starts with fiction”.

We have numerous case studies to go on which demonstrate the successful deployment of


Verichip-style devices and commensurate applications but for the time being implantables for
non-medical applications have drizzled for all but the hobbyist implantees, systems engineering
researchers and artists. This does not mean that the potential for RFID implantees has gone- we
may still be waiting for that next generation who may demand an iplant just like the current
generation has demanded an iPod, iPhone and iPad. How the next generation go about achieving
risk return might be using a completely new paradigm. If the risk taking behavior is successful,
the dividends are purported to be great, but equally if the risks taken are not calculated the effects
might well be detrimental and have long-term repercussions for humanity, for which there will
be no turning back. One thing is clear that despite the arrival of the implantable microchip, we
have not yet seen it unleashed in all its fullness. As a community of stakeholders, we have a great
deal of thinking to do between now and then but perhaps not a commensurate time to act.
Verichip Corporation may no longer be but there are now numerous other companies, including
Positive ID and VeriTeQ who are deploying applications for RFID implants in the ‘care’ space.
The potential for function creep is there for care-style applications to be underpinned by services
that are principally oriented around consumer control.

BSc Computer Science


St.Thomas College , Kozhencherry Page 58
VeriChip

REFERENCES

 Applied Digital Solutions (2003). “Implantable Personal Verification Systems.”


 Associated Press. (13 February 2006). "Company implants ID chips into employees'
 arms.".
 "AntiChips: FAQ on VeriChip, VeriMed." AntiChips: FAQ on VeriChip, VeriMed.
N.p., n.d. Web. 24 Nov. 2013.
 "EPIC - Electronic Privacy Information Center." EPIC. N.p., n.d. Web. 24 Nov. 2013.
 "VeriChip - Mark Of The Beast Or Marvel Of Technology?" VeriChip - Mark Of The
Beast Or Marvel Of Technology? N.p., n.d. Web. 24 Nov. 2013.
 "VeriChip Releases IPO Details." Medical Connectivity RSS. N.p., n.d. Web. 24 Nov.
2013.
 “RFID-an emerging technology” Claire Swedberg, July 2005:
http://www.rfidjournal.com/
 WHO, http://www.who.int/en/
 “RFID in medical field” Taiwan Health Reform Foundation, http://www.thrf.org.tw/

BSc Computer Science


St.Thomas College , Kozhencherry Page 59

S-ar putea să vă placă și