Wouldn't it be nice

There is a keychain that can be tracked from one fourth of the cellular phones on earth. Its location is then relayed via the cellular or wireless network to that manufacturer, who is then able to locate and notify the owner of that keychain. And, to provide careful guidance and a map that will lead its owner back to it.

If you go to a party and ask the people there to place their cellular phones on a table you should see that at least one out of every four of those phones will be capable of doing this. And, that you can repeat this trick worldwide.

This circuit is intended to be used for things like missing car keys, luggage, a backpack or wallet. While there are malicious uses, the manufacturer has also built a feature where you will be notified if you are traveling with one of these keychains that you do not own. There is even an application that can be used to track these rogue keychains, it can be installed on a competitor's cell phone which means that over half of the people at that party can play this game together.

This keychain also uses Near Field Communication (NFC) to communicate whether it has been marked as lost and encourages you to help it get back to its owner. This helpful message also includes information to help you disable it so that it stops tracking you without your consent.

If you aren't able to locate the keychain but continue to receive alerts and then believe that one of these objects is with you, tracking and broadcasting your location to someone who has malicious intent, you are able to work with your local law enforcement agency who can use a Portable Document Format (PDF) file containing information that will help determine if your safety is at risk. And, includes information to help you decide what to do about that.

All of this technology is served by a network intended to help locate missing products. To answer the question, “I paid a lot of money for this thing, where is it at?”

What would be helpful is for these same manufacturers to work together to include a feature in this network that prevents their devices from taking photos of or recording people without their consent. Imagine you are at that party where six of the ten cell phones on the counter are capable of using an application and their NFC technology to track down and disable the keychain. And someone at the party is wearing a lanyard with a different kind of keychain. When people get close to or aim their devices at this new kind of keychain, their cameras inform them that they cannot record that person.