But I remembered the 2006 Black Hat Briefings (probably the premier computer security conference), where I listened to some folks talk about how you can make malware that spreads from RFID chip to RFID chip via the reader.
"Hmmm," I said to my self, "I wonder what you could do to give the hypothetical Officer Friendly an interesting day when he scans your heater?" And since this scanning can be done from some distance away as you lawfully carry your piece, the opportunities for fun and games are probably legion.
Note that IANAL, but it's hard to see how you could be prosecuted under existing anti-hacking laws. After all, the sum total of what you would have done is simply to put data on your own property. You never accessed any computing device owned by anyone else. They accessed yours.
Of course, I only use my Powers for Good, but the Black Hat presentation gets interesting around slide 18, and particularly interesting around slide 23. Given that the RFID reading system and its backend database are administered by incompetents, it's very likely that a RFID payload delivering a SQL Injection attack could wipe out the entire database of scanned guns.
I mean, if I want to set the serial number of my Chiappa handgun to foo'); DROP TABLE Handguns;--, well that's just me practicing my, err, gunsmithing skillz.
Like I said, I only use my Powers for Good. But it's astonishing how the world is filled with people who think they're smarter than everyone else, and that they understand everything worth knowing about something, and how their Cunning Plan could never, ever, bite them in the butt.
Note to Chiappa: if you scan guns returned for service (almost a dead certainty), your p*ssed off customers could go this to you. A little humility is perhaps called for, when your shorts are down around your ankles, security-wise.