You could be jammin like Robert Nesta...plagiarized myself from a class discussion post:
Radio Frequency Identification is an old technology which has become very cheap and easy to use. This cheap part means that it is also easy to take advantage of since there are several ways individuals can track and use the information on your RFID device. There are several options to prevent this. The most simple one is simple protective containers. If you use an RFID device for security then you could use an RFID blocking container to prevent anyone from accessing it. You could also employ blocker tags which emit their own frequency and block malicious readers from accessing the correct tag. Another option is mutual authentication cryptography. This requires both the reader and the tag to approve each other using cryptographic keys which are difficult to break. The final option I’ll mention is active jamming. Active jamming would need to be used in conjunction with Blocker tags to prevent unauthorized scanning during the use of active tags. The appropriate scanning device would jam malicious scanners during the interval when blockers are disabled for the use of the actual tag. The jammer would need to be low power and only near the real scanner.
The first line of defense is always people and policies. You should keep your device in a safe location to prevent unauthorized scanning and limit exposure to third parties.
Liu, A. X., Shahzād, M., Liu, X., & Li, K. (2017). RFID Protocol Design, Optimization, and Security for the Internet of Things. The Institution of Engineering and Technology.