You might only have access when the vehicle is moving on the road.
For instance, you might plant a roadside reader/logger, and have an observer away from the road watching. The observer notes the time whenever a military vehicle goes by.
After you've logged a few military vehicles, you retrieve the logs, match them up to the observer's time stamps, and now you've got a list of targets for your roadside RFID based bomb.
Knowing the target RFID doesn't mean proximate access.
You might, say, attack a hardened, highly secured, professionally maintained electronic data system. Say the integrated business operations system of a large nationwide tyres-service company. Pull off the RFID and owner data.
Apply information as, where, and when desired.
And this is why, boys and girls, data are liability.