Risk
10/26/2012
01:44 AM
Connect Directly
RSS
E-Mail
50%
50%

TSA PreCheck Program Security Hole Exposes Screening Status

Airline boarding passes available to participants in the TSA's PreCheck program contain unencrypted information that could be used to determine whether the person will receive expedited screening

A program that was supposed to be a convenience for frequent airline passengers has turned into a bit of a security flap for the Transportation Security Administration (TSA).

The situation centers on the PreCheck program in which select passengers are allowed to receive what the TSA calls "expedited screening benefits," such as the right to leave their shoes on and keep their laptops in carry-on bags when they travel on domestic flights. The program does not guarantee such benefits will be bestowed upon the traveler each time he or she is at a designated checkpoint, and the TSA says in its description of the program that it will still use "random and unpredictable security measures" throughout the airport.

That randomness, however, may be in jeopardy. The reason is that the passenger and flight information encoded in barcode on the boarding passes PreCheck passengers receive -- which can be printed up to 24 hours before a flight -- is not encrypted. That means it can be read by those with the technical know-how, giving them a heads-up if they are going to be subjected to lesser scrutiny.

"What terrorists or really anyone can do is use a website to decode the barcode and get the flight information, put it into a text file, change the 1 to a 3, then use another website to re-encode it into a barcode," aviation blogger John Butlerwrote last week. "Finally, using a commercial photo-editing program or any program that can edit graphics replace the barcode in their boarding pass with the new one they created."

According to the Washington Post, some details of the situation have been circulating in online forums for months. However, the issue gained widespread media coverage only recently after Butler posted Oct. 19 that he was able to decode his boarding pass for an upcoming trip. In an updated post Oct. 24, he questions why the TSA and the airlines have not come up with an encoding system for the barcodes on boarding passes.

"The effect of such a system would be that when anyone puts their boarding pass into one of the online barcode readers, the output is just a string of characters," he blogs. "The airline and TSA scanners would have [a] chip that contains the decryption key, which would turn the data into the information we see currently."

In a Frequently Asked Questions section, TSA states that participants are not supposed to know in advance whether they have been cleared for expedited screening.

"If the agency determines a passenger is eligible for expedited screening through TSA [PreCheck], information will be embedded in the barcode of the passenger’s boarding pass," the agency notes on its site. "TSA will read the barcode at designated checkpoints and the passenger may be referred to an expedited screening lane."

The error here is the system in and of itself, says Christopher Burgess, chief security officer of technology firm Atigeo. If the TSA is going to preselect people, it should hide this information from those being selected; if they are sorting people, then it should be tied into real-time data, he argues.

"Remember, the TSA [PreCheck] is ostensibly for those with frequent flier status with airlines and individuals who have subjected themselves to Trusted Person verification by USG," he says. "A suggestion might be the scan of the ID being used at the TSA check and comparison to that of the last XX trips. Think about it. I am a trusted person as I travel a good bit. If someone with a forged ID shows up as me, that quick visual will quickly allow the TSA clerk to A) notice the difference in photo (one hopes); B) be able to ask a question re: recent travel for validation; C) compare ID to prior IDs -- none of which requires profiling."

Though the TSA did not respond to a request for comment from Dark Reading, a spokesperson did tell the Washington Postthat it does not comment on the specifics of the screening process, and that the "TSA PreCheck is only one part of our intelligence-driven, risk-based approach."

PreCheck is open to frequent travelers using Alaska Airlines, American Airlines, Delta Air Lines, United Airlines, US Airways, and certain members of CBP's Trusted Traveler programs, including Global Entry, SENTRI and NEXUS, who are U.S. citizens.

* This story was updated with additional commentary. Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3345
Published: 2014-08-28
The web framework in Cisco Transport Gateway for Smart Call Home (aka TG-SCH or Transport Gateway Installation Software) 4.0 does not properly check authorization for administrative web pages, which allows remote attackers to modify the product via a crafted URL, aka Bug ID CSCuq31503.

CVE-2014-3347
Published: 2014-08-28
Cisco IOS 15.1(4)M2 on Cisco 1800 ISR devices, when the ISDN Basic Rate Interface is enabled, allows remote attackers to cause a denial of service (device hang) by leveraging knowledge of the ISDN phone number to trigger an interrupt timer collision during entropy collection, leading to an invalid s...

CVE-2014-4199
Published: 2014-08-28
vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, allows local users to write to arbitrary files via a symlink attack on a file in /tmp.

CVE-2014-4200
Published: 2014-08-28
vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, uses 0644 permissions for the vm-support archive, which allows local users to obtain sensitive information by extracting files from this archive.

CVE-2014-0761
Published: 2014-08-27
The DNP3 driver in CG Automation ePAQ-9410 Substation Gateway allows remote attackers to cause a denial of service (infinite loop or process crash) via a crafted TCP packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.