Risk
10/26/2012
01:44 AM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

TSA PreCheck Program Security Hole Exposes Screening Status

Airline boarding passes available to participants in the TSA's PreCheck program contain unencrypted information that could be used to determine whether the person will receive expedited screening

A program that was supposed to be a convenience for frequent airline passengers has turned into a bit of a security flap for the Transportation Security Administration (TSA).

The situation centers on the PreCheck program in which select passengers are allowed to receive what the TSA calls "expedited screening benefits," such as the right to leave their shoes on and keep their laptops in carry-on bags when they travel on domestic flights. The program does not guarantee such benefits will be bestowed upon the traveler each time he or she is at a designated checkpoint, and the TSA says in its description of the program that it will still use "random and unpredictable security measures" throughout the airport.

That randomness, however, may be in jeopardy. The reason is that the passenger and flight information encoded in barcode on the boarding passes PreCheck passengers receive -- which can be printed up to 24 hours before a flight -- is not encrypted. That means it can be read by those with the technical know-how, giving them a heads-up if they are going to be subjected to lesser scrutiny.

"What terrorists or really anyone can do is use a website to decode the barcode and get the flight information, put it into a text file, change the 1 to a 3, then use another website to re-encode it into a barcode," aviation blogger John Butlerwrote last week. "Finally, using a commercial photo-editing program or any program that can edit graphics replace the barcode in their boarding pass with the new one they created."

According to the Washington Post, some details of the situation have been circulating in online forums for months. However, the issue gained widespread media coverage only recently after Butler posted Oct. 19 that he was able to decode his boarding pass for an upcoming trip. In an updated post Oct. 24, he questions why the TSA and the airlines have not come up with an encoding system for the barcodes on boarding passes.

"The effect of such a system would be that when anyone puts their boarding pass into one of the online barcode readers, the output is just a string of characters," he blogs. "The airline and TSA scanners would have [a] chip that contains the decryption key, which would turn the data into the information we see currently."

In a Frequently Asked Questions section, TSA states that participants are not supposed to know in advance whether they have been cleared for expedited screening.

"If the agency determines a passenger is eligible for expedited screening through TSA [PreCheck], information will be embedded in the barcode of the passenger’s boarding pass," the agency notes on its site. "TSA will read the barcode at designated checkpoints and the passenger may be referred to an expedited screening lane."

The error here is the system in and of itself, says Christopher Burgess, chief security officer of technology firm Atigeo. If the TSA is going to preselect people, it should hide this information from those being selected; if they are sorting people, then it should be tied into real-time data, he argues.

"Remember, the TSA [PreCheck] is ostensibly for those with frequent flier status with airlines and individuals who have subjected themselves to Trusted Person verification by USG," he says. "A suggestion might be the scan of the ID being used at the TSA check and comparison to that of the last XX trips. Think about it. I am a trusted person as I travel a good bit. If someone with a forged ID shows up as me, that quick visual will quickly allow the TSA clerk to A) notice the difference in photo (one hopes); B) be able to ask a question re: recent travel for validation; C) compare ID to prior IDs -- none of which requires profiling."

Though the TSA did not respond to a request for comment from Dark Reading, a spokesperson did tell the Washington Postthat it does not comment on the specifics of the screening process, and that the "TSA PreCheck is only one part of our intelligence-driven, risk-based approach."

PreCheck is open to frequent travelers using Alaska Airlines, American Airlines, Delta Air Lines, United Airlines, US Airways, and certain members of CBP's Trusted Traveler programs, including Global Entry, SENTRI and NEXUS, who are U.S. citizens.

* This story was updated with additional commentary. Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web