Risk
2/3/2009
12:56 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Think Electronic Passports Are Secure? Think Again

With a little time, and a $250 investment, a security researcher says he has shown how easy it is to capture electronic passport data, and then create cloned passports.

With a little time, and a $250 investment, a security researcher says he has shown how easy it is to capture electronic passport data, and then create cloned passports.Anyone involved in information security in 2002 recalls the "war driving" craze. Researchers would drive around a downtown area with a wireless-enabled notebook and a copy of NetStumbler seeking unencrypted wireless networks. The idea was to show how few wireless networks were secured through encryption. Later this week, security researcher Chris Paget is taking a similar approach, this time with RFID-powered documents.

The attack also brings back memories of the days at which cell phone cloners used to be able to clone mobile phones from roadsides and bridges.

Rather than cloning cell phones or war driving, Paget has dubbed his attack "war cloning."

According to Kelly Jackson Higgins' Dark Reading story, Paget has found a way to crack the EPC Gen 2 RFID tags used in the passport cards the U.S. Department of Homeland Security allows in accordance with the Western Hemisphere Travel Initiative for travel among countries in the Western Hemisphere.

Paget says he was able to buy a used RFID scanner from eBay, and tweak it so that it can sniff the data from the passports:

Until now, security researchers for the most part have shied way from hacking away at the new e-passports and e-driver's licenses to illustrate the potential privacy problems because the necessary scanners are expensive -- nearly $3,000 new -- and tough to get. "I found a way to procure equipment on the cheap and repair it and make it do exactly what I wanted it to do," Paget says.

Unlike previous RFID hacks that have been conducted within inches of the targeted ID, Paget's hack can scan RFID tags from 20 feet away. "This is a vicinity versus proximity read," he says. "The passport card is a real radio broadcast, so there's no real limit to the read range. It's conceivable that these things can be tracked from 100 meters to a couple of miles."

Paget says he was able to drive his car at 30 mph and capture an RFID tag in a matter of seconds. "The software for [copying them] lets you just choose the tag you want to copy, wave a blank tag in front of it, and it writes it out," he says.

The security and privacy concerns with these electronic passports aren't new, but ease and cost-effectiveness of this attack seems to be -- and illustrates the need for true authentication and encryption for an adequate level of security.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1544
Published: 2014-07-23
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger cer...

CVE-2014-1547
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1548
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1549
Published: 2014-07-23
The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applica...

CVE-2014-1550
Published: 2014-07-23
Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.