Kuro5hin.org: technology and culture, from the trenches
create account | help/FAQ | contact | links | search | IRC | site news
[ Everything | Diaries | Technology | Science | Culture | Politics | Media | News | Internet | Op-Ed | Fiction | Meta | MLP ]
We need your support: buy an ad | premium membership | k5 store

[P]
RFID Passports: Improved, but still flawed? (Technology)

By KC7GR
Mon Nov 7th, 2005 at 11:14:05 AM EST

Security

In February of 2005, the U.S. State Department published a proposed amendment, in the Federal Register, of U.S. passport regulations. The proposal sought public comment on the idea of embedding RFID chips in all newly-issued passports beginning in 2006.

Over 2,300 comments were received in response, and more than 98% of them were negative, focusing on privacy and security concerns. Since the initial proposal had no provisions for encryption or access control of the stored data, people were concerned (rightly so) that their identities could be snooped by anyone with appropriate reader equipment, at any time and without their knowledge.

Now, eight months later, the State Department has made some changes for their final draft. Do you think they went far enough?


For those who may not be familiar with the technology: Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. A complete RFID system consists of transponders (commonly called tags), usually one per object or person to be tracked, an appropriate reader, and a host computer to process the data.

There are two types of tags: Passive and Active. Passive tags draw their operating power from the induced energy of the reader's field, while Active tags have their own battery.

Active tags have a longer range, and can transmit more complex data, but they tend to be large for a chip and they cost a lot more than passive tags. Conversely, passive tags cost very little, and can be made nearly microscopic, but they have a limited range and cannot store as much data.

If you want more information on RFID itself, Wikipedia has some good references, and Texas Instruments has an entire department dedicated to RFID. There's also a comprehensive paper on RFID privacy issues, at least as they relate to libraries, to be found here.

Now, with that out of the way: What the State Department is proposing is that the RFID-enabled passports carry at least a duplicate copy of all the passport holder's personal information, and a digitized photograph, encoded into the chip. They've left expansion room for, supposedly, biometric data such as a fingerprint or retinal scan.

In response to the massive number of negative comments from the initial proposal, the State Department has made two design changes to the template for the new passports. First: The data encoded on the chip will be encrypted, and under access control. The passport will have to be first scanned with an optical reader, and this initial scan will provide the decryption key for the information on the RFID chip.

Second: A metallic shield will be woven into the passport's covers, thus creating a Faraday Cage effect which will, in theory, prevent the chip from being read when the passport's covers are closed by attenuating any RF energy well below the point where the chip would become active.

For the truly paranoid, it will be easy enough to slip the entire passport into an ESD shielding bag, thus providing an additional layer of Faraday protection.

While it is good that the officials at State paid attention to the feedback they got, I still don't think they fully understand RFID technology and its potential for abuse. As Bruce Schneier has written in this article on Wired, there is yet another potential security hole that DoS overlooked.

This hole takes the form of the collision-avoidance technology that is hardwired into each and every RFID chip. The specific standard that the State Department has apparently chosen is ISO specification 18000-3, Mode 1. RFID chips conforming to this standard have a static and unique 64-bit serial number embedded as a manufacturer's ID. This number is used as part of the collision-avoidance protocol detailed in the standard. More importantly, it can, with the appropriate equipment, be read completely independent of any encryption or access controls present on the chip.

In other words, anyone with a reader can query any passport chip for its unique manufacturer ID number, and the chip will respond if it's in range no matter what kind of encrypted info it may be carrying.

There is a different anticollision protocol, described under ISO 14443A, which requires that a random number be returned from the chips as opposed to the static numbers referenced above. This is the one that Schneier advocates to close this loophole. Whether DoS will listen is anyone's guess.

I regret that I am unable to provide further technical details on the actual standards and collision-avoidance protocols. The documents describing said details are not freely available (the lowest cost I found was $220 per copy).

I have two opinions on this whole situation. First, I don't think chipping passports is going to make our borders any more secure. Any criminal (including terrorists) with the determination and resources to forge passports is going to find a way to do so no matter what obstacles DoS throws at them.

Second, I question whether the "vulnerability" represents the privacy threat that Bruce Schneier thinks it does. The only way I could see it being abused would be to track a person's movements, and even that will be sharply limited or curtailed the moment they close their passport and/or slip it into that wonderful little shielding bag.

Even if the chip's manufacturer ID does get read by someone other than Customs authorities, how in the Multiverse would whoever's doing the reading tie personal information about the holder to it? They'd either have to have access to the Customs computer system (unlikely if they don't work for Customs), or they'd have to literally engage their desired target in conversation, and start asking questions which would make nearly anyone suspicious.

One thing I'd like to know is whether anyone is going to cut back or eliminate international trips due to a perceived fear of being tracked. I'm certainly not going to...

Sponsors
Voxel dot net
o Managed Servers
o Managed Clusters
o Virtual Hosting


www.johncompanies.com
www.johncompanies.com

Looking for a hosted server? We provide Dedicated, Managed and Virtual servers with unparalleled tech support and world-class network connections.

Starting as low as $15/month
o Linux and FreeBSD
o No set-up fees and no hidden costs
o Tier-one provider bandwidth connections

Login
Make a new account
Username:
Password:

Note: You must accept a cookie to log in.

Poll
RFID Passports: Good idea?
o Yes... 12%
o No... 45%
o Don't Care Either Way... 16%
o The Pyramid is Opening! 25%

Votes: 24
Results | Other Polls

Related Links
o proposed amendment,
o Federal Register,
o made some changes
o good references,
o Texas Instruments
o entire department
o here.
o Faraday Cage
o ESD shielding bag,
o this article on Wired,
o More on Security
o Also by KC7GR


View: Display: Sort:
RFID Passports: Improved, but still flawed? | 33 comments (21 topical, 12 editorial, 0 hidden)
WTF? only the key is needed... (none / 0) (#27)
by vqp on Fri Nov 11th, 2005 at 03:18:00 AM EST

I don't understand the efforts to put all the information in the chip, it's useless and it can be forged.

Why don't they use an online (or even offline) centralized system to store all the information, uniquely identified by the RFID key?

I know that privacy-paranoids will complain and say that a database with personal data is dangerous in the hands of government. Wake up: they already have it!, so why make the identification process cumbersome? Is it really so difficult to understand?.

You already carry a unique ID that can be scanned from a 10 meter distance: it's your face. And the government already have your photo in their database. It is a question of time (20 years to be conservative) in order to develop a consistent face recognition system.

Then all these whinings will be over.

happiness = d(Reality - Expectations) / dt

Why Wireless? (none / 0) (#22)
by Western Infidels on Tue Nov 8th, 2005 at 03:30:09 PM EST

What is the justification for going wireless? Why not use a contact-based smartcard-like system, and make many of these security / privacy concerns disappear?

Vulnerability (none / 0) (#18)
by fyngyrz on Mon Nov 7th, 2005 at 11:00:37 AM EST
(sabumnim*dojang*com) http://www.blackbeltsystems.com/

I question whether the "vulnerability" represents the privacy threat that Bruce Schneier thinks it does. The only way I could see it being abused would be to track a person's movements

Government has your data in a computer. Government encodes your data into a passport, along with unique ID number (RFID serial number.) You walk by (insert your least favorite Government monitoring instance here, such as warrant-free monitoring authorized by the FBI.) They read your passport's serial number. Then (astounding you, who cannot envision a connection to "customs computers") these sterling folks use this incredible, cross-intra-network tool called (wait for it) the Internet to access your data. They are now in possession of everything on your passport, and are now in the process of looking up everything else about you using the information they got off the passport as a starting point.

Now: First of all, if the government has your data, then we know that more generally, people have your data, because everyone has their price and our congresscritters will sell it to them, just as they sold out the social security number. The potential is very high that entities other than government will be able to get your data as you walk by, as well. This could lead to uses as mundane as tailoring ad content or special offers to you in a dynamic way, or to criminals deciding you are worth mugging more than the last twerp who walked by. Considering that criminals have the lowest barrier to entry for this information (meaning, they won't wait for it to be legal to have it, they'll just get it if they can), this is more likely than ad-tailoring. On the other hand, if the ad people get it, you can be sure that the criminals either already have it, or will have it immediately following.


Graphics s/w

the real privacy concern is (none / 1) (#15)
by dimaq on Mon Nov 7th, 2005 at 06:58:17 AM EST
(nobody@dev.null.org)

when they develop the classified tech to read RFID tags from satellites, or for truly paranoid flying saucers *g*

Australian "ePassport" (none / 1) (#14)
by ccdotnet on Mon Nov 7th, 2005 at 05:55:03 AM EST

Since October 24 all new Australian passports feature:

The chip embedded in the centre pages stores your digitised photograph, name, gender, date of birth, nationality, passport number, and the passport expiry date.

From here.

Fortunately no mention of RFID yet, and the chip's data is "protected" by PKI.

You do realize (2.60 / 5) (#12)
by trhurler on Sun Nov 6th, 2005 at 12:00:10 PM EST
(abuse@127.0.0.1) file:///dev/zero

that they probably know exactly what they're doing, right? The government regards "privacy" in the same way most corporations regard "security" - as a PR issue. If they can make the PR problem go away(and they can, as evidenced by the fact that nobody is even paying attention anymore except you and me,) while still getting what they want(which is passports that will uniquely identify you at a distance even without fancy encryption gear,) they're going to do it.

--
'God dammit, your posts make me hard.' --LilDebbie

RFID Passports: Improved, but still flawed? | 33 comments (21 topical, 12 editorial, 0 hidden)
View: Display: Sort:

kuro5hin.org

[XML]
All trademarks and copyrights on this page are owned by their respective companies. The Rest © 2000 - 2005 Kuro5hin.org Inc.
See our legalese page for copyright policies. Please also read our Privacy Policy.
Kuro5hin.org is powered by Free Software, including Apache, Perl, and Linux, The Scoop Engine that runs this site is freely available, under the terms of the GPL.
Need some help? Email help@kuro5hin.org.
If you can read this, you are sitting too close to your screen.

Powered by Scoop create account | help/FAQ | mission | links | search | IRC | YOU choose the stories! K5 Store by Jinx Hackwear Syndication Supported by NewsIsFree