CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
February 2nd, 2009

Cheap RFID Sniffing And Cloning Device For Sale By Researcher

Using inexpensive off-the-shelf components, an information security expert has built a mobile platform that can clone large numbers of the unique electronic identifiers used in US passport cards and next generation drivers licenses.

The $250 proof-of-concept device, which researcher Chris Paget built in his spare time, operates out of his vehicle and contains everything needed to sniff and then clone RFID, or radio frequency identification, tags. During a recent 20-minute drive in downtown San Francisco, it successfully copied the RFID tags of two passport cards without the knowledge of their owners.

Paget’s contraption builds off the work of researchers at RSA and the University of Washington, which last year found weaknesses in US passport cards and so-called EDLs, or enhanced drivers’ licenses. So far, about 750,000 people have applied for the passport cards, which are credit card-sized alternatives to passports for travel between the US and Mexico, Canada, the Caribbean, and Bermuda. EDLs are currently offered by Washington and New York states.

Paget’s device consists of a Symbol XR400 RFID reader (now manufactured by Motorola), a Motorola AN400 patch antenna mounted to the side of his Volvo XC90, and a Dell 710m that’s connected to the RFID reader by ethernet cable. The laptop runs a Windows application Paget developed that continuously prompts the RFID reader to look for tags and logs the serial number each time one is detected. He bought most of the gear via auctions listed on eBay. The device has a range of about 30 feet, making it ideal for discretely skimming the EDL and passport card tags of people who pass by his vehicle. With modifications, Paget says his device could read RFID identifiers that are more than a mile away. The antenna was concealed by the vehicle’s tinted window, and the PC and RFID reader fit well below the eye line, making it virtually undetectable by passersby.

“It’s one thing to say that something can be done, it’s another thing completely to actually do it,” Paget said in explaining why he built the device. “It’s mainly to defeat the argument that you can’t do it in the real world, that there’s no real-world attack here, that it’s all theoretical.”

Use of the cards is expected to rise as US officials continue to encourage their adoption. Civil liberties groups have criticized the cards and a travel industry association has called on the federal government to suspend their use until the risks can be better understood.

The cards make use of the RFID equivalent of optical barcodes known as electronic product code tags, which are widely used to track cattle and merchandise as it’s shipped and then stored in warehouses. Because the technology employs no encryption and can be read from distances of more than a mile, the tags are highly susceptible (PDF) to cloning and tracking, researchers have concluded.

Officials with the US Customs and Border Protection Department say they have no plans to overhaul the technology used in passport cards. RFID signals allow border agents to process travelers more quickly and bring an added level of security to the process, spokeswoman Kelly Ivahnenko said. The cards come with protective sleeves that prevent the RFID tags from being readable, she added, and even if they are captured, she said there is little anyone can do with the information. A spokesman from the US State Department – which processes applications for passport cards and then issues them – declined to comment.

Paget plans to release the software’s source code during a demonstration at the Shmoocon hacker convention to be held later this month in Washington.

Credit: The Register

Share this item with others:

More on CyberInsecure:
  • Inexpensive Equipment Tricks GSM Mobile Phones And Intercepts Calls
  • Cheap Laser Device Allows Keystrokes Sniffing From Any PS/2 Keyboard
  • Police Bring Down Major Card-Cloning Network, 178 Arrested In Europe, Australia, U.S.
  • Billion RFID Access Cards Can Be Hacked
  • HTC Smartphones Vulnerable To Critical File Transfer Profile Security Flaw In Bluetooth

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: Cheap RFID Sniffing And Cloning Device For Sale By Researcher

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.