Author Topic: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250  (Read 6826 times)

roo_ster

  • Kakistocracy--It's What's For Dinner.
  • friend
  • Senior Member
  • ***
  • Posts: 21,225
  • Hoist the black flag, and begin slitting throats
Do please click through the link to watch the 5 minute video of the hacker explaining how it works as he harvests the passports.

RFID tags in identification documents is one of those Really Bad Ideas that gov't goons latch on to and won't let go of.



http://www.theregister.co.uk/2009/02/02/low_cost_rfid_cloner/

Passport RFIDs cloned wholesale by $250 eBay auction spree

Video demo shows you how

By Dan Goodin in San Francisco

Posted in Security, 2nd February 2009 06:02 GMT

Using inexpensive off-the-shelf components, an information security expert has built a mobile platform that can clone large numbers of the unique electronic identifiers used in US passport cards and next generation drivers licenses.

The $250 proof-of-concept device - which researcher Chris Paget built in his spare time - operates out of his vehicle and contains everything needed to sniff and then clone RFID, or radio frequency identification, tags. During a recent 20-minute drive in downtown San Francisco, it successfully copied the RFID tags of two passport cards without the knowledge of their owners.

Paget's contraption builds off the work of researchers at RSA and the University of Washington, which last year found weaknesses in US passport cards and so-called EDLs, or enhanced drivers' licenses. So far, about 750,000 people have applied for the passport cards, which are credit card-sized alternatives to passports for travel between the US and Mexico, Canada, the Caribbean, and Bermuda. EDLs are currently offered by Washington and New York states.

"It's one thing to say that something can be done, it's another thing completely to actually do it," Paget said in explaining why he built the device. "It's mainly to defeat the argument that you can't do it in the real world, that there's no real-world attack here, that it's all theoretical."

Use of the cards is expected to rise as US officials continue to encourage their adoption. Civil liberties groups have criticized the cards and a travel industry association has called on the federal government to suspend their use (http://www.theregister.co.uk/2008/12/01/rfid_scanning_under_fire/) until the risks can be better understood.

The cards make use of the RFID equivalent of optical barcodes known as electronic product code tags, which are widely used to track cattle and merchandise as it's shipped and then stored in warehouses. Because the technology employs no encryption and can be read from distances of more than a mile, the tags are highly susceptible (PDF) (http://www.rsa.com/rsalabs/staff/bios/ajuels/publications/EPC_RFID/Gen2authentication--22Oct08a.pdf) to cloning and tracking, researchers have concluded.

Paget's device consists of a Symbol XR400 RFID reader (now manufactured by Motorola), a Motorola AN400 patch antenna mounted to the side of his Volvo XC90, and a Dell 710m that's connected to the RFID reader by ethernet cable. The laptop runs a Windows application Paget developed that continuously prompts the RFID reader to look for tags and logs the serial number each time one is detected. He bought most of the gear via auctions listed on eBay.

And if you read on, we'll show you video proof that the thing actually works.

He plans to release the software's source code during a demonstration at the Shmoocon hacker convention (http://www.shmoocon.org/) to be held later this month in Washington.

Paget's device has a range of about 30 feet, making it ideal for discretely skimming the EDL and passport card tags of people who pass by his vehicle. With modifications, Paget says his device could read RFID identifiers that are more than a mile away. The antenna was concealed by the vehicle's tinted window, and the PC and RFID reader fit well below the eye line, making it virtually undetectable by passersby.

To be sure, the RFID tags contain no personally identifiable information, but rather what amounts to a record pointer to a secure Department of Homeland Security database. But because the pointer is a unique number, the American Civil Liberties Union and other civil libertarians warn the cards are still susceptible to abuse, especially if their RFID tags can be read and captured in large numbers. Cloning the unique electronic identifier is the first step in creating fraudulent passport cards, they say.

The cards also amount to electronic license plates that could be used to conduct clandestine surveillance. Law enforcement officials could scan them at political rallies and then store them in databases. The tags could also be correlated to other signals, such as electronic toll-booth payment systems or RFID-based credit cards, to track the detailed movements of their holders.
Not that the Feds Care

Officials with the US Customs and Border Protection Department say they have no plans to overhaul the technology used in passport cards. RFID signals allow border agents to process travelers more quickly and bring an added level of security to the process, spokeswoman Kelly Ivahnenko said. The cards come with protective sleeves that prevent the RFID tags from being readable, she added, and even if they are captured, she said there is little anyone can do with the information.

"From our standpoint the privacy issues have been misrepresented and blown out of proportion," she told The Reg. "Anytime that you have a new technology and use it in a new way, there are always going to be far-out ways to use information nefariously. We want travelers to be aware of the technology and to know how it works so that they can be comfortable using it."

A spokesman from the US State Department - which processes applications for passport cards and then issues them - declined to comment.

But critics contend the risks are real, especially if RFID-enable identification becomes universal.

"Just like a social security number, the unique identifier number on this document must be properly safeguarded," said Nicole Ozer, Technology and Civil Liberties policy director of the ACLU of Northern California. "If it falls into the wrong hands, it can be used for tracking, stalking, identity theft, and counterfeiting. If the government continues to stick its head in the sand and ignore the very real privacy and security threats that researchers, civil liberties organizations, and even industry groups have repeatedly brought to its attention, the American people will pay a very high price."
Regards,

roo_ster

“Fallacies do not cease to be fallacies because they become fashions.”
----G.K. Chesterton

Thor

  • friend
  • Senior Member
  • ***
  • Posts: 1,230
  • US Navy (retired)
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #1 on: February 11, 2009, 11:51:13 AM »
I had read that wrapping one's passport in foil would work to prevent unauthorized intrusion.
" a sword never kills anybody; it's a tool in the killer's hand." - Lucius Annaeus

for Military, Vets, & Supporters, check out:
USMILNET

Conservative Discussion Forum


AZRedhawk44

  • friends
  • Senior Member
  • ***
  • Posts: 13,981
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #2 on: February 11, 2009, 11:53:59 AM »
This is why you put your NewID compliant driver's license in the microwave.
"But whether the Constitution really be one thing, or another, this much is certain - that it has either authorized such a government as we have had, or has been powerless to prevent it. In either case, it is unfit to exist."
--Lysander Spooner

I reject your authoritah!

Headless Thompson Gunner

  • friend
  • Senior Member
  • ***
  • Posts: 8,517
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #3 on: February 11, 2009, 11:56:46 AM »
The cards make use of the RFID equivalent of optical barcodes known as electronic product code tags, which are widely used to track cattle and merchandise as it's shipped and then stored in warehouses. Because the technology employs no encryption and can be read from distances of more than a mile, the tags are highly susceptible (PDF) (http://www.rsa.com/rsalabs/staff/bios/ajuels/publications/EPC_RFID/Gen2authentication--22Oct08a.pdf) to cloning and tracking, researchers have concluded.
Reading passive RFID from a mile away?  I don't think so.

I could believe maybe reading passive RFID from a few dozen feet away in normal situations.
« Last Edit: February 11, 2009, 12:12:12 PM by Headless Thompson Gunner »

Headless Thompson Gunner

  • friend
  • Senior Member
  • ***
  • Posts: 8,517
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #4 on: February 11, 2009, 11:57:10 AM »
I had read that wrapping one's passport in foil would work to prevent unauthorized intrusion.
That would work. 

A steel or copper mesh wallet would be  pretty cool.

MechAg94

  • friend
  • Senior Member
  • ***
  • Posts: 33,812
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #5 on: February 11, 2009, 12:07:47 PM »
There was another link about this somewhere I saw.  I didn't see where he was able to get personal information and all that off the passport?
“It is much more important to kill bad bills than to pass good ones.”  ― Calvin Coolidge

Headless Thompson Gunner

  • friend
  • Senior Member
  • ***
  • Posts: 8,517
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #6 on: February 11, 2009, 12:11:29 PM »
The attack described here isn't to glean information from the RFID tags in DLs and passports, it's to simply read and mimic a tag without knowing or caring what it says.

AZRedhawk44

  • friends
  • Senior Member
  • ***
  • Posts: 13,981
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #7 on: February 11, 2009, 12:32:51 PM »
I work in an office that secures the doors with RFID.  I carry a badge on my belt to get in.

This means that I could clone my co-workers badge for a paltry $250 in parts and gain access to parts of the building to which I currently have no access.

Or... someone who doesn't have ANY business in the building can sit in the parking lot with a laptop as I walk in, grab my RFID, and output it to his own card.  Walk in behind me and be "me" to all the doorpads.

Great. ;/
"But whether the Constitution really be one thing, or another, this much is certain - that it has either authorized such a government as we have had, or has been powerless to prevent it. In either case, it is unfit to exist."
--Lysander Spooner

I reject your authoritah!

roo_ster

  • Kakistocracy--It's What's For Dinner.
  • friend
  • Senior Member
  • ***
  • Posts: 21,225
  • Hoist the black flag, and begin slitting throats
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #8 on: February 11, 2009, 12:36:38 PM »
Reading passive RFID from a mile away?  I don't think so.

I could believe maybe reading passive RFID from a few dozen feet away in normal situations.

Best be ready to believe more than that.

It is a matter of antenna, power, and receiver sensitivity, simply put.

The rig in the OP had an effective range of 30'.  Get yourself a nice directional antenna and boost the power and you can sit a long ways off and glean the data.  You'll need line of sight of course.  Considering that folks have rigged Wifi hardware to communicate in excess of 50 miles 173 miles (unamplified), one mile for this application is no great stretch.

http://en.wikipedia.org/wiki/Long-range_Wi-Fi#Longest_unamplified_Wi-Fi_link

I have some knowledge in this area, having done similar hack on my Wifi setup.  If the RFID hacker got his hands on, say, a Primestar dish antenna, he could likely point it at a choke point and clone passport RFIDs at ranges much greater than a mile.


Regards,

roo_ster

“Fallacies do not cease to be fallacies because they become fashions.”
----G.K. Chesterton

KPT

  • New Member
  • Posts: 66
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #9 on: February 11, 2009, 12:39:27 PM »
Beat the back cover of your passport with a hammer. Should destroy the RFID chip.

taurusowner

  • Guest
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #10 on: February 11, 2009, 12:47:06 PM »
Is there a sure way of disabling the RFID in a passport permanently without making it visible or destroying a part of the passport?  The beating it with a hammer will probably leave some clues as to what you did.

Marnoot

  • friend
  • Senior Member
  • ***
  • Posts: 2,965
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #11 on: February 11, 2009, 12:54:27 PM »
Is there a sure way of disabling the RFID in a passport permanently without making it visible or destroying a part of the passport?  The beating it with a hammer will probably leave some clues as to what you did.

Microwave it.

Manedwolf

  • friend
  • Senior Member
  • ***
  • Posts: 14,516
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #12 on: February 11, 2009, 01:06:59 PM »
I have some knowledge in this area, having done similar hack on my Wifi setup.  If the RFID hacker got his hands on, say, a Primestar dish antenna, he could likely point it at a choke point and clone passport RFIDs at ranges much greater than a mile.

Old Primestar dishes. Is there anything they can't do?

S. Williamson

  • formerly Dionysusigma
  • friends
  • Senior Member
  • ***
  • Posts: 3,034
  • It's not the years, it's the mileage.
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #13 on: February 11, 2009, 01:07:10 PM »
Lo, Med, Hi, thaw, defrost... which?

And for how long?
Quote
"The chances of finding out what's really going on are so remote, the only thing to do is hang the sense of it and keep yourself occupied. I'd far rather be happy than right any day."
"And are you?"
"No, that's where it all falls apart I'm afraid. Pity, it sounds like quite a nice lifestyle otherwise."
-Douglas Adams

griz

  • friend
  • Senior Member
  • ***
  • Posts: 3,058
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #14 on: February 11, 2009, 01:11:43 PM »
Our badges at work are supposed to be coded like that.  We just went through an iteration of badge holder that was supposed to block unknown scanners from picking them up.  The holders were expensive and failed for other reasons.  But what I thought was interesting was the gate gaurds have you take them out of the holders so they have their hands on the badge.  Wouldn't a gate that everybody has to go though be a great place to focus a scanner?  I ask about it but they thought I was a trouble maker.
Sent from a stone age computer via an ordinary keyboard.

Marnoot

  • friend
  • Senior Member
  • ***
  • Posts: 2,965
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #15 on: February 11, 2009, 01:17:28 PM »
Lo, Med, Hi, thaw, defrost... which?

And for how long?

Can't imagine it would take more than a couple seconds to fry it good. Certainly no longer than it takes to nuke a CD, or get one of those bread twisty ties a-sparkin'.

Headless Thompson Gunner

  • friend
  • Senior Member
  • ***
  • Posts: 8,517
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #16 on: February 11, 2009, 01:22:18 PM »
Best be ready to believe more than that.

It is a matter of antenna, power, and receiver sensitivity, simply put.

The rig in the OP had an effective range of 30'.  Get yourself a nice directional antenna and boost the power and you can sit a long ways off and glean the data.  You'll need line of sight of course.  Considering that folks have rigged Wifi hardware to communicate in excess of 50 miles 173 miles (unamplified), one mile for this application is no great stretch.

http://en.wikipedia.org/wiki/Long-range_Wi-Fi#Longest_unamplified_Wi-Fi_link

I have some knowledge in this area, having done similar hack on my Wifi setup.  If the RFID hacker got his hands on, say, a Primestar dish antenna, he could likely point it at a choke point and clone passport RFIDs at ranges much greater than a mile.

Having designed a passive RFID system in the past, I'm highly skeptical that a passive RFIDs can capture and re-resonate signals strong enough to do that.  The amount of RF energy needed to transmit one mile and then back again are just to great for a typical RFID patch.

If passive RFID worked at one mile, there'd be little reason to ever use an active RFID.

Jim147

  • friends
  • Senior Member
  • ***
  • Posts: 7,599
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #17 on: February 11, 2009, 01:25:02 PM »
Old Primestar dishes. Is there anything they can't do?
They don't make very good sleds. =D

Lo, Med, Hi, thaw, defrost... which?

And for how long?
Until right before it flames up.
Sometimes we carry more weight then we owe.
And sometimes goes on and on and on.

BAH-WEEP-GRAAAGHNAH WHEEP NI-NI BONG

Jamisjockey

  • Booze-fueled paragon of pointless cruelty and wanton sadism
  • friend
  • Senior Member
  • ***
  • Posts: 26,580
  • Your mom sends me care packages
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #18 on: February 11, 2009, 02:24:25 PM »
Okay but if you nuke your passport, will it then be invalid when they can't read the RFID chip at customs?
JD

 The price of a lottery ticket seems to be the maximum most folks are willing to risk toward the dream of becoming a one-percenter. “Robert Hollis”

Ben

  • Administrator
  • Senior Member
  • *****
  • Posts: 46,170
  • I'm an Extremist!
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #19 on: February 11, 2009, 02:59:59 PM »
I've got an RFID blocker they issued me with my CAC card, but of course the thing is so blocky I never use it and keep the card in my ID wallet. There's still supposed to be other tech in CAC cards to keep them from being cloned, but I don't know what it is. Cloning them could be serious since they're supposed to have people's clearance level and stuff on them.
"I'm a foolish old man that has been drawn into a wild goose chase by a harpy in trousers and a nincompoop."

Regolith

  • friend
  • Senior Member
  • ***
  • Posts: 6,171
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #20 on: February 11, 2009, 08:30:32 PM »
You can get wallets that block RFIDs.  ThinkGeek.com sells em:

http://www.thinkgeek.com/gadgets/security/8cdd/
The price of freedom is eternal vigilance. - Thomas Jefferson

Necessity is the plea for every infringement of human freedom. It is the argument of tyrants; it is the creed of slaves. - William Pitt the Younger

Perfectly symmetrical violence never solved anything. - Professor Hubert J. Farnsworth

Headless Thompson Gunner

  • friend
  • Senior Member
  • ***
  • Posts: 8,517
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #21 on: February 11, 2009, 08:46:00 PM »
Okay but if you nuke your passport, will it then be invalid when they can't read the RFID chip at customs?
Nope.  The information contained in the RFID tag is supposed to be the same information printed inside the passport.  The guy at customs will simply have to read it with his eyes and enter it into the computer using his fingers.

erictank

  • friends
  • Senior Member
  • ***
  • Posts: 2,410
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #22 on: February 12, 2009, 10:02:16 AM »
Microwave it.

I've heard (on FlyerTalk, where the subject comes up with some regularity) that microwaving your RFID passport can result in scorch marks to the document.  An alternate suggestion was to place a block of wood over the tag in the back cover and beat on that for a bit, which prevents putting hammerhead-shaped dents in the cover.

Manedwolf

  • friend
  • Senior Member
  • ***
  • Posts: 14,516
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #23 on: February 12, 2009, 10:15:54 AM »
Okay but if you nuke your passport, will it then be invalid when they can't read the RFID chip at customs?

It just doesn't work. It's not your fault. The airport xray must have ruined it.

And yes, they'll still take it, they just have to enter the data by hand instead of swiping it past a low-power reader that was their basis for calling it "safe". They ignored the fact that someone could make a homebrew with more power to interrogate an RFID from across a room. They're passive devices, powered by the signal like an ancient crystal radio. When the pulse of energy at the right frequency hits the RFID (antenna and chip) it causes the RFID to return a weak signal containing a few bits.

It just seemed like a stupid idea all around, and there were warnings about virtual pickpocketing years ago.

Zardozimo Oprah Bannedalas

  • Webley Juggler
  • friend
  • Senior Member
  • ***
  • Posts: 4,415
  • All I got is a fistful of shekels
Re: Man Builds and Demonstrates Passport RFID Sniffer/Cloner for $250
« Reply #24 on: February 12, 2009, 10:36:12 AM »
Would degaussing work?