Wireless identity theft
   HOME

TheInfoList



OR:

Wireless identity theft, also known as contactless identity theft or RFID identity theft, is a form of identity theft described as "the act of compromising an individual’s personal identifying information using wireless (
radio frequency Radio frequency (RF) is the oscillation rate of an alternating electric current or voltage or of a magnetic, electric or electromagnetic field or mechanical system in the frequency range from around to around . This is roughly between the ...
) mechanics." Numerous articles have been written about wireless identity theft and broadcast television has produced several investigations of this phenomenon. According to
Marc Rotenberg Marc Rotenberg is president and founder of the Center for AI and Digital Policy, an independent non-profit organization, incorporated in Washington, D.C. Rotenberg is the editor of ''The AI Policy Sourcebook'', a member of the OECD Expert Group o ...
of the
Electronic Privacy Information Center Electronic Privacy Information Center (EPIC) is an independent nonprofit research center in Washington, D.C. EPIC's mission is to focus public attention on emerging privacy and related human rights issues. EPIC works to protect privacy, freedom ...
, wireless identity theft is a serious issue as the contactless (wireless) card design is inherently flawed, increasing the vulnerability to attacks.


Overview

Wireless identity theft is a relatively new technique for gathering individuals' personal information from RF-enabled cards carried on a person in their access control, credit, debit, or government issued identification cards. Each of these cards carry a radio frequency identification chip which responds to certain radio frequencies. When these "tags" come into contact with radio waves, they respond with a slightly altered signal. The response can contain encoded personally identifying information, including the card holder's name, address, Social Security Number, phone number, and pertinent account or employee information. Upon capturing (or ‘harvesting’) this data, one is then able to program other cards to respond in an identical fashion (‘cloning’). Many websites are dedicated to teaching people how to do this, as well as supplying the necessary equipment and software. The financial industrial complex is migrating from the use of magnetic stripes on debit and credit cards which technically require a swipe through a magnetic card swipe reader. The number of transactions per minute can be increased, and more transactions can be processed in a shorter time, therefore making for arguably shorter lines at the cashier..


Controversies

Academic researchers and ‘White-Hat’ hackers have analysed and documented the covert theft of RFID credit card information and been met with both denials and criticisms from RFID card-issuing agencies... Nevertheless, after public disclosure of information that could be stolen by low-cost jerry-rigged detectors which were used to scan cards in mailing envelopes (and in other studies also even via drive-by data attacks), the design of security features on various cards was upgraded to remove card owners’ names and other data. Additionally, a number of completely unencrypted card designs were converted to encrypted data systems.


RSA report

The issues raised in a 2006 report were of importance due to the tens of millions of cards that have already been issued.
Credit Credit (from Latin verb ''credit'', meaning "one believes") is the trust which allows one party to provide money or resources to another party wherein the second party does not reimburse the first party immediately (thereby generating a debt) ...
and debit card data could be stolen via special low cost radio scanners without the cards being physically touched or removed from their owner's pocket, purse or carry bag. Among the findings of the 2006 research study "Vulnerabilities in First-Generation RFID-Enabled Credit Cards", and in reports by other white-hat hackers: * some scanned credit cards revealed their owners’ names, card numbers and expiration dates; * that the short maximum scanning distance of the cards and tags (normally measured in inches or centimetres) could be extended to several feet via technological modifications; * that even without range-extension technologies,
Black Hat Black hat, blackhats, or black-hat refers to: Arts, entertainment, and media * Black hat (computer security), a hacker who violates computer security for little reason beyond maliciousness or for personal gain * Black hat, part of black and whit ...
ters walking through crowded venues or delivering fliers could easily capture card data from other individuals and from mail envelopes; * that security experts who reviewed the study findings were startled by the breaches of privacy of the study (conducted in 2006); * that other e-systems, such as Exxon Mobil’s Speedpass keychain payment device, used weak encryption methods which could be compromised by a half-hour or so of computing time; * that some cards’ scanned stolen data quickly yielded actual credit card numbers and didn't use data tokens; * that data illicitly obtained from some cards was successfully used to trick a regular commercial card-reader (used by the study group) into accepting purchase transactions from an online store that didn't require the entry of the cards’ validation codes; * that while higher level security systems have been and continue to be developed, and are available for RFID credit cards, it is only the actual banks which decide how much security they want to deploy for their cardholders; * that ''every one'' of the 20 cards tested in the study was defeated by at least one of the attacks the researchers deployed; * another related security threat concerned a different product: new government issued ePassports ( passports that now incorporate RFID tags similar to credit and debit cards). The RFID tags in ePassports are also subject to data theft and cloning attacks. The
United States government The federal government of the United States (U.S. federal government or U.S. government) is the national government of the United States, a federal republic located primarily in North America, composed of 50 states, a city within a feder ...
has been issuing ePassports since 2006. In a related issue, privacy groups and individuals have also raised " Big Brother" concerns, where there is a threat to individuals from their aggregated information and even tracking of their movements by either card issuing agencies, other third party entities, and even by governments.. Industry observers have stated that ‘''...RFID certainly has the potential to be the most invasive consumer technology ever.''’ Credit card issuing agencies have issued denial statements regarding wireless identity theft or fraud and provided marketing information that either directly criticized or implied that: * beyond the card data itself, other data protection and anti-fraud measures in their payment systems are in place to protect consumers; * the academic study conducted in 2006 used a sample of only 20 RFID cards, and was not accurately representative of the general RFID marketplace which generally used higher security than the tested cards; * unencrypted plain text information on the cards was "...basically useless" (by itself), since financial transactions they were tied to used verifications systems with powerful encryption technologies; * even if consumers were victims of RFID credit card fraud or identity theft, they would not be ''financially'' liable for such credit card fraud (a marketing strategy that ignores the other serious consequences to card holders after they've been associated with fraudulent transactions or have their identity stolen); After the release of the study results, all of the credit card companies contacted during the ''
New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
investigative report said that they were removing card holder names from the data being transmitted with their new second generation RFID cards..


Compromised U.S. identification documents

Certain official identification documents issued by the U.S. government,
U.S. Passport United States passports are passports issued to citizens and nationals of the United States of America. They are issued exclusively by the U.S. Department of State. Besides passports (in booklet form), limited-use passport cards are issued b ...
s, Passport Cards, and also enhanced driver's licenses issued by States of New York and Washington, contain RFID chips for the purpose of assisting those policing the U.S. border.. Various security issues have been identified with their use, including the ability of
black hat Black hat, blackhats, or black-hat refers to: Arts, entertainment, and media * Black hat (computer security), a hacker who violates computer security for little reason beyond maliciousness or for personal gain * Black hat, part of black and whit ...
s to harvest their identifier numbers at a distance and apply them to blank counterfeit documents and cards, thus assuming those people's identifiers. Various issues and potential issues with their use have been identified, including privacy concerns. Although the RFID identifier number associated with each document is not supposed to include personal identification information, "...numbers evolve over time, and uses evolve over time, and eventually these things can reveal more information than we initially expect" stated Tadayoshi Kohno, an assistant professor of computer science, at
University of Washington The University of Washington (UW, simply Washington, or informally U-Dub) is a public research university in Seattle, Washington. Founded in 1861, Washington is one of the oldest universities on the West Coast; it was established in Seattl ...
who participated in a study of such government issued documents.


See also

*
Identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was c ...
* RFID *
HID Global HID Global is an American manufacturer of secure identity products. The company is an independent brand of Assa Abloy, a Swedish door and access control conglomerate. Björn Lidefelt was appointed CEO on 27 January 2020. He succeeded Stefan Wid ...
* Credit card fraud


References


Further reading

* . * . * (on how deliberately corrupted RFID tags could introduce viruses into computer systems). * {{Citation , last = Seltzer , first = Larry , url = http://www.eweek.com/c/a/Security/Exposing-the-Myth-of-Passport-Card-Security , title = Exposing the Myth of Passport Card Security , newspaper = eWeek , date = 2009-02-20 , access-date = 2009-03-14. Crime Data security Credit cards Identity theft Radio-frequency identification