It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Newitz said she has an RFID chip implanted in her right arm manufactured by VeriChip Corp., a subsidiary of Applied Digital. “Their Web site claims that it cannot be counterfeited — that is something that Jonathan and I have shown to be untrue.” The pair demonstrated the cloning process: Westhues held a standard RFID reader against Newitz’s arm to register the chip’s unique identification number. Next, Westhues used a home-built antenna connected to his laptop to read Newitz’s arm again and record the signal off her implanted chip.
James Van Bokkelen is about to be robbed. A wealthy software entrepreneur, Van Bokkelen will be the latest victim of some punk with a laptop. But this won't be an email scam or bank account hack. A skinny 23-year-old named Jonathan Westhues plans to use a cheap, homemade USB device to swipe the office key out of Van Bokkelen's back pocket.
"I just need to bump into James and get my hand within a few inches of him," Westhues says. We're shivering in the early spring air outside the offices of Sandstorm, the Internet security company Van Bokkelen runs north of Boston. As Van Bokkelen approaches from the parking lot, Westhues brushes past him. A coil of copper wire flashes briefly in Westhues' palm, then disappears.
Van Bokkelen enters the building, and Westhues returns to me. "Let's see if I've got his keys," he says, meaning the signal from Van Bokkelen's smartcard badge. The card contains an RFID sensor chip, which emits a short burst of radio waves when activated by the reader next to Sandstorm's door. If the signal translates into an authorized ID number, the door unlocks.
A German security researcher who demonstrated last year that he could clone the computer chip in an electronic passport has revealed additional vulnerabilities in the design of the new documents and the inspection systems used to read them.
Lukas Grunwald, an RFID expert who has served as an e-passport consultant to the German parliament, says the security flaws allow someone to seize and clone the fingerprint image stored on the biometric e-passport, and to create a specially coded chip that attacks e-passport readers that attempt to scan it.
Grunwald says he's succeeded in sabotaging two passport readers made by different vendors by cloning a passport chip, then modifying the JPEG2000 image file containing the passport photo. Reading the modified image crashed the readers, which suggests they could be vulnerable to a code-injection exploit that might, for example, reprogram a reader to approve expired or forged passports.
Forged passports may seem like the stuff of spy novels, but they have appeared in the real world, having been used by individuals who went on to take part in terrorist attacks. To add a layer of security that goes beyond what's printed on the page, many nations are adopting passports with an RFID chip that contains a duplicate of the printed information, secured by encryption. A security researcher hired by a British newspaper has now shown that it's possible to replace the data in the RFID chip, and the lack of international cooperation in the sharing of encryption information may mean the hack goes undetected in many places.
The basics behind the RFID scheme are pretty simple. Passports contain printed copies of a personal photo and key biometric information, such as height, date of birth, etc. With the right equipment and blank passports, it's possible to forge these printed materials. RFID chips embedded in the passports are intended to help detect these forgeries, as they carry a duplicate of this information—if the two don't match, then the forgery should be obvious. (The US State Department maintains an FAQ addressing this technology.)
Of course, it's entirely possible to forge an RFID chip, which is precisely what a security researcher in Amsterdam did at the request of The Times. Jeroen van Beek of the University of Amsterdam was given two valid passports that contained RFID chips. Using an $80 RFID reader, van Beek was able to obtain a copy of all the biometric data, substitute arbitrary values for each of the fields, then write the modified data back out to a separate $40 RFID chip. The Times reports that the process took about an hour. In an amusing twist—and to avoid charges that they were actually engaged in illegal forgery—van Beek uploaded Osama bin Laden's vitals onto the blank RFID chip.
Back in August, a security researcher named Jeroen van Beek demonstrated a method for manipulating information in the RFID tags used in recent passports; more details of the process were discussed at the Black Hat conference held in Las Vegas that month. Now, a member of the group The Hacker's Choice (THC) has built on that knowledge to describe how anyone can use some free software and cheap hardware to manipulate the personal data on a passport RFID tag. The hack comes accompanied by a video showing a machine in Amsterdam's airport reading Elvis Presley's personal information off a hacked chip.
The process, as described by someone going with the handle VonJeek, is pretty straightforward. Software that emulates passport RFID behavior, apparently written by van Beek, is uploaded onto a blank card. Using a free Python application, an existing passport's chip is read and the data transferred to the emulator. In the process, the bits that call for active verification of the encoded information can be shut off, limiting the verification process when the card is read in the future. Instructions for modifying the information prior to uploading it are also provided.
The instructions come with a video of the hacked card in action at the Amsterdam airport. At a self-service boarding pass machine, the hacker slipped the modified RFID card into his passport, and placed it in a scanning device. Up popped Elvis on the screen. Ars' man near Amsterdam, Chris Lee, indicated that this wouldn't get anyone past security—it simply saves waiting in line for manual check-in—but it is a clear indication that the hack was functional as far as the RFID readers were concerned.
Originally posted by FortAnthem
I've heard that once you're chipped, anyone with the proper equipment could read your information without your knowledge, just by you walking near them.
Think of the possibiltites for Identity Theft!
Originally posted by ShadowEyes
Originally posted by FortAnthem
I've heard that once you're chipped, anyone with the proper equipment could read your information without your knowledge, just by you walking near them.
Think of the possibiltites for Identity Theft!
As bad as that would be, the ramifications of this 'tagging' would be even worse.
They would be able to track you EVERYWHERE. So what would that mean if you had to become a survivalist? You wouldn't be able to get away!