Speaking at the annual Biometrics Institute Australia conference in Sydney last week, Dr Helen Cartledge said that RFID chips, including those located within banking cards and e-Passports issued by the government, are at risk from wireless skimming devices.
"e-Passport utilizes basic access control (BAC) to prevent personal information being extracted without actually handing over the document. Extended Access Control is used to protect other information such as fingerprint [data]. Credit cards, however, do not have the same type of safeguards and some of the information they contain may be vulnerable if attackers are nearby with a transceiver [reader] at the same frequency range as your e-tag or cards--they may get access to some of your information," Cartledge added.
While the data in a passport requires an encrypted key to use, researchers in the Netherlands have found a way to read some stored information remotely.
Cartledge works as a senior security advisor within the National Security Science and Technology (NSST) branch of the Department of Prime Minister and Cabinet, and works to apply innovations in science to aid national security priorities.
Cartledge said that the NSST branch has funded a review and research program into the RFID technology, looking for holes and vulnerabilities in the system.
The NSST is set to publish the results in coming months.
"There's a lot research need to be done in relation to encryption of our biometric or personal information in storage and transition," Dr Cartledge said.
Carteledge said that, in the meantime, everyone should take an interest in protecting their own security when it comes to RFID chips.
"There are some ways we can protect of our cards by using Faraday Cage theory [metal foil wallet]. This is one of the methods we can use."
Vulnerabilities in BAC chips and proximity technology is not a new concern for the government, however.
At the Cards and Payments Australasia conference in March, Centrelink's director of internal systems provisioning, Glenn Mitchell, told delegates how easy it was to procure proximity card skimmers on eBay and use them to scoop up unencrypted data from someone's card whilst on public transport, for example.
The devices that Centrelink tested could be concealed in a briefcase, bag or even in a jacket pocket, and served to activate unencrypted proximity cards at a distance of up to 40cm away. Once the card had been activated, the unique ID number is stored by the device and later downloaded onto a fresh proximity card.
"What an attacker can do with that is go back to their office and put the code on a digital card to have a way of getting in and out of [a target] building," Mitchell said.
---
Autor(en)/Author(s): Luke Hopewell
Quelle/Source: ZDNet, 31.05.2011