Lindaland
  Global Unity 2.0
  Chips in official IDs raise privacy fears

Post New Topic  Post A Reply
profile | register | preferences | faq

UBBFriend: Email This Page to Someone! next newest topic | next oldest topic
Author Topic:   Chips in official IDs raise privacy fears
T
Knowflake

Posts: 705
From:
Registered: Apr 2009

posted July 13, 2009 11:20 AM     Click Here to See the Profile for T     Edit/Delete Message
http://news.yahoo.com/s/ap/20090711/ap_on_bi_ge/us_chipping_america_iv

Chips in official IDs raise privacy fears


By TODD LEWAN, AP National Writer – Sat Jul 11, 3:38 pm ET

Climbing into his Volvo, outfitted with a Matrics antenna and a Motorola reader he'd bought on eBay for $190, Chris Paget cruised the streets of San Francisco with this objective: To read the identity cards of strangers, wirelessly, without ever leaving his car.

It took him 20 minutes to strike hacker's gold.

Zipping past Fisherman's Wharf, his scanner detected, then downloaded to his laptop, the unique serial numbers of two pedestrians' electronic U.S. passport cards embedded with radio frequency identification, or RFID, tags. Within an hour, he'd "skimmed" the identifiers of four more of the new, microchipped PASS cards from a distance of 20 feet.

Embedding identity documents — passports, drivers licenses, and the like — with RFID chips is a no-brainer to government officials. Increasingly, they are promoting it as a 21st century application of technology that will help speed border crossings, safeguard credentials against counterfeiters, and keep terrorists from sneaking into the country.

But Paget's February experiment demonstrated something privacy advocates had feared for years: That RFID, coupled with other technologies, could make people trackable without their knowledge or consent.

He filmed his drive-by heist, and soon his video went viral on the Web, intensifying a debate over a push by government, federal and state, to put tracking technologies in identity documents and over their potential to erode privacy.

Putting a traceable RFID in every pocket has the potential to make everybody a blip on someone's radar screen, critics say, and to redefine Orwellian government snooping for the digital age.

"Little Brother," some are already calling it — even though elements of the global surveillance web they warn against exist only on drawing boards, neither available nor approved for use.

But with advances in tracking technologies coming at an ever-faster rate, critics say, it won't be long before governments could be able to identify and track anyone in real time, 24-7, from a cafe in Paris to the shores of California.

The key to getting such a system to work, these opponents say, is making sure everyone carries an RFID tag linked to a biometric data file.

On June 1, it became mandatory for Americans entering the United States by land or sea from Canada,Mexico, Bermuda and the Caribbean to present identity documents embedded with RFID tags, though conventional passports remain valid until they expire.

Among new options are the chipped "e-passport," and the new, electronic PASS card — credit-card sized, with the bearer's digital photograph and a chip that can be scanned through a pocket, backpack or purse from 30 feet.

Alternatively, travelers can use "enhanced" driver's licenses embedded with RFID tags now being issued in some border states: Washington, Vermont, Michigan and New York. Texas and Arizona have entered into agreements with the federal government to offer chipped licenses, and the U.S. Department of Homeland Security has recommended expansion to non-border states. Kansas and Florida officials have received DHS briefings on the licenses, agency records show.

The purpose of using RFID is not to identify people, says Mary Ellen Callahan, the chief privacy officer atHomeland Security, but rather "to verify that the identification document holds valid information about you."

Likewise, U.S. border agents are "pinging" databases only to confirm that licenses aren't counterfeited. "They're not pulling up your speeding tickets," she says, or looking at personal information beyond what is on a passport.

The change is largely about speed and convenience, she says. An RFID document that doubles as a U.S. travel credential "only makes it easier to pull the right record fast enough, to make sure that the border flows, and is operational" — even though a 2005 Government Accountability Office report found that government RFID readers often failed to detect travelers' tags.

Such assurances don't persuade those who liken RFID-embedded documents to barcodes with antennas and contend they create risks to privacy that far outweigh the technology's heralded benefits. They warn it will actually enable identity thieves, stalkers and other criminals to commit "contactless" crimes against victims who won't immediately know they've been violated.

Neville Pattinson, vice president for government affairs at Gemalto, Inc., a major supplier of microchipped cards, is no RFID basher. He's a board member of the Smart Card Alliance, an RFID industry group, and is serving on the Department of Homeland Security's Data Privacy and Integrity Advisory Committee.

Still, Pattinson has sharply criticized the RFIDs in U.S. driver's licenses and passport cards. In a 2007 article for the Privacy Advisor, a newsletter for privacy professionals, he called them vulnerable "to attacks from hackers, identity thieves and possibly even terrorists."

RFID, he wrote, has a fundamental flaw: Each chip is built to faithfully transmit its unique identifier "in the clear, exposing the tag number to interception during the wireless communication."

Once a tag number is intercepted, "it is relatively easy to directly associate it with an individual," he says. "If this is done, then it is possible to make an entire set of movements posing as somebody else without that person's knowledge."

Echoing these concerns were the AeA — the lobbying association for technology firms — the Smart Card Alliance, the Institute of Electrical and Electronics Engineers, the Business Travel Coalition, and theAssociation of Corporate Travel Executives.

Meanwhile, Homeland Security has been promoting broad use of RFID even though its own advisory committee on data integrity and privacy warned that radio-tagged IDs have the potential to allow "widespread surveillance of individuals" without their knowledge or consent.

In its 2006 draft report, the committee concluded that RFID "increases risks to personal privacy and security, with no commensurate benefit for performance or national security," and recommended that "RFID be disfavored for identifying and tracking human beings."

For now, chipped PASS cards and enhanced driver's licenses are optional and not yet widely deployed in the United States. To date, roughly 192,000 EDLs have been issued in Washington, Vermont, Michigan and New York.
But as more Americans carry them "you can bet that long-range tracking of people on a large scale will rise exponentially," says Paget, a self-described "ethical hacker" who works as an Internet security consultant.
Could RFID numbers eventually become de facto identifiers of Americans, like the Social Security number?
Such a day is not far off, warns Katherine Albrecht, a privacy advocate and co-author of "Spychips," a book that is sharply critical of the use of RFID in consumer items and official ID documents.

"There's a reason you don't wear your Social Security number across your T-shirt," Albrecht says, "and beaming out your new, national RFID number in a 30-foot radius would be far worse."

There are no federal laws against the surreptitious skimming of Americans' RFID numbers, so it won't be long before people seek to profit from this, says Bruce Schneier, an author and chief security officer at BT, the British telecommunications operator.

Data brokers that compile computer dossiers on millions of individuals from public records, credit applications and other sources "will certainly maintain databases of RFID numbers and associated people," he says. "They'd do a disservice to their stockholders if they didn't."

But Gigi Zenk, a spokeswoman for the Washington state Department of Licensing, says Americans "aren't that concerned about the RFID, particularly in this day and age when there are a lot of other ways to access personal information on people."

Tracking an individual is much easier through a cell phone, or a satellite tag embedded in a car, she says. "An RFID that contains no private information, just a randomly assigned number, is probably one of the least things to be concerned about, frankly."

Still, even some ardent RFID supporters recognize that these next-generation RFID cards raise prickly questions.
Mark Roberti, editor of RFID Journal, an industry newsletter, recently acknowledged that as the use of RFID in official documents grows, the potential for abuse increases.

"A government could do this, for instance, to track opponents," he wrote in an opinion piece discussing Paget's cloning experiment. "To date, this type of abuse has not occurred, but it could if governments fail to take privacy issues seriously."

___
Imagine this: Sensors triggered by radio waves instructing cameras to zero in on people carrying RFID, unblinkingly tracking their movements.

Unbelievable? Intrusive? Outrageous?

Actually, it happens every day and makes people smile — at the Alton Towers amusement park in Britain, which videotapes visitors who agree to wear RFID bracelets as they move about the facility, then sells the footage as a keepsake.

This application shows how the technology can be used effortlessly — and benignly. But critics, noting it can also be abused, say federal authorities in the United States didn't do enough from the start to address that risk.
The first U.S. identity document to be embedded with RFID was the "e-passport."

In the wake of the Sept. 11 attacks — and the finding that some of the terrorists entered the United States using phony passports — the State Department proposed mandating that Americans and foreign visitors carry "enhanced" passport booklets, with microchips embedded in the covers.

The chips, it announced, would store the holder's information from the data page, a biometric version of the bearer's photo, and receive special coding to prevent data from being altered.

In February 2005, when the State Department asked for public comment, it got an outcry: Of the 2,335 comments received, 98.5 percent were negative, with 86 percent expressing security or privacy concerns, the department reported in an October 2005 notice in the Federal Register.

"Identity theft was of grave concern," it stated, adding that "others expressed fears that the U.S. Government or other governments would use the chip to track and censor, intimidate or otherwise control or harm them."

It also noted that many Americans expressed worries "that the information could be read at distances in excess of 10 feet."

Those concerned citizens, it turns out, had cause.

According to department records obtained by researchers at the University of California, Berkeley, under aFreedom of Information Act request and reviewed by the AP, discussion about security concerns with the e-passport occurred as early as January 2003 but tests weren't ordered until the department began receiving public criticism two years later.

When the AP asked when testing was initiated, the State Department said only that "a battery of durability and electromagnetic tests were performed" by the National Institute of Standards and Technology, along with tests "to measure the ability of data on electronic passports to be surreptitiously skimmed or for communications with the chip reader to be eavesdropped," testing which "led to additional privacy controls being placed on U.S. electronic passports ... "

Indeed, in 2005, the department incorporated metallic fibers into the e-passport's front cover, since metal can reduce the range at which RFID can be read. Personal information in the chips was encrypted and a cryptographic "key" added, which required inspectors to optically scan the e-passport first for the chip to communicate wirelessly.

The department also announced it would test e-passports with select employees, before giving them to the public. "We wouldn't be issuing the passports to ourselves if we didn't think they're secure," said Frank Moss,deputy assistant Secretary of State for passport services, in a CNN interview.

But what of Americans' concerns about the e-passport's read range?

In its October 2005 Federal Register notice, the State Department reassured Americans that the e-passport's chip — the ISO 14443 tag — would emit radio waves only within a 4-inch radius, making it tougher to hack.

Technologists in Israel and England, however, soon found otherwise. In May 2006, at the University of Tel Aviv, researchers cobbled together $110 worth of parts from hobbyists kits and directly skimmed an encrypted tag from several feet away. At the University of Cambridge, a student showed that a transmission between an e-passport and a legitimate reader could be intercepted from 160 feet.

The State Department, according to its own records obtained under FOIA, was aware of the problem months before its Federal Register notice and more than a year before the e-passport was rolled out in August 2006.

"Do not claim that these chips can only be read at a distance of 10 cm (4 inches)," Moss wrote in an April 22, 2005, e-mail to Randy Vanderhoof, executive director of the Smart Card Alliance. "That really has been proven to be wrong."


The chips could be skimmed from a yard away, he added — all a hacker would need to read e-passport numbers, say, in an elevator or on a subway.

Other red flags went up. In February 2006, an encrypted Dutch e-passport was hacked on national television, with researchers gaining access to the document's digital photograph, fingerprint and personal data. Then British e-passports were hacked using a $500 reader and software written in less than 48 hours.

The State Department countered by saying European e-passports weren't as safe as their American counterparts because they lacked the cryptographic key and the anti-skimming cover.

But recent studies have shown that more powerful readers can penetrate even the metal sheathing in the U.S. e-passport's cover.

John Brennan, a senior policy adviser at the State Department's Bureau of Consular Affairs, concedes it may be possible for a reader to overpower the e-passport's protective shield from a distance.

However, he adds, "you could not do this in any large-scale, concerted fashion without putting a bunch of infrastructure in place to make it happen. The practical vulnerabilities may be far less than some of the theoretical scenarios that people have put out there."

That thinking is flawed, says Lee Tien, a senior attorney and surveillance expert with the Electronic Frontier Foundation, which opposes RFID in identity documents.
It won't take a massive government project to build reader networks around the country, he says: They will grow organically, for commercial purposes, from convention centers to shopping malls, sports stadiums to college campuses. Federal agencies and law enforcement wouldn't have to control those networks; they already buy information about individuals from commercial data brokers.

"And remember," Tien adds, "technology always gets better ... "
___
With questions swirling around the e-passport's security, why then did the government roll out more RFID-tagged documents — the PASS card and enhanced driver's license, which provide less protection against hackers?
The RFIDs in enhanced driver's licenses and PASS cards are nearly as slim as paper. Each contains a silicon computer chip attached to a wire antenna, which transmits a unique identifier via radio waves when "awakened" by an electromagnetic reader.

The technology they use is designed to track products through the supply chain. These chips, known as EPCglobal Gen 2, have no encryption, and minimal data protection features. They are intended to release their data to any inquiring Gen 2 reader within a 30-foot radius.

This might be appropriate when a supplier is tracking a shipment of toilet paper or dog food; but when personal information is at stake, privacy advocates ask: Is long-range readability truly desirable?

The departments of State and Homeland Security say remotely readable ID cards transmit only RFID numbers that correspond to records stored in government databases, which they say are secure. Even if a hacker were to copy an RFID number onto a blank tag and place it into a counterfeit ID, they say, the forger's face still wouldn't match the true cardholder's photo in the database, rendering it useless.

Still, computer experts such as Schneier say government databases can be hacked. Others worry about a day when hackers might deploy readers at "chokepoints," such as checkout lines, skim RFID numbers from people's driver's licenses, then pair those numbers to personal data skimmed from chipped credit cards (though credit cards are harder to skim). They imagine stalkers using skimmed RFID numbers to track their targets' comings and goings. They fear government agents will compile chip numbers at peace rallies, mosques or gun shows, simply by strolling through a crowd with a reader.

Others worry more about the linking of chips with other identification methods, including biometric technologies, such as facial recognition.

The International Civil Aviation Organization, the U.N. agency that sets global standards for passports, now calls for facial recognition in all scannable e-passports.

Should biometric technologies be coupled with RFID, "governments will have, for the first time in history, the means to identify, monitor and track citizens anywhere in the world in real time," says Mark Lerner, spokesman for the Constitutional Alliance, a network of nonprofit groups, lawmakers and citizens opposed to remotely readable identity and travel documents.
Implausible?

For now, perhaps. Radio tags in EDLs and passport cards can't be scanned miles away.

But scientists are working on technologies that might enable a satellite or a cell tower to scan a chip's contents. Critics also note advances in the sharpness of closed-circuit cameras, and point out they're increasingly ubiquitous. And more fingerprints, iris scans and digitized facial images are being stored in government databases. The FBI has announced plans to assemble the world's largest biometric database, nicknamed "Next Generation Identification."

"RFID's role is to make the collection and transmission of people's biometric data quick, easy and nonintrusive," says Lerner. "Think of it as the thread that ties together the surveillance package."

IP: Logged

T
Knowflake

Posts: 705
From:
Registered: Apr 2009

posted July 13, 2009 11:23 AM     Click Here to See the Profile for T     Edit/Delete Message
i had to renew my license this year and the whole rigamarole is a lot different now. They said i'd have my new license sent to me in the mail within a month and gave a temporary one. All the times before I had left with a new one that day. It took about a month to get this new flashy license. I figured it was being chipped. The dmv lady was telling me they are working out the new system and people will be able to renew online from now on soon. I asked how we would get an updated picture on our license in 5 years, or whatever it is, and she said they havent worked that out yet and you may just be able to keep the same picture. I was very close to asking her if they were chipping all the new licenses, but just walked out disgusted instead.

IP: Logged

T
Knowflake

Posts: 705
From:
Registered: Apr 2009

posted July 13, 2009 11:27 AM     Click Here to See the Profile for T     Edit/Delete Message
the first picture she took was great and i said i really liked it and asked if i could keep it on the license photo. for some reason, the camera was set on close-up and got a high resolution shot of my forehead and eyebrows only. unfortunately, she laughed and said no.

IP: Logged

katatonic
Knowflake

Posts: 887
From:
Registered: Apr 2009

posted July 13, 2009 11:53 AM     Click Here to See the Profile for katatonic     Edit/Delete Message
so pardon me for being thick here, but does metal obscure or enhance scanning from a "reader"? if the former we could just wrap our licenses etc in tin foil for protection. i NEVER carry my license with me unless i know i am going to need it, ie, it is in my car not on my person. maybe i will wait to get my new passport after all, until something is done about this!

the facial recognition thing is nasty too, though i have heard that so far it doesn't work very well...tests in germany failed badly!

i wonder where one can lobby against these sinister doodas? anyone know?

edit: after rereading answered my first question all by my lonesome...so i would suggest metal protective coverings for all chipped materials...

IP: Logged

Happy Dragon
Knowflake

Posts: 169
From:
Registered: Apr 2009

posted July 13, 2009 01:33 PM     Click Here to See the Profile for Happy Dragon     Edit/Delete Message
Snooping through the power socket
~ http://news.bbc.co.uk/1/low/technology/8147534.stm ~

IP: Logged

katatonic
Knowflake

Posts: 887
From:
Registered: Apr 2009

posted July 13, 2009 03:31 PM     Click Here to See the Profile for katatonic     Edit/Delete Message
nice!

IP: Logged

T
Knowflake

Posts: 705
From:
Registered: Apr 2009

posted July 15, 2009 10:45 AM     Click Here to See the Profile for T     Edit/Delete Message
Thanks for the tip kat. I'm going to make a metal holder for mine.

quote:
the facial recognition thing is nasty too, though i have heard that so far it doesn't work very well...tests in germany failed badly!

i think what they don't realize yet, is all of these things they are doing to invade our privacy and rights are going to fail miserably - or backfire, rather. Just watch. Not to sound all apocolyptic, but it seems everything's coming crumbling down. That's Pluto for us. And i don't mind a bit. They think theyre slick, but all of these "advances in technology" and "protective measures" will only serve to complicate matters and create more problems instead. It'll all come back to bite them.

HD

is right, kat.

IP: Logged

katatonic
Knowflake

Posts: 887
From:
Registered: Apr 2009

posted July 15, 2009 05:52 PM     Click Here to See the Profile for katatonic     Edit/Delete Message
i agree T. and have to say, i am just guessing that metal interferes from what it said about metallic threads reducing range on passport chips?

as a friend of mine pointed out, it is probably not good for OUR energy (he used the word karma) to worry too much about this stuff. and it is true that all the snooping reaps SO MUCH information that it's an almost impossible job to even decode/decipher it, let alone file in a
useful way...

and whatever the technology they have been taking notes on us for a very long time with very little effect...

IP: Logged

AcousticGod
Knowflake

Posts: 837
From: acousticgod@sbcglobal.net
Registered: Apr 2009

posted July 15, 2009 06:16 PM     Click Here to See the Profile for AcousticGod     Edit/Delete Message
quote:
i think what they don't realize yet, is all of these things they are doing to invade our privacy and rights are going to fail miserably - or backfire, rather. Just watch. Not to sound all apocolyptic, but it seems everything's coming crumbling down. That's Pluto for us. And i don't mind a bit. They think theyre slick, but all of these "advances in technology" and "protective measures" will only serve to complicate matters and create more problems instead. It'll all come back to bite them.

That reminds me of an article I saw about Saturn entering Libra, it's sign of exaltation. Let me find it.

    Relationships were much stronger than they are now, the last time Saturn was in Libra, 28 years ago. There are many reasons for that but I am going to start with one of them: cell phones (Virgo).

    Cell phones are a great convenience but they degrade relationships if you do not pay attention. I get around this and you can too but you must make an effort and I’ll explain.

    In the old days there was a phone in the house. That meant that if you called me, my husband might pick up, or one of my kids. As a matter of course when you called a person you would chat with whoever picked up and as a result, everyone who called your house knew everyone who lived there.

    Today lives are compartmentalized. I call satori on a cell phone - she has three children. By now I should be their second mother but in fact, I’ve never heard their voices in 7 years. It’s hard to believe, isn’t it?

    You don’t call a “couple” as you did 20 or 30 years ago. You call an individual who you then have a private conversation with.

    If you think about it you can see how this does not support relationship. It is very easy to break up, discard someone when no one in your house is attached to them but you. Pretty lousy too, when you think about it.
    Saturn in Transition

IP: Logged

katatonic
Knowflake

Posts: 887
From:
Registered: Apr 2009

posted July 16, 2009 11:04 AM     Click Here to See the Profile for katatonic     Edit/Delete Message
not to mention that once you have a cell phone even your least communicative friends expect you to be "on tap" whenever they want to talk to you! i keep leaving mine at home these days, the only way to get some peace!!

IP: Logged

T
Knowflake

Posts: 705
From:
Registered: Apr 2009

posted July 17, 2009 11:11 AM     Click Here to See the Profile for T     Edit/Delete Message
quote:
and whatever the technology they have been taking notes on us for a very long time with very little effect...

Yep.

Interesting AG.

IP: Logged

All times are Eastern Standard Time

next newest topic | next oldest topic

Administrative Options: Close Topic | Archive/Move | Delete Topic
Post New Topic  Post A Reply
Hop to:

Contact Us | Linda-Goodman.com

Copyright © 2008

Powered by Infopop www.infopop.com © 2000
Ultimate Bulletin Board 5.46a