Storm building over RFID-enabled passports
With just months before full U.S. adoption, a raging debate
Network World - As the U.S. government prepares to complete a conversion to the controversial RFID-based electronic passports, traditional paper-only IDs are still available for a few months to those listening to the raging debate over security and privacy concerns swirling around the electronic documents.
Many security experts are still questioning whether e- passports, which have a 10-year life span, have enough security built in to survive a decade of hackers and technology advancements while protecting e-passports users from data theft, identity theft and other security and privacy intrusions.
"If the government is right, this will be the first time in the history of mankind that a perfectly secure application will be produced. Of course it will be hacked," says Bruce Schneier, the noted security guru, author and CTO of Counterpane Internet Security.
The government thinks otherwise and has already started to issue the cards from two of its regional offices in Colorado and Washington, D.C.
"Let me be blunt," says Frank Moss, deputy assistant secretary for passport services at the Department of State. "We have obviously gone through an elaborate process here, and, I think, with the exception of a relatively small number of people, have addressed most people's security concerns."
Moss, along with other government and military officials, has been using an RFID-enabled passport since last year.
The e-passport is a contact-less smartcard with a secure microprocessor that employs a passive radio frequency to transmit data over an encrypted wireless link to a reader. The passive technology requires a reader to power the chip and is different from an RFID vicinity chip used for tracking items from a distance.
A technology called Basic Access Control (BAC) uses an electronic key, derived from machine-readable data printed on the passport's page, to unlocked the data on the chip, and a digital signature protects the integrity of the digital data.
The chip, which is embedded inside the cover of the passport, contains only a duplicate copy of the passport photograph and the printed data. The digital data is intended to prevent forgeries by allowing inspectors to compare the printed and digital data.
"This is not a security device for you, it is a security device for the government," says Schneier. "As long as you don't benefit from this why should you be a guinea pig?" Schneier recommends people get new passports, which are valid for 10 years, without RFID technology while they are still available. The government does not plan on recalling passports before their expiration date.
But once regional passport offices convert to e-passports, the traditional paper-only versions will not be available. The Colorado office converted on Aug. 4, while the Special Issuance Agency in Washington is completing a conversion. The other 15 offices will convert during the next five to six months.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!