Difference between revisions of "RFID"
(→Purposes of use) |
(→Technological problems) |
||
Line 32: | Line 32: | ||
:“Up until now, everyone working on RFID technology has tacitly assumed that the mere act of scanning an RFID tag cannot modify back-end software, and certainly not in a malicious way. Unfortunately, they are wrong. In our research, we have discovered that if certain vulnerabilities exist in the RFID software, an RFID tag can be (intentionally) infected with a virus and this virus can infect the backend database used by the RFID software. From there it can be easily spread to other RFID tags.”<ref>[http://www.rfidvirus.org/ RFID Virus website, Vrije Universiteit Amsterdam, Department of Computer Science, “RFID Viruses and Worms,” by Melanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum, last modified 02 March 2006], accessed 22 November 2008.</ref><ref>See also [http://www.rfidvirus.org/papers/percom.06.pdf RFID Virus website, “Is Your Cat Infected with a Computer Virus?” by Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum, IEEE PerCom 2006], accessed 22 November 2008.</ref> | :“Up until now, everyone working on RFID technology has tacitly assumed that the mere act of scanning an RFID tag cannot modify back-end software, and certainly not in a malicious way. Unfortunately, they are wrong. In our research, we have discovered that if certain vulnerabilities exist in the RFID software, an RFID tag can be (intentionally) infected with a virus and this virus can infect the backend database used by the RFID software. From there it can be easily spread to other RFID tags.”<ref>[http://www.rfidvirus.org/ RFID Virus website, Vrije Universiteit Amsterdam, Department of Computer Science, “RFID Viruses and Worms,” by Melanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum, last modified 02 March 2006], accessed 22 November 2008.</ref><ref>See also [http://www.rfidvirus.org/papers/percom.06.pdf RFID Virus website, “Is Your Cat Infected with a Computer Virus?” by Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum, IEEE PerCom 2006], accessed 22 November 2008.</ref> | ||
− | |||
Implementation of such a vulnerable technology prone to viral attacks and hacking can be viewed as an economic threat, in the case of companies using it and spreading its use to enlarge their marketing system, as well as a security one, in the case of them being used with personal identification cards.<ref>[http://arstechnica.com/news.ars/post/20060315-6386.html ARS Technica website, “RFID chips can carry viruses,” 15 March 2006], accessed 22 November 2008.</ref> Many computer experts and science centres accept the fact that “RFID introduces new privacy and security risks -- and a whole new dimension to corporate espionage”<ref>[http://www.rsa.com/rsalabs/node.asp?id=2115 RSA Laboratories website, “RFID Privacy and Security”], accessed 22 November 2008.</ref>, but also willing to work on the technology to prevent it: “Laboratories is now researching new techniques to help protect the privacy and security of businesses and consumers in RFID environments.”<ref>[http://www.rsa.com/rsalabs/node.asp?id=2115 RSA Laboratories website, “RFID Privacy and Security”], accessed 22 November 2008.</ref> Considering the fact that current genius Microsoft technology fails to protect our desktop computers from being infected by viruses, it appears to be either a rather naïve or an extremely evil state of mind to believe that the RFID tags can be protected from any kind of technical misuse, and trust them to carry unique information about anything, be it a product, a pet, or a person. | Implementation of such a vulnerable technology prone to viral attacks and hacking can be viewed as an economic threat, in the case of companies using it and spreading its use to enlarge their marketing system, as well as a security one, in the case of them being used with personal identification cards.<ref>[http://arstechnica.com/news.ars/post/20060315-6386.html ARS Technica website, “RFID chips can carry viruses,” 15 March 2006], accessed 22 November 2008.</ref> Many computer experts and science centres accept the fact that “RFID introduces new privacy and security risks -- and a whole new dimension to corporate espionage”<ref>[http://www.rsa.com/rsalabs/node.asp?id=2115 RSA Laboratories website, “RFID Privacy and Security”], accessed 22 November 2008.</ref>, but also willing to work on the technology to prevent it: “Laboratories is now researching new techniques to help protect the privacy and security of businesses and consumers in RFID environments.”<ref>[http://www.rsa.com/rsalabs/node.asp?id=2115 RSA Laboratories website, “RFID Privacy and Security”], accessed 22 November 2008.</ref> Considering the fact that current genius Microsoft technology fails to protect our desktop computers from being infected by viruses, it appears to be either a rather naïve or an extremely evil state of mind to believe that the RFID tags can be protected from any kind of technical misuse, and trust them to carry unique information about anything, be it a product, a pet, or a person. | ||
− | |||
===People getting chipped=== | ===People getting chipped=== |
Revision as of 17:08, 23 November 2008
Radio frequency identification, or RFID, as defined by the RFID Journal, is “a generic term for technologies that use radio waves to automatically identify people or objects.” The most common practice of the technology is “to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna (the chip and the antenna together are called an RFID transponder or an RFID tag). The antenna enables the chip to transmit the identification information to a reader. The reader converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can make use of it.”[1]
Contents
Background
RFID tags carry specific data about the objects they are attached to, and, unlike barcodes, they can be recognised and read by a reader as long as they are in the same range. The amount of data they can carry depends on the manufacturer and the form of application, but the current versions can carry up to 2KB of data[2], which is enough to store all the basic information about a product in a simple format.
Purposes of use
RFID is claimed to bring the advantage of every item being tagged with a unique proof of identification, making tracking of products easy and error-proof. In this way, it is expected to improve production line efficiency for many companies.[3] The technology also helps companies in the way that it allows better access to product sales statistics. The main aim is stated to be “to reduce administrative error, labor costs associated with scanning bar codes, internal theft, errors in shipping goods and overall inventory levels.”[4]
Drawbacks
What actually has prevented the technology from being implemented is its cost. Although the tags are reusable in a certain system, say, in one company, they have to be very cheap to obtain to go out of the system as they cannot be used in another system unless all the systems work together and create a whole network of tracking.[5]
Therefore, the disadvantage is created by the absence of a universal system of RFID. Considering that the target now is to create a universal system, we come across some other, and much more serious, problems with respect to the practicable limitations of the whole network of RFID.
Technological problems
Easily copyable
The very first technical problem with the use of RFID tags on products is that they have proved to be easily copyable. Henry Porter, in an article for The Observer, states that he had the first hand experience after having been injected a chip under his skin. “It turns out that this futuristic device is rather unimpressive… It took… no time at all to pass a scanner over my arm, extract the information and clone the RFID.”[6]
Even for ID cards, the threat of being easily copied constitutes a big threat. Although the idea of embedding RFID tags in various types of ID cards bears the aim of making them “nearly impossible to forge or tamper with,” they are apparently functioning just in the opposite way.[7] “The hack was tested on a new European Union German passport, but the method would work on any country's "e-passport," since all of them will be adhering to the same ICAO standard. He obtained an RFID reader by ordering it from the maker - Walluf, Germany-based ACG Identification Technologies - but also explained that someone could easily make their own for about $200 just by adding an antenna to a standard RFID reader.”[8] Even the US authorities must have realised that fact that they have decided to also include a metal shield to protect them. “What they probably realise is that the covert reading of passport could represent a considerable threat, especially to those whose nationality terrorists want to target or those who may represent rich pickings for criminals.”[9]
Viral threats
The RFID technology has been presented to public as being fault-free and posing no technical problems. However, in addition to the problem of copying, they can also carry viruses that may well corrupt, if not all, a huge part of the system they are implemented in.
- “Up until now, everyone working on RFID technology has tacitly assumed that the mere act of scanning an RFID tag cannot modify back-end software, and certainly not in a malicious way. Unfortunately, they are wrong. In our research, we have discovered that if certain vulnerabilities exist in the RFID software, an RFID tag can be (intentionally) infected with a virus and this virus can infect the backend database used by the RFID software. From there it can be easily spread to other RFID tags.”[10][11]
Implementation of such a vulnerable technology prone to viral attacks and hacking can be viewed as an economic threat, in the case of companies using it and spreading its use to enlarge their marketing system, as well as a security one, in the case of them being used with personal identification cards.[12] Many computer experts and science centres accept the fact that “RFID introduces new privacy and security risks -- and a whole new dimension to corporate espionage”[13], but also willing to work on the technology to prevent it: “Laboratories is now researching new techniques to help protect the privacy and security of businesses and consumers in RFID environments.”[14] Considering the fact that current genius Microsoft technology fails to protect our desktop computers from being infected by viruses, it appears to be either a rather naïve or an extremely evil state of mind to believe that the RFID tags can be protected from any kind of technical misuse, and trust them to carry unique information about anything, be it a product, a pet, or a person.
People getting chipped
The formal explanations of the system only includes pets and products; on the other hand, there are examples of people who have been “tagged” with RFID microchips.[15] However, the practice of inserting RFID devices into people for purposes of club memberships and payment procedures are not a dream – the ideas of employing the system actually dates back to at least 2004.[16] Not surprisingly, another attempt to make Americans more secure includes the idea of “the use of an RFID implant which is shot into the body by means of a large hypodermic needle. The chip can be read when a scanner is passed over the area where it lurks in the fatty tissue below the surface of the skin.” [17] There actually is a company, VeriChip Corporation, that is not at all shy to publicise its basic ideal: “RFID for people.” The motives include ‘patient identification,’ ‘infant protection,’ ‘wander prevention,’ and ‘emergency management’ among many others.[18]
Although in real practice very few people have so far been chipped, further practices are to come.[19] The US Food and Drug Administration has already approved the RFID tagging technology for medical purposes.[20] Additionally, in 2004, the students of an elementary and middle school in a small town in California were required to wear RFID badges around their necks to test the technology.[21] Such practices show how serious the manufacturers and the state are about actually launching a nationwide program with RFID tagged individuals.
Duplication problem
As mentioned above, RFID chips are easily copyable unless they are protected with metal shields. Talking about the chips inserted into human body, it would be much more difficult to protect the chips from transmitting of information, as they can easily be read by any scanner/ reader placed at a certain distance, and duplicating the tag is not really a problem once the information the tag bears is recognised, therefore posing a threat to individuals’ personal data, challenging computer geniuses’ ability to hack into the system. [22] It means that today people are able to forge passports and any other different forms of ID cards, tomorrow they will copy others’ RFID tags. The problem is, RFID tags will probably carry all the key information about one individual – library records, insurance status, educational background, criminal record, family records, etc. It is difficult to believe that it will create peace among people, and there will not be people using their financial power to exploit others.
State power on individuals
The United States Patent Agency approved the “combination ID/ tag holder” in 2004, stating that the “invention can be used in conjunction with an automated attendance monitoring system to monitor attendance of students or other individuals whose whereabouts need to be tracked.”[23] It remains to be seen who will decide who ‘the individuals’ in question, whose whereabouts need to be tracked, would be. If the RFID project is launched in a country, it is not convincing at all to believe that state would not have the ultimate power to manage it with the excuse of ‘securing national safety’.
Supplying the state with that much information about the people living in one country, it only takes little imagination to come up with the ways it can be used against the people who might have the little bit of disagreement with the ways of the state. Henry Porter states his point of view against NIR (National Identity Register) in the UK, which can be perceived as a simplified form of RFID tags:
- “Every time you get a library card, make a hire-purchase agreement, apply for a fishing or gun licence, buy a piece of property, withdraw a fairly small amount of your money from your bank, take a prescription to your chemist, apply for a resident's parking permit, buy a plane ticket, or pay for your car to be unclamped you will be required to swipe your card and the database will silently record the transaction. There will be almost no part of your life that the state will not be able to inspect. And it will be able to use the database to draw very precise conclusions about the sort of person you are - your spending habits, your ethnicity, your religion, your political leanings, your health and even perhaps your sexual preferences. Little wonder that MI5 desired - and was granted - free access to the database. Little wonder that the police, customs and tax authorities welcome the database as a magnificent aid to investigation.”[24]
To give the topic a more simplistic look, people on the street are also scared by the rise of RFID technology. A concerned citizen states his fears about tagging people in one of the RFID blogs:
- “Today RFID is optional, but twenty years from now it may be mandatory. In fact, it might be required to be implanted at birth. Today a scanner may need to be within three inches, but in twenty years it might be detectable from a satellite, a moving car, or fixed scanners in businesses or on power poles where cameras are currently positioned in residential neighbourhoods.”[25]
Just imagining that it would be the case, that everyone is tagged with RFID chips, prisoners are kept safe, products tracked by owners, children safe in classes. In the frame of a catastrophe scenario, one would wonder what would happen to people of different colour, race, political view, religion, gender, etc., if, by any chance, countries give in to dictatorships. This might sound like a worst case, but we need not think that further to imagine what kind of power we would be handing to authorities with our personal data.
Resources
- ARS Technica website, “RFID chips can carry viruses,” 15 March 2006, accessed 22 November 2008.
- Best, Jo, “Schoolchildren to be RFID-chipped,” Silicon website, 08 July 2004, accessed 19 November 2008.
- CNET website, “FDA approves injecting ID chips in patients,” 13 October 2004, accessed 22 November 2008.
- CNET website, “The man with the RFID arm,” 15 February 2005, accessed 22 November 2008.
- Free Patents Online website, Combination ID/ tag holder, accessed 22 November 2008.
- Morton, Simon, “Barcelona clubbers get chipped,” BBC News website, 29 September 2004, accessed 19 November 2008.
- Porter, Henry, Guardian website, “Beware of card tricks,” 11 July 2006, accessed 19 November 2008.
- Porter, Henry, Henry Porter website, “Surveillance is really getting under my skin,” 19 November 2006, accessed 22 November 2008.
- RFID Journal website, accessed 19 November 2008.
- Rieback, M.R., et al., RFID Virus website, “Is Your Cat Infected with a Computer Virus?” IEEE PerCom 2006, accessed 22 November 2008.
- Rieback, M.R., et al., RFID Virus website, Vrije Universiteit Amsterdam, Department of Computer Science, “RFID Viruses and Worms,” last modified 02 March 2006, accessed 22 November 2008.
- RSA Laboratories website, “RFID Privacy and Security”, accessed 22 November 2008.
- VeriChip Corporation, accessed 22 November 2008.]
- Work Permit website, Global immigration news, “New hi-tech RFID passports hacked and cloned,” 04 August 2006, accessed 22 November 2008.
- Zetter, Kim, Wired website, “School RFID Plan Gets an F,” 02 October 2005, accessed 22 November 2008.
Further Reading
- Ahmad, Muhammad Idrees, The Fanonite website, “Fortress Britain,” 26 June 2008, accessed 23 November 2008.
- Broache, Anne, ZDnet website, “Tech industry attacks state anti-RFID laws,” 20 April 2006, accessed 23 November 2008.
- Juels, Ari, RSA Laboratories website, “RFID Security and Privacy: A Research Survey,” 28 September 2005, accessed 23 November 2008.
- Kharif, Olga, Business Week website, “RFID’s Second Wave,” 09 August 2005, accessed 23 November 2008.
- Kravets, David, Wired website, “Farmers See ‘Mark of the Beast’ in RFID Livestock Tags,” 09 September 2008, accessed 23 November 2008.
- Porter, Henry, Henry Porter website, “We don’t need ID cards,” 06 November 2006, accessed 23 November 2008.
- Slack, James, Daily Mail website, “Royal Mail, shops and private firms to bid for right to fingerprint us for new ID cards,” 06 November 2008, accessed 23 November 2008.
- Williams, Chris, The Register website, “Schoolkid chipping trial ‘a success’,” 22 October 2007, accessed 23 November 2008.
Notes and References
- ↑ RFID Journal website, accessed 19 November 2008.
- ↑ RFID Journal website, accessed 19 November 2008.
- ↑ See the RFID Journal website for links to companies that have been using the technology.
- ↑ RFID Journal website, accessed 19 November 2008.
- ↑ RFID Journal website, accessed 19 November 2008.
- ↑ Henry Porter website, “Surveillance is really getting under my skin,” by Henry Porter, 19 November 2006, accessed 22 November 2008.
- ↑ Work Permit website, Global immigration news, “New hi-tech RFID passports hacked and cloned,” 04 August 2006, accessed 22 November 2008.
- ↑ Work Permit website, Global immigration news, “New hi-tech RFID passports hacked and cloned,” 04 August 2006, accessed 22 November 2008.
- ↑ Henry Porter website, “Surveillance is really getting under my skin,” by Henry Porter, 19 November 2006, accessed 22 November 2008.
- ↑ RFID Virus website, Vrije Universiteit Amsterdam, Department of Computer Science, “RFID Viruses and Worms,” by Melanie R. Rieback, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum, last modified 02 March 2006, accessed 22 November 2008.
- ↑ See also RFID Virus website, “Is Your Cat Infected with a Computer Virus?” by Melanie R. Rieback, Bruno Crispo, and Andrew S. Tanenbaum, IEEE PerCom 2006, accessed 22 November 2008.
- ↑ ARS Technica website, “RFID chips can carry viruses,” 15 March 2006, accessed 22 November 2008.
- ↑ RSA Laboratories website, “RFID Privacy and Security”, accessed 22 November 2008.
- ↑ RSA Laboratories website, “RFID Privacy and Security”, accessed 22 November 2008.
- ↑ BBC News website, “Barcelona clubbers get chipped,” by Simon Morton, 29 September 2004, accessed 19 November 2008.
- ↑ Silicon website, “Schoolchildren to be RFID-chipped,” by Jo Best, 08 July 2004, accessed 19 November 2008.
- ↑ Henry Porter website, “Surveillance is really getting under my skin,” by Henry Porter, 19 November 2006, accessed 22 November 2008.
- ↑ VeriChip Corporation, accessed 22 November 2008.
- ↑ CNET website, “The man with the RFID arm,” 15 February 2005, accessed 22 November 2008.
- ↑ CNET website, “FDA approves injecting ID chips in patients,” 13 October 2004, accessed 22 November 2008.
- ↑ Wired website, “School RFID Plan Gets an F,” by Kim Zetter, 02 October 2005, accessed 22 November 2008.
- ↑ Henry Porter website, “Surveillance is really getting under my skin,” by Henry Porter, 19 November 2006, accessed 22 November 2008.
- ↑ Free Patents Online website, Combination ID/ tag holder, accessed 22 November 2008.
- ↑ Guardian website, “Beware of card tricks,” by Henry Porter, 11 July 2006, accessed 22 November 2008.
- ↑ CNET website, “The man with the RFID arm,” Blogs, posted 16 February 2005, accessed 22 November 2008.