1 Allwin Initiative for Corporate Citizenship Dartmouth Center for the Advancement of Learning Dickey Center Ethics Institute Institute for Security Technology Studies Leslie Center Rockefeller Center Tucker Foundation
2 Wireless ID Issues: Privacy, Efficiency and Security Panelists Kevin Fu Frank Moss Deirdre Mulligan Charles Palmer Sanjay Sarma
3 Panel Outline RFID introduction (Kevin Fu) e-passports (Frank Moss) Privacy of e-passports (Deirdre Mulligan) Human identification (Charles Palmer) Supply chain security (Sanjay Sarma) Computer Science rfid-cusp.org
4 Panel Format Short presentations by each panelist Q/A Final comments by each panelist Computer Science rfid-cusp.org
5 Wireless ID Issues: Privacy, Efficiency and Security Kevin Fu UMass Amherst, Comp. Sci.
6 RFID tags in a nutshell Originally simple bar code replacement Now are mini, low-power computers Applications E-commerce Public transportation Pharmaceutical anti-counterfeiting Medical applications Computer Science rfid-cusp.org
7 What s a Radio-Frequency Identification (RFID) tag? Chip (IC) Antenna Computer Science rfid-cusp.org
8 Capabilities of basic RFID tags Often no tethered power Limited memory Limited computational power Debatable read ranges Computer Science rfid-cusp.org
9 Case Study: RFID Credit Cards
10 What are RFID Credit Cards? No-swipe credit card fastest acceptance of new payment technology in the history of the industry. [VISA; As reported in the Boston Globe, August 14 th 2006] Computer Science rfid-cusp.org
11 Video from ABC News not included in this PDF Computer Science rfid-cusp.org
12 Wireless ID Issues: Privacy, Efficiency and Security Frank Moss U.S. Dept. of State (ret.) No slides available - see prepared remarks
13 Wireless ID Issues: Privacy, Efficiency and Security Deirdre Mulligan UC Berkeley, School of Law
14 Embedded RFID and Everyday Things: A Case Study of the Security & Privacy Risks of the e-passport Jennifer King Marci Meingast Deirdre Mulligan University of California, Berkeley
15 An Interdisciplinary Approach Prof. Deirdre K. Mulligan - Director of the Samuelson Law, Technology, & Public Policy Clinic, Boalt School of Law Marci Meingast - Ph.D student, Dept. of Electrical Engineering & Computer Science Jennifer King - Information Scientist & Research Specialist, Samuelson Clinic
16 Talk Outline Traditional and new uses of RFID Privacy and security threats posed The e-passport Case Study Timeline Issues posed by adoption process Recommendations for future embedded RFID implementations affecting the public
17 Terminology RFID: Any technology that transmits specific identifying numbers using radio. [Garfinkel 05] Ubiquitous computing: Making many computers available throughout the physical environment, but making them effectively invisible to the user. [Weiser 93]
18 Evolving Uses of RFID Past: livestock tagging, inventory management Present: proximity cards, library books, government issued ID, limited consumer products (Nike+iPod, car keys) Future: clothing, paper clips, money...?
19 Concerns with evolution in RF applications Ubiquity - when the product is a payment card, ID card, etc., object is carried through public places Data - static, can be linked to individuals User awareness - user may not realize the object contains a transponder Signaling - object may not notify the user when data is read
20 Threats to Privacy Loss of control over personal data Leak data without knowledge Others can access your data without consent Context is important What you wish to reveal about yourself is situationally dependent Place (home vs. public place) matters
21 The e-passport: A Case Study Result of the Enhanced Border Security and Visa Entry Reform Act of 2002 US chose to adopt the ICAO s directive 9303 First issued to the public Dec. 06 Contains an ISO14443 compliant contactless smart card chip with 64K memory Benefits: document security, improved port of entry performance
22 Original Specifications Chip stores all data contained on identification page: Name Nationality Gender Date & place of birth Issuing country & date Expiration date Passport number & type JPEG of passport photo Data digitally signed but not encrypted No anti-skimming or eavesdropping countermeasures
23 ISO Chips are 14443A or B compliant when they conform to: Standardized physical architecture Radio frequency power and signal interface (13.56mhz) Initialization, anti-collision, and transmission protocols Passive chip, powered by reader Standard does not explicitly address: Chip or reader OS (proprietary to each vendor) Read range (generally assumed to be a max of 4cm/ 10in)
24 Security Vulnerabilities of Original Passport Design Eavesdropping Intercept communications between the reader & the passport Skimming Surreptitiously read data from the passport (esp. in public areas) These methods can be used to: Identify passport holders (by name or nationality) Hotlist/track individuals Clone (done successfully by Lukas Grunwald in 2006)
25 US Dept. of State s Initial Stance Passport data did not require protection because: Identical to data currently printed on passport Security measures cause longer read times Encryption requires global coordination Overlooks fundamental change to passport Document --> technological artifact
26 Changes to the e-passport Late 2004 incorporated anti-skimming material into outside cover of the passport Spring 2005 commissioned NIST to conduct skimming vulnerability tests (results still not released) April 2005 State admits passports can be read at one meter (3 feet) or more October 2005 announces the adoption of Basic Access Control. Changes driven by: Response to requests for comments by public: 2,335 comments were received by the State Department: 98.5 percent were negative most focused on security and privacy concerns Negative press highlighting the lack of privacy protections in the original design
27 Problems with Process Privacy Impact Assessment failed to assess privacy concerns of passport holders Rule Making & Comment - conducted, but late in process, and info provided to public was minimal, lack of support No focus on needs of passport holders Lack of expert analysis and scientific assessment No outside or expert assessments No independent testing
28 Recommendations If RFID is an appropriate choice: Employ user-centric design to ensure users security & privacy needs are met Err on side of privacy: protect user data Give users control - opt-outs should be possible, provide feedback, allow user to choose when transponder is activated Engage with the public Establish trust - develop policy guidelines outlining how data is collected and managed
29 Wireless ID Issues: Privacy, Efficiency and Security Charles Palmer IBM Research
30 People can track RFID s, but RFID s can t (reliably) track people
31 The Use of RFID for Human Identity Verification * The Dec 2006 report from DHS s Data Privacy & Integrity advisory committee provided advice on how to decide if RFID is a good choice to identify and/or verify the presence of an individual, and best practices on the use of RFID in such situations when they are selected or required by law. *
32 Like most new technologies, RFID brings good news... Potential for better accuracy, speed, & efficiency Improved forgery prevention and tamper resistance Easier recovery of lost ID s and detection of their fraudulent use
33 ... and bad news Unauthorized access to data on the RFID or to the data when in transit to/from the reader Data gathered for one purpose might be reused for another Potential for surveillance of RFID-bearing individuals
34 Will children be playing RFID-Tag Tag in the Future?
35 The real issue with using RFID for identity verification RFID in a credential merely identifies the credential, not the individual bearing it. Thus, RFID alone is insufficient to reliably verify identity.
36 Case Study: The Border Challenge For non-citizens entering a country, the government want to know... Who s coming across, where are they going, and when do they plan to leave, and then When did they leave and where? All without impeding commerce
37 How many people? In 2005, 366,984 buses and trucks crossed the border into the US at Blaine, WA, or about 1000/day, not including private vehicles or cars. Operating 24x7x365, this means 85 seconds per vehicle... Adding a few seconds per vehicle could exceed 24 hours/day.
38 How RFID might help Each person entering the country is given an I-94 card with a unique RFID chip in it On entry, the I94 # is stored with collected ID information (e.g., fingerprints) On exit, a simple scan of the I94 would bring up the record, including any new info since entry into the US. This could be done without exiting the vehicle. Prepositioning of this data is also a safety improvement for the border guards.
39 DHS began a pilot test at several US borders They tried really hard to address privacy concerns... no personal information will be included on the RFID tag, and the serial number on the tag cannot be changed. Additionally, personal information is only processed within DHS databases and RFID technology tags are tamper-proof and difficult to counterfeit, with security features to prevent the misuse of information... The problem here was that RFID wasn t the right choice for the problem
40 Tracking the credential just isn t the same To speed up the exit process, all of the RFID-enabled I94 s in the vehicle would be read while the vehicle is moving (slowly). If no reason to stop them came up, the vehicle would proceed without stopping. All of the I94 s in the vehicle would be marked as having exited the US.
41 Who really left the country? But there were some serious problems The RFID-enabled I94 could be read whether or not it was with the corresponding person Reading all the I94 s in a vehicle proved unreliable, and readers in different lanes read I94 s from vehicles in other lanes. The pilot program was deemed a failure
42 RFID is good for tracking things that don t mind being tracked For people, it seems RFID is only reliable when they gain a real benefit, or when it is combined with a second form of identity verification. Otherwise, you can never be sure what you re tracking.
43 Wireless ID Issues: Privacy, Efficiency and Security Sanjay Sarma MIT, Mechanical Eng. No slides available
44 Wireless ID Issues: Privacy, Efficiency and Security Question/Answer
45 Wireless ID Issues: Privacy, Efficiency and Security Final Remarks
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
Introduction to Online Identity Management By Thomas J. Smedinghoff 1 1. Identity Management Basics... 3 (a) Identification... 4 (1) Scope and Accuracy... 5 (2) Issuance of Credential... 6 (b) Authentication...
Card-Not-Present Fraud Working Committee White Paper: Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud Version 1.0 Date: April 2015 About the EMV Migration Forum The EMV Migration
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
GAO United States Government Accountability Office Report to Congressional Committees September 2012 INFORMATION SECURITY Better Implementation of Controls for Mobile Devices Should Be Encouraged GAO-12-757
New York State Office of the State Comptroller Division of Local Government and School Accountability LOCAL GOVERNMENT MANAGEMENT GUIDE Information Technology Governance Thomas P. DiNapoli State Comptroller
BELGIAN CYBER SECURITY GUIDE PROTECT YOUR INFORMATION This Guide and the accompanying documents have been produced jointly by ICC Belgium, FEB, EY, Microsoft, L-SEC, B-CCENTRE and ISACA Belgium. All texts,
ICC CYBER SECURITY GUIDE FOR BUSINESS ICC CYBER SECURITY GUIDE FOR BUSINESS Acknowledgements The ICC Cyber security guide for business was inspired by the Belgian Cyber security guide, an initiative of
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
International Civil Aviation Organization WORKING PAPER TAG/MRTD/21-WP/4 22/11/12 Revised 05/12/12 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTY-FIRST MEETING
6100-010588 FINAL REPORT OF FINDINGS Investigation into the personal information handling practices of WhatsApp Inc. January 15, 2013 REPORT OF FINDINGS Our File: 6100-010588 Complaints under the Personal
7 LAWS OF IDENTITY THE CASE FOR PRIVACY-EMBEDDED LAWS OF IDENTITY IN THE DIGITAL AGE Ann Cavoukian, Ph.D. Information and Privacy Commissioner of Ontario Commissioner Ann Cavoukian gratefully acknowledges
Mobile App Privacy: The Hidden Risks Christopher G. Cwalina, Richard Raysman and Steven B. Roosa, Holland & Knight LLP with PLC Intellectual Property & Technology This is just one example of the many online
Security Architecture for the TEAMDEC System Haiyuan Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the degree
Title: Author: Editors: : Forensic Implications of Identity Management Systems WP6 Zeno Geradts (NFI, The Netherlands) Peter Sommer (LSE, UK) Reviewers: Martin Meints (ICPP, Germany) Mark Gasson (University
NRECA / Cooperative Research Network Smart Grid Demonstration Project Guide to Developing a Cyber Security and Risk Mitigation Plan DOE Award No: DE-OE0000222 National Rural Electric Cooperative Association,
Network Security: History, Importance, and Future University of Florida Department of Electrical and Computer Engineering Bhavya Daya ABSTRACT Network security has become more important to personal computer
V 1.0 November, 2010 CYBERSECURITY The protection of data and systems in networks that connect to the Internet 10 Best Practices For The Small Healthcare Environment Your Regional Extension Center Contact
Payment and Security Experts Implementing PCI A Guide for Network Security Engineers Updated For PCI Data Security Standard Version 1.2.1 Tom Arnold, CISSP, ISSMP, CFS, CPISM/A, PCI/QSA Partner, PSC Sponsored
Know your law Guide respecting the management of technology-based documents An Act to establish a legal framework for information technology (R.S.Q., C-1.1) ACKNOWLEDGEMENTS This Guide respecting the management
Copyright Online Tech 2012. All Rights Reserved. page 1 of 36 HIPAA Compliant Data Centers 1.0. Executive Summary... 3 2.0. Impact of HITECH and HIPAA on Data Centers... 3 3.0. What is a HIPAA Compliant
Physical Access Control System (PACS) in a Federal Identity, Credentialing and Access Management (FICAM) Framework PACS Best Practices using PKI-Authentication A SIA White Paper Security Industry Association
SMART CARD CONTENT SECURITY Defining tamperproof for portable smart media AUTHOR: Stefano Zanero ( email@example.com ) Dipartimento di Elettronica e Informazione Politecnico di Milano Version 1.0 This
ISMS User s Guide for Medical Organizations Guidance on the Application of ISMS Certification Criteria (Ver.2.0) ISMS: Information Security Management System 8 November 2004 Japan Information Processing