By Annalee Newitz
They can steal your smartcard, lift your passport, jack your car, even clone the chip in your arm. And you won’t feel a thing.
James Van Bokkelen is about to be robbed. A wealthy software entrepreneur, Van Bokkelen will be the latest victim of some punk with a laptop. But this won’t be an email scam or bank account hack. A skinny 23-year-old named Jonathan Westhues plans to use a cheap, homemade USB device to swipe the office key out of Van Bokkelen’s back pocket.
“I just need to bump into James and get my hand within a few inches of him,” Westhues says. We’re shivering in the early spring air outside the offices of Sandstorm, the Internet security company Van Bokkelen runs north of Boston. As Van Bokkelen approaches from the parking lot, Westhues brushes past him. A coil of copper wire flashes briefly in Westhues’ palm, then disappears.
Van Bokkelen enters the building, and Westhues returns to me. “Let’s see if I’ve got his keys,” he says, meaning the signal from Van Bokkelen’s smartcard badge. The card contains an RFID sensor chip, which emits a short burst of radio waves when activated by the reader next to Sandstorm’s door. If the signal translates into an authorized ID number, the door unlocks.
The coil in Westhues’ hand is the antenna for the wallet-sized device he calls a cloner, which is currently shoved up his sleeve. The cloner can elicit, record, and mimic signals from smartcard RFID chips. Westhues takes out the device and, using a USB cable, connects it to his laptop and downloads the data from Van Bokkelen’s card for processing. Then, satisfied that he has retrieved the code, Westhues switches the cloner from Record mode to Emit. We head to the locked door.
“Want me to let you in?” Westhues asks. I nod.
He waves the cloner’s antenna in front of a black box attached to the wall. The single red LED blinks green. The lock clicks. We walk in and find Van Bokkelen waiting.
“See? I just broke into your office!” Westhues says gleefully. “It’s so simple.” Van Bokkelen, who arranged the robbery “just to see how it works,” stares at the antenna in Westhues’ hand. He knows that Westhues could have performed his wireless pickpocket maneuver and then returned with the cloner after hours. Westhues could have walked off with tens of thousands of dollars’ worth of computer equipment – and possibly source code worth even more. Van Bokkelen mutters, “I always thought this might be a lousy security system.”
RFID chips are everywhere – companies and labs use them as access keys, Prius owners use them to start their cars, and retail giants like Wal-Mart have deployed them as inventory tracking devices. Drug manufacturers like Pfizer rely on chips to track pharmaceuticals. The tags are also about to get a lot more personal: Next-gen US passports and credit cards will contain RFIDs, and the medical industry is exploring the use of implantable chips to manage patients. According to the RFID market analysis firm IDTechEx, the push for digital inventory tracking and personal ID systems will expand the current annual market for RFIDs from $2.7 billion to as much as $26 billion by 2016.
RFID technology dates back to World War II, when the British put radio transponders in Allied aircraft to help early radar system crews detect good guys from bad guys. The first chips were developed in research labs in the 1960s, and by the next decade the US government was using tags to electronically authorize trucks coming into Los Alamos National Laboratory and other secure facilities. Commercialized chips became widely available in the ’80s, and RFID tags were being used to track difficult-to-manage property like farm animals and railroad cars. But over the last few years, the market for RFIDs has exploded, driven by advances in computer databases and declining chip prices. Now dozens of companies, from Motorola to Philips to Texas Instruments, manufacture the chips.
The tags work by broadcasting a few bits of information to specialized electronic readers. Most commercial RFID chips are passive emitters, which means they have no onboard battery: They send a signal only when a reader powers them with a squirt of electrons. Once juiced, these chips broadcast their signal indiscriminately within a certain range, usually a few inches to a few feet. Active emitter chips with internal power can send signals hundreds of feet; these are used in the automatic toll-paying devices (with names like FasTrak and E-ZPass) that sit on car dashboards, pinging tollgates as autos whiz through.
For protection, RFID signals can be encrypted. The chips that will go into US passports, for example, will likely be coded to make it difficult for unauthorized readers to retrieve their onboard information (which will include a person’s name, age, nationality, and photo). But most commercial RFID tags don’t include security, which is expensive: A typical passive RFID chip costs about a quarter, whereas one with encryption capabilities runs about $5. It’s just not cost-effective for your average office building to invest in secure chips.
This leaves most RFIDs vulnerable to cloning or – if the chip has a writable memory area, as many do – data tampering. Chips that track product shipments or expensive equipment, for example, often contain pricing and item information. These writable areas can be locked, but often they aren’t, because the companies using RFIDs don’t know how the chips work or because the data fields need to be updated frequently. Either way, these chips are open to hacking.
“The world of RFID is like the Internet in its early stages,” says Ari Juels, research manager at the high tech security firm RSA Labs. “Nobody thought about building security features into the Internet in advance, and now we’re paying for it in viruses and other attacks. We’re likely to see the same thing with RFIDs.”
David Molnar is a soft-spoken computer science graduate student who studies commercial uses for RFIDs at UC Berkeley. I meet him in a quiet branch of the Oakland Public Library, which, like many modern libraries, tracks most of its inventory with RFID tags glued inside the covers of its books. These tags, made by Libramation, contain several writable memory “pages” that store the books’ barcodes and loan status.
Brushing a thatch of dark hair out of his eyes, Molnar explains that about a year ago he discovered he could destroy the data on the books’ passive-emitting RFID tags by wandering the aisles with an off-the-shelf RFID reader-writer and his laptop. “I would never actually do something like that, of course,” Molnar reassures me in a furtive whisper, as a nonbookish security guard watches us.
Our RFID-enabled checkout is indeed quite convenient. As we leave the library, we stop at a desk equipped with a monitor and arrange our selections, one at a time, face up on a metal plate. The titles instantly appear onscreen. We borrow four books in less than a minute without bothering the librarian, who is busy helping some kids with their homework.
Molnar takes the books to his office, where he uses a commercially available reader about the size and heft of a box of Altoids to scan the data from their RFID tags. The reader feeds the data to his computer, which is running software that Molnar ordered from RFID-maker Tagsys. As he waves the reader over a book’s spine, ID numbers pop up on his monitor.
“I can definitely overwrite these tags,” Molnar says. He finds an empty page in the RFID’s memory and types “AB.” When he scans the book again, we see the barcode with the letters “AB” next to it. (Molnar hastily erases the “AB,” saying that he despises library vandalism.) He fumes at the Oakland library’s failure to lock the writable area. “I could erase the barcodes and then lock the tags. The library would have to replace them all.”
Frank Mussche, Libramation’s president, acknowledges that the library’s tags were left unlocked. “That’s the recommended implementation of our tags,” he says. “It makes it easier for libraries to change the data.”
For the Oakland Public Library, vulnerability is just one more problem in a buggy system. “This was mostly a pilot program, and it was implemented poorly,” says administrative librarian Jerry Garzon. “We’ve decided to move ahead without Libramation and RFIDs.”
But hundreds of libraries have deployed the tags. According to Mussche, Libramation has sold 5 million RFID tags in a “convenient” unlocked state.
While it may be hard to imagine why someone other than a determined vandal would take the trouble to change library tags, there are other instances where the small hassle could be worth big bucks. Take the Future Store. Located in Rheinberg, Germany, the Future Store is the world’s preeminent test bed of RFID-based retail shopping. All the items in this high tech supermarket have RFID price tags, which allow the store and individual product manufacturers – Gillette, Kraft, Procter & Gamble – to gather instant feedback on what’s being bought. Meanwhile, shoppers can check out with a single flash of a reader. In July 2004, Wired hailed the store as the “supermarket of the future.” A few months later, German security expert Lukas Grunwald hacked the chips.
Grunwald cowrote a program called RFDump, which let him access and alter price chips using a PDA (with an RFID reader) and a PC card antenna. With the store’s permission, he and his colleagues strolled the aisles, downloading information from hundreds of sensors. They then showed how easily they could upload one chip’s data onto another. “I could download the price of a cheap wine into RFDump,” Grunwald says, “then cut and paste it onto the tag of an expensive bottle.” The price-switching stunt drew media attention, but the Future Store still didn’t lock its price tags. “What we do in the Future Store is purely a test,” says the Future Store spokesperson Albrecht von Truchsess. “We don’t expect that retailers will use RFID like this at the product level for at least 10 or 15 years.” By then, Truchsess thinks, security will be worked out.
Today, Grunwald continues to pull even more-elaborate pranks with chips from the Future Store. “I was at a hotel that used smartcards, so I copied one and put the data into my computer,” Grunwald says. “Then I used RFDump to upload the room key card data to the price chip on a box of cream cheese from the Future Store. And I opened my hotel room with the cream cheese!”
Aside from pranks, vandalism, and thievery, Grunwald has recently discovered another use for RFID chips: espionage. He programmed RFDump with the ability to place cookies on RFID tags the same way Web sites put cookies on browsers to track returning customers. With this, a stalker could, say, place a cookie on his target’s E-ZPass, then return to it a few days later to see which toll plazas the car had crossed (and when). Private citizens and the government could likewise place cookies on library books to monitor who’s checking them out.
Juels is now looking into the security of the new US passports, the first of which were issued to diplomats this March. Frank Moss, deputy assistant secretary of state for passport services, claims they are virtually hack-proof. “We’ve added to the cover an anti-skimming device that prevents anyone from reading the chip unless the passport is open,” he says. Data on the chip is encrypted and can’t be unlocked without a key printed in machine-readable text on the passport itself.
But Juels still sees problems. While he hasn’t been able to work with an actual passport yet, he has studied the government’s proposals carefully. “We believe the new US passport is probably vulnerable to a brute-force attack,” he says. “The encryption keys in them will depend on passport numbers and birth dates. Because these have a certain degree of structure and guessability, we estimate that the effective key length is at most 52 bits. A special key-cracking machine could probably break a passport key of this length in 10 minutes.”
I’m lying facedown on an examination table at UCLA Medical Center, my right arm extended at 90 degrees. Allan Pantuck, a young surgeon wearing running shoes with his lab coat, is inspecting an anesthetized area on the back of my upper arm. He holds up something that looks like a toy gun with a fat silver needle instead of a barrel.
I’ve decided to personally test-drive what is undoubtedly the most controversial use of RFIDs today – an implantable tag. VeriChip, the only company making FDA-approved tags, boasts on its Web site that “this ‘always there’ identification can’t be lost, stolen, or duplicated.” It sells the chips to hospitals as implantable medical ID tags and is starting to promote them as secure-access keys.
Pantuck pierces my skin with the gun, delivering a microchip and antenna combo the size of a grain of long rice. For the rest of my life, a small region on my right arm will emit binary signals that can be converted into a 16-digit number. When Pantuck scans my arm with the VeriChip reader – it looks sort of like the wand clerks use to read barcodes in checkout lines – I hear a quiet beep, and its tiny red LED display shows my ID number.
Three weeks later, I meet the smartcard-intercepting Westhues at a greasy spoon a few blocks from the MIT campus. He’s sitting in the corner with a half-finished plate of onion rings, his long blond hair hanging in his face as he hunches over the cloner attached to his computer.
Because the VeriChip uses a frequency close to that of many smartcards, Westhues is pretty sure the cloner will work on my tag. Westhues waves his antenna over my arm and gets some weird readings. Then he presses it lightly against my skin, the way a digital-age pickpocket could in an elevator full of people. He stares at the green waveforms that appear on his computer screen. “Yes, that looks like we got a good reading,” he says.
After a few seconds of fiddling, Westhues switches the cloner to Emit and aims its antenna at the reader. Beep! My ID number pops up on its screen. So much for implantable IDs being immune to theft. The whole process took 10 minutes. “If you extended the range of this cloner by boosting its power, you could strap it to your leg, and somebody passing the VeriChip reader over your arm would pick up the ID,” Westhues says. “They’d never know they hadn’t read it from your arm.” Using a clone of my tag, as it were, Westhues could access anything the chip was linked to, such as my office door or my medical records.
John Proctor, VeriChip’s director of communications, dismisses this problem. “VeriChip is an excellent security system, but it shouldn’t be used as a stand-alone,” he says. His recommendation: Have someone also check paper IDs.
But isn’t the point of an implantable chip that authentication is automatic? “People should know what level of security they’re getting when they inject something into their arm,” he says with a half smile.
They should – but they don’t. A few weeks after Westhues clones my chip, Cincinnati-based surveillance company CityWatcher announces a plan to implant employees with VeriChips. Sean Darks, the company’s CEO, touts the chips as “just like a key card.” Indeed.