[LINK] Industry Reply on e-Passport Cloning
Adam Todd
link at todd.inoz.com
Fri Aug 11 20:53:54 AEST 2006
Did I not mention this a week ago :) (Probably end up in the Supreme Court
on those comments too!)
Creating a mechanism that clones data and is able to re transmit or cause
to be transmitted is easy.
In fact, if you sat near a scanner with a sensitive enough receiver, you
could easily record the data stream - say up to 4 meters away would be
sufficient.
After recording a dozen data streams at an airport check point, you could
easily create clone data, and transmit them in place of the real passports
that are being scanned using a more powerful transmitter.
This is rudimentary communications, lets not get into encryption and
handshakes and such, because there has to be something common each way to
make it all work and as it's wireless it's open to intercept.
At 04:56 PM 11/08/2006, Geoffrey Ramadan wrote:
>Industry reply on e-passport cloning.
>http://www.rfidjournal.com/article/articleview/2559/1/1/
>
>Some choice comments:
>"However, Grunwald merely cloned the data on the IC inside his passport.
>He did not counterfeit the passport, nor did he manipulate the data."
>
>"Cloning a passport's inlay, according to the Smart Card Alliance, would
>be no different than stealing someone else's passport and trying to
>present that as your own at a border entry point."
>
>"What this person has done is neither unexpected nor really all that
>remarkable,"
>
>--
>Reg
>
>Geoffrey Ramadan B.E.(Elec)
>Chairman, Automatic Data Capture Association (www.adca.com.au)
>and
>Managing Director, Unique Micro Design (www.umd.com.au)
>
>_______________________________________________
>Link mailing list
>Link at mailman.anu.edu.au
>http://mailman.anu.edu.au/mailman/listinfo/link
>
More information about the Link
mailing list