Here is a short piece on how a researcher, Chris Paget, bought a $250 RFID reader on eBay and used it to clone ePassports while driving 30 miles an hour near Fisherman’s Wharf in San Francisco. I fully recognize that this demonstration doesn’t represent a method for fabricating complete paper-in-hand cloned passports. Cloning is just the first step, but it is a big step. More importantly, it is a step that the State department has is somewhere between impossible and unlikely. The following is a passage from the privacy impact assessment (PIA) of TDIS – the Travel Document Issuance System:
The Department of State has taken extensive measures to prevent a third-party from reading or accessing the information on the chip without the passport holder’s knowledge. This includes safeguards against such nefarious acts as “skimming” data from the chip, “eavesdropping” on communications between the chip and reader, “tracking” passport holders, and “cloning” the passport chip in order to facilitate identity theft crimes. These safeguards are described in detail on the Department of State website.
Apparently those safeguards aren’t very strong.
I invite you to read the State Department’s FAQ on e-Passports. Notice the incredibly defensive tone in the opening of the answer to the question, “Will someone be able to read or access the information on the chip without my knowledge (also known as skimming or eavesdropping)?” Also notice the tacit acknowledgment that passport RFID chips can be cloned.
Mr. Paget intends on driving around DC this weekend to see what he can clone, and with a macbre sense of humor, I look forward to reading his results.
Until then, I’ll keep my paper passport.