Little Brother: How RFIDs in everyday objects could make easy targets for hackers

By
Page 2 of 2  |  Single page

Even our food supply, starting at the feedlot, has the potential to be 'tracked', based on the creation of RFID ink, which can be used to tattoo livestock - a patent was filed in 2008. This had lead to fears that the same technology could be used to track people in the future, says Computer Weekly.

Little Brother: How RFIDs in everyday objects could make easy targets for hackers

Even today, there are hopes that RFID will track patients and their doctors in the health system of European nations, as explained in a new report ,carried out by the European commission.

Wireless network: RFIDs need bandwidth

For that many RFID tags to transmit over the analogue waveband, there's going to be some serious bandwidth necessary to allocate all those frequencies. Redmond believes that by 2017, there will be over 1 trillion RFID tags in existence, a market worth more than $US25 billion annually.

In a statement made to Vitalisnews, Redmond spoke about the technical need to increase the space (bandwidth) needed for these RFIDs:

"The increased use of RFID chips is going to require the increased use of the UBF [UHF] spectrum. ...They are going to stop using the [UHF] and VHF frequencies in 2009. Everything is going to go digital (in the U.S.). Canada is going to do the same thing", said Redmond.

RFID tracking

The growing number of RFIDs has led to fears that the same technology could be used to track people. The RFID Gazette warns that employers have the upper hand to keep tabs on their employees by insisting on making employees wear the chips, whether it be directly or indirectly (think of a courier or a routine service person).

Everyday smart cards which provide  access to employees into most corporate buildings, contain RFIDs that can tell a boss much more about the employee than a simple swipe to open the door. The data is easily catalogued by a computer and can reveal the times the employee arrives at work, finshes and much more.

But when it comes to RFID hacking, Ebay is proving a winner for enterprising data skimmers, who seek the RFID data. According to a Los Angeles Times report, San Francisco native Chris Paget armed himself with a cheap Motorola reader purchased on the auction site and scanned the hilly streets of his city in search of accessible and unsecured RFIDs.  Which is most of them, really. 

Within an hour Paget had found what he was looking for: the unique serial codes contained in RFID-equipped passports. The test proved how easy it was for people to download the codes and potentially identify people without their knowledge, and silently track the person if they needed too.

The RFID breach already has a name in security circles: Little Brother. And this ability to send and receive data to a reader (or scanner) is happening right across our industrialised world, at airports, through border crossings and even on an ordinary trip to the supermarket.

The future for RFID

For now, the jury is out until more studies are done on the security implications of RFIDs.

Meanwhile, the technology is getting more sophisticated. RFID chips are now so small in fact, that they measure no longer than a grain of rice, if not much smaller.  

Some state laws in Australia even make it mandatory to chip newly purchased cats and dogs in Australia, a bond between man and pet, that keeps us well within the reach of RFIDs whether we like it or not. More troublingly however is the claim that RFID use in our pets may cause cancer.

For more reading, The RFID journal  and RFID Gazette have a great collection of articles and topics on the subject, while Patrick Redmond's lectures on the dangers of RFID can be found on his website.

 

Previous Page 1 2 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Australia's super funds told to assess authentication controls

Australia's super funds told to assess authentication controls

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

The Northern Beaches Women's Shelter hones focus on tech-enabled abuse

The Northern Beaches Women's Shelter hones focus on tech-enabled abuse

Log In

  |  Forgot your password?