https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

content


HID protects its turf

HID protects its turf

RFID security presentation sparks brouhaha
  • Written by Urgent Communications Administrator
  • 1st April 2007

A simple presentation on RFID security by a small consulting firm rapidly snowballed into a news event involving legal threats and the ACLU.

“We partially accomplished our objective, to raise awareness of RFID security,” said Chris Paget, director of research and development at IOActive. “But not in the way we wanted.”

Using information readily available on the Internet along with $20 worth of parts bought on eBay, Paget created a cloning device to duplicate RFID access cards — developed by Irvine, Calif.-based HID Global — that controlled access in and out of his office building. He had planned to discuss the mechanisms and construction of the device in a “RFID for Beginners” talk in February at the Black Hat 2007 security conference, until IOActive received a letter from HID Global alleging that the creation of the device may have infringed upon its patents.

The letter, later posted on the ACLU of Northern California’s Web site, went on to say that presentation and publication of the details concerning the development of the cloning device at Black Hat would subject the company to “further liability.”

Black Hat’s founder and director, Jeff Moss, felt a little déjà vu as IOActive’s printouts were ripped out of briefing books just days before the presentation. “We try to expose vulnerabilities in a vendor-neutral way,” Moss said. “This takes us back to the ‘CiscoGate’ days.”

In 2005, Cisco Systems had threatened to sue a Black Hat presenter for potentially divulging security holes in one of its products and hired temporary staff to rip the presentation from thousands of briefing books.

Why didn’t IOActive get in touch with HID before Paget got busy in the lab? “We didn’t see this as a new issue,” Paget said. “There’s a white paper on HID’s Web site that’s a little over two years old. It states clearly that proximity [RFID] cards can be cloned. … It’s obviously something they’ve known for some time.”

On Feb. 28, IOActive and HID Global fired off a round of statements, with the former announcing the withdrawal of its original presentation from the Black Hat conference, and the latter saying it was surprised by the turn of events. “We did not threaten them to stop the presentation,” said Kathleen Carroll, HID’s director of government relations. “We asked them to amend the presentation so it wouldn’t give specifics protected by patent.”

Carroll added that the company is acutely aware of the ability to clone RFID access cards, but the tripwire was specific documentation of HID’s technology in Paget’s presentation.

“There have been demonstrations of cloning in the past,” Carroll said. “This was the first time our chief technology people were very concerned. It sounded to us in this demonstration that they were going to show source code and schematics, and to us, that was patent infringement.”

According to Carroll, HID doesn’t have a problem with discussing the vulnerabilities of access cards. In fact, in the wake of the IOActive controversy, the company posted an open letter to its customers recommending policies and procedures for protecting existing RFID access cards from compromise.

“I think our company believes that hackers who are responsible do a service,” Carroll said. “But you do that in a responsible way.”

Looking ahead, Paget argues for stronger security measures than simple access cards. “If you just rely on these proximity badges alone, you’re in trouble,” he said. “There are systems like contactless smart cards that can be made secure. Alternatively, combine the RFID card with a second factor layer of authentication, like a PIN pad or a biometric.”

He also points out that cloning RFID access cards isn’t a problem HID can make go away simply by suppressing IOActive’s presentation.

“Anyone with any electronics knowledge can look at the [HID] patent and certainly learn everything they need to construct their own cloner,” Paget said. “And you can consult the various [RFID cloner plans] on line and build it very easily. … [But] we would certainly not recommend anyone else build a cloner because you’ll face the wrath of HID.”

ID-ONLY VERSUS ENCRYPTED RFID TAGS

ID-only tags simply send the same code every time

  • Easy to clone

Encrypted tags handshake with the reader

  • More difficult to clone
  • Many “encrypted” tags can be broken

Active or passive tags can use either method

  • ID-only is far more common

Source: BlackHat

Tags: RFID content Tracking, Monitoring & Control

Most Recent


  • AT&T wireless growth keyed by FirstNet—now provides 24,000 agencies with 4.4 million connections
    AT&T this week reported that FirstNet ended 2022 supporting more than 24,000 public-safety agencies with “about” 4.4 million connections, including 377,000 connections that were added during the last three months of 2022—a total that represents more than half of the carrier’s post-paid wireless growth for the quarter. AT&T officials released these figures in conjunction with […]
  • Report: Remote work causing offices to empty, but walkable cities still in high demand
    Given the reliance on vehicular transportation in the United States, some American cities historically haven’t prioritized being walkable in past planning and or design. But amid an unprecedented shift in the economy toward remote work, those that have are increasingly desirable for prospective residents. A new report from Smart Growth American and Places Platform, “Foot Traffic Ahead […]
  • AT&T FirstNet unleashes robotic dogs for emergency services
    AT&T is releasing robotic hounds from Ghost Robotics as part of the service provider’s FirstNet emergency responder service. In a blog, AT&T VP Lance Spencer explained that the robotic dogs will be connected to AT&T’s network and deployed for public safety, defense, federal and state agencies, local police and fire departments, and commercial customers. “Network-connected robotic dogs can deliver a […]
  • Federal agencies infested by cyberattackers via legit remote-management systems
    It has come to light that hackers cleverly utilized two off-the-shelf remote monitoring and management systems (RMMs) to breach multiple Federal Civilian Executive Branch (FCEB) agency networks in the US last summer. On Jan. 25, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) released […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • The battle over connected cars drags on
  • AI energizes remote monitoring of patients, fuels bidirectional health care
  • APCO, NENA, NASNA speakers cite ‘discussions’ to address NG911 funding issues
  • HID protects its turf
    Newscan: New York transit agency breached by hackers as cyberattacks surge

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

AT&T wireless growth keyed by FirstNet—now provides 24,000 agencies with 4.4 million connections dlvr.it/ShY5qH

27th January 2023
UrgentComm

Report: Remote work causing offices to empty, but walkable cities still in high demand dlvr.it/ShXM7Z

27th January 2023
UrgentComm

AT&T FirstNet unleashes robotic dogs for emergency services dlvr.it/ShW7p8

27th January 2023
UrgentComm

Federal agencies infested by cyberattackers via legit remote-management systems dlvr.it/ShVhn3

26th January 2023
UrgentComm

How 5G is making cities safer, smarter, and more efficient dlvr.it/ShVS1h

26th January 2023
UrgentComm

MCPTT interworking for critical communications dlvr.it/ShTm3P

26th January 2023
UrgentComm

Self-driving cars present terrorism risk, FBI director says dlvr.it/ShTTHx

26th January 2023
UrgentComm

UK Home Office officially will cut ESN ties with Motorola Solutions in December dlvr.it/ShNjfN

24th January 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.