Feeds

How to clone a biometric passport while it's still in the bag

Mail exposes the postal vulnerability

5 things you didn’t know about cloud backup

In an investigation for the Daily Mail, security consultant Adam Laurie has demonstrated how a new UK biometric passport can be cloned without even being removed from its delivery envelope.

The Mail exploit draws on previous work by Laurie and others, and puts together vulnerabilities in the chip technology, and in the chip security and logistics systems used by the Identity & Passport Service.

The data in the chip is essentially a digital version of what is printed inside the passport itself. The printed data can be read if the passport is presented and opened, and the chip's security system attempts to duplicate this process. The chip data can be read wirelessly, but it is encrypted, with the key printed inside the passport. So in theory, although the chip can be read without the passport (or indeed the delivery envelope) being opened, the data is meaningless without the key.

But the key in this first generation of biometric passport is relatively easy to identify/crack. It is not random, but consists of passport number, the passport holder's date of birth and the passport expiry date. The Mail found it relatively easy to identify the holder's date of birth, while the expiry date is 10 years from the issue date, which for a newly-delivered passport would clearly fall within a few days. The passport number consists of a number of predictable elements, including an identifier for the issuing office, so effectively a significant part of the key can be reconstructed from the envelope and its address label.

Laurie established the theory of this last year, but the Mail report puts it into practice. With the cooperation of the applicant, the newly-delivered passport envelope was rerouted, and a working key was identified within four hours. Once this has been done, a fraudster would have all of the information needed to copy the chip, and therefore would be some considerable distance closer to being able to produce an identical copy of the entire passport.

The Mail notes that no proof of identity was required when the passport was delivered, but the vulnerabilities exposed mean that the problem goes far beyond the occasional passport being cloned after its delivery has been intercepted. Because it's feasible to steal the data without detection, it's perfectly possible that insiders could intercept large numbers of the millions of new passports delivered every year.

If, that is, there is a point to doing so. At the moment the value of the data is limited because the chip can only be copied, not changed, so it can only be used as an aid in the forgery of a copy of an existing passport (although some possible exploits based on this are described here). Passport forgers would still have to produce a viable copy of the passport book itself, and the resulting document could only be used by someone of similar appearance to the original owner.

That, however, is the current state of play, not necessarily the end of the story. One of the primary reasons the chip is being introduced is because historically, passport forgers have been able to forge successive generations of book passports, with each new iteration of security eventually being matched by the bad guys.

Once biometric passports are commonplace the forgers will need to be able to deal with the chips in them, and if they want to stay in business they'll need to be able to change the data, not just copy it.

Without access to the digital signature used by the passport issuing authority to protect the integrity of the data, this can't be done. The forgers could therefore attempt to crack the signature for the passport variety of their choice, but simply gaining access to the key via corrupt officials or espionage could turn out to be a quicker route. With this in mind, it's worth noting that ICAO, which devised the system, anticipates that keys will be compromised, and puts forward steps that should be taken to protect the system when this happens.

If, however, this turns out to happen a lot (how many of the world's passport issuing authorities would you trust?), then chip security will quite possible turn out to be just one more increment in the passport forgery arms race. ®

The essential guide to IT transformation

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
HP: NORKS' cyber spying efforts actually a credible cyberthreat
'Sophisticated' spies, DIY tech and a TROLL ARMY – report
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?