Feeds

California outlaws RFID tag skimming

You looking at my ID?

Boost IT visibility and business value

California governor Schwarzenegger has signed a law making the illegitimate reading of RFID tags illegal, but blocked a measure making the unauthorised tracking of kids equally so.

RFID Journal reports that anyone skimming an RFID tag issued by a government agency, health insurance company, employer or library could find themselves in prison for up to a year, or facing a $1,500 fine, though you're OK if you read it by accident, for a medical emergency or if you're a law-enforcement official.

The measure also protects RFID tags issued by schools, which is good, because schools aren't required to tell parents that their kids are being RFID-equipped, thanks to the governor's blocking of law that would have required parental consent.

Anti-skimming laws are popping up all over the place: Washington passed one back in May, and Japan has had anti-skimming legislation since 2005. In many countries computer-hacking laws already cover the illegitimate reading of personal data, even if that data only comprises an identification number, but many of those still need to be tested in court before the legality of such action is known for sure.

The US passport comes with a foil wrapper designed to prevent skimming of the RFID data, but it's been shown to fail if the passport is even slightly open. The UK Passport Office has made no such attempt, making skimming technically easy if allegedly pointless.

The idea is that an RFID tag contains only an ID number, so if someone reads it then there's no problem as they still won't match up with the data connected to that number. The Hacker's Choice recently demonstrated an electronic passport programmed with Elvis' identity - but it's only useful if the immigration staff are relying on the technology to do their job, if the look at the picture they might notice that the carrier is not the long-dead crooner he claims to be.

UK company Peratech has been pushing its quantum-tunnelling technology, able to create a switch with no moving parts, as the solution to skimming/ The user would have to press on a button before the tag would operate, but while that might be feasible for a passport it's a little less practical on an Oyster Card.

California's new law is unlikely to put off serious fraudsters - it's more likely that legislation like this will be used to add weight to a case of actual fraud or theft.

®

The Essential Guide to IT Transformation

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
What FTC lawsuit? T-Mobile US touts 10GB, $100 family-of-4 plan
Folks 'could use that money for more important things' says CEO Legere
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.