Feeds

California outlaws RFID tag skimming

You looking at my ID?

Top 5 reasons to deploy VMware with Tegile

California governor Schwarzenegger has signed a law making the illegitimate reading of RFID tags illegal, but blocked a measure making the unauthorised tracking of kids equally so.

RFID Journal reports that anyone skimming an RFID tag issued by a government agency, health insurance company, employer or library could find themselves in prison for up to a year, or facing a $1,500 fine, though you're OK if you read it by accident, for a medical emergency or if you're a law-enforcement official.

The measure also protects RFID tags issued by schools, which is good, because schools aren't required to tell parents that their kids are being RFID-equipped, thanks to the governor's blocking of law that would have required parental consent.

Anti-skimming laws are popping up all over the place: Washington passed one back in May, and Japan has had anti-skimming legislation since 2005. In many countries computer-hacking laws already cover the illegitimate reading of personal data, even if that data only comprises an identification number, but many of those still need to be tested in court before the legality of such action is known for sure.

The US passport comes with a foil wrapper designed to prevent skimming of the RFID data, but it's been shown to fail if the passport is even slightly open. The UK Passport Office has made no such attempt, making skimming technically easy if allegedly pointless.

The idea is that an RFID tag contains only an ID number, so if someone reads it then there's no problem as they still won't match up with the data connected to that number. The Hacker's Choice recently demonstrated an electronic passport programmed with Elvis' identity - but it's only useful if the immigration staff are relying on the technology to do their job, if the look at the picture they might notice that the carrier is not the long-dead crooner he claims to be.

UK company Peratech has been pushing its quantum-tunnelling technology, able to create a switch with no moving parts, as the solution to skimming/ The user would have to press on a button before the tag would operate, but while that might be feasible for a passport it's a little less practical on an Oyster Card.

California's new law is unlikely to put off serious fraudsters - it's more likely that legislation like this will be used to add weight to a case of actual fraud or theft.

®

Choosing a cloud hosting partner with confidence

More from The Register

next story
FCC, Google cast eye over millimetre wireless
The smaller the wave, the bigger 5G's chances of success
It's even GRIMMER up North after MEGA SKY BROADBAND OUTAGE
By 'eck! Eccles cake production thrown into jeopardy
Mobile coverage on trains really is pants
You thought it was just *insert your provider here*, but now we have numbers
Don't mess with Texas ('cos it's getting Google Fiber and you're not)
A bit late, but company says 1Gbps Austin network almost ready to compete with AT&T
HBO shocks US pay TV world: We're down with OTT. Netflix says, 'Gee'
This affects every broadcaster, every cable guy
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.