Chris Paget speaking at DEF CON 17
This presentation below about challenging many of the popular preconceptions about RFID technology. “Short-range” will be shot down first (I’m aiming to set a half-mile world record in the Nevada desert just before Defcon), “secure” will be busted second (don’t bring _any_ RFID tags unless you want them cloned), “immune to electromagnetic pulse weaponry” will fall last (and hopefully most spectacularly). I’ll be covering a wide range of different RFID technologies from 125KHz to 900MHz, and releasing a whole pile of source code, schematics, and (with luck) a little magic smoke.
DEF CON 14: A Hacker’s Guide to RFID Spoofing and Jamming
Speaker: Melanie Rieback, RFID Security/Privacy Researcher, Vrije Universiteit Amsterdam
Radio Frequency Identification (RFID) tags are remotely-powered data carriers that augment physical objects with wireless computing abilities. This allows us to create smart homes and offices, optimize our supply chains, and keep a watchful eye on our pets, livestock, and kids. But unfortunately, RFID security and privacy issues have been addressed as an afterthought; it is regretfully easy to interfere with RFID systems, as many rely upon the integrity of RFID tag data for their correct functioning. To illustrate these problems, we have built a handheld device that performs RFID tag spoofing and selective RFID tag jamming (a bit like an “RFID firewall”). Compatible with the ISO 15693/14443 13.56 MHz RFID standards, our device is battery-powered and fits into a shirt pocket. This presentation will explain the “nuts and bolts” of RFID tag spoofing and jamming attacks, and will conclude with a live practical demonstration of these attacks.
You can download the full PDF presentation here.
Cloning the Verichip
Two presenters demonstrated the electronic equivalent of making a copy of an implanted RFID or radio frequency ID chip.The point was to show just how easy it is to fool a detection device that purports to uniquely identify any individual. You can read the article here.
For a demonstration on how to clone a Verichip, click here.