The following text is
copyright 2006 by Network World, permission is hearby given for reproduction,
as long as attribution is given and this notice is included.
More 'security as an
afterthought'
By Scott Bradner
The top story on the New York
Times business section on October 23rd details a perfect example of businesses
developing a product and only thinking seriously about security or privacy
after someone else reports problems.
In this case, like most others, the businesses claim there really is no
problem for anyone to worry about.
In this case, believing the businesses would require a suspension of
logic.
The Times reports that U.
Mass. researcher Tom Heydt-Benjamin has demonstrated that it is quite easy to
extract information from the new generation of RFID equipped credit cards
without having to look at them. According to the Times, Heydt-Benjamin has
written this up in a paper he has submitted to a security conference - I've not
seen a copy of the paper and am relying on the Times article for my
information.
It seems that Mr.
Heydt-Benjamin kludged up a RFID reader, tried it out on 20 of the new credit
cards and was able to read unencrypted information from all of them. In at least some cases, the information
included the card holder's name, the credit card number and expiration
date. In other words all the
information you would need to buy things on-line and, maybe depending on the
details, enough information to create your own RFID or non-RFID credit card for
in-person use.
The reaction from the credit
card companies was predictable if not fully believable. A Mastercard spokesperson said that 98%
of their RFID cards used "the highest standards" without saying just
what that meant in terms of exposed information or just why all of the
Mastercard cards tested somehow fell into the 2% of not so good cards. An
American Express spokesperson said "It's basically useless information.
You can't steal that data and play it back and expect that transaction to
work." The spokesperson did
not explain away the fact that the researchers did just that with data from
some cards. The card companies
also pointed to their fraud-detection software that would detect the use of
stolen card numbers. Pardon me if
I do not accept the assumption that all fraudulent use would be caught. I do accept the fact that some such use
is caught since I got a call from Mastercard about one such case with one of my
credit cards.
This column is not meant
merely as a rant against RFID-based credit cards, although I do not want to
have one for a number of years so that all the bugs get worked out. I'm trying to point out two all too
common behaviors. First rolling
out products without thinking through the security or privacy implications and,
second, the quick dismissal when someone points out the flaws in the products
that were prematurely rolled out.
At the end of the article,
the Times reports that all of the card companies said they were removing the
cardholder name from the information that is retrieved from the cards as a
"best practice." Why did
they include the name in the first place?
Why did the not encrypt it if they had a real reason to include it?
If you are working on a new
product or service, break the mold - think about security before you ship it.
disclaimer: Some at Harvard are all for breaking
molds while others cling to them but this advice is mine.