Wireless Identity Theft

Wireless Identity Theft

"Wireless" Identity Theft is described as "The act of compromising an individual's personally identifying information using wireless (radio frequency) mechanics." (read an article from The University of Massachusetts titled: "Vulnerabilities in First-Generation RFID-enabled Credit Cards" [http://prisms.cs.umass.edu/~kevinfu/papers/RFID-CC-manuscript.pdf] )

This is a relatively new technique of gathering an individual's personal information from RF-enabled cards carried on a person in their access control, credit, debit, or government issued identification cards (see Electronic Freedom Foundation site [http://w2.eff.org/Privacy/RFID/rfid_position_statement.php] ). Each of these cards carry a radio frequency identification chip which responds to certain radio frequencies. When these "tags" come into contact with radio waves, they respond with a slightly altered signal. In their response is encoded personally identifying information such as Name, Address, Social Security Number, Phone number, and pertinent account or employee information.

Upon capturing (or "harvesting") this data, the thief is then able to program their own cards to respond in an identical fashion ("cloning"). Many sites are dedicated to nothing but teaching people how to perform this act, as well as supplying the necessary equipment and software necessary (see: RFIdiot.org [http://rfidiot.org/] and Texas Instruments' RFID site [http://www.ti.com/rfid/] )

As of this writing (May 25th, 2008), Google search results indicated the existence of 13,300 websites dedicated to this practice, up from 8,400 only one month ago. This is indicative of a rapidly spreading wave of information. Further, numerous articles have been written (Wired.com: "The RFID Hacking Underground" [http://www.wired.com/wired/archive/14.05/rfid.html] ) and broadcast television has produced several investigations into this phenomenon (see KPHO-5 PHOENIX [http://www.kpho.com/video/16291478/index.html] and KVUE-24 Austin [http://www.kvue.com/video/index.html?nvid=243913] ).

Currently, efforts are underway to educate the average consumer as to the vagaries of Radio Frequency Identification as the greatest threat to society in current times by companies such as Wisteria House Products [http://www.armadillodollar.com] of Arizona and the Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN) [http://www.nocards.org/] as well as attempting to initiate legislation to limit the use of RFID by companies and governmental agencies.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Identity theft — is a form of stealing another person s identity in which someone pretends to be someone else by assuming that person s identity, typically in order to access resources or obtain credit and other benefits in that person s name. The victim of… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Central Equipment Identity Register — The Central Equipment Identity Register is a database of the IMEI numbers of blacklisted handsets. If a device s IMEI number is listed on CEIR, it is not supposed to work on any service provider. A common usage of the CEIR is with stolen… …   Wikipedia

  • International Mobile Equipment Identity — The International Mobile Equipment Identity or IMEI (pronEng|aɪˈmiː) is a number unique to every GSM and UMTS and iDEN mobile phone as well as some satellite phones. It is usually found printed on the phone underneath the battery.The IMEI number… …   Wikipedia

  • Credit card — Personal finance Credit and debt Pawnbroker Student loan Employment contract Salary Wage Empl …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Internet privacy — involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information… …   Wikipedia

  • Credit card fraud — Personal finance Credit and debt Pawnbroker Student loan Employment contract Salary Wage Empl …   Wikipedia

  • Legality of piggybacking — Laws regarding unauthorized access of a computer network exist in many locales, including the U.S. federal government, all 50 U.S. states, and other countries, though the wording and meaning differ from one to the next. However, the… …   Wikipedia

  • Radio-frequency identification — (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Some RFID tags can be read from… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”