Still Fighting over ePassports

March 2009
Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p16
Trade Publication
The article focuses on the continuous technological battle between security researcher and federal security leaders on the security of electronic passports in the U.S. In the restart of a technology fight, security researcher Chris Paget showed in a YouTube video the ease of scanning, cloning and tracking RFID-based U.S. passport cards and enhanced driver's licenses. On the other hand, government security executives negates Paget's video, claiming the security of the issuance of U.S. passports.


Related Articles

  • Biometric passport fails security.  // Accountancy;Sep2006, Vol. 138 Issue 1357, p61 

    This article reports that in 2006 a hacker demonstrated that a digital passport could be easily duplicated. A German man, Lukas Grunwald, copied his German passport and showed that the same method could be applied to any passport using radio frequency identification systems, such as those issued...

  • RFID: Contact-free access control. Colombo, Allan B. // SDM: Security Distributing & Marketing;Sep97, Vol. 27 Issue 10, p62 

    Focuses on the use of contact-free access control via radio frequency identification (RFID) in the electronic security industry in the United States. Benefits of RFID; Available RFID technologies; Passive/active cards and tokens; RF transponder. INSET: A case for proximity: User benefits..

  • Auto ID soars: RFID, electromagnetic process.  // Security: Solutions for Enterprise Security Leaders;Jul97, Vol. 34 Issue 7, p8 

    Reports on advances in the development and marketing of automatic identification systems. Highlights of study by marketing consulting firm Frost & Sullivan; Radio frequency identification systems; Electro-magnetic anti-shoplifting technology; Radio frequency electronic article surveillance;...

  • Sleek, sophisticated smart labels have the brains to change RFID.  // Security: Solutions for Enterprise Security Leaders;Jun99, Vol. 36 Issue 6, p9 

    Reports on the growth of the use of radio frequency identification (RFID) in the United States. Application in the security sector; Motorola's introduction of BiStatix technology; Enabling of printing of RFID materials on materials including paper; Texas Instrument's launch of Tag-it, a...

  • RFID keys and cards.  // EDN Europe;10/ 1/2011, p22 

    Information on a series of six secure RFID keys and cards from Maxim is presented.

  • Shopping for RFID. Mesenbrink, John // Security: Solutions for Enterprise Security Leaders;Oct2002, Vol. 39 Issue 8, p10 

    Focuses on the reasons for the demand in radio frequency identification (RFID) system. Benefits of RFID; Use of RFID as security system; Reduction in the problem associated with contact or line-of-sight technologies; Advantages of RFID; Reliance of RFID on radio frequency waves.

  • Proximity Cards, Readers Offer More Choices, Flexibility.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p33 

    Discusses the development of proximity devices for use in security access control. Shift toward high-frequency proximity technology; SecuraKey's introduction of its e*TAG line of radio frequency identification (RFID) system; Potential of a universal ID/access/credit card; Advantages of open...

  • GOOD BAD UGLY.  // Network World;10/6/2008, Vol. 25 Issue 39, p5 

    The article offers news briefs related to high technology industry in the U.S. Microsoft has released a free, low-footprint version of its Hyper-V virtualization software as it continues to chase its rival. A study found that the data on the radio chips in so-called electronic-passports can be...

  • Black Hat Exposes RFID Security Risk. Hines, Matt // InfoWorld;3/5/2007, Vol. 29 Issue 10, p9 

    The article reports on a dispute over the security of the radio frequency identification (RFID) technology, highlighted at the Black Hat Briefings hacker conference held in Washington D.C. on February 27, 2007. Researcher Chris Paget was prevented to present the techniques for cloning the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics