[ISN] "Safest ever" passport is not fit for purpose

From: InfoSec News (alerts@private)
Date: Sun Mar 04 2007 - 22:12:45 PST


http://www.thisislondon.co.uk/news/article-23387681-details/'Safest+ever'+passport+is+not+fit+for+purpose/article.do

05.03.07

They are the "safest ever", according to the Government. But the Daily 
Mail reveals today how easily a person's identity can be stolen from new 
biometric passports.

A shocking security gap allows the personal details and photograph in 
any electronic passport to be copied from the outside of the envelope in 
which it is delivered to homes.

The passport holder is none the wiser when it arrives because the white 
envelope has not been tampered with or opened.

Using a simple gadget built from parts bought on the Internet, it took 
the Mail less than four hours to copy the details from one passport.

It had been delivered in the normal way by national courier company 
Secure Mail Services to a young woman in Islington, North London.

With her permission we took away the envelope containing her passport 
and never opened it.

By the end of the afternoon, we had stolen enough information from the 
passport's electronic chip - including the woman's photograph - to be 
able to clone an identical document if we had wished.

More significantly, we had the details which would allow a fraudster, 
people trafficker or illegal immigrant to set up a new life in Britain.

The criminal could open a bank account, claim state benefits and 
undertake a myriad financial and legal transactions in someone else's 
name.

This revelation will prove a major embarrassment to ministers. Since 
their introduction a year ago, more than four million biometric travel 
documents have been delivered by courier.

The Government believes this is the safest way of sending out passports. 
But this may be an illusion.

The passports are dispatched in white envelopes which are easily 
recognisable from the distinctive lettering and figures on the outside.

There is no identity check on the person signing for the passport when 
it arrives. In multi-occupancy flats they can be handed to anyone at the 
address. Thousands have already gone missing.

We began our investigation by asking Elizabeth Wood, a 33-year old web 
designer, to apply for a new biometric passport.

She telephoned the Identity and Passport Service on Monday, February 12.

Because she wanted the passport quickly, she was asked to go to the IPS 
office in Victoria, Central London, the following afternoon.

If she had not requested the fasttrack service, the passport would 
normally have been sent out without a face-to-face interview.

The next day Miss Wood met an official for ten minutes. The details on 
her application form were verified using two forms of ID - normally a 
household bill and a bank statement. Her photograph was also examined.

Miss Wood paid 91 for the fasttrack delivery and was told her passport 
would be sent to her home by secure courier in exactly seven days.

In fact, it took just four days, arriving when Miss Wood was in the 
shower. Her boyfriend went to the door and signed for the document. He 
was able to do so without showing any form of identity to the courier, 
who did not ask for Miss Wood.

But there is another gaping hole in security. At first glance the new 
biometric passport looks much like the traditional one.

The only clue on the outside of the document that it contains an 
electronic chip is a small gold square on the front.

Inside the passport there is a laminated page containing the holder's 
picture, passport number, name, nationality, sex, signature, date and 
place of birth and the document's issue and expiry date.

At the bottom of this page are two lines of printed numbers and letters 
which can be read by a computer when the passport is swiped through a 
special machine by immigration officials. It is called the Machine 
Readable Zone.

On the back of the page is a tiny computer chip, surrounded by a coil of 
copper-coloured wire. This is a Radio Frequency Identification 
microchip, which can be read using radio waves.

Encoded on the passport's RFID chip are three important files. One 
contains an electronic copy of the printed information on the passport's 
photo page; the second holds the electronic image of the holder's photo. 
The third is a security device which checks that the previous two files 
are not accessed and altered.

In order to get into the files, the computer needs an "electronic key". 
This is the 24-digit code printed on the bottom line of the passport's 
Machine Readable Zone. It is called the "MRZ key number".

When an immigration official checks the passport by swiping it through 
his machine, it reveals the key which is then used to open up the 
electronic data on the microchip.

The official checks that the photograph and information printed on the 
passport match the details on the chip and the holder is allowed to pass 
in, or out, of the country.

The Government says the biometric chips are protected by "an advanced 
digital encryption technique". In other words, without the MRZ key code 
it is impossible to steal the passport holder's details if you do not 
have their travel document.

Yet it took us no time at all to unravel the crucial code, using a 
relatively simple computer software programme and a scanning device.

The Mail was helped by computer security consultant Adam Laurie, who 
advises public bodies and private companies on combating IT fraud. He 
discovered glaring weaknesses in the biometric passport's security 
system.

The first flaw is that a hacker can try to access the chip as many times 
as he likes until he cracks the MRZ code. This is different to putting a 
pin number into a bank machine, where the security system refuses access 
after three wrong combinations are entered.

The second is that there are easily identifiable recurring patterns in 
the MRZ key codes issued. For example, the passport holder's date of 
birth always features, as does the passport's expiry date, which is ten 
years after the issue date.

The Mail is not publishing full details of Miss Wood's passport to 
protect her. We know exactly how Mr Laurie cracked the MRZ code but we 
are not going to reveal the process for security reasons.

Crucially, he only needed one new piece of information - Miss Wood's 
date of birth.

In under two hours, the Mail had found this by checking the electoral 
roll, birth records and looking at genealogical sites on the Internet.

Miss Wood's photo page soon popped up on Mr Laurie's laptop screen. He 
had not needed to see her actual passport - the white envelope 
containing it remained unopened on the desk.

Crucially, some banks, including the Post Office, no longer require to 
see a full passport as proof of identity from a new customer opening an 
account. They ask for a photocopy of the photo page to be sent in the 
post instead.

Miss Wood's photo page could easily be copied and used for this purpose. 
Mr Laurie said: "I used public information and equipment that is legal. 
The software took me three days to write. It is incredibly easy to 
thieve data from the passports. It could be put onto another chip and 
implanted in a blank passport."

Phil Booth, national co-ordinator of NO2ID, a group pressing the 
Government to abandon plans for identity cards, witnessed our 
experiment.

"This shows how easy it is to steal a person's identity from the new 
passport without the innocent owner even knowing," he said.

"The Government has repeatedly said this information is secure. You have 
just shown that it is not."

Last night a Home Office spokesman said: "We do not believe it would be 
possible to successfully forge a new passport by doing this.

"The security around the UK passport chip prevents anyone changing or 
deleting any of the data or information on the chip, which is what is 
required to successfully forge a passport."


_________________________________________
Visit the InfoSec News Security Bookstore
http://www.shopinfosecnews.org



This archive was generated by hypermail 2.1.3 : Sun Mar 04 2007 - 22:39:48 PST