The following text is
copyright 2005 by Network World, permission is hearby given for reproduction,
as long as attribution is given and this notice is included.
Maybe it
is mulish stupidity after all
By Scott Bradner
Three weeks ago I wrote about
the US Government's efforts to keep the pending electronic passport from being
too secure. I still do not know
for sure why they tried so hard to do this but it is beginning to look like we
should apply the old adage 'never ascribe to malice what can be adequately
explained by stupidity'.
Deputy
Assistant Secretary of State Frank
Moss spoke on a panel on electronic passports at the Computers,
Freedom, and Privacy conference (http://www.cfp2005.org/) in mid April. The other panelists were well known
security guru Bruce Schneier and Barry Steinhardt the
director of the ACLU's Freedom and Technology Program. You have to give Frank Moss credit for
being willing to come to what was obviously going to be a den of doubters.
The session
was well reported by PC World
(http://blogs.pcworld.com/staffblog/archives/000616.html) which has also
provided audio recordings of the talks.
Bruce Schneier spoke first and focused on putting the issues in context.
(http://blogs.pcworld.com/staffblog/archives/media/audio/cfp05_passport_panel_bruce_schneier.zip) Next came Frank Moss.
(http://blogs.pcworld.com/staffblog/archives/media/audio/cfp05_passport_panel_frank_moss.zip) He said that the government had
received over 2,400 comments on the electronic passport proposal. He did not say but it's my guess that
most of the comments did not much like the proposal. He said that the passports, which are scheduled to be given
to US diplomats this August, would not be implemented unless the government was
not sure that they would be safe.
(The government doing a test drive of its own targets.) He said that the government was looking
at a number of options including building a Faraday cage into the passport to
block scanning but then he reiterated that the passports could only be read by
a scanner from a distance of 10 cm.
He went on to say: "The
idea that you can walk down a hallway in hotel and pick out the Americans, is
quite honestly, poppycock, the same thing goes for the bar in Beirut. These things can only be read at very
short distances." I expect he
is right about the hotel hallway but expect he is not correct about the Beirut
bar, something that he was about to find out.
Third up was Barry Steinhardt who proceeded to give a live demonstration
of scanning a passport, which had been outfitted with a RFID chip of the type
specified in the standard, at a distance of three feet. Mr. Moss seems to have finally paid
attention when this was demonstrated in front of him because a few days later
he told Wired News that the government was suddenly "taking a very serious
look" at the scanning issue.
He did not say what the result of the serious look might be but maybe
they will adopt the Basic Access Control (http://www.icao.int/mrtd/download/documents/TR-PKI
mrtds ICC read-only access v1_1.pdf) standard developed by the same people who
developed the rest of the standards for electronic passports. See the paper
"Security and Privacy Issues in E-passports" by researchers Ari
Juels, David Molnar, and David Wagner(eprint.iacr.org/2005/095.pdf) for an
analysis of this and other security issues about e-passports.
So maybe it
was just that Moss and company just needed to be shown (in public) that they
were wrong to get them to listen, we will know soon if they learned any lasting
lessons.
disclaimer: Lasting lessons are what places like
Harvard are all about but we prefer to not use public embarrassment to get a
student's attention anyway the
above is my hope, unshared (as far as I know) by the university.