RFID Passports the dangers of the e-passport Stephanie Henrichs.

Slides:



Advertisements
Similar presentations
My Fears My Protectors In your sketchbook…. Fears What do you fear? What do you fear? Now or in the past Now or in the past Real or conceptual Real or.
Advertisements

Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Holographic Laser Projection (HLP) Technology.  How It works  FAA Classification  Surfaces  Lighting  Portable  Picture Quality and Resolution.
The Building Blocks: Send and Receive Operations
Smart Cards Kyle Dion. What is a Smart Card? Definition: defined as any pocket-sized card with embedded integrated circuits which can process information.
ENGR101/HUM 200: Technology and Society November 10, 2005.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
My Personal Budget Vocabulary
Frogeye: Perception of the Slightest Tag Motion Lei Yang, Yong Qi, Jianbing Fang, Xuan Ding, Tianci Liu, Mo Li Tsinghua University, Xi’an Jiaotong University.
RFIDs and the Future Logistic System Dr. Hayden So Department of Electrical and Electronic Engineering 17 Sep, 2008.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
E-Passports Threatens Your Privacy Nathan Sweet CSCE 390 Dr. Valtorta
Security in RFID Presented By… NetSecurity-Spring07
RFID Security CMPE 296T -Sankate Sharma -Sangbeom Ryu.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID passports How does is work? Step by step By: Einav Mimram.
Business Systems Planning (IBM Corporation) Initial work on BSP began in the early 1970s. At first, it was for IBM internal use only; later it was made.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
RFID in the Military Rana, Mohammed,Trandel, Ahmed.
R F I D - Introductory Presentation - - Introductory Presentation -
Overview  What is RFID?  How to use it?  Relevant links  Future Trends  Bibliography.
Department of Electrical and Computer Engineering Team 7 “The BeepachU” Preliminary Design Review.
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Radio Frequency Identification (RFID) Be Safe Security Solutions.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
Section 1 Understanding how ICT can be used to meet business needs.
RFID Technology: When innovation brings along data protection challenges Eleni Kosta ICRI – K.U.Leuven.
computer
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
LO: To IDENTIFY the features of biometrics (passport) Keyword: Security - the state of being free from danger or threat. Starter Describe what a passport.
Security Concerns In Schools. o One of the biggest obstacles keeping schools from achieving a secure environment is “the big D” also known as Denial.
Modems Modems are used for high-speed home networking applications, especially those using existing home wiring. They are a technological improvement.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Describe direct data entry and associated devices, e. g
Radio Frequency Identification (RFID)
The Only Place in The World that sells Cheap Chipsets!
New Equipment for Phys Ed Logan Rogers. Goal To teach students about calories and how easy/hard it is to burn them using bands, pedometers, trackers.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
ONE OF THE MOST USEFUL DEVICES TODAY IS THE COMPUTER.
Yes? Or No?. Radio-frequency identification is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product,
网上报账系统包括以下业务: 日常报销 差旅费报销 借款业务 1. 填写报销内容 2. 选择支付方式 (或冲销借款) 3. 提交预约单 4. 打印预约单并同分类粘 贴好的发票一起送至财务 处 预约报销步骤: 网上报账系统 薪酬发放管理系统 财务查询系统 1.
BIG DATA Initiative SMART SubstationBig Data Solution.
English for Advance Learners I
What is a Firewall?.
Environmentally Friendly Computing Products – The MacBook Air
Rapid Detection of Arsenic in Water
PARKING AUTOMATION SYSTEM
Designing a Production Plan
What is a Radio-Frequency Identification (RFID) tag?
Describe direct data entry and associated devices, e. g
Future Developments in ICT
Own Your Identity.
Internal Press Release
Legitimate Blocks: If you're visiting the same website each time then the warning will appear, the site may contain some dangerous and malicious content.
Making Exercise Easy Matthew Penk.
BACK SOLUTION:
Home Office.
Information Technology
Radio-Frequency Identification (RFID)
Own Your Identity.
Digital Footprints.
? ? ? ? ? 1. What is my problem? 1. What is my problem?
Chapter 4 Changes in Demand.
Daily Time Spent With Video Based On Total U.S. Population, 3Q ‘18
Laptop rental UAE is complete rental service provider in Dubai. Laptop is a device every person must have for their regular purpose. Laptop rental uae.
Presentation transcript:

RFID Passports the dangers of the e-passport Stephanie Henrichs

2 The Problem  RFID chips in the e-passport can be used to track an individual passport  Possible to create a device (i.e. bomb) to trigger when a specific passport passes with a range of the device  Found by computer scientists at the University of Birmingham

3 My Solution  Complete overhaul of the system  Use a contact-based smart chip  Would need an intermediate solution  Inclusion of an RFID- blocking passport protector with purchase of passport

4 Opposition  Such an overhaul would be time- consuming and expensive  Especially after so much was spent to develop the current system

5 Why It’s Necessary  The current system is simply not safe  Should not have been released in the first place  Over 30 million e-passports have been issued  The RFID readers are cheap and easy to find