Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-Passport

New applications for Radio Frequency Identification (RFID) technology include embedding transponders in everyday things used by individuals, such as books, payment cards, and personal identification. While RFID technology has existed for decades, these new applications carry with them substantial new privacy and security risks for individuals. These risks arise due to a combination of aspects involved in these applications: (1) The transponders are permanently embedded in objects individuals commonly carry with them (2) Static data linkable to an individual is stored on these transponders (3) The objects these transponders are embedded in are used in public places where individuals have limited control over who can access data on the transponder. In 2002, the U.S. Department of State proposed the adoption of an "electronic passport," which embedded RFID transponders into U.S. passports for identification and document security purposes. In this paper, we use the U.S. Government's adoption process for the electronic passport as a case study for identifying the privacy and security risks that arise by embedding RFID technology in "everyday things." We discuss the reasons why the Department of State did not adequately identify and address these privacy and security risks, even after the government's process mandated a privacy impact assessment. We conclude with recommendations to assist government as well as industry in early identification and resolution of relevant risks posed by RFID technology embedded in everyday things.

[1]  Simson L. Garfinkel,et al.  RFID: Applications, Security, and Privacy , 2005 .

[2]  Colin Potts,et al.  Design of Everyday Things , 1988 .

[3]  Tadayoshi Kohno,et al.  Devices That Tell On You: The Nike+iPod Sport Kit , 2006 .

[4]  Jonathan Kies,et al.  User and task analysis for interface design , 1998 .

[5]  Victoria Bellotti,et al.  Design for privacy in multimedia computing and communications environments , 1997 .

[6]  Jean Scholtz,et al.  Towards a Discipline for Evaluating Ubiquitous Computing Applications [Technical Report] , 2004 .

[7]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[8]  G. Leopold The Federal Register. , 1979, Journal of clinical ultrasound : JCU.