Security Snake Oil
Security Snake Oil
Security Snake Oil
Or…
Introduction
The long-running BBC television series, Doctor Who, was a cult favorite, adored
by adult science fiction fans and children alike. The show concerned the
adventures of a mysterious, eccentric time traveler who used his creativity and
intellect to outwit evil doers throughout time and space.
Even though he put high-technology to good use, Doctor Who was never naive
about its limitations. In a 1978 episode (“The Pirate Planet”), for example, he
quickly opened a high-tech lock placed in his path by the bad guys, commenting
matter-of-factly that, “The more sophisticated the technology, the more
vulnerable it is to primitive attack. People often overlook the obvious.” Security
managers should take a clue from Doctor Who and recognize that high-
technology is not an automatic panacea.
As Doctor Who recognized, high-tech devices and systems are often vulnerable
to simple attacks. We believe there are 8 major reasons for this:
1. High-tech devices must still work in, and be physically coupled to, the real
world. This is often a source of exploitable vulnerabilities.
3. High-tech often permits an increased standoff distance from the assets being
protected. This tends to decrease personal attention to detail. In the end,
security (whether high-tech or low-tech) fundamentally requires staying alert and
paying attention to details.
4. With high-technology, there are usually many more legs for an adversary to
attack.
5. High-tech features often fail to address the critical vulnerability issues in any
given security application, and can even become a distraction.
It is common to confuse the inventory function with the security function. This
usually leads to poor security, especially when high-technology is involved. 3 of
the 7 technologies discussed below are very problematic for security applications
because they are fundamentally inventory technologies.
Inventory involves locating and counting our “stuff”. It will detect innocent
errors by insiders, but it is not designed to counter nefarious adversaries. That is
the job for security.
Security is specifically designed (or at least should be) from the very start to
prevent or mitigate the actions of the bad guys. In an ideal world, there wouldn’t
be any bad guys, and we wouldn’t need security. But even in an ideal world,
we’d still need to perform the inventory function. (Of course, in an ideal world,
there’d be no need for security professionals, so maybe an ideal world wouldn’t
be so ideal after all!)
Counterfeit Counterfeits
The essential fact about counterfeiting that is often overlooked is the following:
It is usually sufficient for an adversary to counterfeit the superficial appearance of
a device or object, and perhaps its apparent performance. An adversary rarely
needs to replicate the actual device or object, or even counterfeit its real
performance. (This is because few security applications have the time or money
for detailed forensic postmortem examinations in a laboratory to reliably verify
authenticity.) Consequently, counterfeiting is usually much easier than it might
first appear. Relatively low-tech methods usually suffice, even when
counterfeiting very sophisticated, high-tech security devices or materials.
RFIDs
RFIDs are an excellent technology for inventory purposes. They can help to
quickly identify and track products moving through the supply chain in a non-
contact manner. Unfortunately, however, RFIDs have been highly touted as
security devices—and as the answer to both product counterfeiting and reliable
tamper detection. The fact is, they are silver bullets for neither.
RFIDs are relatively easy and cheap to counterfeit. When we first studied
RFIDs at Los Alamos, we quickly demonstrated a number of different counterfeit
designs—a new one every 2 days on average. This was done without the need to
involve a single electrical engineer or rf expert. Our counterfeits cost only a few
dollars in retail quantities. A clever home electronics hobbyist can counterfeit low
end RFIDs—which are the only ones that most security applications can afford.
Serious counterfeiters and cargo thieves will not be deterred by these devices.
It is also fairly easy to spoof a RFID reader even without counterfeiting the RFID
devices. There are 5 different ways an adversary can do this:
or
4. Tamper with data stored in (or transmitted by) the real reader.
For attacks 1-3, the adversary may have the fake or modified reader
automatically accept all RFIDs as valid, or perhaps just special ones chosen by
the adversary. (Users of any reader must occasionally verify at random,
unpredictable times that an invalid RFID number will actually be rejected.)
Alternately, the adversary may want to control the reader from a distance using
inexpensive radio frequency (rf) electronics, which are now readily available,
inexpensive, and miniature.
Attack #4 typically involves changing the RFID number stored in the reader’s
database. This allows the adversary to remove the original RFID and replace it
with one of his choice without being detected.
In addition to being easy to counterfeit, RFIDs are usually trivial to “lift”, that
is, to remove from one object or container and place on another without being
detected. Nearly anyone moderately skilled with their hands can quickly saw,
undercut, grind, etch away, or dissolve with reactive chemicals whatever
mechanical, adhesive, or potting method is used to attach the RFID to the object
or container of interest. Reattaching the RFID is usually also simple. This ease
with which lifting can be accomplished limits the usefulness of RFIDs for security
applications.
RFID radio signals are also easy to block or jam. This makes certain kinds of
denial of service attacks trivial to execute.
Contact memory buttons are a lot like RFIDs except that they have no rf
emanations. Instead, they communicate electrically through mechanical contact.
Typically, these are passive devices that get their power from electrical contact
with the reader. The button then sends an electronic signal with its unique serial
number.
When counterfeiting a contact memory button, the entire button (or “can”)
may be counterfeited, or else another button can be purchased or stolen, then
modified to look—at least on the outside—like the original, but with a counterfeit
circuit inside.
Manufacturers often etch the serial number on the outer case of the contact
memory button. This does not, as some manufacturers claim, “increase
security”. It simply makes it possible for an adversary to tell from a distance
what serial number to counterfeit without having to touch or electronically read
the memory button. A 3” telescope can be used to view the serial number from
60 feet away, while it can be read from 5 feet away with the naked eye.
Like RFIDs, high-end (and thus expensive) memory buttons are available that
use batteries, cryptography, challenge-response protocols, rotating passwords,
and/or tamper detection to try to improve security. None of these are particularly
effective at stopping a determined adversary who has taken time to understand
the devices.
Tags
There are really 4 distinct kinds of tags, though people are often unclear about
which kind they have in mind. Inventory tags are strictly for inventory
purposes; there is no nefarious adversary to worry about, so neither lifting or
counterfeiting are of concern.
With security tags, on the other hand, both lifting and counterfeiting are a
concern. This is in contrast to anti-counterfeiting tags where only
counterfeiting is an issue. These are used, for example, to try to prevent
counterfeiting of commercial products. Lifting is not of concern because the
product counterfeiter has no economic interest in buying the authentic product so
that he can move the security tag to his fake product.
Counterfeiting is also the only issue for buddy tags (sometime called
tokens). They differ from anti-counterfeiting tags in that they usually are not
physically attached to the object or container of interest.
Few, if any high-tech (or even low-tech) security tags have solved the lifting
problem. Lifting is usually relatively easy to achieve if the adversary has skilled
hands—and sometimes, even if he doesn’t.
Tamper-Indicating Seals
Unlike locks, seals do not try to resist or delay unauthorized access, just record
that it took place. Unlike intrusion detectors, the trespassing is detected only
after the fact, at the time the seal is inspected.
There is currently a great deal of interest in using high-tech electronic seals for
cargo security and counter-terrorism. This includes seals that use RFIDs, contact
memory buttons, and/or encryption. Many of the proponents of such high-tech
seals seem to be confusing inventory with security, as discussed above.
We have studied hundreds of seals in detail at Los Alamos, and found them all
easy to defeat quickly using only low-tech, inexpensive methods available to
almost anyone. These include seals used for nuclear applications, as well as
seals used extensively for cargo security applications. We find that high-tech
seals are often easier to defeat than low-tech seals for the reasons discussed
above. This does not, however, necessarily have to be the case if the high-tech
seals were better designed and/or used in a more sophisticated manner.
(To “defeat” a seal means to remove it, then replace it with a counterfeit or the
original seal in a manner that avoids detection. Simply yanking a seal off a
container is not defeating it because the fact that the seal is missing or damaged
will be noted at the time of inspection.)
We’ve categorized all the methods for defeating seals into 105 general
categories. There are many possible variations within each category. As with
RFIDs, both lifting and reader attacks are usually viable for seals.
It is clear that much better seal designs (low-tech and high-tech) are both
necessary and possible. Very little research, however, is underway towards this
goal. In the meantime, the performance of tamper-indicating seals can be
dramatically improved if seal users understand the vulnerabilities and look for the
most likely attack scenarios for the specific seals they are using. This requires,
first and foremost, a recognition that seals can be defeated, followed by hands-on
training.
Cryptography & Authentication
Developers and manufacturers like to talk about the high security of the
encryption or authentication algorithms used in their security devices or systems.
The fact that it is usually easy to gain undetected access to the interior of the
hardware (before or after installation) means that cryptography frequently adds
little to the security of tags, seals, monitoring systems, or access control devices.
GPS
The Global Positioning System (GPS) is being used increasingly for a wide
variety of applications. GPS receivers are now embedded in watches and cell
phones, for example.
GPS receivers tune into the radio signals from 24 satellites orbiting the earth.
Those signals help the GPS receiver determine the current time, and where it is
located on the earth’s surface, typically to within about ±15 yards.
GPS is increasingly being used for security applications. These include cargo
tracking; public safety services such as police, fire, rescue and ambulance; and
time synchronization signals for financial transactions and critical utility,
computer, and telecommunications networks.
The problem with using GPS for security applications is that it was never
intended for such uses—it is fundamentally an inventory technology. Private
industry, foreigners, and 90% or so of the federal government must use the
civilian GPS signals. Unlike the military signals, these are unencrypted and
unauthenticated. This makes it easy to spoof them using widely available, user-
friendly GPS satellite simulators. These simulators can be purchased, rented, or
stolen; they are not export controlled. They can be easily operated by people
with little understanding of GPS, electronics, or computers.
There are several possible scenarios for hijacking a truck that uses GPS cargo
tracking. If the driver is part of the conspiracy--which statistics tell us happens in
the majority of cases--he can simply hard-wire a GPS satellite simulator to the
antenna of his truck’s GPS receiver. (There is thus no need to send the fake
signals through the air.) This lets him trick headquarters into thinking the truck is
somewhere it is not during the hijacking and cargo unloading, thus creating
deniable culpability for the driver and misdirection for the hijackers.
If the driver is instead honest, hijackers must decide whether to disable him
before or after spoofing, based on whether or not he might be able to get off a
panic call for help. If no panic alarm is likely, the cargo thieves can take out the
driver first, and again hard-wire the GPS satellite simulator to the GPS receiver’s
antenna. They will then make headquarters think the truck is happily traveling
along its intended route on schedule, while in actuality it is being driven
elsewhere by the crooks to be unloaded.
Alternately, if the hijackers are worried about the driver getting off a panic call
for help, they may instead want to feed his GPS cargo tracking system fake
signals remotely using radio frequency (rf) signals. (We’ve demonstrated how
easy this is to do from a "chase" vehicle.) They will make the truck wrongly
report back to headquarters that it is 10 or 20 miles farther along, or farther
behind, the planned route than it truly is. When the hijackers then attack the
driver, any panic alarm he gets off will cause the authorities to descend on the
wrong location. The truck hijackers can drive the truck off without fear of being
apprehended.
There are other GPS spoofing concerns beyond cargo hijacking. The possibility
of using spoofing to crash (or steal from) nationwide computer,
telecommunications, financial, and utility networks that rely on GPS for time
synchronization is very real. Unfortunately, the backup time standard often used
(when there is one) is the radio signal from the atomic clocks at the National
Institutes of Standards and Technology (NIST). These signals are also not
encrypted or authenticated, and can also be counterfeited.
There are relatively inexpensive countermeasures that can detect the use of a
GPS satellite simulator. Such countermeasures, however, are not currently in
use. Even with such countermeasures, sophisticated adversaries will always be
able to spoof civilian GPS signals unless they are eventually encrypted or
authenticated. At this point, it would just be useful if the general public couldn’t
easily spoof civilian GPS receivers.
It is also easy to block or jam civilian GPS signals. The satellite signals from
space can be blocked by breaking the antenna on the GPS receiver, or by
covering it with aluminum foil or other metal. Jamming involves making a noisy rf
circuit that broadcasts on the GPS frequency. Complete plans are available on
the Internet. A jammer capable of blocking civilian GPS satellite signals over
hundreds of square miles costs less than $50. Fortunately, however, blocking
and jamming (unlike spoofing) are not surreptitious. The GPS receiver (and its
user) knows full well that it is not receiving signals.
Biometrics
While biometrics clearly have a bright future, the fact remains that most
biometric access control systems are currently easy to spoof. This can be done
by replicating or counterfeiting the actual biometric—which is often surprisingly
easy to do. Alternately, an adversary can tamper with the access control device
itself. The tamper detection on most biometric devices is either nonexistent or
remarkably unsophisticated.
Conclusion
The point of this article is not to discourage the use of high-technology. It has
a very important role to play in security, now and in the future. High-technology
can offer important security improvements, while saving time, money, personnel,
and resources.
Roger G. Johnston, Ph.D., CPP has been head of the Vulnerability Assessment
Team at Los Alamos National Laboratory (LANL) since 1992. He received a B.A.
degree from Carleton College (1977), and M.S. and Ph.D. degrees in physics from
the University of Colorado (1983). Johnston is the author of over 80 technical
publications, holds 10 U.S. patents, and serves as a security consultant. He was
recently awarded the LANL Fellows Prize for Outstanding Research.