7 comment(s) – last by Dorkyman.. on Oct 25 at 4:48 PM
Vulnerable information could help malicious parties plan attacks
The U.S. Transportation Safety Administration has spent hundreds of millions of dollars to blanket the nation’s airports in “nude” full-body scanners. However, base security still relies heavily on conventional searches – pat-downs and luggage scans — amid concerns regarding the efficacy of the nude scanners.
I. TSA Uses Unencrypted Barcode Info to Designate Not-so-Random “Random” Searches
That’s why the findings of an aviation blogger – John Butler — are particularly troubling. They represent a serious compromise in security procedures by allowing passengers to know, via inspecting their barcode, whether they will be subject to conventional screens.
Mr. Butler published his findings to his blog PuckInFlight.
The flaw is specific to the TSA’s pre-screening program. That program allows frequent fliers to pay a fee to get to skip certain digital screening requirements. Passengers who pay the fee get to carry on approved liquids in their luggage, don’t have to remove their personal electronics, and can keep their belts/shoes on, when travelling through the scanners.
The idea is that the passengers are pre-screened to try to weed out potential violent threats, and then to use the possibility of random screens to deter any would be terrorists from going to great lengths to try to exploit the program.
Except the screens weren’t random. According to Mr. Butler, they appear to be pre-determined, and worse yet the barcode on your ticket tells — without encryption — whether you will be screened.
The decoded contents of Mr. Butler’s boarding pass. [Image Source: PuckInFlight]
The majority of the barcode encodes your name, flight number, departure city, destination city, seat number, etc. But the final encoded number is a mysterious ’1′ or ’3′. The number encodes a number of beeps that prompts the TSA agents — in predetermined fashion — whether to screen the passenger (1 beep means no conventional pre-check, 3 beeps means to do a conventional pre-check).
II. Want to Illegally Skip Security? Print a Modified Boarding Pass
As Mr. Butler points out, a malicious flyer could read their bar code information, then re-encode a new bar code with the ’3′ replaced with a ’1′. The blogger summarizes:
Sterling Payne, in a comment to The Washington Post, refused to say whether Mr. Butler’s findings were accurate or not. He comments, “TSA does not comment on specifics of the screening process, which contain measures both seen and unseen. TSA Pre Check is only one part of our intelligence-driven, risk-based approach.”
According to The Washington Post, many boarding passes come with verification codes, which could prevent the attack from being carried out. However, the publication notes that some boarding passes are marked as “unverified” and appear to still be validated. As boarding passes can be printed up to 24 hours in advance, attackers could have a window of opportunity to analyze and modify an unverified pass.
A modified unverified pass could offer a free pass through security.
[Image Source: OC Register]
Chris Soghoian, an advocate at the American Civil Liberties Union, said poor security is nothing terribly new for the TSA. He created a website back in 2006 that allowed people to create fake boarding passes to test TSA security.
He comments on the latest hole, “If you have a team of four people [planning an attack], the day before the operation when you print the boarding passes, whichever guy is going to have the least screening is going to be the one who’ll take potentially problematic items through security. If you know who’s getting screened before you walk into the airport, you can make sure the right guy is carrying the right bags.”
The temptation, he points out, might be to use profiling or other tactics, but he notes the ACLU opposes them. He says such methods are unnecessary, if the TSA just did its job and encrypted the information on the passes. At the end of the day that’s the same conclusion Mr. Butler came to.
Both men made it clear that they did not test the attack by printing fake boarding passes. Mr. Butler stated that he believed that was a “legally grey area and morally black one”, while The Washington Post suggests, “[It] is illegal to tamper with a boarding card under U.S. law.”