(((These are Chaos Computer Club guys and Dutch guys ganging up on the hapless British, but the British are starting to look like the computer-security newbie putzes of the universe. Just wait till it dawns on the increasingly paranoid British public that (a) Oysters are, in reality, spychip leeches that cling to you and can be used to track you anywhere and (b) now any ID thief can clone you just be standing next to you with some kiddie-script and a scanner.)))
http://blog.wired.com/cars/2008/06/hackers-crack-l.html
Link: Hackers Crack London Tube's Ticketing System | Autopia from Wired.com.
http://www.pcworld.com/article/id,143371-c,privacysecurity/article.html
(((SANS:)))
–Dutch Researchers Break Mifare RFID Technology
(June 21 & 23, 2008)
Researchers at a Dutch university have broken the security of the Mifare
RFID chip, which is used in the Oyster card, a prepaid smartcard used for travel on UK public transportation. Mifare RFID technology is also used in the UK to access government departments, hospitals and schools.
The research was presented to the Dutch Parliament, which earlier this year postponed implementation of a prepaid transportation smartcard based on the same technology. The Dutch government is also replacing
Mifare cards used to access government buildings.
http://www.zdnet.co.uk/misc/print/0,1000000169,39437719-39001093c,00.htm http://www.vnunet.com/vnunet/news/2219828/london-oyster-cracked http://www.telegraph.co.uk/news/newstopics/politics/2168791/Oyster-card-fears-over-Mifare-security.html http://www.theregister.co.uk/2008/06/23/dutch_clone_oyster_card/print.html
[Editor's Note (Schultz): Over the past few years we've seen repeated claims concerning security weaknesses in the RFID chip. It was only a matter of time before there was a proof of concept of how these weaknesses can be exploited in real life settings.]
(((This wouldn't be such a big deal IF there wasn't so much spyware mission creep in RFID chips. Imagining obscurity is security, authority figures have trusted these things and built all kinds of semilegitimate or outright spookware apps on top of them. So while the British are blathering that there's no big whoop, the Dutch are coming out of their skins...
who do you think is being franker about the scope of the trouble here?)))
(((Includes a &%$$ DOS attack, which would potentially jam
London commuters into large slaughterable packs of victims as they found themselves unable to enter the underground. Oh the joy.)))
http://www.techradar.com/news/world-of-tech/oyster-card-cloned-398826
"More worryingly, the team also instigated a DDoS (denial of service) attack on a tube gate, putting it out of service.
"The 'research' was undertaken by researchers Wouter Teepe and Bart Jacobs. According to the pair, all they used was a regular laptop, where they managed to top-up their cards with credit, without actually paying any money...."