Watching us through the Sorting Door

Ex-spook and SAP launch RFID research project


A former CIA intelligence analyst and researchers from SAP plan to study how RFID tags might be used to profile and track individuals and consumer goods.

"I believe that tags will be readily used for surveillance, given the interests of various parties able to deploy readers," said Ross Stapleton-Gray, former CIA analyst and manager of the study, called the Sorting Door Project.

Sorting Door will be a test-bed for studying the massive databases that will be created by RFID tags and readers, once they become ubiquitous. The project will help legislators, regulators and businesses make policies that balance the interests of industry, national security and civil liberties, said Stapleton-Gray.

In Sorting Door, RFID readers (whether in doorways, walls or floors, or the hands of workers) will collect data from RFID tags and feed them into databases.

Sorting Door participants will then investigate how the RFID tag's unique serial numbers, called EPCs, can be merged with other data to identify dangerous people and gather intelligence in a particular location.

For example, a computer could alert customs officials when sensors show that a container's contents do not match the descriptions provided by its EPCs. Or a doorway RFID reader might detect suspicious individuals, such as someone wearing a heavy coat into a bank on a 90 degree day.

Government investigators could also build profiles about individuals through the EPCs, such as their tastes in clothing, or their reading preferences.

RFID/EPC tags on consumer goods "may give clues to their owners' interests, habits, and activities," according to the Sorting Door proposal. This data could be acted upon by security sentinels, or devices that greet recognized customers.

Sorting Door gets its name from the Sorting Hat in the "Harry Potter" books, which magically determines which school house its wearer will join.

The data mining software in Sorting Door would be provided by SAP, an enterprise software company, which has worked on RFID tests with Wal-Mart, Procter and Gamble and the Metro Group.

RFID, an acronym for radio frequency identification, is widely used in highway toll-pay transponders, contactless payment devices and proximity (or "prox") cards used in offices.

Sorting Door will largely focus on RFID/EPC tags (EPC is short for Electronic Product Code), which will eventually replace the barcode on consumer goods, according to retailers' plans.

Many retailers and their suppliers hope to create databases merging the EPCs on purchased items with shoppers' credit and customer loyalty cards. The companies could then use that information to pitch new products at specific consumers - wherever RFID/EPC reader devices are set up to spot them.

The U.S. Department of Homeland Security may also be interested in having access to these databases, which will help form what some are calling the EPC Network, and others "The Internet of Things."

The U.S. Department of Defense, which has gigantic supply chains, will be a major contributor of databases to the EPC Network.

Homeland Security has been contemplating joining Sorting Door, since Stapleton-Gray talked with the agency about the project several weeks ago.

"RFID tags have some promising potentials, but also some serious questions," said Homeland Security spokeswoman Valerie Smith. "So research like this can be helpful."

Smith said that Homeland Security would not be commenting specifically on whether it is joining Sorting Door at this time.

Privacy advocates worry that the government is already eyeing ways to access the EPC Network. Several airlines have already shown their willingness to turn over their databases to federal authorities, in the name of national security.

"The government is already doing a lot of data mining, with databases from the private sector," said Katherine Albrecht, director of the consumer privacy group, <http://www.nocards.org" target=new>CASPIAN. "It lets them get around that pesky Fourth Amendment to the Constitution (which protects citizens from arbitrary searches). This is data they would be not allowed to get on their own."

Privacy advocates, for their part, expect Sorting Door to show how RFID tags will turn shoes and clothes into tracking beacons for marketers and government snoops.

That is one unique aspect of Sorting Door: It is open to all stakeholders in the RFID debate, including privacy watchdogs, the RFID industry, and the government.

But the RFID industry - those who make radio tags and those who buy them - are afraid of revealing RFID's "spy chip" capabilities, according to civil libertarians.

RFID users such as Procter and Gamble will not be interested in Sorting Door, because the results will be open to public scrutiny, said Electronic Frontier Foundation senior staff attorney Lee Tien.

"The burden is on the proponents of tracking devices to show that they are not going to contribute to a surveillance infrastructure," said Tien. "But (the retailers) are not willing to have an honest conversation with society."

Tien said he supports the mission of the Sorting Door project.

Retailers and suppliers, the RFID/EPC standards body EPC Global, and representatives of industry- backed RFID laboratories either declined to be interviewed for this story, or did not respond to interview requests.

Some of the industry representatives said they were unfamiliar with Sorting Door. Stapleton-Gray said he hopes to brief retailers, consumer packaged goods producers and EPC Global on the project in the near future, however.

SAP's involvement will likely get the attention of others in the industry.

Tao Lin, director of Auto-ID (or EPC) research at SAP Labs in Palo Alto, Calif., is combining an EPC Network data mining project of his own with Sorting Door.

The EPC Network is an inevitability, said Lin, and now is the time to learn about its potential for securing people and goods, or for being abused by the government.

"We need to proactively investigate the issues," said Lin, "before we set up laws and rules to facilitate or prevent certain uses of this infrastructure."®

Related stories

Your fingerprints are everywhere
Germans plan biometric hooligan clampdown
Privacy groups slam US passport technology
World Cup tickets will contain RFID chips
IVF clinics may tag embryos


Other stories you might like

  • India extends deadline for compliance with infosec logging rules by 90 days
    Helpfully announced extension on deadline day

    India's Ministry of Electronics and Information Technology (MeitY) and the local Computer Emergency Response Team (CERT-In) have extended the deadline for compliance with the Cyber Security Directions introduced on April 28, which were due to take effect yesterday.

    The Directions require verbose logging of users' activities on VPNs and clouds, reporting of infosec incidents within six hours of detection - even for trivial things like unusual port scanning - exclusive use of Indian network time protocol servers, and many other burdensome requirements. The Directions were purported to improve the security of local organisations, and to give CERT-In information it could use to assess threats to India. Yet the Directions allowed incident reports to be sent by fax – good ol' fax – to CERT-In, which offered no evidence it operates or would build infrastructure capable of ingesting or analyzing the millions of incident reports it would be sent by compliant organizations.

    The Directions were roundly criticized by tech lobby groups that pointed out requirements such as compelling clouds to store logs of customers' activities was futile, since clouds don't log what goes on inside resources rented by their customers. VPN providers quit India and moved their servers offshore, citing the impossibility of storing user logs when their entire business model rests on not logging user activities. VPN operators going offshore means India's government is therefore less able to influence such outfits.

    Continue reading
  • Hangouts hangs up: Google chat app shuts this year
    How many messaging services does this web giant need? It's gotta be over 9,000

    Google is winding down its messaging app Hangouts before it officially shuts in November, the web giant announced on Monday.

    Users of the mobile app will see a pop-up asking them to move their conversations onto Google Chat, which is yet another one of its online services. It can be accessed via Gmail as well as its own standalone application. Next month, conversations in the web version of Hangouts will be ported over to Chat in Gmail. 

    Continue reading
  • OpenSSL 3.0.5 awaits release to fix potential worse-than-Heartbleed flaw
    Though severity up for debate, and limited chips affected, broken tests hold back previous patch from distribution

    The latest version of OpenSSL v3, a widely used open-source library for secure networking using the Transport Layer Security (TLS) protocol, contains a memory corruption vulnerability that imperils x64 systems with Intel's Advanced Vector Extensions 512 (AVX512).

    OpenSSL 3.0.4 was released on June 21 to address a command-injection vulnerability (CVE-2022-2068) that was not fully addressed with a previous patch (CVE-2022-1292).

    But this release itself needs further fixing. OpenSSL 3.0.4 "is susceptible to remote memory corruption which can be triggered trivially by an attacker," according to security researcher Guido Vranken. We're imagining two devices establishing a secure connection between themselves using OpenSSL and this flaw being exploited to run arbitrary malicious code on one of them.

    Continue reading
  • Not enough desks and parking spots, wobbly Wi-Fi: Welcome back to the office, Tesla staff
    Don't worry, the tweetings will continue until morale improves

    Employees at Tesla suffered spotty Wi-Fi and struggled to find desks and parking spots when they were returned to work at the office following orders from CEO Elon Musk.

    Most tech companies are either following a hybrid work model or are still operating fully remotely. Musk, however, wants his automaker's staff back at the office working for at least 40 hours a week. Those who fail to return risk losing their jobs, he warned in an internal email earlier this month.

    "Everyone at Tesla is required to spend a minimum of 40 hours in the office per week. Moreover, the office must be where your actual colleagues are located, not some remote pseudo office. If you don't show up, we will assume you have resigned," he wrote.

    Continue reading
  • LGBTQ+ folks warned of dating app extortion scams
    Uncle Sam tells of crooks exploiting Pride Month

    The FTC is warning members of the LGBTQ+ community about online extortion via dating apps such as Grindr and Feeld.

    According to the American watchdog, a common scam involves a fraudster posing as a potential romantic partner on one of the apps. The cybercriminal sends explicit of a stranger photos while posing as them, and asks for similar ones in return from the mark. If the victim sends photos, the extortionist demands a payment – usually in the form of gift cards – or threatens to share the photos on the chat to the victim's family members, friends, or employer.

    Such sextortion scams have been going on for years in one form or another, even attempting to hit Reg hacks, and has led to suicides.

    Continue reading
  • 5G C-band rollout at US airports slowed over radio altimeter safety fears
    Well, they did say from July, now they really mean from July 2023

    America's aviation watchdog has said the rollout of 5G C-band coverage near US airports won't fully start until next year, delaying some travelers' access to better cellular broadband at crowded terminals.

    Acting FAA Administrator Billy Nolen said in a statement this month that its discussions with wireless carriers "have identified a path that will continue to enable aviation and 5G C-band wireless to safely co-exist."

    5G C-band operates between 3.7-3.98GHz, near the 4.2-4.4GHz band used by radio altimeters that are jolly useful for landing planes in limited visibility. There is or was a fear that these cellular signals, such as from cell towers close to airports, could bleed into the frequencies used by aircraft and cause radio altimeters to display an incorrect reading. C-band technology, which promises faster mobile broadband, was supposed to roll out nationwide on Verizon, AT&T and T-Mobile US's networks, but some deployments have been paused near airports due to these concerns. 

    Continue reading
  • IBM settles age discrimination case that sought top execs' emails
    Just days after being ordered to provide messages, Big Blue opts out of public trial

    Less than a week after IBM was ordered in an age discrimination lawsuit to produce internal emails in which its former CEO and former SVP of human resources discuss reducing the number of older workers, the IT giant chose to settle the case for an undisclosed sum rather than proceed to trial next month.

    The order, issued on June 9, in Schenfeld v. IBM, describes Exhibit 10, which "contains emails that discuss the effort taken by IBM to increase the number of 'millennial' employees."

    Plaintiff Eugene Schenfeld, who worked as an IBM research scientist when current CEO Arvind Krishna ran IBM's research group, sued IBM for age discrimination in November, 2018. His claim is one of many that followed a March 2018 report by ProPublica and Mother Jones about a concerted effort to de-age IBM and a 2020 finding by the US Equal Employment Opportunity Commission (EEOC) that IBM executives had directed managers to get rid of older workers to make room for younger ones.

    Continue reading
  • FTC urged to probe Apple, Google for enabling ‘intense system of surveillance’
    Ad tracking poses a privacy and security risk in post-Roe America, lawmakers warn

    Democrat lawmakers want the FTC to investigate Apple and Google's online ad trackers, which they say amount to unfair and deceptive business practices and pose a privacy and security risk to people using the tech giants' mobile devices.

    US Senators Ron Wyden (D-OR), Elizabeth Warren (D-MA), and Cory Booker (D-NJ) and House Representative Sara Jacobs (D-CA) requested on Friday that the watchdog launch a probe into Apple and Google, hours before the US Supreme Court overturned Roe v. Wade, clearing the way for individual states to ban access to abortions. 

    In the days leading up to the court's action, some of these same lawmakers had also introduced data privacy bills, including a proposal that would make it illegal for data brokers to sell sensitive location and health information of individuals' medical treatment.

    Continue reading

Biting the hand that feeds IT © 1998–2022