Flaw in TSA Boarding Passes Lets You Print New Tickets to Skip Screening
October 25, 2012 4:04 PM
comment(s) - last by
Vulnerable information could help malicious parties plan attacks
U.S. Transportation Safety Administration
spent hundreds of millions
of dollars to
blanket the nation's airports
"nude" full-body scanners
. However, base security still relies heavily on
-- pat-downs and luggage scans -- amid concerns regarding the efficacy of the
I. TSA Uses Unencrypted Barcode Info to Designate Not-so-Random "Random" Searches
That's why the findings of an aviation blogger -- John Butler -- are particularly troubling. They represent a serious compromise in security procedures by allowing passengers to know, via inspecting their barcode, whether they will be subject to conventional screens.
his findings to his blog
The flaw is specific to the TSA's pre-screening program. That program allows frequent fliers to pay a fee to get to skip certain digital screening requirements. Passengers who pay the fee get to carry on approved liquids in their luggage, don't have to remove their personal electronics, and can keep their belts/shoes on, when travelling through the scanners.
The idea is that the passengers are pre-screened to try to weed out potential violent threats, and then to use the possibility of random screens to deter any would be terrorists from going to great lengths to try to exploit the program.
Except the screens weren't random. According to Mr. Butler, they appear to be pre-determined, and worse yet the barcode on your ticket tells -- without encryption -- whether you will be screened.
The decoded contents of Mr. Butler's boarding pass. [Image Source: PuckInFlight]
The majority of the barcode encodes your name, flight number, departure city, destination city, seat number, etc. But the final encoded number is a mysterious '1' or '3'. The number encodes a number of beeps that prompts the TSA agents -- in predetermined fashion -- whether to screen the passenger (1 beep means no conventional pre-check, 3 beeps means to do a conventional pre-check).
II. Want to Illegally Skip Security? Print a Modified Boarding Pass
As Mr. Butler points out, a malicious flyer could read their bar code information, then re-encode a new bar code with the '3' replaced with a '1'. The blogger summarizes:
What terrorists or really anyone can do is use a website to decode the barcode and get the flight information, put it into a text file, change the 1 to a 3, then use another website to re-encode it into a barcode. Finally, using a commercial photo-editing program or any program that can edit graphics replace the barcode in their boarding pass with the new one they created. Even more scary is that people can do this to change names. So if they have a fake ID they can use this method to make a valid boarding pass that matches their fake ID. The really scary part is this will get past both the TSA document checker, because the scanners the TSA use are just barcode decoders, they don’t check against the real time information. So the TSA document checker will not pick up on the alterations. This means, as long as they sub in 3 they can always use the Pre-Check line.
Sterling Payne, in
a comment to
The Washington Post
, refused to say whether Mr. Butler's findings were accurate or not. He comments, "TSA does not comment on specifics of the screening process, which contain measures both seen and unseen. TSA Pre Check is only one part of our intelligence-driven, risk-based approach."
The Washington Post
, many boarding passes come with verification codes, which could prevent the attack from being carried out. However, the publication notes that some boarding passes are marked as "unverified" and appear to still be validated. As boarding passes can be printed up to 24 hours in advance, attackers could have a window of opportunity to analyze and modify an unverified pass.
A modified unverified pass could offer a free pass through security.
[Image Source: OC Register]
, an advocate at the
American Civil Liberties Union
, said poor security is nothing terribly new for the TSA. He created a website back in 2006 that allowed people to create fake boarding passes to test TSA security.
He comments on the latest hole, "If you have a team of four people [planning an attack], the day before the operation when you print the boarding passes, whichever guy is going to have the least screening is going to be the one who’ll take potentially problematic items through security. If you know who’s getting screened before you walk into the airport, you can make sure the right guy is carrying the right bags."
The temptation, he points out, might be to use profiling or other tactics, but he notes the ACLU opposes them. He says such methods are unnecessary, if the TSA just did its job and encrypted the information on the passes. At the end of the day that's the same conclusion Mr. Butler came to.
Both men made it clear that they did not test the attack by printing fake boarding passes. Mr. Butler stated that he believed that was a "legally grey area and morally black one", while
The Washington Post
suggests, "[It] is illegal to tamper with a boarding card under U.S. law."
Puck In Flight [John Butler]
The Washington Post
This article is over a month old, voting and posting comments is disabled
RE: This report doesn't make a lot of sense.
10/25/2012 6:29:21 PM
I forgot to emphasize that there is nothing on a boarding pass that exists that allows you to "avoid normal intrusive search(es)". The only things that exists is Pre-Check (which allows some things to be left in your carry on) and age differences of less than 12 and older than 75 (which allows footware/jackets, and less intrusive patdown).
"Well, we didn't have anyone in line that got shot waiting for our system." -- Nintendo of America Vice President Perrin Kaplan
Appeals Court Bends Over For TSA, Punts "Prompt" Nude Scanner Hearings
September 27, 2012, 7:29 AM
TSA Refuses to Hold Public Hearings on Nude Scanners, Court Chimes In
August 2, 2012, 10:45 AM
TSA Patdown Leaves 6-Year Old in Tears, Gov't Defends Actions
April 14, 2011, 10:01 AM
TSA Worker Assaults Boss After Body Scanner Reveals Genitalia
May 7, 2010, 1:50 PM
DHS Begins Mass Rollout of Airport Scanners Despite Health, Privacy Risks
March 8, 2010, 10:30 AM
Temple University Researchers Hit the Delete Button on HIV, Remove it from Human Cells
July 22, 2014, 7:39 AM
Airbus Shows Off All-Electric E-Fan 2.0 Airplane, Plans Production in 2017
July 21, 2014, 9:29 AM
Buzz Aldrin Says First Astronauts to Set Foot on Mars Should Never Return Home
July 9, 2014, 9:46 AM
Women May Soon Be Able to Control Their Fertility via Remote Control
July 7, 2014, 10:14 AM
Tiny "Bio-bots" Powered by Muscle Cells, Electrical Pulses
July 3, 2014, 7:00 PM
Boston Using Solar-Powered Benches as Phone Charging Stations
July 1, 2014, 1:09 PM
Most Popular Articles
Microsoft Kills Entertainment Unit, May Shelve Flagship Lumia "McLaren"
July 18, 2014, 7:40 PM
Boeing 777 Malaysian Airlines Flight 17 Crashes in Ukraine
July 17, 2014, 1:00 PM
Google Signs Controversial Deal With Pharmaceutical Giant Novartis
July 16, 2014, 7:32 PM
Toyota Scientist: Autonomous Vehicles May Lead to Increased Fuel Consumption, Pollution
July 18, 2014, 2:42 PM
JJ Abrams Unveils X-Wing Starfighter for New "Star Wars" Movie
July 21, 2014, 12:24 PM
Latest Blog Posts
Space Terrorism is a Looming Threat For the United States
Apr 23, 2014, 7:47 PM
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information