Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2006 Nov-Dec;13(6):601-7.
doi: 10.1197/jamia.M2143. Epub 2006 Aug 23.

The security implications of VeriChip cloning

Affiliations

The security implications of VeriChip cloning

John Halamka et al. J Am Med Inform Assoc. 2006 Nov-Dec.

Abstract

The VeriChip is a Radio-Frequency Identification (RFID) tag produced commercially for implantation in human beings. Its proposed uses include identification of medical patients, physical access control, contactless retail payment, and even the tracing of kidnapping victims. As the authors explain, the VeriChip is vulnerable to simple, over-the-air spoofing attacks. In particular, an attacker capable of scanning a VeriChip, eavesdropping on its signal, or simply learning its serial number can create a spoof device whose radio appearance is indistinguishable from the original. We explore the practical implications of this security vulnerability. The authors argue that:1 The VeriChip should serve exclusively for identification, and not authentication or access control. 2 Paradoxically, for bearer safety, a VeriChip should be easy to spoof; an attacker then has less incentive to coerce victims or extract VeriChips from victims' bodies.

PubMed Disclaimer

Comment in

Similar articles

Cited by

References

    1. Second meeting of the American Health Information Community, 29 November 2005. Available at: http://www.hhs.gov/healthit/m20051129.html.
    1. Albrecht K, McIntyre L. The Spychips Threat: Why Christians Should Resist RFID and Computer Tracking. Nelson Current; 2006.
    1. Bahney A. High tech, under the skin New York Times 2006. 2 February. Available at: http://www.nytimes.com/2006/02/02/fashion/thursdaystyles/02tags.html. Accessed February 2, 2006.
    1. Bono S, Green M, Stubblefield A, Juels A, Rubin A, Szydlo M. Security analysis of a cryptographically-enabled rfid device 14th USENIX Security Symposium. 2005. pp. 1-16Baltimore, Maryland, USA, July-August. USENIX Videos and other information available at www.rfidanalysis.org .
    1. VeriChip Corporation Procedure for VeriMedTM system use. 2006. Available at: www.verimedinfo.com/files/VeriMed%20ER%20Protocol.pdf .