Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

Ask The Experts Forum

BlogsAsk The Experts ForumHave Security Access Cards Been Cloned Through Eavesdropping?

Have Security Access Cards Been Cloned Through Eavesdropping?

Posted By RFID Journal, 10.02.2013

Are there any case of this occurring?

—Name withheld

———

I am unaware of any instances of security access cards being cloned by eavesdroppers. In order to eavesdrop on the communication between a passive high-frequency (HF) tag and the reader that controls a door, you would need to be located within only a few feet of the device. The person presenting his or her RFID-enabled badge to the reader would very likely notice you standing there.

—Mark Roberti, Founder and Editor, RFID Journal

Login and post your comment!

Not a member?

Signup for an account now to access all of the features of RFIDJournal.com!

Next Post
What Types of RFID Tags Are Used for Aut...
Previous Post
Can RFID Manage Warranty Claims?
PREMIUM CONTENT
Case Studies Features Best Practices How-Tos
RFID JOURNAL EVENTS
Live Events Virtual Events Webinars
ASK THE EXPERTS
Simply enter a question for our experts.
TAKE THE POLL
JOIN THE CONVERSATION ON TWITTER
Loading
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations
© Copyright 2002-2016 RFID Journal LLC.
Powered By: Haycco