Gaping security flaw exposed on anti-tamper devices

19.01.2011
ARLINGTON, VA. -- Security devices used in transportation, packaging and even in accounting for nuclear materials are very vulnerable to attack, two security researchers warned on Tuesday at the Black Hat security conference.

The , known as "tamper-evident devices,' aren't intended to prevent theft but to alert inspectors that something has been broken into.

The devices are wide-ranging in design and application, and are used to seal everything from evidence bags, large shipping containers and even things like the warranty seal on an Xbox gaming console.

Jamie Schwettmann and Eric Michaud of i11 Industries went through a long list of devices at the conference here and explained, step-by-step, how each seal can be circumvented with common items, such as various solvents, hypodermic needles, razors, blow driers, and in more difficult cases with the help of tools such as drills.

Tamper-evident devices may be as old as civilization, and today are used in everyday products such as aspirin containers' paper seals. The more difficult devices may be bolt locks designed to secure shipping containers, or polycarbonate locks designed to shatter if cut.

But they all share something in common: They can be removed and the anti-tampering device reassembled.

Tampering can be discovered if people are looking specifically for it and test for it, but in most cases all these devices get is a "just kind of a once-over," said Schwettmann, "because we put so much trust in these things."

Michaud, who has worked on the Argonne Vulnerability Assessment Team training International Atomic Energy Agency (IAEA) inspectors, said the same type of anti-tamper devices used commercially are also used on containers that may store nuclear devices, waste, and equipment to help verify arms treaties.

Michaud believes those seals can be tampered with. "It's a massive risk," he said.

There aren't any controls on the use of the seals, said Michaud. He called one maker of seals and asked them for a sample. They sent "a non-voided legitimate stack of them," he said. If he wanted to forge the seals, he could have, he said.

Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at or subscribe to . His e-mail address is .

in Computerworld's Security Topic Center.