RFID skimming is a form of digital theft, which enables information from RFID based smart cards to be read and duplicated. It can be used as a form of wireless identity theft or credit card theft among other forms of information theft. Typically it works by illegitimate reading of RFID chips at a distance using an RFID reader device, which downloads the card information.
Incidence
RFID skimming has been reported as far back as 2008 and as recently as 2013,
In 2010, Identity Theft Resource Center reported no known incidents of criminal skimming; however, according to the founder of Identity Stronghold, levels of theft are difficult to determine, as victims typically do not know how their card data was compromised.
Methods for preventing RFID skimming
Shielding
Shielding attempts to block radio signals from reaching the tag by enclosing it within a container made of material that blocks electromagnetic signals in the RFID spectrum by acting as a Faraday cage.
RFID blocking wallets and sleeves
Shielded containers for regular use in the form of single-document sleeves, wallets, pouches, etc.
Metal foil
Shielding is possible simply and inexpensively by wrapping a tagged object in aluminum foil, which can be configured as a sleeve permitting a card to be slid out. Informal tests found that the shielding effect was not 100% effective, though it did very much reduce the maximum range for reading, from about 1.5 feet (50Â cm) to 1â"2 inches (3â"5Â cm).
Permanent disabling of RFID functionality
RFID functionality can be disabled permanently by cutting internal wires; use of a microwave oven has also been reported successful, according to informal reports. Cutting requires location of the internal wires, followed by cutting, drilling, or heating. Methods that visibly damage the card may lead to its being rejected as a payment method when presented to a retailer in the normal way.
Temporarily blocking RFID functionality
A new technology which has not been widely deployed, a blocking card is a credit card-sized security device intended to be kept close to vulnerable cards. It works by detuning the RFID signal of nearby cards, and thus allows them to be stored in a non-shielded container. When removed from the proximity of the blocking card for legitimate uses they function normally. The efficacy of these blocking cards has been challenged.
RFID alarms
There are devices that detect any attempt to read an RFID device and generate an alarm. They cannot know whether the access is legitimate or not.