RFID skimming

Wikipedia Open wikipedia design.

RFID skimming is a proposed form of digital theft that has never occurred, which its authors claim information from RFID based smart cards could be read and duplicated. If it were real it could be used as a form of wireless identity theft or credit card theft among other forms of information theft. It does not work however cards are now encrypted thus making the reading of RFID cards by this method theoretically impossible. Banks do not recommend the use of RFID blocking devices for example wallets, bags or card sleeves as this potential crime does not really exist.


RFID skimming has been reported as far back as 2008 by the inventors and vendors of RFID materials[1] and as recently as 2013,[2]

In 2010, Identity Theft Resource Center reported no known incidents of criminal skimming; however, according to the founder of Identity Stronghold, levels of theft are difficult to determine, as victims typically do not know how their card data was compromised.[3]

No real world crime of RFID skimming has ever been reliably reported by law enforcement authorities, it is a "crime" that does not really exist. RFID skimming is a constructed problem designed to raise fear and sell RFID protecting items. [4]

Methods for preventing RFID skimming[edit]


Shielding attempts to block radio signals from reaching the tag by enclosing it within a container made of material that blocks electromagnetic signals in the RFID spectrum by acting as a Faraday cage.[5]

RFID blocking wallets and sleeves[edit]

Shielded containers for regular use in the form of single-document sleeves, wallets, pouches, etc.

Metal foil[edit]

Shielding is possible simply and inexpensively by wrapping a tagged object in aluminum foil,[6] which can be configured as a sleeve permitting a card to be slid out. Informal tests found that the shielding effect was not 100% effective, though it did very much reduce the maximum range for reading, from about 1.5 feet (50 cm) to 1–2 inches (3–5 cm).[7]

Permanent disabling of RFID functionality[edit]

RFID functionality can be disabled permanently by cutting internal wires; use of a microwave oven has also been reported successful, according to informal reports.[8] Cutting requires location of the internal wires, followed by cutting, drilling, or heating. Methods that visibly damage the card may lead to its being rejected as a payment method when presented to a retailer in the normal way.

Temporarily blocking RFID functionality[edit]

A new technology which has not been widely deployed, a blocking card is a credit card-sized security device intended to be kept close to vulnerable cards. It works by detuning the RFID signal of nearby cards, and thus allows them to be stored in a non-shielded container. When removed from the proximity of the blocking card for legitimate uses they function normally. The efficacy of these blocking cards has been challenged.[citation needed]

RFID alarms[edit]

There are devices that detect any attempt to read an RFID device and generate an alarm. They cannot know whether the access is legitimate or not.


  1. ^ boingboingtv. "How to hack RFID-enabled Credit Cards for $8". YouTube. Retrieved 3 August 2013. 
  2. ^ Garble Card. "walletCG". YouTube. Retrieved 3 August 2013. 
  3. ^ "Electronic Pickpocketing". WREG. 3 December 2010. Archived from the original on 1 January 2011. Retrieved 3 August 2013. 
  4. ^ CSO Online - THe Truth About RFID Credit Card Faud December 19 2017
  5. ^ Lee, Joel. "What Are RFID-Blocking Wallets & Which Should You Buy?". MakeUseOf. Retrieved 4 September 2017. 
  6. ^ "Can Aluminum Shield RFID Chips?". RFID Shield. Archived from the original on March 30, 2014. 
  7. ^ "Aluminum Foil Does Not Stop RFID". Omniscience is Bliss. 
  8. ^ Instructables Web site:How to Disable 'Contactless Payment' on Your Debit Card

This page is based on a Wikipedia article written by contributors (read/edit).
Text is available under the CC BY-SA 4.0 license; additional terms may apply.
Images, videos and audio are available under their respective licenses.