In 2006 Adam Laurie wrote software that tries all known passport keys within a given range, thus implementing one of Witteman's attacks.
These test specifications are updated with every new protocol and are covering details starting from the paper used and ending in the chip that is included.
Laurie demonstrated the attack by reading the chip of a Daily Mail reporter's passport in its envelope without opening it.
In 2006 Lukas Grunwald demonstrated that it is trivial to copy passport data from a passport chip into a standard ISO/IEC 14443 smartcard using a standard contactless card interface and a simple file transfer tool.
In 2008 Jeroen van Beek demonstrated that not all passport inspection systems check the cryptographic signature of a passport chip.
For his demonstration Van Beek altered chip information and signed it using his own document signing key of a non-existing country.