The Vault. In this issue: Bringing Biometrics into Play in the UK p. 4. digital

Size: px
Start display at page:

Download "The Vault. In this issue: Bringing Biometrics into Play in the UK p. 4. digital"

Transcription

1 a security-news.tv publication by K O B N july 2009 #02 The Vault digital In this issue: Bringing Biometrics into Play in the UK p. 4 Exclusive: UK says no to the Big Bang approach p. 20 That s one small step for the UK p. 24 ID cools off under Obama administration p. 28 An automated future for border control p. 34 PDA security is just an App away p. 44 ID crosses borders p. 52

2 Editorial The UK ID Project nothing more than a phantom pregnancy? Nicole Mountain, Channel Director, Security-News.tv Over the past few months, the debate surrounding the UK ID project has intensified from both the political and consumer point of view. The controversy was further fuelled by the leader of the Conservative Party, David Cameron, as he pledged to scrap the Labour initiative under a conservative ruled government after the 2010 National Elections, causing a wave of uncertainty and speculation amongst the companies who have already won and are in the process of submitting bids for elements of the project. Home Office officials however, continue to support and defend the project as a solution to fight terrorism, crime associated with identity theft and illegal immigration, along with helping citizens to easily prove their identity. In the midst of this debate, Security-News.tv took the opportunity to speak with Duncan Hine, Executive Director Integrity & Security (page 20), and Bob Carter, Consultant, PKI, Encryption & Chip (page 24), at the Identity & Passport Service (IPS) to find out more about the technology behind the scheme. On the same topic, UK biometrics expert Calum Bunney takes a closer look at the bigger biometric picture of the NIS project on page 4. For an overseas perspective on the discussions around ID schemes, read our interview with Janice Kephart, Director National Security Policy at The Centre for Immigration Studies in Washington D.C.(page 28). Kephart was involved with the US 9/11 commission from 2001 and has a very interesting view on the developments in this area since the Obama Administration has come into power. Looking at the entire system behind any ID solution, we met up with Matthew Finn MD of Augmentiq (page 34) to get an insight into the challenges of border control applications. SAFE ID Solutions s Katja Sommerfeld speaks about how eid can increase security and therefore add value at border crossing situations on page 86. And find out from Karin Sveheim at Precise Biometrics how integrating biometrics in the mobile phone could enhance future registered travel programs on page 78. A special feature in our publication comes from the independent industry association Silicon Trust with articles on the subject of eresidency permits, eticketing and Trusted Computing (from page 72). Nicole Mountain security-news.tv

3 Contents The Vault july 2009 contents Cover story Bringing Biometrics into Play in the UK 4 By Calum Bunney, Independent consultant Identity and Authentication Technology Solutions UK says no to the Big Bang approach 20 Interview with Dr. Duncan Hine, Home Office Identity and Passport Service, UK That s one small step for the UK, one giant leap for Europe 24 Interview with Bob Carter, Home Office Identity and Passport Service, UK ID cools off under Obama administration 28 Interview with Janice Kephart, Center for Immigration Studies, USA An automated future for border control 34 Interview with Matthew Finn, Augmentiq PDA security is just an App away 44 Interview with Sven Gossel, charismathics ID crosses borders 52 Interview with Dr. Detlef Houdeau, Infineon Technologies The Silicon Trust Second wave of biometric documents in Europe 60 By Detlef Houdeau, Infineon Technologies and member of the Silicon Trust Smart tickets a proven solution for future transport systems 64 By Dr Roland Magiera, Giesecke & Devrient and Ramona Mache, Infineon Technologies and member of the Silicon Trust Trusted Computing for the Future 72 By Hans Brandl, Infineon Technologies and member of the Silicon Trust Match-on-SIM a new frontier for the aviation industry 78 By Karin Sveheim, Precise Biometrics and member of the Silicon Trust A question of security 84 Interview with Allan Harle, Inspectron and member of the Silicon Trust Intelligent security at the border 86 By Katja Sommerfeld, SAFE ID Solutions and member of the Silicon Trust If you are viewing this publication in PDF format, click on any article title to go directly to the page. Edited video transcript Edited audio transcript 2 security-news.tv security-news.tv

4 bringing biometrics into play in the uk Bringing Biometrics into Play in the UK By Calum Bunney, Independent consultant - Identity and Authentication Technology Solutions security-news.tv security-news.tv

5 bringing biometrics into play in the uk For the last three or four years the UK has been promoted widely as a leader in public sector biometric planning and deployment. Dedicated Identity legislation, passed in 2006, has enabled the UK to position itself as a European leader for the establishment of a government-wide integrated biometric identity management platform. Outside of the United States, and post-9/11, there has not been a government biometric program with such scope, investment and longterm ambition. For the United Kingdom, the historical approach to managing identity has greater similarity with that in the United States than with fellow EU member states. The uses for identity in particular for unique identifiers in respect of nationality, healthcare, taxation and social welfare rights, and driver licensing are restricted in both countries to the individual delivery businesses, each of which defines, manages, and polices identity in its own way. In both the UK and the US the main source of unique identifiers national social insurance numbers is too flawed to use as the foundation for layered identitybased services. Biometrics offers a new basis on which to build unique identities and go beyond the limitations of other means of unique identification and authentication. Biometrics offers a new basis on which to build unique identities and go beyond the limitations of other means of unique identification and authentication. In the United States identity programs have begun mass deployment of biometrics for the identification and management of foreign nationals, and for limited groups of workers in critical infrastructure businesses. In the UK the biometric proposal has been considerably more ambitious than this, with a ten-year plan to capture the biometric data faces and all fingerprints of those residing in the UK and over the age of sixteen. The significance of the UK proposal for biometrics should not be understated, because the UK, if it is not the prophet of biometrics, has at least been set to become the patron saint of biometric identity services, for the governmental community at least. The UK National Identification Scheme (NIS), with a predicted contractual value of around five billion pounds (GBP 5 Billion) between 2008 and 2018, has promised to be a major boost for biometric development and credibility; and with their eyes on this prize the biometrics suppliers and the identification security industries have kept themselves busy in observation and discussion with the technical evolution of the NIS. Along with this, technical evolution has run an unsteady current of public and political activity and opinion formation about the development and cost of Identity Management to the UK. In the beginning this shaped the development of the NIS, but it has continued to debate key issues about the cost and the consequence of state applications of biometric technologies. In its earlier stages, around 2004, the NIS began as an effort to understand how identity management across all of UK government might be improved: how this might deliver a wider shared benefit; how individual identities might be defined, established and managed to prevent against fraud in service delivery as well as against the defrauding of individual identities. Both the security-news.tv security-news.tv

6 bringing biometrics into play in the uk state and the citizen should gain a clear benefit. These efforts then moved on to a more pragmatic need to accommodate business commitments and development programmes already underway. Unlike most of Europe, the UK does not operate a citizen identity registration system that has dedicated structures to support the mandatory authority to demand that a citizen registers and reports important changes; the point rather is that the NIS should provide this amongst other things. This means that the NIS is starting from behind where other EU countries currently sit in their management of citizen identity. When other UK commitments to identity, biometrics in particular, are taken into the calculation of business change, then the UK proposal is clearly very ambitious. It wants to overtake fellow EU member states in the accuracy and reliability of managing individual citizen and residents identities, and it wants to integrate systematically all (with the exception of criminal justice) governmental requirements for biometrics within one Biometric Identity Management provision. The design for the NIS would therefore integrate and provide a home for the following businesses and activities: Asylum: To continue with the proven effective use of ten print fingerprint capture and biometric data sharing of Asylum Seeker identities across the EU. This is supported by a biometric fingerprint AFIS system. Visas: To manage the growing overseas (i.e. point of application) use of ten print fingerprint capture for UK Visa applicants to detect fraudulent and barred applicant entrants to the UK. Biometric information from visa applicants is managed separately but will be shared for comparison with other UK biometric databases, to see whether, for example, that a visa applicant has ever applied for asylum or residence in the UK, or whether s/he has a criminal record. Overseas passport applications: Interfacing to receive and manage the capture of biometric and other passport applications data by the UK Foreign & Commonwealth Office at overseas consular locations. Birth: To realize an early identity authentication benefit from the conversion to digital of birth, marriage, and death records for most of the UK, the data recording systems for England, Wales, and Northern Ireland have been assimilated to the UK s Identity & Passport Service. Birth, death, and marriage mark obvious key events in anyone s biography. Biography: To increase the use of biographical foot-printing techniques as a key part of the process of identity authentication for passport applications in particular. Binding a biographical identity to a biometric would create false trust if that biographical identity could be counterfeit. Before introducing biometrics as a means of assuring uniqueness for identities in the NIS records, all means of checking biographies, and of assessing the risk of these, need to be explored thoroughly. Thanks largely to the commercial activities of the financial sector, the technical methods for profiling and collecting biographical footprints have become very powerful tools and capabilities of these are now being designed into the new systems for identity document applications processing. security-news.tv security-news.tv 9

7 bringing biometrics into play in the uk Biometrics: The EU proposal is to introduce a second biometric, with two index fingerprint images stored to passports issued from mid-2009 onwards. The timing of this EU requirement has not proven to be convenient for the introduction of the NIS, which has wider reaching plans for biometric data capture and management, so the UK plans to take advantage of the fact that it is not an actual signatory to the EU Treaty governing passports, to delay its introduction of fingerprint data to passports until In all other respects the UK has met with, often as a technology leader, EU passport security requirements. The proposal for integrated management of biometrics in the UK will reflect not just the different government users or creators of biometric records (asylum, visas, residence permits, identity cards and passports), but it also has to provide for the many shared biometric communications and formats required for biometric data, as well as for the secure storage and secure formatting of biometric data (e.g. for inclusion to machine readable documents). To address the requirement for a multi-client National Biometric Identification System then the Identity & Passport Service awarded a contract to IBM in April Cryptographical structures: The ICAO-led move to a global Public Key Directory structure that supports trust for validating biometric travel documents (i.e. those with an ICAO compliant RFID chip) is a security and technical interoperability challenge that will test the will and capability of the UK government to move ahead with any other identity interoperability initiatives that are likely to emerge within the EU in the next ten years of the NIS. Other EU states, rather than focus on internal state integration of biometric management, have been focused more on the mutual recognition and trusted use of one another s identity credentials, for the most part as a facilitator of citizen freedom of movement with EU borders. Enrolment: The introduction in the UK of face-to-face passport interviews for higher risk applicant groups forms the need to create a wider network of identity offices for this purpose. This office network should eventually provide a mechanism for the convenient capture of applicant biometric information. Unlike the requirement for a face-to-face interview, which would be based on an assessment of risk posed by the applicant s biography, the biometric enrolment would be a universal requirement for anyone applying for a passport or identity card. Applicants for visas or asylum already have biometric enrolment structures in place. The UK Identity & Passport Service has not yet decided how it will go about capturing biometrics. The option to take ownership for a well distributed network of enrolment centers is probably not a financially attractive one, and the leading contender for developing a geographically customer friendly biometric enrolment network is probably the UK Post Office. The Post Office currently provides an optional front-end service to check passport applications. To introduce some competition to this situation the Identity & Passport Service has been exploring the idea that locations for traditional photo booth technologies (such as pharmacies and supermarkets) might be able to offer some form of biometric enrolment facilities. How this might work appears to be under current investigation. If the quality of biometric enrolment is critical to the effectiveness of the entire investment in biometrics, as well as to the principle of biometric introduction to support other new investments in identity management, including the cost of multi-application integration (asylum, visas, passports, identity cards), then there are important issues to resolve. Will the solutions for this enrolment be wholly automated or partially mediated by trained staff; who will take responsibility for the biometric data generated; will the need to control costs result in a compromise on biometric quality; is there a competitive market for this service? 10 security-news.tv security-news.tv 11

8 bringing biometrics into play in the uk Residence in the UK: The NIS is about residence in the UK and not about UK Nationality. To complete the NIS provision for those residing in or visiting the UK then the NIS has an application provision for EU and non-eu residents. Once residence is granted, the applicant is provided with a Biometric Residence Permit card. The data on this card is maintained according to EU Residence Permit standards, and makes use of the ICAO technical structures for machine-readable documents. Enrolment and card issuance began early in Supplier refresh: The major suppliers to current UK NIS businesses must be replaced within the routine of contractual re-tendering, but the emerging requirements for these replacement contracts also have to be rethought and designed so as to make the transition to the wider biometric identity scheme. The cornerstone of the NIS introduction is the application requirements for the UK Passport. In 2009, the passport applications system contract, which began in 2008, is due to end. This was a good example of a business delivery system, correctly designed at the time for one purpose only for processing passport application workflow but which was unsuited to the new biometric or person-centric world of identity management. A radical replacement of this business system is inevitable and the announcement of the contract award for this to CSC was made in April Identity cards: The proposal for Identity Cards for UK Nationals has been on and off the political agenda many times but, since 2003, it has found a permanent home in the UK Home Office ministry where legislation passed in 2006 finally settled on the principle of living and working in the UK as the applicability criterion for Identity Card registration. The scheme was not legislated to be compulsory but the requirement to register to the NIS as part of a passport application means in practice that nearly 90% of British Nationals would have to register as part of an application for a new or replacement passport. The requirement for non-uk nationals to register is supported by other Immigration legislation. In 2008 the Home Secretary revised an earlier intention to issue Identity Cards automatically to those registering to the NIS in favor of a voluntary application for a card. This would remain so until 2010 when the link between registering and being issued with a card would presumably be reviewed. The decision about biometric registration of British or Irish residents in the UK, who do not apply for British Passports, is one that requires further legislation to decide on any compulsion to register. One practical assumption is that once the benefits of holding an identity card become visible then many of the remaining unregistered would voluntarily register in order to benefit. Identity Services: The NIS proposal goes far beyond the secure registration of unique biometric identities. It projects a future where government agencies and third parties such as banks, telecoms companies, and airlines, will all wish to participate actively in the use of identity information and trusted identity services. Plans to realize this in the UK are currently pinned on a date of 2015 when services will become available based on the additional benefits and mechanics of the NIS registration. While the UK government has been a good communicator of its program plans for the NIS, it has said very little indeed about how Identity Services will be established, and with whom. A reasonable excuse for this is that such services are logically downstream of the registration process and that registration has to reach a critical mass before other client government departments will change to, or introduce, identity verification systems as the gateway to their own businesses and services. Also in favor of staying silent on this topic is the undetermined variety of ways that other parties might interface with the NIS to gain the assurance necessary to their own businesses: authentication has many levels. 12 security-news.tv security-news.tv 13

9 bringing biometrics into play in the uk From the partisan standpoint of biometrics, the future for biometric verification services based on NIS registration lacks both clarity and direction. Biometrics are admittedly confined in most The UK wants to overtake fellow EU member states in the accuracy and reliability of managing individual citizen and residents identities. cases to a higher level of identity authentication, but this ignores any convenience benefit that biometrics might provide to those who might (for example) have trouble remembering their PIN numbers. Any deployment of biometric authentication that requires interfacing to the NIS Identity Services system is likely to have a high entry barrier so this steers us towards Identity Cards as the possible enabler for future biometric transactions. The design of the Identity Cards now being issued as Residence Permits and as Critical Worker Identification Cards is determined by the EU requirements for Residence Permits and by the more general ICAO Machine Readable Travel Document requirements for biometrics, including fingerprints. Other than for border control inspection purposes the biometric data on the chips of these documents is not designed for routine biometric inspection, and it has not yet been proven for any large deployment of biometric verification. At this point of the NIS evolution then, the Identity Service opportunity for biometric verification is much the same whether an Identity Card or a Passport book is being used (and this will certainly be so from 2012 when the UK adds fingerprints to new passports). For the purpose of cardholder verification the Identity & Passport Service has publicly indicated its preference to use some form of EMV application that will enable Identity Card holders to authenticate themselves using widely distributed Chip & Pin point of sale terminals. The applications this might affiliate to are not clear, and unlike some of the Identity Card standards being promoted in the EU, EMV does not offer any clear method for using biometrics as a convenient, secure, or simply preferred PIN code mechanism. The most we can say at this stage is that the exploitation of the NIS biometric data for other business and personal benefits has yet to be defined in public. NIS benefits: An individual registered to the UK National Identity Scheme is expected to benefit in different ways. An indirect benefit to the UK taxpayer is that UK Nationals benefit from the stronger biometric management of non-british nationals passing through UK Immigration checks. Residence permits provide the biometric data for UK Immigration to check that the foreign passport holder is also a legitimate resident. The direct benefits to those living and working in the UK are less evident at this stage. For foreign nationals the benefits continue to be a clearly defined right to be in the UK. For British nationals there are no immediate direct benefits beyond the consideration that once their biometric data is registered, accepted, and bound to their biographical identity then their identity is more secure at this foundational level; secure against someone else trying to enroll to the NIS using a part of their identity. Protection against identity fraud at other levels such as creating false or impersonated identities in service businesses other than the NIS itself, will only follow when those businesses avail themselves of the root trust in identity that the NIS aims to build. The benefits for this can only be delivered as soon as client agencies to the NIS Identity Services turn their affiliations into identity verification solutions. The next steps The move from largely disconnected identity systems using biometrics, to a single management system capable of servicing almost all the UK s core identity requirements, is a massive undertaking. It combines new initiatives with the hard work of major business change, and above all it takes time and certainly longer than one governmental term of office. By mid-2009 the procurement of the NIS biometric application system and the NIS biometric identification service has been finalized, along with a series of smaller transitional procurements to support the migration of business services towards an integrated biometric service provision from The three remaining sets of procurement to affect the next ten years of biometrics for the UK UK Nationals benefit from the stronger biometric management of non-british nationals passing through UK Immigration checks. shall be the biometric enrolment systems, the majority Identity Card for UK Nationals, and the future Identity Services provision. These will consolidate the current thinking about the quality and viability of biometric data; will define the future relationship between biometrics and identity documents themselves; and will determine how in future biometric data might be made available for the benefit of individual peace of mind and government wide identity assurance. 14 security-news.tv security-news.tv 15

10 bringing biometrics into play in the uk Growth and exploitation of benefits With the introduction of the NIS well underway, the issue of growth comes to the fore. Just saying that it takes a long time to put such large changes in place belies the bigger questions about who will use the system to generate the benefits, and whether the use of the system is linked to its growth. Growth of the NIS begins with the growth of registration, and the forecast for this is clearly based on the UK s passport issuance records, to which must be added the registrations from Residence Permits. As long as the two remain linked no passport without registration first then any principles of voluntarism are likely to apply only before and only to the products (card or passport) issuing from the registration process; so selective voluntarism is unlikely to harm the deeper mechanics of growth. Managing the biometric enrolment rate and getting to the tipping point or critical mass for inspection systems to change their default to NIS based validation processes is the big target and the introduction of the biometric enrolment part of the NIS service will have to avoid data or attendance traffic jams. The UK Home Secretary recently announced that one of the NIS pilot programs, the Critical Workers Identification Card (CWIC), would not now be made compulsory amongst the pilot group of airport and airline workers previously identified as candidates for early NIS enrolment. For the benefits of the Identity Card itself this is not a great blow, as there is no clear indication that the CWIC can be used for anything that a passport cannot do, other than serve as a badge of NIS enrolment. What matters here is the choice regarding biometric registration to the NIS. The registration of early pilot groups serves two purposes: the testing and evaluation of the business and technical processes prior to mass registration in , and the publicly visible commencement of the NIS in practice. In 2010 the Identity Card is also due to be made available to students, and at a considerably lower price than a passport (advertised at less than half) this might actually deliver a financial benefit to young people who would be happy with a lower cost travel document that gives them the freedom of the EU/EEA. However, while these young people benefit, this initiative only competes internally with the passport as the product of an NIS registration. The tangible financial saving here might at least prove to be more effective at winning public support over the introduction of NIS registration than the introduction of the card for airport workers has been. The protests of this group serve to remind us that inconvenience and cost without a clear benefit is unlikely to motivate growth. Future risks and concerns The separation between registration and ID card issuance (for UK Nationals) marks a potential threat for biometrics. The message this sends is that biometrics are there first and foremost for the benefit of the state. Enrolment of biometrics for the identification function of policing the applications process is a powerful use of the 16 security-news.tv security-news.tv 17

11 technology, but the growth of a large, eventually almost exhaustive public database of biometric data might prompt questions about why this is not being used more effectively in the arena of identity verification to deter and detect bogus identity claims. If the state is willing to protect itself against false issuance of an identity then should it not also be working hard to facilitate protection of the individual in respect of key transactions such as new service enrolments, which might be fraudulent? And where are the plans for biometrics to be deployed to this end? Driven by the scale of the NIS and the fear of public failure, then there is a risk that the Identity & Passport Service will suffer from Identity Paranoia. The well-voiced security concerns around mass management of biometric based identities, driven by public concern, but also by the consolidated referral of several biometric identity management applications to a single biometric service provider could have the opposite rather than the desired effect on biometric and identity data accessibility. Stringent barriers for co-operation in terms of technical accreditation and legal liability for data could deter a number of third parties, and even other government departments, from participating in the delivery of NIS benefits (with or without benefits). The immaturity of the UK Government s declared plans for the support of Identification Services only serves to create doubts that the NIS will be an accessible resource. We have to hope that more planning information on this will be forthcoming. By excluding the use of identity documents for biometric verification other than for machine-readable travel applications then access to most of the UK s biometric data is in the hands of a single provider. This could lead to a number of undesirable situations, including the systematic compromise of biometric information, the risk of service failure, or the risk that the one supplier for all biometric service provision will manipulate the contract value in its favor. In all of these aspects security, service management, procurement and contract law the UK is taking a considerable risk around its preferred route to providing a viable biometric future for the UK and a return on citizens investment in biometrics. Conclusion The real investment in the UK NIS is not about biometric Identity Cards or biometric passports: it is about the wider, integrated Biometric Identity Management system. The different identity documents (cards and passports for UK Nationals, cards for foreign residents EU or non-eu, cards for asylum seekers) are all products derived from the data captured and stored to the Biometric Identity Management system. While passports continue to be the benchmark for developing biometric requirements, and while airports continue to be the testing grounds for any exploitation of biometric technologies, it still remains for the UK to show where it will take biometric technologies after the NIS reaches a useful registration mass. The benefits to individuals of a large, integrated biometric scheme are still to be identified and If the state is willing to protect itself against false issuance of an identity then should it not also be working hard to facilitate protection of the individual? quantified and it will be important for the UK government to put more of its cards on the table as the story unfolds. 18 security-news.tv security-news.tv 19

12 uk says no to the big bang approach UK says no to the Big Bang approach Interview with Dr. Duncan Hine, Home Office Identity and Passport Service, UK With overall responsibility for security and counter fraud for the IPS and the co-ordination of risk and integrity for the National Identity Scheme in the UK, Dr. Duncan Hine, Executive Director of Integrity and Security, is at the centre of one of the country s more controversial large-scale IT projects. We caught up with Duncan Hine earlier this year to talk motivation, security and public acceptance surrounding the much talked about National Identity Service. We re here to talk about a big topic of conversation the National Identity Service in your opinion, could you outline the political motivation behind the introduction of such a scheme? Certainly, at the Identity and Passport Service (IPS), we provide passports for all UK citizens and we register births, marriages and deaths in England and Wales. So we are very much into identity management and the way that can serve the citizen. I think the National Identity Service is really important because it is trying to do two big things: it s trying to make life easier for the honest citizen in terms of proving who they are, their age and various other things about their own personal identity and in keeping a person s identity safe and stopping other people from compromising, stealing or assuming it. But it is also trying to frustrate criminals, and to some degree terrorists, who would like to do things that we in society don t want to happen, such as crimes, impersonations, fraud and so on. So we ve got both of those agendas very clearly in our minds. Now, after the initial epassport rollout in 2006, the National Identity Service is the next largest biometric project in the UK. What kind of security measurements are taken into consideration for this, and will they be the same as used for the epassport? Well it s incredibly useful to be in an organization that does all three things at the same time, because of course we ve now successfully rolled out approximately 16.5 million epassports, we ve improved the read time at borders and we ve experienced very few technical problems or failures of any type at all. So it s really interesting 20 security-news.tv security-news.tv 21

13 uk says no to the big bang approach watch the video interview online at: s-n.tv/channel/video now to build on that in terms of designing how a national identity service will roll out physically. And I think the first thing we ve learnt is that a big bang approach is just not right. It s much better to take a scaled approach; to work through a number of phases, to learn from one phase to the next and deploy all of that wisdom as we roll out in greater and greater volumes. In terms of security, the approaches will be similar, because it s based in the same organization and I think the important thing to note here is that this is a marriage between people, technology and business processes and we are improving all three of those at the same time. In terms of implementation, have you had any feedback so far from any trials for ID cards across the country? We have done one or two trials in limited places, but we are in fact on a full scale rollout at the moment with certain groups, so you will have heard people talking about the Identity Cards for Foreign Nationals (ICFN), which is actually in volume production. We are enrolling people as we speak and issuing the card to individuals who live and work in the UK from countries outside of the EU. And I think that (the ICFN card) has proven that a lot of our operational assumptions are correct, we ve had very few problems with the project in terms of actually beginning to scale it up steadily and I think this bodes well for the rollout to airside workers later on this year, and then possibly young people and other groups in a targeted way as we move into 2010/2011. So by 2012, can we expect complete rollout across the country? By 2012 there will be volume rollout of both ID cards and the second biometric epassport. We will also be including fingerprints for the first time in the passport enrolments, so that s quite exciting and we will certainly add an awful lot to our security features to stop multiple enrolments. And regarding public opinion, what do you think the government will do, or has it made any ground already, in trying to bring the British public round to the idea of an ID scheme? It s difficult for me to speak for the government, but speaking personally I think we ve realized that we need to engage even more with the public and the various stakeholders. And that s one of the things I think we ve learnt from the Critical Workers Identity Card (CWIC), which will rollout to airside workers, is that this is something we do every day, so we re focusing on the details of why this makes sense, why the security is good and why you can trust the cards and the systems, but we really need to explain that very, very clearly to lots of people who have very reasonable concerns about it. And to take an example from Germany, the German government has tried to increase public buy in, or acceptance by engaging businesses to create ebusiness solutions, which can be used alongside the card. The idea being that if the citizen can see more benefits in their daily life, other than the basic identification function, that this will outweigh the perceived negative aspects to the scheme Is the UK planning on doing anything similar? Yes we are, but the first thing I would say is we don t really accept that there are any negative aspects to this system. We can see that people have some concerns and worries and we are very keen to explain that they are usually the result of a misunderstanding or a misinterpretation of what is happening. We do realize that for the cards to be useful, they have got to do things for real people in the real world, as well as defeat criminals and fraudsters. Therefore, we are working with government colleagues to make sure that they are incredibly useful for government service access and increasingly with private sector partners to understand how they would like to make use of them, whether that s retailers, universities / higher education establishments, local governments or a host of different areas. I think the thing that we really believe is, what we are doing here is building an infrastructure, and people will use it for their own applications, some of which we will be deeply involved in and some which will be a bit of a surprise to us but hopefully a pleasant surprise. 22 security-news.tv security-news.tv 23

14 uk says no to the big bang approach That s one small step for the UK, one giant leap for Europe Interview with Bob Carter, Home Office Identity and Passport Service, UK As a Consultant for PKI, Encryption & Chips at the UK s Identity and Passport Service (IPS) and Chairman of the Brussels Interoperability Group (BIG), Bob Carter has been involved in the first-generation epassport project, and through the BIG he also played a part in setting the EAC specification and protocol for European epassports. With the first-generation epassports having been issued in the UK during 2006, we talk to Bob Carter about how and why the second-generation epassport will make such a difference and how far away from realization the UK is. As chairman of the Brussels Interoperability Group, the 28th June 2009 is a big date in your calendar, why is that? Well that s the date the EU laid down for the introduction of second-generation EAC passports, which means that from that date, all Schengen member countries must introduce two finger biometrics on their passports. The UK however is different because we are not doing that yet we will do it later on. As you said earlier, the second-generation epassports have two fingerprints, how does that make the EAC epassport more secure than the already existing facial recognition passport for example? A couple of things there Currently, the first-generation (facial biometric) passport can be read by any reader that has the right software, so a person can read the passport, open it up and vaguely see the face. With the second-generation epassports, as they also hold sensitive biometric information, we need to protect them more, therefore we ve introduced more protocols to protect both the chip and the data. So with the second-generation EAC epassport, the chip cannot be cloned or copied. We are also now protecting the epassport with stronger encryption between the reader and the chip, so when the reader is in communication it stops interference. So initially we have stopped what we call skimming and eavesdropping of the data. And in addition to that, any person not authorized by the issuer, cannot read the data held on the chip. 24 security-news.tv security-news.tv 25

15 uk says no to the big bang approach For example, today you can verify that a passport was issued by the IPS and that it s genuine; the cardholder is who they say they are and the passport holder is who they say they are. As we go forward with EAC and fingerprints are held on there, we also want to make sure that the reader has been authorized by us (IPS) and hasn t been stolen, so we will issue a certificate to that reader on a daily, weekly or monthly basis, dependant on the risk. This means that the chip also has to ask; does that reader present to me the right documentation? Even though the reader may present the right documentation, there is still more it has to do, it has to confirm the date of the certificate and whether the date of that certificate is equal to or greater than the date I know. If the reader cannot confirm this information, it will shut down and not release any more information. Overall, we have tried to make the secondgeneration passport much more secure than the first one, to protect our citizens information. And will the issues that surrounded the firstgeneration passports be resolved before moving on with the second? We hope so. Basically, the previous issues were surrounding verification at border control, we had to distribute certificates so that border control could read and validate them. Unfortunately though, some countries have been a bit slow in distributing them and as a consequence not every country is now reading the passports properly. We re reading them well in the UK, however not every country is doing that. The second-generation passport however, relies upon there being certificates distributed otherwise it just won t work. It is understandable why it hasn t worked the first time round, because there s the question of whether to distribute a lot of readers or passports first? The process is also quite slow as it takes about ten years to regenerate a whole stock of passports. As a consequence, the option is whether to have the maximum number of epassports after five years so do you bring in a system at day one or in five years time? It s a chicken and egg scenario, but we re getting there slowly and it will all work out fine. That s a confident answer there. Yes, it will be fine. With regard to the UK situation will the UK issue second-generation epassports? Is this on a roadmap and being planned already? It s planned, but we will not be doing it on the 28th June 09, primarily because the UK is not in the Schengen area, and as a consequence we are outside of the EU regulation on passports. But as I ve said before, we have agreed to mirror the EU regulations, just not the timing of it. However, because we are going ahead with the National Identity card, which means we are enrolling everyone for finger biometrics and facial biometrics, it seems crazy to do this for epassports and then again for ID cards later on, so we plan to do them both together and get them done at the same time. So we estimate that we will be issuing the second-generation passports in watch the video interview online at: s-n.tv/channel/video 26 security-news.tv security-news.tv 27

16 id cools off under obama administration ID cools off under Obama administration Interview with Janice Kephart, Center for Immigration Studies, USA With one of the world s largest superpowers shifting political focus, we wanted to know what effect this would have upon the implementation of ID schemes in the country. Therefore, Security-News.tv spoke with Director of National Security Policy at the Center for Immigration Studies in the US, Janice Kephart, to get her opinion regarding the influence of political preference upon US government based projects. 28 security-news.tv security-news.tv 29

17 id cools off under obama administration watch the video interview online at: s-n.tv/channel/video Firstly, could you give us a short introduction outlining what the Centre for Immigration Studies actually does, and your role within it? I am the National Security Policy Director for the Centre for Immigration Studies, where my role is to push policy as hard as possible in areas concerning borders and national security. I have had a role in secure documents and ID for I would say the most important things are the items that hit everybody living in the United States and that would be our driving license standards. a while, and was positioned as a council member for the September 11th Commission, where I did all of the immigration work and also produced the terrorist travel monograph that ended up creating the recommendations that I believe have spurred this industry forward. Before that, I was in our US Congress, in our Senates, where I took part in committee work and legislation on ID theft and counter terrorism So I have a history, pre and post 9/11, in this area of Identity management (on the policy side). What kind of projects are currently underway in the US? Right now there are a number of programs that mostly fall under the Department of Homeland Security, which have been spurred on by our 9/11 Commission recommendations. Most of them have similarities; for the most part they are identification vetting on the front end and document authentication on the back end, and whether you are talking about worker verification on the interior of the US, checking foreign nationals at borders, trusted traveler programs, or creating better standards for passports, driving licenses, transportation and worker cards, these are all things that have taken place because of the 9/11 Commission recommendations and these are all programs that I watch pretty carefully. For example I did a report last year that had quite a bit of influence on our worker authorization program, everify, and none of it is less important than the other. I think if you were to put something at the highest level, I would say the most important things are the items that hit everybody living in the United States and that would be our driving license standards. 30 security-news.tv security-news.tv 31

18 id cools off under obama administration Janice Kephart, Center for Immigration Studies, USA What position does the US hold with regard to ID cards? There is no such thing as a National ID card in the United States; our cultural and political atmosphere would not permit that. What we did say at the 9/11 Commission however, was that there needs to be minimum standards in place for every state that issues a driving license. What I think most people don t understand, even people in the United States, is that not only do all 50 states produce their own driving license and ID, but you also have 15, 16 or 17 different varieties of IDs or driving license being produced by each state; you have commercial truck drivers, permit drivers, those that don t need a license, all varieties of IDs being produced by a state so with no minimum standards in place, either for the identity bedding on the front and for the applicant or for the document production, you have incredible vulnerabilities. You add into that an incredible illegal immigration problem and we have a burgeoning underworld of counterfeiting and fakes, which breed national security and basic organized crime problems, which help to spur illegal immigration because it is so easy to assimilate in the United States under a bad identification. So the driving license standards really are something that effects what we are doing in the United States. Where does the former and current government administration stand in terms of backing for these state projects? Due to strong political reasons, the states don t like the federal government telling them what to do. What s very interesting is that after 9/11, the states got together under their Department of Motor Vehicle National Association, (which is Canada and the US,) and they created a very stringent set of standards for driver license application vetting and the creation of new documents. The whole security task force, made up of 13 different committees, all produced reports and they came up with very stringent standards. What the federal government and congress then did was take these standards and turn them into a federal law, however they were a lot less than what the states had come up with themselves. But the states, having been told what to do by the federal government, didn t want to do it anymore so there was a huge backlash and the federal government then asked the states what they would like. During the process of the regulations, they (the federal government) abided by what the states wanted, however the states then said that the federal government should pay for everything. This caused a whole new issue, so what we have right now is some money in the program, but not enough. In terms of the prior administration, under Bush and Homeland Secretary Michael Chertoff, we had a very good creation of regulations and regard; we had a grant creating process to give the states some money to do this and a lot of cooperation with the states. It s in the middle of implementation now, every state now has better vetting on the front end than they did before everybody is checking legal status, everybody is checking social security numbers except for a You have 15, 16 or 17 different varieties of IDs or driving license being produced by each state few states, so that is a huge improvement over pre 9/11. However, we have a new administration and in that we have a new Secretary who used to be a Governor herself, Janet Napolitano. She has said outright that she has no interest in this program and would like to see it repealed if possible so I think we have hit a stopping point. I doubt it will be repealed, because I don t think Congress will let this happen, even though we have a majority of Democrats, but I do think it will be neutered. With the new Obama administration, we have got a very fuzzy direction right now. Basically, if you rank the Bush administration as hot on these issues, I d say we d get anything from tepid to cool from the Obama administration. 32 security-news.tv security-news.tv 33

19 an automated future for border control An automated future for border control Interview with Matthew Finn, Augmentiq With the aviation industry continuing to receive a high level of attention with regard to its security procedures, we spoke with Matthew Finn, Managing Director of Augmentiq to discuss the aviation market, border security and find out his opinion regarding what role technology can play to help increase security in the airport environment. From your experience in the area of border control, how do you believe that airport security can be increased? What advantages can this have for governments, airport authorities and of course for passengers? The real question here is concerning risk, and at the end of the day there are about two billion passengers that travel through the airports every year who are not only traveling through the airports and going through security, but in most instances they are also crossing international borders. The reality is, of those two billion passengers very, very few pose any threat whatsoever; the vast majority are very well intentioned passengers they are going about their business, they are going on vacation and they are doing business in other countries around the world. The challenge we are trying to face and respond to, is to identify those risks as early and as far from the border as possible. There are a number of techniques for doing this, by creating technologies that identify fraudulent documents, or making sure that the quality of the document is a good document. So, should Matthew Finn be going through the airport with a false document, you would be able to identify it immediately, and if I am traveling through an airport on a false document there s possibly something wrong. So you re saying that security should start from the document, what do you mean by that? Absolutely, starting at the document. Just imagine if you were to travel to a country such as Australia Australia is a long way away and you are going to travel from here to Heathrow by train; you ll arrive at the airport and when you stand in line to check in, the agent at the check in counter will take your passport and swipe it in the keyboard or put it on a document reader. The biographic data is then captured and read in real time in the airport check-in area. What s happening behind the scenes is that data is being extracted from the document and sent in real time to the government of Australia. The government of Australia then says: this is 34 security-news.tv security-news.tv 35

20 an automated future for border control Matthew Finn, born on the 4th July, is he eligible to enter the country? Is he someone that we want to arrive in Australia? Is he someone that we know? Is he someone that has created a problem in Australia before? If they are not satisfied that I am the kind of person that is eligible to enter the country, within about one second they respond to the airline check in agent, still in real time, and say do not board. Therefore, I never actually get onto the aircraft and arrive in Australia, as I am stopped beforehand. They have a very unique system in Australia, which is one of the few systems in the world that operates this interactive mode of border control. The issue of border control notoriously circles around the topic of convenience versus security As a consultant in this field, how do you ensure that the balance is right between those two factors? You re absolutely right, a balance needs to be struck and in the post 9/11 environment the balance has moved towards the security side of the spectrum and it needs to go back to the facilitation side the example I gave of Australia is a good one for this. watch the video interview online at: s-n.tv/channel/video Another topic that is a particular favorite of mine is at the security check point where there is no data available, so when you are going through the metal detectors and putting your cabin baggage through the x-rays, nobody knows It would be particularly useful to know a little bit more about the passenger going through security and if there are any elements in that passenger s profile that suggest that this person is potentially of a greater risk. who you are, where you are going, where you are traveling to, or who you are traveling with. What would be particularly useful is to know a little bit more about the passenger going through security and if there are any elements in that passenger s profile that suggest that this person is potentially of a greater risk. If so, you can spend a little bit more time screening them and provide a differentiated screening process. And again for people that are low risk, you can speed them through the security check point and make sure they get to their aircraft on time after enjoying other airport services. Another excellent example is what we re seeing in the UK with programs like IRIS and over in Amsterdam with the PRIVIUM program. Both of these systems use biometrics, or and in the case of Privium with the smart card, a secure document. With those biometrics you can simply identify yourself, put a card into a machine, it reconciles the information stored on the card with what s being presented to a camera, the gate opens and you go straight through. These types of techniques are much more about simplification, simplifying passenger travel to make sure that the security checks are still there we know that Mathew Finn is who he says he is because we ve got his biometrics and we ve verified them, but in fact we re now giving him that facilitation benefit so he can go straight through the airport, or straight through security and potentially straight on to the aircraft without being held up by a series of repetitive checks. In terms of biometrics, do you see biometric use or the use of biometrics for identification as an increasing trend, or is it just one of many possibilities to ensure the convenience factor or the speed of processing? Biometrics are excellent for what they do in terms of identity management and assurance. If I have an electronic passport with my fingerprint data stored on a chip, I place my fingerprint down (on the reader) and it verifies that I am indeed the holder of that document this is a great technique using biometric technology. But what biometrics do not tell you, is what would come from the biographic information and that s quite different. In a quick example, if you and I are traveling together and let s say that I m on a warnings index, I m maybe a persona non grata in a particular country when I go through the barrier, the barrier doesn t open because they want to stop and question me that they will know from the biometric data stored in my passport. However the biographic data that could be in the airline reservation system will show that you and I are traveling together; I bought your ticket; we sat next to each other on the airplane so by association, there is also a possibility and reason to stop and question you as well. So it s that combination of biometric and biographic data, both of which are complementary, but do different things. But the short answer to your question is, biometrics is definitely a growing trend, we will see them at check in, we ll see them at the security check point, we ll see them at the border and we ll see them for access control in general throughout the entire airport campus. You ve worked with both governments and private businesses, do you see government projects such as ID cards and passports being neatly integrated, or do you think it s always going to be separate schemes? Governments are sovereign states and their prime responsibility is to defend the public and the interests of the state, so the governments will need to act in the best interests of their public and of their citizens, but there does need to be interoperability, there must be harmonization. It would be unthinkable for you to travel from the UK to Germany and have one set of rules, one set of processes here in the UK, you hop on a flight to Frankfurt, you arrive at the German 36 security-news.tv security-news.tv 37

21 an automated future for border control changed my fundamental position that security is required, but also that the balance between security, privacy and facilitation is absolutely fundamental to our own rights and our own freedoms so that we can travel around the world and enjoy other cultures and other places as we work and holiday in different parts of the world. border police and it s a completely different set of techniques. So harmonization is definitely required and I think governments will continue to work together, as is the case within the European Union, to identify a common framework for enrolling people in passport schemes or ID schemes such as registered traveler, so that you as a passenger can have that same travel experience wherever you travel in the world and those programs are starting to proliferate now. They are challenging, it isn t always easy to get governments of different states to work together, but there is definitely a willingness to do so. We understand that you are also studying for a post graduate degree in counter-terrorism do you think that your studies have changed your opinion about why and how transportation security should be implemented? In honesty it hasn t, it s entrenched some of the views that I have. Terrorism is a real and present danger, there s no doubt about it. It has been around for a long time, it s not just the last seven or eight years. The reality is that there are dangers in the world; there are threats and we need to respond to them. Those threats will change over time; we ve seen that in Europe we can all remember days in the 60s and 70s where there where particular groups that were responsible for terrorism in various countries, we ve all experienced it. Now there is a different terrorist threat that has taken on a different form. The reality is that whether it is ideology, economics, politics or religion, there will always be people that are driven towards fanatical ideas, fanatical ideologies and they will try to act in a way that creates terror terrorism is just that; it s trying to generate a response or stimulate a reaction based on an act of terror. Regrettably, the airline industry is very much in the focus of particular terrorist communities because of its spectacular nature. 9/11 was a terrible event but it was also a spectacular event, in as much as it was in every newspaper, it was on every news channel and it was on every broadcast network, it has the ability to create an inordinate amount of repercussions as far as the world is concerned, so from an air transport perspective, The airline industry is very much in the focus of particular terrorist communities because of its spectacular nature. terrorism is a real and present danger, but it is not the only threat we are trying to respond to in the airline community or in the border control community. There s also illegal immigration, human trafficking, counter-organized crime, there could be drug trafficking, and there are many other issues. So the studies in counter terrorism are very helpful to broaden out my knowledge in terms of what some of the terrorist groups think, how they operate and how they are structured and financed, but it hasn t actually It s interesting what you say about 9/11 being a spectacular event, but what about sea ports or train stations, they seem less spectacular in terms of awareness, but surely they provide just as much entry for terrorism or any other criminal forces? Absolutely We saw it in Madrid just a few years ago and we ve seen it here in London with mass transit (busses and the underground). Coming from the airline industry, which is where I have been working for the last few years in a security function, there was this thought that there is a disproportionate focus on the airline industry and that ports and rail operators and other forms of transport weren t getting the same attention. They do need the same kind of attention and particularly when we look at the UK for example, the programs that are about to be launched here (UK) from the Identity and Passport Service and also the UK Border Agency, are comprehensive programs and it s not just about airlines and airports, they re also about the marine ports, the ferries, the Channel Tunnel, the rail network and of course here in the UK there is also a land border, so we do need to take these other forms into consideration. The reason perhaps that the airline community gets such attention is because of the volumes, many more 38 security-news.tv security-news.tv 39

22 an automated future for border control people travel internationally by plane than they do by train. Perhaps in continental Europe it s a little bit different, you can hop on the Euro Star, you can go back and forth between Germany, Brussels and Paris, but in most instances when you are traveling internationally and long distance, it s usually by air and not by ferry or by rail. In terms of the future, where do you see border control in three to five years? The future is automation; there is no doubt about it. From my personal point of view, registered traveler programs are an interim solution. The reality is that you can do a lot with an epassport, particularly if you have biometric data securely stored in a chip. The other reality is that many people don t have an epassport, here in Europe there are programs in place to roll epassports out across the member states but this is not quite the case in the rest of the world where there will be slower adoption rates. So in order to provide that automation, registered traveler programs as one example, do provide an interim solution, but in a few years time when you travel from Germany to the UK you will be able to board an aircraft using your secure document, whether that s a credit card form or a German ID Card, a German passport, or some other form of ID that proves your identity. You will arrive in Heathrow, go through an unattended border, and if there are any problems the gate will not open and you will have to go to a manual process. The benefits for us as passengers, is that there will be speed and convenience, the benefits for the airport is that passengers have more time to enjoy the services in the airport like going shopping, having a massage and so on. And for the airlines, there s a great operational benefit if there is more automation and speed through the airport, as the risk is far less that the aircraft will leave late if you know that people can get to the gate on time, then the aircraft can depart on schedule. So in simple terms it s about automation, it s providing those technology solutions that can facilitate the transfer of passengers that are low risk and it allows those limited resources to focus on the high-risk situations. And finally, in terms of achieving a perfectly processed border control situation, if you could have a wish list to the governments of the world and private businesses, what would be on it? What needs to be implemented in terms of policy, interoperability or technology to make all of this happen? Privacy needs to be a very important theme in all of this. If we re talking about sensitive data being used, processed, stored and manipulated in The airline industry is very much in the focus of particular terrorist communities because of its spectacular nature. some way there needs to be stringent controls around that data Who gets to see it? Who gets to use it? Who gets to process it? How long is it stored for? What additional uses can be added to the primary function? Here in the European Union we ve got some fantastic data privacy laws and data protection regimes in place, which need to be enforced and they need to be harmonized across the entire European Union which is the case today but there are some differences in implementation. As far as border control is concerned, we ve got Schengen in the European Union, which enables the free movement of people, that s a concept that should just continually get larger and larger, we don t need to be routinely providing our documents and our boarding passes at various stages throughout the journey, it s repetitive and it s redundant. So in terms of policy we need to think a little bit smarter, put the passenger back in the central focus and think what can be done to benefit the passenger, to simplify passenger travel and to make things work, but to respect those rights around the data and its use. I think that would be my starting point and although there are a few other challenges along the way, those would be my top two. 40 security-news.tv security-news.tv 41

23 we are smart card architects In its EU-Passport Specification, the European Commission requires that*: Every Member State MUST contract an accredited (national) test laboratory to certify functional compliance to the relevant standards on all ISO/OSI layers. Issued certificates MUST be notified to the Commission. * Source: European Commission, EU-Passport Specification (EN) 28/06/2006 To meet the European Union's June 2009 deadline for migration to the EAC standard, e-passport issuing authorities should seek the right test and certification partner now. The German Federal Office for Information Security (BSI) has developed a unique e-passport certification scheme which incorporates all tests of the ISO/OSI layers. The certificate issued by BSI will be published on the BSI website: The BSI e-passport certificate The best way to prove conformity with EU and ICAO standards We know how to get certified. It s easy when you know how. HJP Your global e-passport and eid card system consultants Passport manufacturer Passport issuing authority HJP Pre-Testing Test Lab 1 Electrical Testing Layer 1-4 Test Lab 2 Application Testing Layer 6-7 BSI Certification Publication on BSI website HJP GlobalTester test software HJP Project Management Test Consulting Marketing Support ask us about our references in europe, the middle east and africa hjp consulting gmbh germany phone Don't waste time going round in circles struggling with test standards and administrative hurdles, go to our website or feel free to contact us. 42 security-news.tv security-news.tv 43

24 pda security is just an app away PDA security is just an App away Interview with Sven Gossel, charismathics With Apple s growing market dominance in the corporate environment, the App Store is becoming an increasingly popular way to proliferate new software based applications across both business and personal users. Sven Gossel, CEO of charismathics, talks to us about their innovative new solution ienigma, and explains why they believe that the App Store is an ideal platform for delivering solutions such as theirs. charismathics is known as the middleware company, can you explain that for us? We believe that the middleware in public key infrastructures (PKI) is actually the decision making factor for everything that is around us; this means lifecycle management, cost of ownership, handling issues and user interface, so we are talking about the main part of any PKI scheme, and this is why we emphasize this so much. Sven Gossel, charismathics One of your new products, the ienigma, has been causing a bit of a stir at the moment, how has that developed? From a technology perspective, this is a soft token. We decided to put the first mobile phone application that we did on the iphone, because of three main reasons: 1) using the Apple App store is the simplest way to deploy an application, 2) because the application increases the security 44 security-news.tv security-news.tv 45

25 The The Vault March july 2009 pda security is just an app away of the individual for PC platforms, 3) because it allows a user interface that is more than on other smart phone platforms a user interface that talks to the user in a way that he/she really understands what s happening. So the convenience factor and the way that applications can be constructed, are the main reasons why we chose this platform to start with. Are most of your customers in the corporate environment? Not so much any more and it depends on what corporate means to you for us, corporate starts at more than 1,000 users. We are noticing that there are an increasing number of our customers working with less number of seats (people). This is an interesting scenario as the user public key infrastructure gets to a smaller number of users than we originally work with. So if we take your definition, I would say that about 80% of our customers are in the corporate area, but we have an increasing number of enterprises with a reduced number of seats, which decreases this share quite a bit. A lot of security type products tend to feel the need to be surrounded by a secure environment, what made you decide to put this application in to the App Store? Well coming from the perspective of a largely enterprise driven company, and taking into consideration the fact that the number of users are getting smaller, means that in the end, we The convenience factor and the way that applications can be constructed, are the main reasons why we choose this platform to start with. are talking about individuals who have the strong desire to increase the security of their own IT platforms and at the end of the day, ienigma is a product made for the single user, enabling him/her to add all these features to their IT platforms that they have on their PC anyway, but just haven t have activated or used. ienigma configures the features automatically to make sure they are finally used. So what we are trying to do here, is transfer the level of security from enterprise installations down to individuals, and the App Store helps by allowing us to build all the security and deployment avenues we need. What kind of end markets do you see the ienigma used for? If we split the market into enterprise and individual use, these are the two we are addressing. For enterprise use, it plugs into our standard software architecture so that you can add this specific smart phone, the iphone, as well as other smart phones later in the year, and we will port this onto Windows Mobile and on the Blackberry to the existing PKI infrastructures that are in place, so you will have users taking smart cards, you will have users taking USB sticks and others using their smart phones to do the same thing it is replacing a smart card or USB stick doing PKI in exactly the same manner. For the consumers, this is an immediate way to save money because it does not require configuration anymore that you have in the enterprise sector, so it can be used for a single seat, as well as in big environment and that was our design perspective, we wanted to have this product in both of those markets. We wanted to have this product in the enterprise and the individual market. You mention base for Windows Mobile and the Blackberry, what timeframe do you imagine these being available in? Both should be available by the end of this year. We have chosen this sequence of release because it matches that of the App Store, so you have the Blackberry platform in place these days and Windows Mobile following in the 46 security-news.tv security-news.tv 47

26 pda security is just an app away summer. We would like to be one of the first applications that are delivered on those platforms. How is the application going to be delivered and downloaded? It s the App Store users paying for the license and then downloading it to their platform. For the enterprise as well as for the static version, we need a plug in on the PC or the Mac side, this means that by applying for the first digital identity when using this application, our server sends the part that is required on the PC or the Mac, so that the user is able to install on that side as well. It s a pretty innovative way to deliver your software by using something like the App Store, there are not many people doing this Was this a conscious decision or did you get lucky? I think the idea of the App Store itself is brilliant in terms of how to put applications onto smart phones. It differs from the standard way to deploy applications, because it used to be driven by the carriers and now the users drive it and this I believe is the revolutionary concept of the App Store and this is what we are trying to use. So we are trying to use this change of paradigms in delivering applications to mobile phones, which in turn allows us to do more individual things other than what we could ve done by any carrier delivery platforms. T-Mobile, for example, has decided to come up with such a platform as well. I doubt it will be as successful because inevitably T-Mobile will decide which kind of application they like and which ones they don t with the App Store this is not the case. In this sense, Apple has made major steps in driving the independence of the user by using his/her mobile phone as a computer and I think this is exactly where the success of all the other applications are and of course this is something we leverage from as well. You may have heard about the Skype version of T-Mobile that doesn t allow phone calls unless you are on the 3G connection, this shows how strong the carriers interest is when playing around with some of the applications that might be very useful for the individual, but they are just not in the best interest of the carriers. Therefore, this shift in relationship is the major factor that is driving the market. And it seems like a good decision, as the iphone is the only product so far that is increasing the number of smart phones actually in the market, and from that perspective I think it is very interesting that the users are honoring this by buying the iphone. How easily can the software be integrated and used as part of existing infrastructure? It s very simple, our standard software is made to work with different smart cards and tokens at the same point in time and so the iphone is nothing but a plug-in to that existing software frame. So it s really simple deployment in enterprise fields, is basically installing our standard software. Your solution is based on two-factor authentication, could you quickly clarify what that means? Two factor authentication means that a) you have something and b) you know something so you have the iphone and you know the pin code. In essence, it is the same principle as a smart card you have the smart card and you know the pin. The iphone is a one-to-one replacement of the smart card with the advantage that you are visualizing what a smart card does, thereby guiding the user into a much more user friendly interface that allows you to really try and understand what the system is doing. I think this is a very important step, because otherwise you will not get the acceptance of individuals to use this application. In terms of security, how would you say this compares to some SIM based security solutions? Well it s a soft token, so we are living with the limitations of each of the platforms in the market. The iphone has technical limitations, the Blackberry has technical limitations and so forth, so we are trying to make the most of what this platform allows us to do. The iphone doesn t allow us to have access to the SIM card by the 48 security-news.tv security-news.tv 49

27 An ID card for the real and virtual world Your Contactless Technology Partner for 13.56MHz applications based on ISO14443 A & B, MIFARE, NFC, FeliCa listen to this interview online at: s-n.tv/channel/audio API, it does not allow us to use an additional SD card, because there simply is no slot, therefore we have limitations that we have to live with, which made our decision to use a soft token concept. On the soft token basis, I think it is as secure as any software token that is on the market. From the comparison of a SIM card or SD card based hardware security, it is not comparable because it is not in hardware but in software. So I would not mention the security element of the application, but the security of the platform as the important factor. As a company, you claim to connect the two worlds of software and hardware to develop innovative identity solutions, is this a reflection of how you visualize the overall security solution of the future? Yes, we are trying to connect the software and hardware security worlds with each other, this is a major part of what we are doing and we are trying to make it available for everybody in the world and not just enterprises. I think an operating system should encrypt s by default, but at the moment it doesn t we are trying to change that. We think that the operating systems should provide security by default, and for a lot of client operating systems this is not the case we are trying to change that. Our mission is to improve security for the individual by using our software. And finally, what s in store for charismasthics from 2010? The decision on this is dependent on market development. Currently, we see question marks on the Symbian platforms, because although they will definitely be there, the way to deal with it is rather difficult. The market share in the smart phone area has also decreased a lot over the past two years, which is due to the iphone and the fact others are taking over. According to the Gartner Reports, it is not only the iphone that has taken market share away from the Symbian platforms, therefore we have a situation that we will closely watch before deciding upon our next steps for the mobile area. Aside of that, we will come out with other products that I am currently unable to talk about, but they are all in line with making PKI use ubiquitous and putting this product in the hands of everybody in the hope of increasing the security of people. Contactless Readers Multi-protocol support Different form factors High performance Best in class interoperability Proven prime Supporting Tools Easy access to technology Contact & Contactless Smart Card Software Development Kit (SDK) NFC Demonstrator Package SCT3511 SCL010 SDI010 SCL3711 Dual Interface Tokens Mobile Versatile Multi-application support 50 security-news.tv security-news.tv 51

28 id crosses borders ID crosses borders Interview with Dr. Detlef Houdeau, Infineon Technologies With Europe quickly becoming saturated with ID based projects, we talk with industry expert Dr. Detlef Houdeau about the Asian ID market, emerging areas, business drivers and find out his view on the future of ID. Bangladesh recently announced that they are going to start their epassport system, and shortly afterwards Infineon announced that it will supply the chips for the Indian epassport system. Do you think that the increased rollout in these regions is owed to international pressure, or are there national drivers for the implementation of these projects? From a historical point of view, there are two pressure points: one is the US Visa Waiver Program (VWP), which is part of the US VISIT Program, where a lot of European member states must migrate from a traditional booklet to an electronic biometric passport. The second is the European regulation, which was published in 2004 to realize once and for all that all European member states (move towards) this kind of migration. In Asia, Japan, Singapore and Australia are the only key countries that are part of the US Visa Waiver Program. Now, other big states like Bangladesh, India and maybe China would also migrate, but driven by national policy. On one side they join the international program on new security system and biometric technology, and on the other side the document is part of the national program, this means it has been to show this document to other member states, this is the kind of view from the outside Are you a second layer country, or did you join new international programs like the biometric passport program? 52 security-news.tv security-news.tv 53

29 id crosses borders So it s almost a prestige issue? A prestige point, yes. One of the first things that come to mind when talking about these regions is the sheer scale of the population involved. In your opinion, do the relatively small epassport schemes lay the ground for the really large-scale eid card projects? Yes, for example, since 2006, all European states receive national infrastructure to capture biometric data, face data; they have the national PKI certification authorities in place, and they have the capabilities to make digital documents. Based on this, it is easy to jump on the second train and create a National Identity card based on the same background system; it means they don t pay additional money for infrastructure. And you can combine this for additional services, for example government services that include paying tax or changing your home address. This is a driving force in Europe as many of these tasks can now be done from the home, via Internet, without having to go to a government office. If you look to Asia, they are two to three years behind the European passport wave, which means they could also make the second step after the passport implementation in Asia, maybe also two to three years after the passport and infrastructure is in place. So Europe is in front of this evolution, Asia would follow two to three years later for passport and the national identity, and your right, normally states have 15 to 20% of Asia would follow Europe two to three years later for passport and the national identity. population with booklet passport documents, but normally you have 80 to 90% of citizens who have national identity cards. The scaling factor of national identity is typically four times higher. Traditionally, Europe sees itself as the pace maker when it comes to implementing eid schemes. Do you think this claim is still justified today? Yes. At this moment we have nine European states (eight of them are part of the European Commission, one is outside the European Commission) that have National Identity card programs running. We have seen announcements in France, Poland, UK and Germany that they will follow in the next 18 months on the electronic identity card program. So that means that we have for 450 million citizens in Europe, more than 50% of states which claim 50% of the population, will have National Identity card programs in place. If you look in Asia, South America and Africa this kind of investigation is not placed at this moment. So that claim is still justified? Yes. And on the other side, we have seen that the European Commission has spent a lot of money to bring services across border in Europe called interoperability of services, interoperability of technology and interoperability on communication. I ll give you an example; some weeks ago, the Polish ministry told us that since Poland has been part of the European Commission, more than 1.5 million Polish citizens are living permanently outside of Poland, for example in the UK or in Germany. These people also need to have some communication with their home government; for tax payment, changing their address or other things, and they cannot drive home at any time to visit the offices, so that means there is a need for a pan-european communication channel. This must also have the possibility to allow some services from another country, which means cross-border interteroperability is also a key topic for the European Commission for health service, for government services and for tax payment services. 54 security-news.tv security-news.tv 55

30 id crosses borders Now, a question to you not only as a representative of a technology company, but also as a person that sits on many cross industry associations does the constant public and media fueled debate about privacy and data protection issues and passport hacking frustrate you as a technical expert? No, it makes sense that citizens on the street talk about this topic, it is a real issue. On the other side, political organizations must also listen to the public discussion points. At the end of the day, each member state in Europe, also in Asia Pacific and the Gulf region, has a specific decision which captures the specific national requirement on privacy, data, data handling and data management, which means that we as an industry must always follow the political and social trends. We must offer different solutions, which means that we cannot take the same approach for different government bodies or for different states we must handle each one individually. So in your opinion, it s not really anything to do with the technology aspect, it is policy and communication that it comes down to? Right, I ll give you one example: the German legal framework is that the German National Identity card has only a small amount of data such as age, address and name. So you as a citizen can decide what kind of data you will hand over to an Internet provider, it means you alone handle your data. For French policy it is a little different, they have one access key to all data on the National Identity card, which means every person who goes into contact with you at your home place, government services and ebusiness services can have access to all the data on the National Identity card. It s a different handling, but it s the same application at the end of the day. The industry cannot take the same approach for different government bodies or for different states. Now, in terms of market development, the next three years or so will see the European markets fairly saturated where do you see real market potential beyond 2012? We see that in many states in Africa there s a lot of discussion to bring more services to reduce fraud (fraud in Africa is one of the key elements), also there is a part of border control checking there are a lot of illegal people living in different states and the government has no view as to how many people are really living in the country. So Africa is one of the next market places that we see, also South America and a lot of investigation in the Asia Pacific. We think that will bring passport process and biometric passport technology to the streets, and we think that they will also follow with national programs two or three years afterwards. Now with regard to contactless technology, in your opinion is it a realistic vision to have an NFC phone functioning as a reader for an electronic ID card? First of all, there are two different drivers for NFC and s previous driver was public transport ticketing systems and now it is moving on to travel documents like passport, resident permit and the national identity card with driver function, so they drive the and also application and interoperability programs. NFC from this point will be driven more by the convenience for payment for example taking your mobile to pay in a supermarket and on the street, so it s coming more for the payment application. So now the discussion is how do you combine two different standards? Because defined something and NFC defined something else and if you make a cross check of both you see some We see that in many states in Africa there s a lot of discussion to bring more services to reduce fraud. differences between them. One of the key steps would be to harmonize both standards but on the other side, we also see a trend for mobile readers in a lot of government applications such as the resident permit card. This must be read on the street to check that people have the right documents, which means that a mobile reader is needed and not a border control terminal. So the discussion of low energy, low voltage and low reading distance is one of the next steps for mobile reader infrastructure. I see this as the main topic and not the mobile handy topic. 56 security-news.tv security-news.tv 57

31 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program The Industry s Benchmark Silicon Based Security Partner Program Since the year 2000, when the Silicon Trust was founded by Infineon Technologies as a marketing program for smart card solutions, the program has developed to be a key partner platform for companies aimed at promoting the use of silicon-based security in a broad variety of applications including Identification, Telecom and Payment. With more than 20 active member companies in 2008, Silicon Trust now forms a strong community of like-minded companies. Today, the driving force behind the Silicon Trust are the three executive partners: Gemalto, Giesecke & Devrient and Infineon Technologies, supported by the German Federal Office for Information Security (BSI) in the Silicon Trust advisory board. Many other companies along the value chain of silicon-based security participate in Silicon Trust discussions and activities. 58 security-news.tv security-news.tv 59

32 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: second wave of biometric documents Second wave of biometric documents in Europe Part One Introducing the electronic Residence Permit for non-eu/eea nationals By Detlef Houdeau, Infineon Technologies and member of the Silicon Trust The EU Commission runs a number of large-scale identity management programs surrounding the traveler, including: Schengen Visa, uniform person and biometric data settings, Visa-Information-System (VIS), Schengen-Information-System (SIS) and the uniform asylum validation process (EURODAC), however the focus of these schemes is on travelers who spend up to a maximum of 90 days in Europe. Therefore, the Commission plans to implement a new initiative, which concentrates on more long-term travelers, who stay in a European country between three months to five years. With this approach, the EU Commission is able to unify travel identity management with non-eu nations. EU policy and biometric documents On 20th June 2003, the European Council met in Thessaloniki to discuss issues concerning European integration. During this meeting they declared a coherent approach across all EU members, relating to biometric identifiers and biometric data for all EU citizen passports, non- EU/European Economic Area (EEA) nationals and for a back office information system [1]. Just over a year later, in the Council Regulation (EC) No 2252/2004 (13th December 2004) a roadmap outlining the security features and biometrics for passports and travel documents, was issued by the EU Member States (EU-MS). Since June 2006, all 27 EU-MS have switched to this new technology and have only issued passports with an embedded security microcontroller, contactless RF interface (ISO/ IEC 14443) and at least one biometric feature the facial image of the holder. Currently, both Latvia and Germany also store two fingerprint images in the chip. The deadline for the implementation of two fingerprint images in passports, by all EU-MS was 28th June The data is protected by the BAC/EAC security protocols, which were defined by ICAO and BIG. 60 security-news.tv security-news.tv 61

33 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: second wave of biometric documents Technology and Residence Permit for non-eu/eea nationals On 7th March 2008, the Council of the European Union published regulations concerning Residence Permits for third country nationals (EU 13502/2/07) [2]. The following key objectives were addressed in the regulation: Harmonized immigration policy; Uniform format within the EU; Meet high technical standards, to safeguard against counterfeiting and falsification. With the decision to select the technical standard for travel documents according to ICAO document 9303, part 3 on size 1 and 2 (ID1 and ID2 format), a binding link between the holder and the Residence Permit is achievable. This approach supports the authenticity of the document and the identity of the holder. Two biometric sets of data from the holder are collected, the face image and two fingerprint images (according to ISO/IEC 19794) and then stored on the Residence Permit card, which is protected by EAC security protocol. The Residence Permit has the ICAO chip inside symbol printed on the card and for machine-readable travel documents with a contactless security microcontroller chip (e-mrtp, RF-chip) The front and back layout of the card is also defined by the EU [2]. Additional functions on the card, such as egovernment and digital signature that enable access to eservices, should also be facilitated and governed by the EU Member States. For this type of application, the Residence Permit card may also require a contact-based interface (ISO/IEC 7816) in addition to the contactless interface (ISO/IEC 14443). Implementation The first european rollout was started by the UK on 25th November Each year, around 300,000 people apply to study in the UK (The London School of Economics alone takes 66% of its students from overseas [3] ). The UK Border Agency (UKBA) issues smart card-based Residence Permits in an ID1- format. The Identity Card for Foreign Nationals includes two sets of biometric data (face and two finger images) and is the UK s first mandatory electronic ID document. UK immigration and police officers now have the possibility to quickly identify people easily and securely. On street checking is also possible in the future, with the new generation of mobile contactless card readers with integrated MRZ (Machine-Readable Zone) scanners now available. Outlook Veronica Atkins interviews Detlef Houdeau at OMNICARD 2009 The second European eresidence implementation will start shortly. The focus for the new scheme will be on people who visit Europe for over three months from countries outside of Europe: non-eu Visa-Waiver-Program members for example an Indian student studying in France for two years or a Chinese citizen working in the UK. This second wave increases the demand in the security industry for certified security microcontroller chips, secure smart cards, readers and supporting infrastructure on top of the biometric epassport business. It also highlights the continuing advancement of contactless identification technology within the public sector. More details on this new program, the technology, roadmap of the European Council and on the challenge for the security industry in Europe, will be reviewed in one of the upcoming issues of The VAULT magazine. Source [1] ec/76279.pdf [2] re02.en07.pdf [3] 62 security-news.tv security-news.tv 63

34 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: smart tickets Smart tickets a proven solution for future transport systems By Dr Roland Magiera, Giesecke & Devrient and Ramona Mache, Infineon Technologies and member of the Silicon Trust More than 50 major municipalities world wide already use smart cards and smart tickets for mass transit solutions. The first high volume contactless ticketing solution, Upass, was introduced in Seoul, South Korea in Since then other schemes have been implemented in cities such as With smart ticketing technology, the transport agencies and authorities should and will improve the services and convenience for customers. Moscow, Sao Paulo, Shanghai and Rio De Janeiro. European systems have also begun in major cities such as London, Stockholm, Paris and Rome, while in Asia the market expanded further with implementations in Tokyo, Hong Kong, Bangkok and Brisbane amongst others. This development is of significant importance to almost all countries in the world. The inadequate provision of transport systems can restrict access to social, political and cultural activities for people with disabilities, the elderly and many other groups, which can therefore be claimed to reinforce social marginalization. Public transport can therefore be seen, for any country, to play an important role and have significant relevance upon the natural environment as well as quality of daily life. Therefore the overall mission of Public Transport Agencies is to provide a high-quality, accessible and affordable public transport system with the strategic aims of: Increasing standards of living; Reducing pollution and energy consumption; Optimizing journey times in order to reduce congestion; Improving reliability, convenience and service for end customers. Karin Sveheim, Precise Biometrics 64 security-news.tv security-news.tv 65

35 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: smart tickets With smart ticketing technology, the transport agencies and authorities should and will improve the services and convenience for customers as investment in new infrastructure increases globally over the coming years. More efficient There is a drive to integrate access to a variety of citizen services to the smart ticket. services will result in higher usage, increased revenue, which in turn should limit the amount of subsidies required from both the government and the taxpayer. History and outlook There is a trend that the world s largest cities will become even bigger. Referring to a UN report, it is predicted that there will be 60 Mega- Cities with a total of more than 600 million inhabitants by Today, these cities are facing a number of challenges with their public transport systems as the number of inhabitants and visitors increases so does the demand for more convenient and reliable mobility. Furthermore, there is a drive to integrate access to a variety of citizen services to the smart ticket, whilst also reducing the threat of crime in the city, reducing the need to carry cash, and make illegal usage and counterfeiting impractical. One additional global future trend, which will drive increased investment in new infrastructure, is the need for more efficient energy use when travelling. Decreasing energy resources will force governments to develop energy-saving technologies for future decades to come. Different types of transport schemes Transport schemes can be very different: influenced by various stakeholders such as passengers, service providers, government authorities, and private companies. Each scheme also has varying regional specifics, e.g. passengeroriented schemes in US vs. operator-dominated schemes in Europe. Finally, transport schemes feature different levels of integration with other systems and services and may follow different operational specifications. Alternative solutions offering better security against fraud are discussed with the focus on smooth migration with controlled costs (infrastructure changes cost many millions of Euro). Furthermore, talks with transport agencies have unveiled the following tendencies: Currently, the market still favors MIFARE - based systems split into three segments: lowend (using low cost contactless memories), medium (with contactless secure memories) and high-end applications (using certified security controllers); It is key to create value for the issuer and, not to destroy investment. Undisclosed proprietary encryption methods and algorithms are seen as a security risk and are no longer favored; Contactless banking cards are getting more and more attention driven by the US. For example, Massachusetts (MTA) plans to extend their pilot in New York to New Jersey, but it is not yet clear to what extent other regions will follow London s Transport for London (TfL) has publicly discussed implementing contactless EMV sometime in the future; Mobile phones with Near Field Communication (NFC) will be viable in the next few years. Pilots have already taken place and have been promoted worldwide, but a major rollout is not expected before 2013 when infrastructure is available, there is a range of phones deployed and business cases are implemented. 66 security-news.tv security-news.tv 67

36 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: smart tickets Different schemes different requirements Public transport systems are extremely diverse. Different regional specifics, level of integration and varying standards create the need for adaptable solutions. In general we may cluster the following levels of product requirements: The low-end market is focused on the Limited Use ticket application and uses designs made up from a small capacity memory IC, directly attached to a printed or etched antenna, which is laminated inside a paper ticket; The medium market has tailored solutions for schemes with different tariff zones, micro payment and various merchant services. The ticket is typically a plastic card with a three year life span, utilizing a secure memory IC in a module and wired antenna; The high-end market addresses multiapplications like transport, city services and payment, this often requires a smart card controller and wired antenna in a personalized plastic card. It is worth mentioning that the different transport schemes are using and may use products of all three levels after starting within one level. The most prominent success story for Limited Use Tickets is the Moscow Metro project, where the rollout started in Last year (2008) a volume of several 100 million tickets, with a low-end memory compatible to ISO 14443, were consumed as either single ride tickets or up to 16 ride tickets. Further rollouts in Russian cities like St. Petersburg are planned. The following requirements for such projects have to be considered: Looking at the monetary values stored on such a Limited Use ticket, the solution has to be very cost sensitive; A fast performance, e.g. NFC Forum Tag Operation Type 2 compatibility, is an important precondition. Therefore the IC should support a fast start up; Proportional security, like a privacy concept using passwords and password limitation, should be considered for any system. In the medium segment most projects have used MIFARE technology. Despite the recent security scares, it may be worth schemes staying with MIFARE if the system itself provides online security. Such examples can be found in Brazil and United States of America. But of course there are projects, which will upgrade to another level. The most well known project is the Oyster Card, which is the contactless smart card for London transport. Oyster began in 1998 and the roll out was in Consumers use it for daily, seasonal, annual and concessionary travel tickets for both the underground and overland buses. To visualize the challenge in London, here are some figures: There are 8.5 million passengers a day using London transport; 700 bus routes, 8000 buses, covering 3,730 km; 329 km underground lines; 26 km Docklands Light Railway line; 28 km tramways; 788 km National Rail lines in the Greater London area serving over 600 stations. 68 security-news.tv security-news.tv 69

37 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: smart tickets Over 20 million Oyster cards have been issued and 20,000 card terminals deployed. The challenge for London is to upgrade this single issuer closed 1990 s design with a system for the 21st century. The product of choice has to balance the best performance, security, and price ratio. Such systems, which are looking to upgrade, should mitigate risk whenever possible. Any ticket alternative must therefore have a low impact on deployment and should be based on open standards. The ticket communication should not be based on proprietary command sets, which could incur license fees and/or a single supplier situation. The new system should offer future-proof flexible security, like the public algorithm Advanced Encryption Standard (AES) in combination with secured hardware design. Furthermore a new system should offer similar, if not better transaction times and finally, compatibility to third party solutions such as contactless banking cards using EMV security and NFC phones with etickets. High-end market transport cards often require multi-application designs. These designs require extra security to protect the different issuers and the user s data. For example, the largest contactless microcontroller transportation card in China is the Shenzhen Tong Card. Shenzhen Tong Ltd., the public transportation company, has already issued more than three million Shenzhen Tong cards within 2008 in the city of Shenzhen. The city s population is around 9 million in the Guangdong province, which has some 100 million people. Shenzhen Tong are multi-application cards that can be used as tickets for public transportation and to pay for goods in stores. In the transportation sector, the metro and more than 10,000 buses have been fitted to use Shenzhen Tong cards. Additionally, in the micropayment sector, more than 500 supermarkets, shopping malls and convenience stores already accept Shenzhen Tong cards for payments up to 1000 RMB (Renminbi) around 100 Euro. The Shenzhen Tong card utilizes contactless security microcontrollers with a high security profile. The chip has Common Criteria EAL security certification (the benchmark is CC EAL 5+ high). Additionally, EMVCo certification is recommended for use in payment schemes. The Shenzhen Tong Card is also compliant to ISO standards and global application standards to support a multi-supplier base. Challenges and conclusion New systems or existing systems, which consider an upgrade to a new technology should take the opportunity to choose a more secure and open system which is ready for the future. Important for all transport agencies is to have the choice of a broad portfolio of products from tickets using low-end contactless memories IC, up to multi-application cards with a certified microcontroller IC. The system should be based on one security concept; tailored security is advisable especially in cost sensitive markets. The systems should be based on international and open standards to avoid higher than necessary costs due to (hidden) license fees or single supplier situations. The product of choice has to balance the best performance, security, and price ratio. Important for all transport agencies is to have the choice of a broad portfolio of products from tickets using low-end contactless memories IC, up to multi-application cards with a certified microcontroller IC. Overall, the challenge will be for the different parts of the supply chain to work closer together to understand the changing strategic aims of the transport operators and to supply future proof electronic ticket solutions to meet the needs of stakeholders in the public transport industry for the 21st Century. 70 security-news.tv security-news.tv 71

38 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: trusted computing for the future Trusted Computing for the Future By Hans Brandl, Infineon Technologies and member of the Silicon Trust Personal Computers (PCs) with built in Trusted Computing (TC) technology are already well known and widely distributed in the marketplace with nearly all new notebooks containing a Trusted Platform Module (TPM), which can be used to increase trust and security features in a number of daily applications. It has become a necessity to adapt the current TC standard and implementation, to cover embedded platforms. Trusted Computing (TC) has become an established technology for the verification and implementation of integrity and security applications on personal computers. Similar applications are also required for embedded computing platforms, which similar to personal computers, also have trust and security problems. The issues here are mainly due to the increasing complexity and consequential instability of Operation Systems (OS) and applications, in addition to Internet connections that are prone to security risks and attacks. Until now, the TC standard has focused on PCs because of their large resource of available code space, specific bus interfaces and large computing power, elements which are not always available with embedded platforms. However, as there are an increasing number of embedded computing platforms like PCs in the field, it has become a necessity to adapt the current TC standard and implementation, to cover embedded platforms, such as mobile communication devices, industrial controls or automotives. Trusted embedded systems As with all new technology, a systematic approach should be taken for the development of trusted embedded systems to ensure that all components are considered: Trusted hardware and Trusted Platform Modules should be integrated as part of the VHDL design, which can then be adapted to different host systems together with processors to support trust architecture. Trusted operating systems should be based on the upcoming new virtualization / hypervisor architecture, which is already in use on PCs, adapting it to the specific requirements of small platforms and trusted modules. Security layers for implementing easy and accessible security mechanisms should be included Trusted protocols Elementary TC protocols like TSS (Host interface API) and TNC (trusted network connect) an advanced secure communication protocol, will also be required for embedded platforms, but with a restricted amount of resources. 72 security-news.tv security-news.tv 73

39 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: trusted computing for the future Trusted platform modules One important point in the deployment of TPMs in PCs, is the activation of the TPM itself. Due to privacy reasons and misgivings, in a typical PC system TPMs are delivered in a deactivated state, which have to be activated at deployment by the new owner of the computer. Today, as the use of TPMs is increasing, especially in large organizations, ITC infrastructures require a different and more efficient method of handling the modules and the new Trusted Computing Management System (TCMS) [1] is often the first option for streamling efficiency in large TPM infrastructures. By combining existing TCG and PC standards, TPMs can now be activated in a secure and productive way, remotely by the organization s ITC administrator, with the help of a dedicated TCMS server. Similar use of the TCG standard features, together with a TCMS server, enables new basic functionalities for the secure transfer and management of TPM stored certificates and other critical information. Based on these fundamental security mechanisms, secure and remote management, together with secure message handling, paves the way for new TPM applications and use scenarios. For embedded applications, the same procedures are required, but on a much larger scale. For example, mobile phone communication protocols are usually controlled by the network provider it s not expected that the owner of a mobile phone should activate the security features via a TPM and enter the relevant details. A user expects to be able to use the system straight from the box, while the network provider does the Trusted Computing (TC) has become an established technology for the verification and implementation of integrity and security applications on personal computers. rest. In addition to this, the owner expects that security parameters are set to a suitable level so that an attacker or third party is unable to interfere with it. A possible future application could be the security and safety enhancements of future embedded platforms in complex, mission critical applications, such as automotive applications. It is not possible to manually activate a TPM based security feature during the production, sales or after sales stage because the manufacturer, salesperson or user doesn t have the knowledge and understanding concerning such security induced handling and its reach. As a consequence, it is necessary to expand the first approaches of TPMs remote security management to a much broader product base at embedded applications and increase its flexibility to a very broad range of embedded security platforms for example. Further standardization of such functionality will also be necessary for the broad penetration into the fields of use. Trusted computing in the future The mobile phone is considered a future application for embedded trust, because of of the following reasons for example: The network provider requires control over the network access, the authentication of the user and to control specific services; Modifications and enhancements to the platform s hard and software (as well as additional software) may need authentication and verification from the integrity of the platform; The user may want to store private data (electronic purse, payment, access control applications) on the device and be confident that this cannot be accessed by anyone else. Similar requirements are also made by next generation automotive systems: A car manufacturer needs a trusted infrastructure for checking the integrity of the car system itself and may need a TPM function for starting a trusted virtual operating system, with error tolerance, for internal safety functions. The repair shop may need access to specific critical functions, such as engine and power features inside the car or the odometer value, which should not be accessible by the user or any other unauthorized third party; It is also interesting to note that future wireless car-to-car communication runs only in a safe and secure, authenticated manner. All the application scenarios (and many more that arise in the future) may require independent instances of trust and security, however, in order to streamline costs, only one module should be implemented, which can carry out all of the scenarios. 74 security-news.tv security-news.tv 75

40 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: trusted computing for the future One of the Trusted Computing Group Mobile Phone Work Group s (TCG MPWG) first deliverables has created and published a specification [2], which offers new potentials for implementing trust in mobile computing platforms (but not only in these) by introducing a new, hardware-based trust anchor for mobile phones and devices. This Mobile Trusted Module (MTM) has properties and features comparable to a standard TPM. The MPWG proposed a much more universal security architecture for mobile phones and devices on a higher abstraction level. The specification is called a TCG Mobile Reference Architecture (RA) and abstracts a trusted mobile platform as a set of tamper resistant trusted engines, operating on behalf of different stakeholders. This architecture offers a high degree on flexibility from the design and implementation of the trusted components, to all participants in hard- and software development, also at nonmobile phone systems. An important aspect of the TCG Mobile Reference Architecture is the potential to make some parts of a trusted mobile platform virtual. The implementation of the MTM chip depends on the security requirements of its specific use-case. For high levels of protection and isolation, an MTM could be implemented as a slightly modified Trusted Platform Module (TPM) this enables costeffective implementation of new securitycritical applications and various innovative business models, in both the mobile and generic computing domain. A trusted mobile platform, based on a MTM, is characterized as a set of multiple tamper-resistant engines, each acting on behalf of a different stakeholder. Generally, such platforms have several major components: Trusted engines (TE) Trusted services (TS), Customization by trusted resources (TR) A general trusted mobile platform, based on this structure, is described in the following illustration: Trusted Engine #1 Device Manufacturer Normal Services Interface Trusted Services Interface Trusted Resources Interface Trusted Engine #2 Cellular Services Normal Services Interface Trusted Services Interface Trusted Resources MTM #1 MTM #2 MTM #3 MTM #4 All of these trusted engines can be implemented on the same piece of silicon and with today s expertise in chip security, the different compartments and their data can be protected against each other to enable all functions to sit on one piece of silicon, and therefore create cost savings. Interface Trusted Engine #3 Service Provider Normal Services Interface Trusted Services Interface Trusted Resources Interface Trusted Engine #4 User Normal Services Interface Trusted Services Interface Trusted Resources Due to their flexible design, the new standards are not restricted to specific application areas, but allow new products, which require trust and security to take advantage of them. [1] [2] TCG. TCG MPWG Mobile Trusted Module specification, Interface Trusted Subsystem TSS 76 security-news.tv security-news.tv 77

41 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: match-on-sim Match-on-SIM a new frontier for the aviation industry By Karin Sveheim, Precise Biometrics and member of the Silicon Trust What if you could glide right through check-in and security controls at the airport in a fast lane, using your mobile phone for identification passing by queuing exhausted parents and business people returning from holidays and daylong meetings? Future Registered Traveler Programs, incorporating Match-on-SIM card with mobile phones and biometrics will allow this. Over recent years, higher demands on security and tighter government regulations have made it difficult for airline companies and airports to uphold an efficient passenger flow. And since then, the aviation industry has been leaning towards the use of biometrics to help in this area. By using biometrics to verify passengers through the travel process, the aviation industry has found ways of maintaining their efficient self-service systems. And by taking advantage of the fact that most travelers carry mobile phones, it looks like the aviation industry will take yet another step towards eliminating queues in the airport environment. Fingerprint recognition and mobile phone SIM cards are key elements in the future of Registered Traveler Programs using Match-on- SIM biometric technology. The rise of the mobile phone Today one of the most popular approaches to combining biometrics with smart cards is using Match-on-Card. This process involves both the matching and storing of fingerprints, which takes place on a smart card. It has the privacy advantage of storing the fingerprint template within the card, therefore making it unavailable 78 security-news.tv security-news.tv 79

42 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: match-on-sim to external applications and the outside world. And as SIM cards represent 80% of the entire smart card market, Match-on-Card is now also available on SIM cards Match-on-SIM. Millions of people already use their mobile phones to access their bank accounts, read their s, talk to people using Instant Messenger (IM) and download music and ring tones, all of which require an element of verification. However, as more and more functions and applications, such as Registered Traveler Programs, have the ability to be added to the mobile phone, the need for secure verification is increasing. and other services related to travel where authentication is needed. The solution offers definable advantages and cost-efficiencies to airline companies through its automated travel processes and security upgrade. As more and more functions and applications have the ability to be added to the mobile phone, the need for secure verification is increasing. Biometrics in the aviation industry At airports, where passenger safety and national security are paramount, this technology enables airlines and airports to offer travelers an extensive and secure service, based on biometric verification. Match-on-SIM is a solution demonstrating that fingerprint recognition and mobile phones can be combined in an entire solution for airline travel. Biometrics can be used throughout the entire process of booking, check-in, boarding The system provides many of the services that the self-service kiosks offer today, but without the maintenance overheads. And, as with all automated airport processes, it allows for faster passenger throughput as well as increased reliability and more accurate passenger identity verification. The technology The subscriber s fingerprint information is stored and matched inside the SIM card. The fingerprint can be captured on an external device, such as on a self-service kiosk or a gate at the airport and then transmitted over the air and matched inside the SIM. This makes the mobile phone a truly personal object, while retaining the verification of the subscriber s identity in the secure environment of the SIM card. No biometric data is ever transferred from the SIM card, which ensures the complete privacy of the subscriber and protects his or her fingerprint data at the same level as system keys. The technology is optimized for a purely contactless environment, which has a number of limitations and rules about what is communicated over NFC and how, and yet is fully compatible with NFC standards. It also fits into the logic of the mobile phone, combined with the fact that it can be easily integrated in an airport environment. SIMs well suited for registered travel Today, most Registered Traveler programs are smart card-based and although smart cards offer high security, it has a few limitations, such 80 security-news.tv security-news.tv 81

43 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: match-on-sim as the lack of a private human interface to the card. If a user wants to know what s in their card, what their last transaction was or what seat they have on their eticket they have to put it in a terminal to be read. However, utilizing the SIM card and mobile phone, you can introduce a greater element of convenience. A mobile phone handset has its own screen and communicates with the SIM card, enabling the owner to check and manage information at their convenience. Because of this, the eticket becomes even more practical than a paper ticket as users can check information at any time or place, and it gives them the reassurance of being able to interact with all these transactions they no longer need to find and use a terminal to access the information they want. The inclusion of biometrics also means that users know that the information stored in the phone is available and accessible only to them. Additionally, if a user s phone is lost, these functions can be locked by biometrics independent of the phone. Replacing traditional RTP cards The rollout of Registered Traveler Programs (RTP) is currently being hindered due to the reluctance of the various parties involved in picking up the cost of issuing cards to travelers. The inclusion of biometrics also means that users know that the information stored in the phone is available and accessible only to them. As it stands, there are still only a small number of RTPs running in Europe, one of which being Dartagnan s PRIVIUM scheme at Schiphol Airport in Amsterdam. Unless things change and harmonization is reached, Europe risks having a number of localized schemes offering fast passage through just one single airport. Introducing the mobile phone here would eliminate the need for both the printing and distributing of a card document, making the option to share and create an interoperable solution more viable and much closer. To address this, the industry is now looking at whether the documents that travelers already carry are capable of incorporating biometric verification and are accessible at an airport. Some have considered epassports, however this would The effort and high cost of distributing RTP cards could be replaced with the distribution of a more affordable piece of software that fits on mobile phone SIM cards. not work because legally, the border control authority can only read the passport this means that they cannot be used in the airline-ticketing environment. In addition, epassports also lack a data field to add RTP details. Mobile phones on the other hand, are available to anyone traveling and can be read by the same type of equipment as epassports or etickets and furthermore, they can facilitate Match-on-Card technology. Therefore, the effort and high cost of distributing RTP cards could be replaced with the distribution of a more affordable piece of software that fits on mobile phone SIM cards. Timelines and forecasts The slowness with which handset manufacturers have introduced NFC-enabled phones is well recorded, but there is no doubt that NFC will play an important role in applications as diverse as payment and airline ticketing. It will be some time before these handsets become commercially available. Their popularity and use should start growing in 2010, and by the end of 2011, analysts forecast that 25-30% of the installed base of mobile phones will be NFC capable. Assuming that these estimates are correct, that will be the time from which a good subscription base could be achieved. And if you look at the number of mobile phones currently in use worldwide, 30% of that total would represent nearly a billion handsets. 82 security-news.tv security-news.tv 83

44 ::: A question of security Interview with Allan Harle, Inspectron and member of the Silicon Trust The Vault July 2009 Each issue we get to know up and coming and innovative companies, to find out what they re up to, their plans for 2009/10 and what drives them to succeed in the security industry. This issue, we speak with Inspectron s CEO, Alan Harle, about verification, identification and the future of multi-application. Inspectron works in the world of secure document integrity and verification, could you explain how you fit into this eco-system? Any secure document will have specific personalized information on it; this could be a name, date of birth or account numbers. This data can be visible or embedded in an RFID chip, or both either way, it is very important that this information is correct, readable and has all the correct security features. Inspectron provide solutions to verify, match and validate that the data on secure documents is correct. The company started in 1976 as an Optical Character Recognition company, so our background has always been in Data Capture and verification. 20 years ago, we migrated this technology to the Transactional Print / Mail market to check the production of credit card statements. If you had to sum up your company in three words, what would they be? Secure, reliable and affordable. You come across as an innovative technology company but where do your ideas and inspiration come from? We are always testing and developing new technology and our inspiration comes from listening to our customers and partners to see how we can align our solutions to meet their challenges. In your experience, what have been some of the most crucial developments and / or achievements in the production of secure documents over the years? One of the most crucial drivers we have seen is the need to identify that a person is who they say they are, whether this is for border crossing or to combat identity theft. The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: a question of security Looking to the future, there is a growing need for more secure documents in both public and private applications such as Payment, Access and National ID, do you see a future for multi-application documents? Yes, we do see a future for multi-application documents. We have seen this in the USA already, where some States are combining Driver Licenses with border crossing applications. Advantages with this are that end users will carry fewer documents. What is hindering progress here is establishing a set of suitable and agreeable standards, across a variety of application areas. How would a multi-application solution affect the document production process, and has the introduction of biometrics impacted on this too? Creating a multi-application document adds a layer of complexity in terms of data management and privacy as the main concern for end users is about who holds what data about them, for example, users might not necessarily want payment information being mixed with a National ID. With the introduction of biometrics, more data is created, which means that a more controlled production process is required and the need for greater verification is increased. And finally, what s next for Inspectron? What are your plans for 2009/10? We will continue to expand our partnerships and look to develop further in new application areas including Healthcare and Insurance ID. 84 security-news.tv security-news.tv 85

45 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: intelligent security at the border Intelligent security at the border By Katja Sommerfeld, SAFE ID Solutions and member of the Silicon Trust Over recent years, the implementation of global MRTD infrastructures can be seen to have increased the security and facilitation of travelers worldwide. Now, at least 60 ICAO countries are issuing epassports, with a number of others planning to issue them by the end of The evolution of machinereadable travel documents (MRTDs) The substantial modernization of the 3rd edition ICAO Doc 9303 provides countries with a proven foundation for planning and introducing or upgrading an existing identity document. The ICAO standards comprise of an optional The inclusion of biometrics also means that users know that the information stored in the phone is available and accessible only to them. interoperable standard that covers the storage of biometric identification and other associated data, which is held on the contactless RFID chip. This optional standard enables countries to issue an official ID document with enhanced security for biometric identification and authentication at border control posts. In the future, the focus will be on global interoperability, which aims to harmonize the capabilities of inspection systems and data exchange in different countries throughout the world. This step ensures that the data received from all systems can be processed and utilized in inspection operations in the respective countries. Therefore, system interoperability meets the requirements of passport issuers and immigration authorities to guarantee the accurate identification of a travel document and its holder, while minimizing facilitation problems for the traveler. eid documents add value The continued increase of epassports and standard machine-readable passports (MRPs) demands the early and fast introduction of border control solutions to provide efficient and secure airport and immigration procedures. Using the added value of eid documents requires the implementation of a highly secure border control solution that covers the eid document s verification and the holder s authentication. Combined with the Public Key Directory (PKD), 86 security-news.tv security-news.tv 87

46 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: intelligent security at the border the border control authorities effectiveness is enhanced because they receive unaltered and genuine document information that will be checked against the biometric data stored on the chip. Innovative security solutions that replace existing methods must offer heightened protection, allow the fluid movement of people at sensitive sites, whilst minimizing any delays. These solutions become complex due to varying factors such as changing government requirements, which may be effected by terror warnings for example, that immediately increase the intensity of border security. In this case, authorities have to be able to centrally adjust the level of security at border check points (e.g. making additions to their most wanted list), either generally or individually for different locations. All respective connected border control clients then have to directly adopt these changes. Biometric identification solutions The biometric identity management solution method has grown in recent years at airports and other border control posts. The solution focuses on the biometric authentication of a traveler from scanned data of the face and fingerprint (fingerprint recognition is the most mature and recognized biometric verification method.) The traveler s biometric information is checked against the biometric data of the eid document that is stored securely on the chip, whereas the eid document was read on a document reader beforehand. The implementation of a document reader, camera and fingerprint scanner within an automated gate system results in significant benefits by reducing passenger handling time and increasing traveler satisfaction at border controls, due to background checks that verify the document and traveler s identity. In principle, the security and reliability of each identity check can be maximized by increasing the number and accuracy of checks. In real scenarios, the time taken for the verification process to take place is limited due to restricted personnel and technical /environmental capacities. A control station at a highly frequented airport has to prove the identity of a traveler within a few seconds in order to avoid long queue times. The compromise between verification security and process efficiency has to be clearly evaluated which is a decision made by the responsible authority. The traditional border control scenario is described in the following illustration: Automated border control solution The steady flow of passengers and the efficiency of new security measures are the two most important issues that need to have an end-to-end-solution. This can be achieved with an electronic automated border control solution that allows security authorities to focus on unknown travelers who may be considered higher risk, which in turn improves the overall security and reduces passenger waiting times. Key benefits of secure border management solutions include: Enhanced process automation; Secure verification of passengers; Greater prevention of fraud; Higher and quicker passenger throughput. Secure border management solutions are heightened when the following additions are in place: egate equipped with multimodal biometric verification capabilities including; face, fingerprint and iris; Connection to national and international database systems; Intelligent surveillance solutions. 88 security-news.tv security-news.tv 89

47 ::: The Vault July 2009 The Industry s Benchmark Silicon Based Security Partner Program ::::::::::::::::: intelligent security at the border The modern border control process can be illustrated as follows: Step 1: The epassport is placed on the electronic document reader at the entrance of the egate. The biometric data in the chip and the data page is read. If the scan is successful the first door opens and the scanned data is stored. Step 2: The biometric control system identifies the person using the face and fingerprint recognition solutions. The captured data is verified and checked against the data stored securely on the chip. The transit data is stored in the database. Step 3: If the 1:1 check is successful the traveler leaves the egate through a second door. If access is not granted, the traveler is led through a side door to the usual manual passport control checkpoint. Intelligent surveillance Security sensitive environments, like airports and border control posts, require a surveillance solution that monitors the behavior of people and objects. In most cases, video content is for analysis and the face recognition systems provide high-level real time threat detection. Therefore, the installation of highly flexible and scalable intelligent video management solutions is inevitable. The solution must have the ability to perform video management, video analytics and recording functions on a large network of video surveillance systems. The operator of such a secure system is then able to define rules for various scenarios, which may include: Unattended, missing or moved objects (cases / boxes) the solution will recognize and track human activities or objects; Moving people in a security area / loitering people the solution will create virtual barriers. Authorities face a challenge In the future, the industry may struggle to implement such solutions because of social and political issues, rather than technological constraints. Border control solutions reach their full potential when biometric records are matched across networks of international databases, which unfortunately cause further regulatory hurdles in terms of international data protection laws (data privacy violation) and data storage issues. Because of this, authorities are often threatened by biometric technologies due to the subsequent need to standardize procedures, technology and data between different stakeholders to ensure security in a specific environment yet worldwide interoperability. 90 security-news.tv security-news.tv 91

48 The Vault july 2009 MECHANICAL SPECIFICATIONS Full page, bleed 167mm x 224mm (+5mm bleed surround) 2/3 page horizontal 167mm x 150mm (+5mm bleed surround) 1/2 page vertical 74mm x 224mm (+5mm bleed surround) 1/2 page horizontal 167mm x 112mm (+5mm bleed surround) Trim size 167mm x 224mm Bleed 5mm surround Spread, gutter bleed 10 mm Materials PDF/X-3 (recommended and preferred, crop marks outside of bleed area), EPS/AI (MAC, all fonts converted into outlines, crop marks outside of bleed area) Inserts rates and mechanical requirements For inserts furnished upon request please contact Nicole Mountain (nicole.mountain@krowne.tv) AGENCY COMMISSION 15% gross billing allowed to publisher recognized agencies. SHORT RATES AND REBATES Advertisers will be short-rated if, within a 12-month period from date of first insertion, they do not use the amount of space (frequency) upon which their billings have been based. Advertisers will be rebated if, within a 12-month period from date of first insertion, they have used sufficient additional space to warrant a lower rate than at which they have been billed. Rebates will be offered as a credit toward future advertising scheduled or as a cash reimbursement. CANCELLATION CLAUSE Cancellations accepted only before final date for reservation and must be in writing. 90 day advanced notice is required for preferred positions. Cover positions are non-cancellable. Advertisers will be responsible for late cancellations. PUBLISHER S PROTECTIVE CLAUSE The publisher reserves the right to cancel or reject any advertising at any time, and to add the word advertisement at the top of any copy which in the publisher s opinion simulates editorial matter and might be misleading to the reader. The publisher will not be bound by any conditions, printed or otherwise, appearing on order blanks or copy instructions when such conditions conflict with the regulations set forth in the rate card. Impressum The Vault is a K O B N Publication This issue of The Vault is copyrighted 2009 by Krowne Communications GmbH The Vault is a quarterly English language magazine that provides topical features as well as edited transcripts of interviews previously available from its audio or video broadcasts or downloads and available on security-news-tv. Publishing Team Steve Atkins (Publisher steve.atkins@krowne.tv) Veronica Atkins (Editor-in-Chief veronica.atkins@krowne.tv) Nicole Mountain (Channel Director nicole.mountain@krowne.tv) Mirja Coulmann (Art Director mirja.coulmann@krowne.tv) Photos shutterstock.de istockphoto.com (Julien Tromeur, Emrah Türüdü, Andrey Volodin, Roberta Casaliggi, Roger Lecuyer, Stephen Brake, Hu Xiao Fang, Angelo Angeles, HuiTuan Wang, Elena Elisseeva) gettyimages.com Advertising and Sponsoring Nicole Mountain (nicole.mountain@krowne.tv) Published by Krowne Communications GmbH Schlüterstrasse 37, Berlin, Germany Tel: , web: Disclaimer The publisher shall not be liable for inaccuracies in the text. The views expressed are those of the interviewees and may or may not represent the views of their companies or affiliates. These transcripts are not intended to be definitive and should not be relied upon as a substitute for specialist advice. Produced by CUE Sound Service GmbH Krowne Communications GmbH No portion of this publication may be reproduced in part or in whole without the express permission, in writing, of the publisher. All product copyrights and trademarks are the property of their respective owners. All product names, specifications, prices and other information are correct at the time of going to press but are subject to change without notice. The publisher takes no responsibility for false or misleading information or omissions. Opinions and views contained within this publication are given by the respective interviewees and do not necessarily represent the views of Security-News.tv or Krowne Communications. Looking for innovation, information and new business? Come to CARTES & IDentification 2009 The world leading event of Digital Security and Smart Technologies Register for FREE* at Promotional code: 24 Years Supporting the Smart 2009 Technologies CIQ01 *Pre registration fee: 50 incl. taxes - On site: 70 incl. taxes Industry 92 security-news.tv An event organized by CARTES & IDentification avenue du Général de Gaulle Paris la Défense Cedex - France cartes-id@comexposium.com Nov Paris-Nord Villepinte Exhibition Centre - France

49 Inspired by Nature The New Gold Standard for Hardware Security EXTEND YOUR LEAD WITH INTEGRITY GUARD the new security concept offered by the innovative SLE 78 family elevates you to a new level of security and flexibility: Makes your developments easier Shortens your product s time to market Provides longer lifecycles for your products Adapts itself automatically to future threats We would like to invite you to find out everything you want to know about Infineon s new SLE 78 security controller family and its brand new security concept Integrity Guard inspired by nature. For further product information please visit our website or contact us directly. [ ]

Biometrics: primed for business use

Biometrics: primed for business use Article Biometrics: primed for business use Introduction For the regular traveller, identity and security checks are becoming ever more intrusive. Walk though an airport today, and you are likely to be

More information

Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals

Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals Second wave of biometric ID-documents in Europe: The Residence Permit for non-eu/eea nationals Detlef Houdeau Infineon Technologies AG, Munich, Germany Detlef.Houdeau@Infineon.com Abstract The first implementation

More information

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) International Civil Aviation Organization WORKING PAPER TAG-MRTD/18-WP/8 22/4/08 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) EIGHTEENTH MEETING Montréal, 5 to

More information

BIOMETRICS - WHY NOW?

BIOMETRICS - WHY NOW? BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services

More information

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,

More information

The Angola National ID Card

The Angola National ID Card The Angola National ID Card Advanced document security for a widely dispersed population 25 by Uwe Ludwig The Republic of Angola in south-central Africa is bordered by Namibia to the South, the Democratic

More information

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER CONTENTS Executive summary 4 Sophisticated security threats stretch national borders 5 Widespread adoption of biometrics

More information

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009 Ad-Hoc Query on Implementation of Council Regulation 380/2008 Requested by FI EMN NCP on 10 th September 2009 Compilation produced on 8 th December 2009 Responses from Austria, Belgium, Denmark, Estonia,

More information

BEST PRACTICES WORKSHOP ON TRAVEL DOCUMENT SECURITY ORGANIZED BY THE OAS/CICTE AND ICAO SAN SALVADOR, EL SALVADOR JUNE 9-11, 2008

BEST PRACTICES WORKSHOP ON TRAVEL DOCUMENT SECURITY ORGANIZED BY THE OAS/CICTE AND ICAO SAN SALVADOR, EL SALVADOR JUNE 9-11, 2008 BEST PRACTICES WORKSHOP ON TRAVEL DOCUMENT SECURITY ORGANIZED BY THE OAS/CICTE AND ICAO SAN SALVADOR, EL SALVADOR JUNE 9-11, 2008 9:00 Opening session DAY 1 Welcoming Remarks and Objectives Dr. Carol Fuller,

More information

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs)

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs) INTERNATIONAL CIVIL AVIATION ORGANIZATION MACHINE READABLE TRAVEL DOCUMENTS (MRTDs) TOWARDS BETTER PRACTICE IN NATIONAL IDENTIFICATION MANAGEMENT Guidance Material (Guide) Version: Release 3 Status: Draft

More information

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver Machine Readable Travel Documents: Biometrics Deployment Barry J. Kefauver Smart Card Alliance March 10, 2004 International Civil Aviation Organization (ICAO) United Nations organization Established in

More information

EVIDENCE OF IDENTIFICATION

EVIDENCE OF IDENTIFICATION Regional Seminar on MRTDs, Biometrics and Identification Management Sint Maarten, 9 11 July 2013 EVIDENCE OF IDENTIFICATION Mauricio Siciliano ICAO MRTD Officer Overview Where are we? ICAO Answer Guide

More information

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents EDPS Opinion 7/2018 on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents 10 August 2018 1 Page The European Data Protection Supervisor ( EDPS

More information

Dear Helena, 20 March 2019

Dear Helena, 20 March 2019 Home Office 2 Marsham Street London SW1P 4DF Tel: 020 7035 4848 Fax: 020 7035 4745 www.homeoffice.gov.uk Baroness Kennedy of The Shaws QC Chairman of EU Justice Sub-Committee House of Lords London SW1A

More information

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL EUROPEAN COMMISSION Strasbourg, 17.4.2018 COM(2018) 212 final 2018/0104 (COD) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on strengthening the security of identity cards of

More information

Ad-Hoc Query on identity documents issued by EU Member States. Requested by EE EMN NCP on 2 nd June Compilation produced on 9 th August 2010

Ad-Hoc Query on identity documents issued by EU Member States. Requested by EE EMN NCP on 2 nd June Compilation produced on 9 th August 2010 Ad-Hoc Query on identity documents issued by EU Member States Requested by EE EMN NCP on 2 nd June 2010 Compilation produced on 9 th August 2010 Responses from Austria, Estonia, Finland, Germany, Hungary,

More information

CASE STUDY 2 Portuguese Immigration & Border Service

CASE STUDY 2 Portuguese Immigration & Border Service CASE STUDY 2 Portuguese Immigration & Border Service Page 1 Table of Contents EXECUTIVE SUMMARY... 3 1 CUSTOMER NAME... 4 2 BUSINESS CASE BUSINESS DRIVERS... 4 3 CHALLENGE... 4 4 SOLUTION DESCRIPTION...

More information

Voting Corruption, or is it? A White Paper by:

Voting Corruption, or is it? A White Paper by: Voting Corruption, or is it? A White Paper by: By: Thomas Bronack Bronackt@gmail.com JASTGAR Systems, Mission and Goal (917) 673-6992 Eliminating Voting Fraud and Corruption Our society is too far along

More information

Singapore's Automated Clearance using Biometrics

Singapore's Automated Clearance using Biometrics Singapore's Automated Clearance using Biometrics Dr. Yau Wei Yun 1 & Ms. Koh Ting Ting 2 Institute for Infocomm Research, Singapore 1 Ministry of Home Affairs 2 Biometric Passports Meant for better border

More information

Moving to the Second Generation of Electronic Passports

Moving to the Second Generation of Electronic Passports Moving to the Second Generation of Electronic Passports Fingerprint biometrics for enhanced security & privacy July 2007 B A N K I N G & R E TA I L E N T R E P R I S E I N T E R N E T C O N T E N T P R

More information

APPLICATION REVIEW A SILICON TRUST PUBLICATION. May Utilising the synergies between passports and eid cards

APPLICATION REVIEW A SILICON TRUST PUBLICATION. May Utilising the synergies between passports and eid cards APPLICATION REVIEW A SILICON TRUST PUBLICATION May 2017 Utilising the synergies between passports and eid cards Implementing an eid card scheme is a massive investment for any government, especially if

More information

The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528

The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528 The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC1-2-37 Washington, DC 20528 Re: Docket# DHS-2006-0030 Minimum Standards for Driver Licenses and Identification

More information

Government of Pakistan NADRA Headquarters, Islamabad

Government of Pakistan NADRA Headquarters, Islamabad Abbaba Government of Pakistan NADRA Headquarters, Islamabad 1 Who We Are 2 Social Support Initiatives 3 Future Strategy National Database and Registration Authority Registrar General of Pakistan NADRA

More information

IDENTITY CARDS BILL REGULATORY IMPACT ASSESSMENT

IDENTITY CARDS BILL REGULATORY IMPACT ASSESSMENT IDENTITY CARDS BILL REGULATORY IMPACT ASSESSMENT 1. Purpose and Intended Effects (a) Objective 1. The identity cards scheme will help to deliver the following outcomes: (iii) (iv) less illegal migration

More information

German Federal Ministry of the Interior 20 August / 6

German Federal Ministry of the Interior 20 August / 6 German Federal Ministry of the Interior 20 August 2008 1 / 6 KEESING Journal of Documents & Identity Issue October 2008 Andreas Reisen As Head of Biometrics, Travel & ID Documents, Registration Division

More information

E-gate case study: The German EasyPASS Project

E-gate case study: The German EasyPASS Project E-gate case study: The German EasyPASS Project Benjamin Marzahn Federal Office for Information Security (BSI) Benjamin Marzahn 20.TAG/MRTD Montreal, 7.-9. September 2011 1 BSI activities regarding emrtds

More information

SECURE REMOTE VOTER REGISTRATION

SECURE REMOTE VOTER REGISTRATION SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current

More information

BIOMETRICS IN A HUMANITARIAN CONTEXT

BIOMETRICS IN A HUMANITARIAN CONTEXT BIOMETRICS IN A HUMANITARIAN CONTEXT Andrew Hopkins & Justin Hughes 1 Presentation Overview s global footprint The Genesis of Biometrics within The Biometrics Implementation Project Conclusions, the Future

More information

Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation

Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation Canada s FASTER-PrivBio Project Biometrics at the Virtual Border to enhance security and facilitation Hubert Laferrière, Director, Immigration Refugees and Citizenship Canada, Government of Canada Gordon

More information

Changes in Schengen visa application process

Changes in Schengen visa application process Changes in Schengen visa application process As part of the worldwide introduction of the Visa Information System (VIS) 1, the Schengen States will launch the VIS in India (and in the neighbouring countries

More information

Brexit Transition Support for Local Cymdeithas Llywodraeth Leol Cymru Welsh Local Government Association

Brexit Transition Support for Local   Cymdeithas Llywodraeth Leol Cymru Welsh Local Government Association Cymdeithas Llywodraeth Leol Cymru Welsh Local Government Association Brexit Transition Support for Local Authorities Welsh NHS Confederation Event 22 nd March 2019 @WelshLGA www.wlga.wales Overview WLGA

More information

16 December 2010 EU-REPUBLIC OF MOLDOVA VISA DIALOGUE ACTION PLAN 1. GENERAL FRAMEWORK Background

16 December 2010 EU-REPUBLIC OF MOLDOVA VISA DIALOGUE ACTION PLAN 1. GENERAL FRAMEWORK Background 16 December 2010 EU-REPUBLIC OF MOLDOVA VISA DIALOGUE ACTION PLAN ON VISA LIBERALISATION 1. GENERAL FRAMEWORK 1. 1. Background The Justice and Home Affairs section of the EU-Republic of Moldova ENP Action

More information

October 2015 Issue No: 2.4. Good Practice Guide No. 45 Identity Proofing and Verification of an Individual

October 2015 Issue No: 2.4. Good Practice Guide No. 45 Identity Proofing and Verification of an Individual October 2015 Issue No: 2.4 Good Practice Guide No. 45 Identity Proofing and Verification of Good Practice Guide No. 45 Issue No: 2.4 October 2015 This document is issued jointly by CESG, the UK s National

More information

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003

Report for Congress. Border Security: Immigration Issues in the 108 th Congress. February 4, 2003 Order Code RL31727 Report for Congress Received through the CRS Web Border Security: Immigration Issues in the 108 th Congress February 4, 2003 Lisa M. Seghetti Analyst in Social Legislation Domestic Social

More information

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections.

5/6/2009. E toll Database. Census Database. Database. Database. Consumer Balance and Bill Subscriptions. Mobile Connections. 222 individuals who entered Spain illegally were arrested. These persons had no travel documents These detainees claimed origin from Indian held Kashmir. 124 individuals were identified by through biometrics

More information

AGENDA. Focal Ideas A systemic approach. The enrolment The deliverance The control. Needs & Challenges Conclusion Look ahead

AGENDA. Focal Ideas A systemic approach. The enrolment The deliverance The control. Needs & Challenges Conclusion Look ahead AGENDA Focal Ideas A systemic approach The enrolment The deliverance The control Needs & Challenges Conclusion Look ahead 3 Focal Ideas 4 Key Factors to achieve Security Balance Identity Chain [processes]

More information

Testimony before Senate Budget Subcommittee 4 on Implementation of the Federal Real ID Act of 2005

Testimony before Senate Budget Subcommittee 4 on Implementation of the Federal Real ID Act of 2005 Testimony before Senate Budget Subcommittee 4 on Implementation of the Federal Real ID Act of 2005 Barry Steinhardt Director, Technology & Liberty Project American Civil Liberties Union February 23, 2006

More information

Additional Case study UK electoral system

Additional Case study UK electoral system Additional Case study UK electoral system The UK is a parliamentary democracy and hence is reliant on an effective electoral system (Jones and Norton, 2010). General elections are held after Parliament

More information

Visa Information System (VIS) FAQs

Visa Information System (VIS) FAQs Visa Information System (VIS) FAQs 1) What is the VIS? The Visa Information System (VIS) is a system for the exchange of data on short-stay visas between Schengen States. The VIS consists of a central

More information

Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams

Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams Reg. No 21964 Annex I List of profiles Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams Frontex - European Border and Coast Guard Agency

More information

Terms of Reference (ToR)

Terms of Reference (ToR) Terms of Reference (ToR) To Support implementation of Online RCMS, AFIS and Data Centre for Identification, Verification, and Return of potential irregular migrants from EU Member States 1. Context/Background

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

Having regard to the opinion of the European Economic and Social Committee ( 1 ),

Having regard to the opinion of the European Economic and Social Committee ( 1 ), L 327/20 Official Journal of the European Union 9.12.2017 REGULATION (EU) 2017/2226 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 30 November 2017 establishing an Entry/Exit System (EES) to register

More information

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of

Senator Daniel K. Akaka Statement on the REAL ID Act December 8, Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of Senator Daniel K. Akaka Statement on the REAL ID Act December 8, 2006 Mr. AKAKA. Mr. President, I rise today to discuss the REAL ID Act of 2005. The REAL ID Act became law over a year and a half ago, but

More information

13462/18 BN/cr 1 JAI.1 LIMITE EN

13462/18 BN/cr 1 JAI.1 LIMITE EN Council of the European Union Brussels, 30 October 2018 (OR. en) Interinstitutional File: 2018/0104(COD) 13462/18 LIMITE JAI 1042 FRONT 357 VISA 284 FAUXDOC 96 IA 330 FREMP 180 CODEC 1762 NOTE From: To:

More information

MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services. East African Community e-passport: Kenyan Journey

MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services. East African Community e-passport: Kenyan Journey MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services East African Community e-passport: Kenyan Journey Peter Kimaile Chief ICT Officer Presentation Outline Overview

More information

THE ICAO MRTD PROGRAMME MAURICIO SICILIANO ICAO

THE ICAO MRTD PROGRAMME MAURICIO SICILIANO ICAO THE ICAO MRTD PROGRAMME MAURICIO SICILIANO ICAO HOW WE GOT HERE ICAO S MANDATE FOR STANDARDS DEVELOPMENT: THE CONVENTION ON INTERNATIONAL CIVIL AVIATION 2 CHICAGO CONVENTION GOALS Establishes principles

More information

INTRODUCTION 4 Borders under pressure 4 On the move 4 Open for business 4 Experience matters 4

INTRODUCTION 4 Borders under pressure 4 On the move 4 Open for business 4 Experience matters 4 CONTENTS INTRODUCTION 4 Borders under pressure 4 On the move 4 Open for business 4 Experience matters 4 AUTOMATING THE FRONT LINE 5 Automated border control process 5 Trusted travelers 5 TECHNOLOGY MATURITY

More information

ABC and Integrated Border management

ABC and Integrated Border management ABC and Integrated Border management A solution concept for integrated border management and ABC ICAO MRTD Symposium 2014 - Montreal Dr. Matthias Kreuseler Mühlbauer ID Services GmbH Current Situation

More information

Case studies. Swedish Police Board, Swedish Migration Board and Swedish Road Authority

Case studies. Swedish Police Board, Swedish Migration Board and Swedish Road Authority Case studies Swedish Police Board, Swedish Migration Board and Swedish Road Authority Swedish Police Board Implementation of national e-passports in Sweden demanded efficient data capture In 2003 the Swedish

More information

Mauritania integrated epassport Project. JW ter Hennepe Sales Manager Morpho. October 10, 2012 Montreal

Mauritania integrated epassport Project. JW ter Hennepe Sales Manager Morpho. October 10, 2012 Montreal Mauritania integrated epassport Project JW ter Hennepe Sales Manager Morpho October 10, 2012 Montreal BACKGROUND A LARGE COUNTRY WITH A STRATEGIC POSITION IN NORTH AFRICA MAURITANIA 1,030,631 KM² HIGH

More information

MARYLAND Maryland MVA Real ID Act - Impact Analysis

MARYLAND Maryland MVA Real ID Act - Impact Analysis MARYLAND Maryland MVA Real ID Act - Impact Analysis REAL ID ACT REQUIREMENT IMPACT ASSUMPTIONS Full Legal Name into Driver Licensing System (DLS) (In Record, on Document) Modify DLS application and databases.

More information

Frequently Asked Questions for Participating Members and Organizations

Frequently Asked Questions for Participating Members and Organizations Frequently Asked Questions for Participating Members and Organizations Version 3.0.0 SWAC is a trademark of Secure Worker Access Consortium, LLC. 2010 Secure Worker Access Consortium LLC Page 2 of 9 Ref:

More information

Position Paper IDENT Implementation for U.S. VISIT

Position Paper IDENT Implementation for U.S. VISIT Position Paper IDENT Implementation for U.S. VISIT LDENT Proven Value o Currently supporting 14,000+ trained active users and over 2,200 workstations (including international locations) o Currently approximate1

More information

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program Manitoba s Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program A voluntary, affordable alternative for travelling to the United States by land or water APPLICANT S GUIDE Manitoba

More information

AUTOMATED AND ELECTRIC VEHICLES BILL DELEGATED POWERS MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT

AUTOMATED AND ELECTRIC VEHICLES BILL DELEGATED POWERS MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT AUTOMATED AND ELECTRIC VEHICLES BILL DELEGATED POWERS MEMORANDUM BY THE DEPARTMENT FOR TRANSPORT Introduction 1. This Memorandum has been prepared for the Delegated Powers and Regulatory Reform Committee

More information

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives 6. Presentation of Pakistan Economic Cooperation Organization - ECO Syed Mushabir Hussain, 15th April, 2013 1 of 33 Contents Introduction Registration initiatives Projects of National importance Future

More information

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A. IDEMIA Identity & Security N.A. Providing identity assurance to secure & simplify lives IDEMIA IDENTITY & SECURITY N.A. 3 Only you can assert your identity Identity is unique it s who we are, where we

More information

SUB-REGIONAL WORKSHOP ON BEST PRACTICES IN TRAVEL DOCUMENT SECURITY. Welcoming Remarks and Objectives

SUB-REGIONAL WORKSHOP ON BEST PRACTICES IN TRAVEL DOCUMENT SECURITY. Welcoming Remarks and Objectives SUB-REGIONAL WORKSHOP ON BEST PRACTICES IN TRAVEL DOCUMENT SECURITY ORGANIZED BY THE ORGANIZATION OF AMERICAN STATES (SECRETARIAT OF THE INTERAMERICAN COMMITTEE AGAINST TERRORISM OAS/CICTE) AND THE INTERNATIONAL

More information

Identity Documents Act

Identity Documents Act Issuer: Riigikogu Type: act In force from: 01.09.2013 In force until: 30.04.2014 Translation published: 04.11.2013 Amended by the following acts Passed 15.02.1999 RT I 1999, 25, 365 Entry into force 01.01.2000

More information

Now, in the interest of full disclosure, I must begin my remarks with the following important announcements. These include:

Now, in the interest of full disclosure, I must begin my remarks with the following important announcements. These include: Remarks by Frank E. Moss Deputy assistant secretary For passport services U.S. Department of State To the Smart Card Alliance Crystal City, Virginia April 18, 2006 Good afteroon. I want to begin my remarks

More information

Government Programs. ICAO REGIONAL SEMINAR ON MRTDs, BIOMETRICS AND BORDER SECURITY RIO DE JANEIRO, BRAZIL, APRIL 2012

Government Programs. ICAO REGIONAL SEMINAR ON MRTDs, BIOMETRICS AND BORDER SECURITY RIO DE JANEIRO, BRAZIL, APRIL 2012 Government Programs ICAO REGIONAL SEMINAR ON MRTDs, BIOMETRICS AND BORDER SECURITY RIO DE JANEIRO, BRAZIL, 17 19 APRIL 2012 Gemalto in key figures Financials 2011 Innovation: 152 M inverted in 2011 14

More information

fraud prevention done right

fraud prevention done right fraud prevention done right 1 Lessons learned after reading Thank you for your interest in identity document fraud prevention! After reading this brief document you have gained more knowledge about: Difference

More information

REPORT VOLUME 6 MAY/JUNE 2017

REPORT VOLUME 6 MAY/JUNE 2017 BORDER SECURITY REPORT VOLUME 6 MAY/JUNE 2017 For the world s border protection, management and security industry policy-makers and practitioners COVER STORY Smarter Borders in Spain AGENCY NEWS SHORT

More information

Public Consultation on the Smart Borders Package

Public Consultation on the Smart Borders Package Case Id: db7db520-ef0e-48aa-aa12-4d18d2070548 Date: 22/10/2015 15:06:12 Public Consultation on the Smart Borders Package Fields marked with are mandatory. Questions to all contributors You are responding

More information

e-borders: Friends of Presidency Group meeting Brussels

e-borders: Friends of Presidency Group meeting Brussels e-borders: Friends of Presidency Group meeting Brussels Tim Rymer Head of Joint Border Operations Centre Border & Immigration Agency 27 March 2008 Friends of Presidency group: PNR History and setting up

More information

IOM, Migration, ID Management and the Responsible Use of Biometrics: Tools for Migration and Border Management

IOM, Migration, ID Management and the Responsible Use of Biometrics: Tools for Migration and Border Management IOM, Migration, ID Management and the Responsible Use of Biometrics: Tools for Migration and Border Management IOM HEADQUARTERS IMMIGRATION & BORDER MANAGEMENT DIVISION Florian G. Forster Head of Division

More information

Visa Information System (VIS) FAQs

Visa Information System (VIS) FAQs Visa Information System (VIS) FAQs 1) What is the VIS? The Visa Information System (VIS) is a system for the exchange of data on short-stay visas between Schengen States. The VIS consists of a central

More information

Approximately eight months after the terrorist

Approximately eight months after the terrorist Backgrounder June 2002 The Enhanced Border Security and Visa Entry Reform Act of 2002 A Summary of H.R. 3525 By Rosemary Jenks Approximately eight months after the terrorist attacks of September 11, on

More information

Identity Management Transcending Markets in Today's Society. October 11th, 2005 Patrick McQuown Adjunct Professor - Georgetown University

Identity Management Transcending Markets in Today's Society. October 11th, 2005 Patrick McQuown Adjunct Professor - Georgetown University Identity Management Transcending Markets in Today's Society October 11th, 2005 Patrick McQuown Adjunct Professor - Georgetown University Agenda Who am I? What do I do? Identity Management Drivers Identification

More information

The Home Office response to the Independent Chief Inspectors of Borders and Immigration s report: An Inspection of the Right to Rent scheme

The Home Office response to the Independent Chief Inspectors of Borders and Immigration s report: An Inspection of the Right to Rent scheme The Home Office response to the Independent Chief Inspectors of Borders and Immigration s report: An Inspection of the Right to Rent scheme August December 2017 The Home Office thanks the Independent Chief

More information

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16 PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention

More information

EU Information Systems

EU Information Systems Workshop on Migration Management : Sharing Experiences between Europe and Thailand co-organized by the European Union and Royal Thai Government, Ministry of Foreign Affairs EU Information Systems Bangkok,

More information

UCL Immigration and Right to Work A Manager s Guide to Acceptable Right to Work Documents

UCL Immigration and Right to Work A Manager s Guide to Acceptable Right to Work Documents UCL HUMAN RESOURCES Introduction UCL Immigration and Right to Work A Manager s Guide to Acceptable Right to Work Documents The purpose of this guide is to provide guidance on documents that are acceptable

More information

CRS Report for Congress

CRS Report for Congress Order Code RL31727 CRS Report for Congress Received through the CRS Web Border Security: Immigration Issues in the 108 th Congress Updated May 18, 2004 Lisa M. Seghetti Analyst in Social Legislation Domestic

More information

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card Abstract Have you ever wondered how Identity Theft, Fraud, and Corruption could be eliminated, while

More information

Recommended Practice 1701 l

Recommended Practice 1701 l Recommended Practice 1701 l Background: The International Traveler Scheme aims to bring registered travelers schemes together under one overall program. The purpose of an International Traveler Scheme

More information

Eastern Region Office PO Box Philadelphia, PA T F

Eastern Region Office PO Box Philadelphia, PA T F Eastern Region Office PO Box 60173 Philadelphia, PA 19102 215-592-1513 T 215-592-1343 F Central Region Office PO Box 11761 Harrisburg, PA 17108 717-238-2258 T 717-236-6895 F Western Region Office 247 Fort

More information

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong Biometric Applications

More information

EUROPEAN DATA PROTECTION SUPERVISOR

EUROPEAN DATA PROTECTION SUPERVISOR 6.8.2008 C 200/1 I (Resolutions, recommendations and opinions) OPINIONS EUROPEAN DATA PROTECTION SUPERVISOR Opinion of the European Data Protection Supervisor on the proposal for a Regulation of the European

More information

Identity Verification in Passport Issuance

Identity Verification in Passport Issuance Identity Verification in Passport Issuance and dcivil ilregistration i The importance of context and continuity of identity Mr Ross Greenwood Principal Identity Matters Consulting 1 PURPOSE To invite a

More information

The Philippine Department of Foreign Affairs began the issuance of the Philippine epassport (electronic passport) on 11 Aug 2009.

The Philippine Department of Foreign Affairs began the issuance of the Philippine epassport (electronic passport) on 11 Aug 2009. The Philippine epassport The Philippine Department of Foreign Affairs began the issuance of the Philippine epassport (electronic passport) on 11 Aug 2009. Frequently Asked Questions Q: What is an electronic

More information

THIS PAPER IS NOT TO BE REMOVED FROM THE EXAMINATION HALLS UNIVERSITY OF LONDON LA1031 ZA

THIS PAPER IS NOT TO BE REMOVED FROM THE EXAMINATION HALLS UNIVERSITY OF LONDON LA1031 ZA THIS PAPER IS NOT TO BE REMOVED FROM THE EXAMINATION HALLS UNIVERSITY OF LONDON LA1031 ZA DIPLOMA IN LAW DIPLOMA IN THE COMMON LAW LLB ALL SCHEMES AND ROUTES BSc DEGREES WITH LAW Common Law Reasoning and

More information

An Open Letter to the ICAO

An Open Letter to the ICAO An Open Letter to the ICAO A second report on 'Towards an International Infrastructure for Surveillance of Movement' Tuesday March 30, 2004 To the participants of the International Civil Aviation Organization

More information

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters March 2009 DEPARTMENT OF STATE Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process

More information

Global Identity Verification & Migration Mobility Control

Global Identity Verification & Migration Mobility Control MRTDs, Biometrics & Security Standards (2011) Montreal, ICAO September 12, 2011 Global Identity Verification & Migration Mobility Control Global l security challenges. The case study of the CIS Region

More information

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives Introduction e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives Following the events of September 11, 2001 many countries accelerated plans for the adoption of a new

More information

The National Identification System (NIDS) Version: Modification: Author: Date: 1.1 Prepared FAQs NIDS Project Team November 15/11/2017

The National Identification System (NIDS) Version: Modification: Author: Date: 1.1 Prepared FAQs NIDS Project Team November 15/11/2017 NIDS FAQS The Facts You Need To Know Abstract A working document designed to address possible questions from various interest groups regarding the National Identification System (NIDS) in simple, everyday

More information

NIDS FAQS. The facts you need to know

NIDS FAQS. The facts you need to know NIDS FAQS The facts you need to know Abstract A working document designed to address possible questions from various interest groups regarding the National Identification System (NIDS) in simple, everyday

More information

The Canadian epassport Project

The Canadian epassport Project ICAO Ninth Symposium and Exhibition on MRTDs, Biometrics and Border Security 22-24 October 2013 The Canadian epassport Project Jean-Pierre Lamarche Director General Passport Program Management & Strategic

More information

An employer s guide to acceptable right to work documents

An employer s guide to acceptable right to work documents An employer s guide to acceptable right to work documents 14 May 2014 Produced by Home Office Crown copyright 2014 1 Contents 1. Introduction... 3 2. Right to work document checks... 4 3. Acceptable documents

More information

3/21/12 DHS: Written testimony of Office of Policy Assistant Secretary David Heyman for a House Committee o

3/21/12 DHS: Written testimony of Office of Policy Assistant Secretary David Heyman for a House Committee o Written testimony of Office of Policy Assistant Secretary David Heyman for a House Committee on the Judiciary, Subcommittee on Crime, Terrorism, and Homeland Security hearing titled Secure Identification:

More information

BIOMETRIC RESIDENCE PERMITS General Information for Applicants, Employers and Sponsors

BIOMETRIC RESIDENCE PERMITS General Information for Applicants, Employers and Sponsors GUIDANCE NOTES BIOMETRIC RESIDENCE PERMITS General Information for Applicants, Employers and Sponsors July 2013 This leaflet explains the Home Office process for applying for a biometric residence permit

More information

The problems with a paper based voting

The problems with a paper based voting The problems with a paper based voting system A White Paper by Thomas Bronack Problem Overview In today s society where electronic technology is growing at an ever increasing rate, it is hard to understand

More information

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program US-Visit In the wake of the attacks of September 11, 2001, the United States federal

More information

THE FUTURE OF epassports AND BORDER CROSSINGS. A look at where technology might take us By Peter Schmallegger, NXP Semiconductors

THE FUTURE OF epassports AND BORDER CROSSINGS. A look at where technology might take us By Peter Schmallegger, NXP Semiconductors THE FUTURE OF epassports AND BORDER CROSSINGS A look at where technology might take us By Peter Schmallegger, NXP Semiconductors 1 2 INTRODUCTION CONTENTS The way international travel and border crossings

More information

Risk UK Pre-employment Screening Article

Risk UK Pre-employment Screening Article 1. There has been media coverage recently of companies being a bit overzealous with CRB checking. How can a company tell if they really need to check the criminal record of current or potential employees

More information

Achieving Interoperability

Achieving Interoperability Fact Sheet IDENT and IAFIS Interoperability Goal of IDENT and IAFIS Interoperability As a part of the U.S. government s efforts to enhance our nation s security to meet the needs and challenges of the

More information

COMMISSION DECISION. of

COMMISSION DECISION. of EUROPEAN COMMISSION Brussels, 4.8.2011 C(2011) 5478 final COMMISSION DECISION of 4.8.2011 amending Commission Decision C(2002) 3069 laying down the technical specifications for the uniform format for residence

More information

January Caux Initiatives for Business Global Secretariat Asia Plateau Panchgani India

January Caux Initiatives for Business Global Secretariat Asia Plateau Panchgani India January 2017 Caux Initiatives for Business Global Secretariat Asia Plateau Panchgani 412805 India M csc@cibglobal.org P +91 8408 940 940 W www.cibglobal.org Dear Readers, Editorial Caux Initiatives for

More information