CardTechSecurTech 2005
By John Latta, WAVE
0519 5/13/05
Las Vegas, NV
April 12 - 15, 2005
SourceMedia is the producer of CardTechSecurTech and it
is at the center of a rapidly expanding market. These are exciting times
as smart card technology play an increasing role in securing the United
States. The conference fills a valuable role and had many quality presentations
in addition to one of the best exhibits of the technology of smart cards
in the U.S.
Industry statistics presented before the keynote provided
a useful perspective into the industry:
1 billion smart cards were sold in 2004 and 1.4 billion
are expected in 2005.
There was $6b in revenue in 2004 which is up over 20%.
The major application of smart cards is the SIM card
in cellular phones in the GSM network.
2 major ID projects are the U.S. Government ID card
and the China national ID card with a contactless chip.
Terrorism, Security and Identity
Richard Clarke, the former Counterterrorism Czar, tied
together the current security situation in the U.S. and closed with what
the secure card industry can do to help. It was one of the most balanced
arguments on these issues we have heard.
Al-Qaeda as a terrorist network has largely been dismantled.
But we should not be lulled into a false sense of confidence because
14 related organizations with membership of 400 pose a serious threat
to the United States.
As we saw in the Madrid bombing, Al-Qaeda is increasingly
relying on connections with criminals to fund their operations.
Identity theft, fraudulent ID and fraud, in general,
are frequently used by terrorists. Thus, it is important that we do
what is possible to limit this opportunity. (Richard encouraged the
audience to read the 9/11 Commission Report.)
One of the problems is that government-issued ID’s
are easily faked. I got a fake drivers license for $40 and the Social
Security Cards have no security. Thus, it is phony to think that we
have secure IDs.
By improving our identity security, we can do much to
secure the U.S. But in the U.S. we have a problem and it goes to our
roots. We fear big government. Individuals do not like the impacts
of 9/11 and they fear their loss of privacy.
Europe and U.S. have different views of privacy. In
Europe there is an opt-in model where a company cannot collect information
on you unless one permits it. While in the U.S. there is not even an
opt-out option from personal data collection. Many of these recent
issues have been highlighted in the recent thefts of personal information,
such as credit histories.
There is a key point that is not getting across to the
public. By improving identity security this will do much to enhance
personal security and privacy. It will be much harder to commit ID
theft. The bottom line is that greater personal identity security is
not about the invasion of privacy but the how to better protect it.
There needs to be a clear massage: we can enable better
privacy protection. For example, Bill 1386 in California requires that
the loss of identity information be notified promptly to those affected.
This should be support and it should be a federal law. The FTC needs
to play a stronger role against ID theft.
There should be standards on the protection of personal
data, and the implementation of these should be independently audited.
Privacy and security are not opposing forces but these
can work together.
The secure card industry is in a strong position to
implement technology which will better protect privacy.
Homeland Security Presidential Directive (HSPD) 12
A whole track was devoted to this. We summarize key points
which came from many speakers.
In August 2004, the President signed a directive that
there be a common ID throughout the government.
In February 2005, FIPS 201 was released which describes
both how common ID will be accomplished and how the identity will be
managed to allow the card holders to have interoperable physical and
logical access. These are central elements to a Personal Identity Verification
(PIV) system.
The timeline is aggressive:
Agencies will have plans to implement by 6/05
Implementation will start with the vetting process
by 10/05
Biometrics are a part of the card. One of the outstanding
issues is the storage of the fingerprint data on the card. An image
is currently the only feasible option but this consumes processing
power and memory space and makes the card harder to implement. Minutea
is a better alternative but the specification for this and its testing
will not be complete until 2006. This puts the schedule at risk. Thus,
and executive decision is required to implement the current cards either
with the timeline or with a delay.
The implementation of FIPS 201 is a major challenge
to the integrator. One of the reasons is that the system must cross
many systems in operation today – legacy support is important.
One speaker referred to the integrator task in terms of sheer complexity.
One of the data locations on the card, CHUID, has the
prospect of embedding an IPv6 address. Thus, every card could have
its own unique IP address, and thus, accessible over the net.
The card and biometrics provide at least 2 factor authentication.
In this era of ID Theft and other frauds, it was counseled that the
principle should be “Defense in Depth.” That is, no one
tool provides adequate defense.
The intent of FIPS 201 is to combine both physical and
logical security. But when the WAVE asked how will the logical security
be implemented to minimize unauthorized system use, the answer was
foggy. For example, when one uses a FIPS 201 ID for computer access,
the card is entered into a reader. The user enters a PIN to gain access
to the system. The card has PKI encryption on it. For the present no
fingerprint reading is planned.
Given that it will be possible to access government
computers in areas which have no physical access security, how is logical
security assured? Basically they have yet to work out the scenarios
which will support FIPS 201. The WAVE stated: If one has the card and
PIN, anyone can log onto the computer. When asked about biometrics,
the response was – there is not the infrastructure on computers
to support fingerprint reading. Using biometrics would allow for 3
factor verification.
Passwords are not considered a safe means to protect
logical access.
The WAVE also asked – If the RealID Act is implemented,
will FIPS 201 and the experience gained from this likely be a prototype
for a much larger public implementation? No doubt was left on this.
In fact, the IAB, Government Smart Card Interagency Advisory Board,
is now taking on members from outside the federal government. State
governments are also joining.
Biometrics is Growing – What does this mean?
Raj Nanavati, Partner, the International Biometric Group,
gave a keynote in the Biometrics for Access Security session. He made
a number of interesting points.
The revenue in the Biometric Industry is estimated to
be:
$1.2B – 2004
$1.85B – 2005
$2.64B – 2006
$3.68B – 2007
$4.64B - $2008
Retail, ATM and POS use of Biometrics
2005 - $67.6
2006 - $121.7m
2007 - $194.8
2008 - $243.5m
Financial Sector use of Biometrics
2005 - $159.5m
2006 - $236.4m
2007 - $324.7m
2008 - $405.5m
This does not include revenue for integrators.
The vast majority of the revenue is for AFIS and
Fingerprint.
$1.14B – 2005
$2.59B - 2008
Important new roll outs of biometrics are happening
in the private sector. The supermarket chain Piggly Wiggly will deploy
a new program in 114 stores for check processing. Lowes Foods has a
similar program with 108 stores.
In the private sector, important challenges lie ahead.
One of the foremost is making a business case for the use of biometrics.
A significant issue, which could impact biometrics on
the regulation front, are the recent problems with data aggregators.
ChoicePoint had problems when it sold personal information to individual’s
intent on committing fraud. This has raised the awareness on personal
data collection and what is done with this information. The recent
Lexis/Nexis stolen information on 310,000 individual’s shows
another example of how the loss of personal data may be much more common.
From these compromises there are indications that Congress
may be willing to legislate greater privacy protections but it is too
early to tell.
The EPIC, Electronic Privacy Information Center, has
sent a letter to the TSA stating that privacy principles should be
incorporated into its biometric standards.
There have been some absurd proposals at the state level
to regulate biometrics.
HIPAA compliance represents an area when biometrics
can be applied. Estimates for the size of the HIPAA compliance market,
beyond just biometrics are very large. These ranged from $42.9B to
$17.6B.
One of the continuing problems in biometrics, especially
in fingerprinting, is that there are significant claims that border
on absurd. One vendor claims a FAR of 1 in a million and another states
it has 0% FAR.
White House Speaks on Biometrics
Kevin Hurst, Senior Policy Analyst, White House Office
of Science and Technology, provided an assessment of advances in Biometrics.
There is been a very rapid growth in applications of
biometrics in the government. These include, in addition to many obvious
ones on the list:
Duplicate enrollment recognition
Logical and physical access control
e-govenment
Identified as biometric performance gaps were:
Excessive error rates
Poor ability to find database match
High sensitivity to varying conditions
Each of the biometrics was summarized well:
Facial – 90% accuracy with 1% FAR
Fingerprint – 99% accuracy with .1% FAR
Iris – 97% accuracy with .01% FAR
There are important motivations for biometrics fusion.
These include the potential for reduced error rates, reduced effect
of noise, ability to enroll anyone and raise the barrier for spoofing.
Much remains to be done.
Advances in Facial Recognition
Joseph Atick, President and CEO of identix, gave an overview
of the large biometric programs. In it he described the Department of
State program which identix is implementing with SAIC and IBG. The specification
for the system is that it will have a 41m records which can grow by 8m/year.
Searches must be able to be done at 500/hour and going to 2000/hour.
The system is a build off of blade servers and uses Oracle 9i RAC. One
of the cautions around such a system deployment is the high level of
skills required and the management talents. This also relates back to
the role of the system integrator.
Claims are made on the facial accuracy, which includes
dermal texture, at 90% - 95% with a FAR of 1%. It was noted that not
all of the images in the DoS image data base would be of adequate quality
to support dermal texture. It was also stressed since dermal texture
requires higher resolution on the texture of the skin that the image
quality requirements are very important. When asked by the WAVE what
the spatial frequency requirements were for the imaging, Joseph did not
respond.
WAVE Comment
With all the emphasis on physical and logical security
using biometrics, nothing has been said about the next level – persistence.
That is, the continual monitoring of the individual to assure that once
taken, the relationship between the individual and the biometrics has
not changed. This is of particular importance on access to networks where
an individual can access an open computer. A persistence requirement
would allow for the monitoring of a changed biometric. What facial texture
would provide would be the ease of continual monitoring of the individual
using a means much less intrusive than fingerprints.
Identity Management
Just slapping a fingerprint reader on an enterprise network
does little for the enterprise. There are early signs of sophisticated
software to manage identity.
Enterprise Security System – Software Innovations
Integrates with Radius, LDAP and Active Directory
Platform independent
Digital Network Authorization for Role assignment to any Identity
Life Cycle management
Encryption of pathways for Identity
HiPath Slcurity – Siemens
Authentication using Secure Token, Smart Card and/or
Biometrics
Administration with Metadirectory, provisioning and Web Resource Management
Authorization with Policy enforcement, Secure sessions, and audits
Identity Management is handled with metadirectories and DirX software product
family
Both packages indicate the level of complexity which is
emerging in the identity management space.
Sharp – Smart Cards to enable embedded Biometrics
The WAVE spoke with Robert Stuart, Product Manager, Optoelectronics
and Smart Card, Sharp Microelectronics of America. Sharp was highlighting
its smart card which is at the top end of capabilities and performance.
This card includes:
Embedded IBM JCOP31 with GP 2.1.1 compliance
Java Card 2.1.1 compliance
Support for multiple cryptographic algorithms
Multiple application support
1MB of Flash memory
EAL4+ certification
Dual Interface – contact and contactless
Contactless transfer to 424kb/s
Contact transfer to 76.8kb/s
16bit embedded microprocessor
As biometrics becomes a part of the smart card, as with
HSPD 12, there are increased demands for memory and processing power.
One is for an embedded biometric, be it a template or image, and the
other for cryptographic support. Because of the superior capabilities
of the Sharp card, they won the epassport contract for Australia. It
is expected that as FIPS 201 matures, cards such as Sharp’s offering
will become mainstream. One of the major advantages of this approach
is that applications can be added and changed on the card. DoD has seen
this in the CAC deployment because of the high mobility of troops between
assignments. Thus, as an individual is TDY, the card can be updated based
on the new responsibilities and access required for the location.
TechCU Application of Biometrics
Certainly the financial sector has much to gain from better
authentication of identity. Yet, this has been slow to roll out, in part,
due to the enormity of the infrastructure that has to be changed. There
are organizations which are driving better authentication and the TechCU
is one experimenting with the technology. This credit union has implemented
a program called MemberID. There is a scanner unit at the branches which
has mag stripe reader, keypad and fingerprint chip. This allows a member
to enter personal data, scan their card or to just use a finger print.
This was begun in 2003 and, with no advertising, it has attracted 8,200
users, nearly 11% of the members. 82% of the target demographics of the
users range from 30 – 59 and 74% are male. Biometrics is felt to
be the security program of the future.
As TechCU looks to the future, they are considering alliances
with merchants to use biometrics and to allow access from home. However,
there are important interoperability issues to be addressed. But more
important, any home solution cannot compromise the security of the system.
It is felt that biometric readers need to be in the $25 range. TechCU
has considered providing the readers to the members if the price is in
this range. One unit considered is the Sony Puppy but the price is too
high at $150.
Keystroke Dynamics as a Biometric
An interesting potential biometric surfaced which uses
typing patterns as a means to uniquely identify an individual. This has
significant implication in a persistent biometric that could verify an
individual’s presence while on a PC. The company involved is BioNet.
Quote of the Day
“In spite of the words about biometrics for logical
access security, every application I have seen is driven by convenience.” Biometrics
supplier on the floor.
WAVE Comments
There is pressure building to strengthen identity security.
Areas of concern include ID theft, terrorism, privacy, accountability
and fraud. Biometrics as a stand alone technology will not assure identity
security. Biometrics, however, is the only way to link an individual
with a token of that individual. However, the quality of the biometric
to identify an individual varies greatly by the biometric used. The key
measures of False Acceptance Rate and False Reject Rate are unreliable
by any measure used in the computer industry. Thus, biometrics are combined
with other factors to lessen security risk.
It became obvious at CardTechSecurTech that Smart Cards
are a primary means to enable portable personal attributes. The strength
of a Smart Card is its biometric ability to directly enable 1:1 matching.
Each individual has a complex series of unique biometric markers that,
in their totality, cannot be “spoofed” or “phished”.
Combined with the essential physical possession of a Smart Card, absolute
identity is assured. Thus, with standardization, the emergence of a national
ID card becomes increasingly real.
Governments, world wide, remain the leaders in biometric
projects. To date most deployments have been successful and are likely
to set the stage for broad deployments of biometrics, including enterprise.
If the equivalent of a national ID card is created, such
as from the RealID legislation, this will likely influence the use of
biometrics in many other sectors including the enterprise. It is important
to note that many other countries are well along in such cards and their
deployment.
In the U.S., fear of Government intrusion and loss of privacy
are the strongest obstacles to the deployment of a national ID card.
The key here is education. Biometric data are inherent to individuals
and are key to their absolute identities. Personal history is acquired
and not a key to identity. The issue of individual privacy vs. biometric
identity should not be a deterrent to progress in protecting the unique
and verifiable identity of every individual.
|