Transportation Worker Identification Credential (TWIC) Next Generation (NEXGEN) Card Update for National Maritime Security Advisory Committee (NMSAC)

Slides:



Advertisements
Similar presentations
For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
Advertisements

What do Immigration Officers look for in a travel document?
pan Testing Centers I-9 Training
Installation & User Guide
Card and Reader Overview Gerald Smith Sr. Consultant ID Technology Partners.
Current Technology and the TWIC Program Walter Hamilton Chairman, International Biometric Industry Association Sr. Consultant, Identification Technology.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
TRANSPORTATION WORKERS IDENTIFICATION CREDENTIAL
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
USCG Enforcement for the Implementation of TWIC
TWIC and Access Control 33 CFR CFR (a)(4) The facility owner or operator must ensure the implementation of security measures to: Prevent.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Level IB Exam Only Session Issued July Once the Exam Begins You will not be allowed to leave the room. Please make sure that you take care of any.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
Liberian Registry INTERTANKO ASSOCIATES COMMITTEE MEETING March 29, 2006.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
Biometric Access Control in TWIC Read Hardware and Card Application Specification Roger Roehr.
Outlook Lesson 4 Managing Messages Microsoft Office 2010 Advanced Cable / Morrison 1.
Special Publication : Interfaces for Personal Identity Verification Jim Dray NIST NPIVP Workshop March 3, 2006.
Driver Records Driver License News. DRIVER PRIVACY PROTECTION ACT.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Working with Objects. Objectives Create an object Transform an object Arrange and lock an object Step and repeat an object Use Live Distribute Use the.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
THE MALAYSIAN ELECTRONIC PASSPORT
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
11/18/2003 Smart Card Authentication Mechanism Tim W. Baldridge, CISSP Marshall Space Flight Center Office of the Chief Information Officer.
Online Self Enrollment & Statement Access UCM Business Procurement Card (BPC) Bank of America Merrill Lynch.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
MCS Array Wide Array.
The Solution SSIVS.
What do Immigration Officers look for in a travel document?
THE MALAYSIAN ELECTRONIC PASSPORT
I-9 Employment Verification REFRESHER Training
Smart Card System Training
Microsoft Word 2016 Lesson 6 Part 1.
Sunpreet S. Arora1, Anil K. Jain1 and Nicholas G. Paulter Jr.2
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Revised by Human Resources
COSEC Visitor Management
Software Application Overview
Chapter One: Mastering the Basics of Security
StudentTranscripts Service Overview
Transportation Worker Identification Credential (TWIC)
Welcome to the National Maritime Center REC Boston
Authentication.
TWIC Implementation Update
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
What? Learn how to program at FIU Register for: COP 1000 – #59660
PE Determiner Portal Registration and Log on Workshop
StudentTranscripts Service Overview
Canadian Passport.
StudentTranscripts Service Overview
TWIC Update to Sector Delaware Bay AMSC
PE Determiner Portal Registration and Log on Workshop
Procurement Forum October 16, 2012.
Benchmark Series Microsoft Word 2016 Level 1
StudentTranscripts Service Overview
Installation & User Guide
Automated Bulk Signing Solution
StudentTranscripts Service Overview
self-paced eLearning series
Unemployment Insurance Agency Michigan Web Account Manager
StudentTranscripts Service Overview
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
INSTRUCTIONAL NOTES There are many similarities between Photoshop and Illustrator. We have attempted to place tools and commands in the context of where.
E-identities (and e-signatures)
Presentation transcript:

Transportation Worker Identification Credential (TWIC) Next Generation (NEXGEN) Card Update for National Maritime Security Advisory Committee (NMSAC) September 29, 2015

Statistics / Significant Events 3.5M+.…Enrollments 2.1M.…..Currently Active Cards 60,000…..Applicants Determined by TSA to be Ineligible $128.00….Enrollment Fee (five-year card) 30,000+….Average new enrollments per month Approximately 300 Universal Enrollment Centers now provide TWIC enrollment services nationwide Proof of U.S. citizenship for U.S.-born applicants is now required (implemented July 1, 2015) New and replacement cards can be sent directly to applicants by mail. 70% of cardholders choose to receive their cards by mail.

NMSAC Contributions to TWIC Card Design 2005—NMSAC Credentialing Working Group provided valuable input to TWIC card design and capabilities: Contactless biometric operation PIN-less biometric operation Cancelled Card List (CCL) to prevent access using lost, stolen, or revoked cards (requires an electronic reader) 2015—TSA invites NMSAC to provide input regarding the Next Generation (NEXGEN) TWIC: Enhancements to improve TWIC’s “visual efficiency” Validate continued need for contactless, PIN-less biometric operation Usefulness of offering a version compatible with Federal smartcard standards (PIV-I cards)

NEXGEN Input Providers Trade shows in DC area TWIC Stakeholder Communications Committee Stakeholder Facilities Operators Discussions SMART Card Manufacturers

TWIC as a Physical Access Credential Topographic security features enable visual authentication and deter the use of counterfeit cards Valid visual inspection includes: Expiration date check Security feature check Facial photo comparison to person presenting the card Lost, stolen, or revoked TWICs cannot be identified by visual inspection Some facilities are using card readers to verify eligibility and facilitate access; readers: Authenticate cards and eliminate use of counterfeit cards Reject expired cards Reject lost, stolen, or revoked cards using the Canceled Card List (CCL) or optional certificate revocation list (CRL) Confirm identity via biometric fingerprint match to the card

Current Visual Composition of TWIC TWICs comply with Federal Personal Identity Verification (PIV) card topography requirements—placement of photo; use of free space; etc. Current TWIC topography includes multiple visual security features: TWIC exceeds PIV requirements with respect to security features Holographic security laminates; color-shifting ink; ultraviolet fluorescence; Guilloche patterns; micro printing Cards contain both overt and covert security features

Current TWIC Topography TWIC Security features Repeating Letters “TWIC” in photo area, but fades in the area of eyes, nose and mouth Optically Variable Ink – Color Shifting (“T” and “I” shift from Red to Gold; “W” and “C” shift from Green to Purple), when card is turned to different angle to light source. Duplex Patterns the thickness of the lines change to form the lower case letters “twic” Ultraviolet fluorescence image of eagle on DHS shield TWIC Triangle -- Privacy, Security, Commerce Three Solid Stars at the top of the credential Star Movement appears when card is tilted from bottom to top of the card. PIV Requirement 1x Overt Feature Ovals displayed -- vertical and horizontal oval displayed when card is tilted, TWIC printed on top and bottom of vertical oval Expanding circle -- the circle when tilted has a variable radius Note: Some of the features noted here on the credential become less prominent as the surface of the laminate becomes scratched through heavy use, aging or weathering. TWIC Security features 9x Overt “Several” Covert

TWIC NEXGEN Features Under Consideration Improve digital quality of the photo to be ICAO compliant Mint mark for the production facility, “1” DC; “2” Stennis 1 Expiration date format updated with year font size change, addition of shading and removal of century “20”. Add new metallic security features onto surface of the card similar to eagle on the current DHS PIV card. Bottom View of card: Use of multi-layered card stock with middle layer of different custom colored layer shown as green

Potential Functionality Options for NEXGEN TWIC Offer PIV-I version of card as an option Additional feature; requires separate activation Must be activated in-person at an enrollment center Will expire in three years (vs. five years for TWIC) May increase utility at government facilities using readers compatible with PIV or PIV-I credentials (DoD, etc.) Most likely will not be implemented—if offered— until complete conversion of TSA vetting programs to the new operating system

Manager (Acting), Maritime Programs Branch John Schwartz Manager (Acting), Maritime Programs Branch Programs Management Division Office of Intelligence & Analysis TSA (571) 277-2177 john.schwartz@dhs.gov 10