E-Passports: Origin and Future Barry J. Kefauver OAS Workshop San Salvador June 9, 2008.

Slides:



Advertisements
Similar presentations
Time To Reflect: Where Have we BeenWhere Do We Go Barry J. Kefauver Best Practices Workshop Bogota, Colombia November 10-12, 2008.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
What do Immigration Officers look for in a travel document?
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Technical Report PKI for Machine Readable Travel Documents offering ICC read-only access TAG_15 Montreal, Tom Kinneging.
12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
Roll out of Biometric Residence Permits RTW documentation
E- passports Erik Poll Digital Security Group Radboud University Nijmegen.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Review of Patents Agenda Item 3: Report of the New Technologies Working Group.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
Nairobi, Kenya 29-31October Fifth Special Meeting of the Counter- Terrorism Committee with International, Regional and Subregional Organizations.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
A PRESENTATION To the Workshop on the Improvement of Civil Registration and Vital Statistics in SADC Region Department of National Registration, Passport.
Security of eGovernment, European Parliament, Brussels 2013 Max Snijder, Linda Kool, Geert Munnichs L Kool | 1 19 February 2013 Findings from the ePassport.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Creating and Maintaining Databases Dr. Pushkin Kachroo.
1 MRTD Programme: Consolidating Comprehensive Security and Enhancing Facilitation Mauricio Siciliano Mauricio Siciliano ICAO MRTD Programme ICAO/McGill.
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
1 Preview of the self service airport R edesign P assenger P rocess (RPP) Club of Amsterdam, 1 Maart 2006.
Risk of Using RFID chips in Passports Oscar Mendez.
RFID Security CMPE 296T -Sankate Sharma -Sangbeom Ryu.
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
1. 2 ECRF survey - Electronic signature Mr Yves Gonner Luxembourg, June 12, 2009.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
National Smartcard Project Work Package 8 – Security Issues Report.
PUSHING THE BORDERS BACK: Passenger Operations U.S. CUSTOMS AND BORDER PROTECTION FIELD OPERATIONS JFK INTERNATIONAL AIRPORT.
Securing Data in ePassports Policy Issues ICAO/NTWG.
1 New Zealand’s Advance Passenger Screening and Biometrics Presentation to : BALI AHEG II Identity Management Workshop 17 March 2004 Rob Bolton Chief Information.
The New Twenty Dollar Bill Presented By: Lauren Firmin.
National Workshop on ANSN Capacity Building IT modules OAP, Thailand 25 th – 27 th June 2013 KUNJEER Sameer B History of centralized ANSN website as well.
Special Publication : Interfaces for Personal Identity Verification Jim Dray NIST NPIVP Workshop March 3, 2006.
NAPHSIS REAL ID Overview June 6, 2007 In support of this key requirement,
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Open access, institutional repositories and UBIR 21 November 2008 – Sarah Taylor Open access, institutional repositories and UBIR The University of Bolton.
Hosted by: June 23-26, 2003 New York City Copyright Managing Multiple Access & Entry Points.
The Emerging Global Identity & Tracking System October 28, 2004 Barry Steinhardt Director, Technology & Liberty Project American Civil Liberties Union.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
e-Breeder Documents – closing the gap in the identity management chain
December 2015 Visa Waiver Program Improvement & Terrorist Travel Prevention Act.
European Electronic Identity Practices Country Update of Estonia Speaker: Ivar Jung Date:
ACI Biometrics Task Force Status Report ACI Bio TF Meeting 2 Geneva, Switzerland April 21, 2005.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Counterfeiting Aim: How are counterfeit bills detected? Do Now: Name any ways you know of to tell if a bill is real or fake.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
Date of download: 7/2/2016 Copyright © 2016 SPIE. All rights reserved. Proposed enrollment and production of an identification document. Figure Legend:
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
TAG Presentation 18th May 2004 Paul Butler
What do Immigration Officers look for in a travel document?
Securing Data in ePassports
Silvia Kolligs DG Justice and Home Affairs Unit B1 -Borders and Visas-
Silvia Kolligs DG Justice and Home Affairs Unit B1 -Borders and Visas-
Technical Report PKI for
Agenda Item 3: Report of the New Technologies Working Group
Biometrics : From Yesterday to Tomorrow
TAG Presentation 18th May 2004 Paul Butler
TUVALU KITELE TEFOTO (BDM REGISTRATION Officer)
Securing Data in ePassports
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
Use of Biometric Technology in Payments to avoid Frauds
Technical Report PKI for
BCS Template Presentation February 22, 2018
E-identities (and e-signatures)
Agenda Item 3: Report of the New Technologies Working Group
Presentation transcript:

E-Passports: Origin and Future Barry J. Kefauver OAS Workshop San Salvador June 9, 2008

Current Status There are over 40 countries issuing chip-based passports There are over 40 countries issuing chip-based passports More than 50% of the world’s passports are now chip-based More than 50% of the world’s passports are now chip-based There remain over 50 countries that need to develop machine-readable passport programs before the April 2010 deadline There remain over 50 countries that need to develop machine-readable passport programs before the April 2010 deadline Work continues to refine and enhance, but implementations go quite well Work continues to refine and enhance, but implementations go quite well The ICAO TAG met in May and decided on a work program for the coming several years The ICAO TAG met in May and decided on a work program for the coming several years

Fundamental Truth vs Urban Myth and c/Gen and c/Gen 2 Skimming Skimming - Reading the electronic data in an IC chip surreptitiously with a reader in the vicinity of the travel document. - Reading the electronic data in an IC chip surreptitiously with a reader in the vicinity of the travel document. Eavesdropping Eavesdropping - When data from an IC chip are intercepted by an intruder while it is being read from an authorized reader. - When data from an IC chip are intercepted by an intruder while it is being read from an authorized reader. Cloning Cloning - Copying the data that has been placed on a chip - Copying the data that has been placed on a chip - “Although he can clone the tag, (the hacker) says it's not possible, as far as he can tell, to change data on the chip, such as the name or birth date, without being detected. That's because the passport uses cryptographic hashes to authenticate the data.” - “Although he can clone the tag, (the hacker) says it's not possible, as far as he can tell, to change data on the chip, such as the name or birth date, without being detected. That's because the passport uses cryptographic hashes to authenticate the data.” Shielding and the Faraday cage Shielding and the Faraday cage

Testing History Canberra, Australia Morgantown, West Virginia, USA - A very significant event - Participants Sydney, Australia - Improved, but much work to be done Laboratory testing at US NIST Several other operational tests, e.g. BWI, Tsukuba, Berlin - Each one reflected improved interoperability

The So-What Test Pragmatics of mischief Pragmatics of mischief - Distance - Distance - Power - Power - Visibility - Visibility At what price? At what price? And then “what” do you have? And then “what” do you have?

Biometrics The only reason why we have a chip The only reason why we have a chip The early days post 9/11 The early days post 9/11 Evolution to the present Evolution to the present Germany launched fingerprint November 2007 Germany launched fingerprint November 2007 Coming challenges Coming challenges

Not Just a Chip The e-passport is everything that non-e passports are, but in addition, with a chip Inks OVD’s of many hues and flavors Paper and accompanying measures to protect Watermarks of various technologies Security printing Many other physical features

False News Makes For Headlines We broke the Dutch Passport We broke the Dutch Passport There were only politicians who drafted 9303 There were only politicians who drafted 9303 JPEG 2000 flaw crashes any reader JPEG 2000 flaw crashes any reader Belgian passport fails Belgian passport fails UK passport not for its purpose UK passport not for its purpose E-passport is a “beacon” for terrorists E-passport is a “beacon” for terrorists

New Initiatives Information and data sharing, real time communications capability Information and data sharing, real time communications capability Centralized civil registry databases Centralized civil registry databases Shift from counterfeits to fraudulent genuines Shift from counterfeits to fraudulent genuines Numerous online enrollment and other-services programs are being deployed Numerous online enrollment and other-services programs are being deployed A need for standards to smooth information A need for standards to smooth information gathering and sharing prior to departure gathering and sharing prior to departure Identity theft has captured worldwide attention and concern Identity theft has captured worldwide attention and concern

So---Now What The story needs to be told The story needs to be told What it does FOR you rather than TO you What it does FOR you rather than TO you Now is the time to tell the biometrics story Now is the time to tell the biometrics story

Thank you for your attention… QUESTIONS? Barry J. Kefauver