THE LEADING EDGE OF BORDER SECURITY

Similar documents
Defending the Internet of Things

Complete. security. begins with 3M

Combatting Counterfeit Identities: The Power of Pairing Physical & Digital IDs

Electronic machine-readable travel documents (emrtds) The importance of digital certificates

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals


The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation

Coesys Border Management

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

Preventing fraud in epassports and eids

Coesys Border Management

Strengthen security with intelligent identity and access management

WHITE PAPER Usher Mobile Identity Platform

The Leading Provider of Identity Solutions and Services in the U.S.

Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013

Contents. Growing Complexity in egovernment Ecosystems Connectivity Creating New Challenges Identity at the Core... 7

Biometrics in Identity as a Service

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

IDaaS: Managed Credentials for Local & State Emergency Responders

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Financial Security Symposium Singapore

ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management entrust@entrust.com entrust.com

TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

QUESTIONS & ANSWERS. How did the Department decide on the cost of the Passport Card?

Mobile Driver s License Solution

IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

Application of Biometric Technology Solutions to Enhance Security

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

Lexmark Enterprise Software. Transforming customer engagement

OpenEdge Research & Development Group April 2015

DOCUMENT SECURITY ISSUES

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

Implementation of biometrics, issues to be solved

Operational and Technical security of Electronic Passports

RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access

Transaction Security. Advisory Services

Establishing and Managing the Schengen Masterlist of CSCAs

Information Technology Policy

RSA SECURE WEB ACCESS FOR HEALTHCARE ENVIRONMENTS

Cyber Security Collaboration: A Critical Ingredient for Worldwide Security

More Power and Performance With Each Printed Card

Veridos Protects Identities. The expert for worldwide government solutions

Provincial IDIM Program BC Services Card Project Identity Assurance Services Solution Architecture Overview

Audio: This overview module contains an introduction, five lessons, and a conclusion.

My Experience. Serve Users in a Way that Serves the Business.

Oberthur Technologies. A Technology Leader

expanding web single sign-on to cloud and mobile environments agility made possible

U.S. Senate Homeland Security and Government Affairs Committee

[FACILITY NAME] IDENTITY THEFT PREVENTION PROGRAM. Effective May 1, 2009

Company Overview. Iraq: Activities & Experience

Executive Summary P 1. ActivIdentity

Why Digital Certificates Are Essential for Managing Mobile Devices

Contents. Introduction: Identities are Critical to Our Digital Life Mobile The Foundation of Next Generation Identities... 7

Payments Transformation - EMV comes to the US

Multi-factor authentication

SIX STEPS TO SSL CERTIFICATE LIFECYCLE MANAGEMENT

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

Beyond passwords: Protect the mobile enterprise with smarter security solutions

WHITEPAPER. Best Practices in Registration Data Management. Government agencies can reduce fraud and turn registrant data into a powerful asset

TOP 5 REASONS WHY MOBILE WILL TRANSFORM ENTERPRISE AUTHENTICATION

Best Solutions for Biometrics and eid

CODE SIGNING. Why Developers Need to Digitally Sign Code and Applications entrust.com

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION

UNIVERSITY OF CALIFORNIA, MERCED Red Flag and Security Incident Reporting Policy

Opinion and recommendations on challenges raised by biometric developments

PUF Physical Unclonable Functions

Solving for the Future: Addressing Major Societal Challenges Through Innovative Technology and Cloud Computing

W.A.R.N. Passive Biometric ID Card Solution

SAFE CITY. The Safe city understands the need for security to evolve from reactive to a proactive and integrated response. PREVENTION + REACTION

Supporting Smart Cards in UEFI

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Report to the Council of Australian Governments. A Review of the National Identity Security Strategy

Glossary of Key Terms

International Civil Aviation Organization ASSEMBLY 38TH SESSION EXECUTIVE COMMITTEE

Longmai Mobile PKI Solution

Optical Memory Cards in Federal Government

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

ACH fraud: The problem Why ACH? Why now? Security evolution How to protect ACH. Combating the Newest Attack Method ACH Fraud Webinar agenda

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Case Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system

Ericsson Mobile digital identity

Biocryptology is an encryption-based. entry to a network or the Internet that. are vulnerable to third parties through

How To Get Smart Cards From Atos

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

Identity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals.

Securing corporate assets with two factor authentication

Transcription:

THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing

THE ERA OF THE MOBILE IDENTITY In an increasingly global market, people everywhere are moving freely across borders and around the globe at a rapid rate. In 2012, the number of people traveling internationally for business and pleasure broke the one billion mark. Another all-time high was set in 2013, and we re on pace to break that record again in 2014. 1 Accelerating Mobility 1.1B 232 M 175 M 2013 2000 1.0B 900M 949 995 1,035 154 M 1990 800M 2010 2011 2012 International Migration The number of international migrants worldwide reached an all-time high in 2013 and continues to grow rapidly. International Tourist Arrivals International tourist arrivals exceeded 1B for the first time in 2012. In the past decade, technology advancements have transformed consumer expectations. Our new instant society empowers consumers with extreme convenience and anytime, anywhere access. People expect no less as they migrate and travel for business or personal pleasure. These heightened expectations extend to all of their increasing interactions with their governments from crossing borders, to voting, to accessing public services. As part of this, citizens expect their government services to be linked from demanding that their driver s license, national ID and passport share common issuance and management structure, to expecting that their government healthcare system talks with the social security administration. 1 United Nations, Department of Economic and Social Affairs, Population Division. Trends in International Migrant Stock: The 2013 Revision 2

Striving to meet these expectations for their citizens and facing new levels of complexity, we ve seen the growth of e-government services that leverage mobile technologies and online channels. Today, all 193 U.N. member nations have a digital presence, with more than half offering at least one-third of their services online and two-thirds offering mobile apps to give citizens on-the-go access. 2 Because of this, the need for secure identities is at an all-time high. As we cross-borders, vote and access e-government services, security, efficiency, cost and program risk are all factors that governments need to efficiently address. This new world requires governments to elevate the importance of trusted identity as they balance the demand for convenience with the need for efficiency and security. As citizens demand more from their governments, it s important to create a seamless connection between securing citizens and societies and delivering government services. Nations are now looking at the whole ecosystem that can help them enable secure identities. It is no longer about individual pieces of a program the entire end-toend security of a document, process, and interoperability of the program requires embedded security features to ensure a protected ecosystem and, ultimately, a protected identity. 2 United Nations 2014 survey 3

THREE KEY ELEMENTS OF A CITIZEN-CENTRIC SOLUTION As nations around the world consider solutions for the identity challenges of an increasingly changing world, consensus has centered on three key elements needed for success: Unified Identity: The need to structure identity around a single record of authority binding digital identity to the person and link this unified identity to a variety of credentials. Whole Government/Common Portal: The need to create a common portal, giving citizens a single access point and a convenient dashboard for a breadth of service offerings on both the federal and state level. Information Privacy: Citizen confidence in a government s respect of personal privacy is key to government trust. Successful solutions must utilize a strong security framework that holds attribute data distinctly, with secure linkage to central identity. 4

EVOLVING IDENTITY SOLUTIONS FOR TRAVEL & BORDER CONTROL Managing the movement of a billion people across the world s borders has exponentially increased the need for new security features. Beyond the record-high numbers, new threats continue to emerge, undermining traditional ways of creating secure identities. Methods of forging and altering passports are becoming more sophisticated, and there is a rapidly growing market for stolen identity documents which can be used by imposters or altered by talented counterfeiters with Interpol s Stolen and Lost Travel Documents database now including more than 30 million documents (passports, visas, etc.) from 167 countries. Other easy-to-forge identity documents like birth certificates are being used to obtain legitimate passports in these cases making it nearly impossible to identify fraudulent documentation. New strategies for addressing these challenges are centered on three types of identity documents: Passports The passport remains the de facto form of identification for international travel, and there is no indication that this will change anytime soon. However, led by European nations, we re seeing a global shift to epassports, with 101 countries now issuing these more-secure documents and 81 percent of new passports issued now including a smart chip. 3 New epassport technologies are further enhancing high-security authentication for travelers. National ID/Driver s Licenses National IDs are following a similar trend, with experts forecasting that by 2015, the majority of the world s nations will be issuing eids. 4 Already, more than 62% of national IDs issued include some form of biometrics. 5 Continued innovation will expand the capabilities of these smart eids enhancing the specificity of credentials linked to the card and adding new applications utilizing high-end contactless technology. Mobile Credentials As the applications of mobile technology grow more diverse and in-demand, mobile credentials are a new frontier with great promise. Mobile payments are projected to grow from $235 billion today to $721 billion in 2017 6 and this growth is especially concentrated in emerging economies, where traditional identity documentation is often nonexistent. This is driving the development of sophisticated mobile credentials that can be used to grant both physical and logical access to secure environments. We may soon see the adoption of mobile credentials as an acceptable form of identification for travel within the borders of a country around the U.S. or across Canada, for example. 3 United Nations 2014 survey 4 Acuity Market Intelligence Report 5 Need source 6 PewResearch 5

PREVENTING WEAK LINKS When thinking about securing these types of identity documents, it s important to avoid the tendency to focus on just the security of the end-user credential and/or document. An identity solution, in general, is only as secure as its weakest link and in today s world, that weak link could be a person, a process, a physical or a digital asset. Governments can take steps today that will help alleviate and mitigate the risk of fraud and false identification as citizens and consumers travel, cross borders, vote or access e-gov services. These include: Secure Databases Securely bind the physical identity to the cyber or online identity. The database is a critical resource that can help safeguard borders and travel when properly used to assess and verify passengers. Enforce credential-based strong authentication for e-services, leverage the trusted identity profile and work to maintain the chain of trust. Train Field Officers/Agents Ensuring that those vetting passengers have the proper training and know what to look for in both arrival and outbound travelers is important. This helps with the noticing of behavior and body language clues, understanding the technologies and electronic components of smart credentials, etc. Outbound Validation Proper electronic validation of both incoming and outgoing passengers provides high assurance of the integrity and authenticity of the document and allows complete, closed-loop tracking of travelers, significantly mitigating the threat of forgery. While the potential for technology failures is always a possibility, it still provides the means to appropriately process travel documents for secondary inspection. Advanced Identification Technology Continuous advancement in technology will be key for identifying passengers. In particular, biometrics of the individual such as fingerprints or even facial recognition could be used. Leveraging these advanced biometric technologies can further mitigate the impersonation threat. Physical Security of Documents The physical security features of these documents are essential to validation. Tools like Datacard Security at Time of Personalization can complement supply chain security by reducing the value of blank documents. Variable security features added during the personalization process make fraud more difficult, requiring not only the raw materials, but access to, and understanding of, these personalization technologies. Examples include: the Datacard PersoCurve security feature, Laser Engraving, 3D photos and UV Fluorescence. 6

ENTRUST DATACARD WHITE PAPER BEYOND THE CREDENTIAL: END-TO-END SECURITY The emerging trends discussed above are all promising new ways of providing citizens with secure credentials that enable efficient and convenient travel. But, let s not forget the key element of looking at the entire ecosystem. When governments start looking at the entire program from enrollment and issuance to management and validation, it tends to become more difficult to ensure all pieces work together to create a secure environment. Industry leaders like Entrust Datacard provide new ways to help ensure that end-to-end security in the full ecosystem. That means building a trust infrastructure that combines physical, electronic and digital security features to support the entire identity lifecycle from citizen enrollment and credential issuance, to managing physical as well as digital credentials like PKI and digital certificates, to authenticating identities and validating access and interactions all while intelligently identifying suspicious and fraudulent activity. By leveraging the end-to-end security of a trust infrastructure, today s governments can effectively combat the growing threats to identity documentation. But more importantly, they can answer the heightened expectations of their citizens offering greater convenience and easier travel while enhancing efficiency and minimizing costs. Building Secure Ecosystems ADJUDICATION DATABASES C I TI Z EN E N R O L L M E N T Photo, biometric, data capture Adjudication against authorized databases Central or remote workflow options CREDENTIAL MANAGEMENT TR U IDE STED NT ITY COUNTRY SIGNING CA (CSCA) ICAO PKD DOCUMENT SIGNER (DS) SPOC C R E D E N T I AL I SS UA N C E Data preparation for document production Central or distributed issuance models Documents delivered in person or by mail C R E D E N T I AL U S E AT B O R D ERS Managed keys & certificates Validate integrity of chip contents Authenicate the credential 7 2014 DataCard Corporation. All rights reserved. GS14-2107-001 NATIONAL PKD SE ISS CURE AN UAN YW CE HE RE VALIDATION AUTHORITY EL E VA CTRO LID NI AT C ION DOCUMENT VERIFYING CERTIFICATE AUTHORITY ADJUDICATION (DVCA) DATABASES COUNTRY VERIFYING CERTIFICATE AUTHORITY (CVCA)

ABOUT ENTRUST DATACARD Consumers, citizens and employees increasingly expect anywhere-anytime experiences whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications. With more than 2,000 Entrust Datacard colleagues around the world, and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information, visit www.entrustdatacard.com. 8 2014 DataCard Corporation. All rights reserved. GS14-2107-001