49
Security & Biometrics in Asia Pacific Terry Hartmann

Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Security & Biometrics in Asia Pacific

Terry Hartmann

Page 2: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Those were the days …

Page 3: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

8 October 2004 ?

What were you doing ?

Page 5: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

2004

• amazing changes have come about

• Congress has been confronted with so many new House resolutions addressing immigration control as a terrorism measure ­­ dealing with everything from illegals getting driver's licenses, to law enforcement cooperation, to visa security and tracking, to welfare benefits for illegals, to even considering the idea of something like a secure national identity card …

Page 6: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

The 9/11 Report … Who, How ?

the 9/11 terrorists had no fewer than 63 driver's licenses among them ­­ without them, they could surely not have rented cars, boarded airplanes and otherwise prepared for their deadly attacks.

Page 7: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

What has happened with Identity Management since September 11 ?

Page 8: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

A new Paradigm

Identity Centric

Transaction Centric

Page 9: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

How has Government Driven this shift ?

Page 10: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Defining the Landscape – Global Challenges

• Public Sector – Increased identity fraud – Increased need to ensure identification of visitors at our borders – Increased need to manage those who would seek to do harm – Increased number of persons in our jail systems – Controlling access to facilities, restricted areas, and information systems – Protection of private/personal information

• Transportation – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient, employee, passenger, and cargo management

– Monitoring airport and port campus activity for threats

• Finance – Increased credit card fraud – Increased attacks on accounts by unauthorised personnel – Vulnerabilities to facilities, restricted areas, and information systems

Page 11: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

1. Something You Have – Driver license, passport, token (PKI), Smartcard …

2. Something You Know – PIN, Password, family name, date of birth, word/phrase

3. Something You are Still Entitled to – Passport not lost, citizenship not revoked

4. Something You Are (Biometrics) – Physical Characteristics – Behavioral Characteristics

Identity Concepts – Who are you ?

Page 12: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Public Perceptions Today

Page 13: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Australia’s Most Watched TV Program ?

Source: AC Nielsen

Page 14: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,
Page 15: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

What is Identity Management all about ?

Page 16: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Fairy Tales, Fables & Folklore

Page 19: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

What are Biometrics all about ?

Page 20: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Biometrics is the automated technique of measuring a physical characteristic or personal trait and comparing it to information in a database or on a token for the purposes of positive identification

Biometric – What is it?

Page 21: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,
Page 23: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

0

500

1000

1500

2000

2500

3000

3500

4000

4500

5000

2003 2004 2005 2006 2007 2008

Signature Voice Iris Facial Middleware Hand Geometry AFIS/Live­Scan Fingerprint

Biometric Market Snapshot

Source: International Biometrics Group 2004

CAGR = 36.5%

AFIS = Automated Fingerprint Identification System

Comparative Technology Revenue Projection 2003­2008 ($M)

719

1,201

1,847

2,648

3,682

4,639

Fingerprint based revenue 56%

Other competing technologies 33%

Page 24: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Revenue by Application

0

500

1000

1500

2000

2500

3000

3500

4000

4500

5000

2003 2004 2005 2006 2007 2008

Civil Identification Access Control/Attendance PC/Network Access Criminal Identificaiton Device Acces Retail/ATM/POS eCommerce/Telephony Suveillance

719

1,201

1,847

2,648

3,682

4,639

Source: International Biometrics Group 2004

Page 25: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Key Segments

Fingerprint, Face,Iris Logical/Physical access control 5. Health Care

Fingerprint PC/Network access control for data security (Logical access)

4. Commercial Enterprises

Fingerprint, Voice Logical access control 3. Financial Services

Fingerprint, Face,

Hand Geometry, Iris

Physical/Logical access control (TWIC, US­VISIT)

2. Travel/ Transportation

AFIS (benefit systems, background searches, ID issuance)

Fingerprint, Face, Iris

Civil Identification

Criminal Identification

Employee access control (physical and logical)

1. Government Sector (incl. Law Enforcement)

­Public Services

­Military Operations

­Intelligence

­Judicial and Law Enforcement

(Federal, State/Provincial, Local/Municipal levels)

Leading Technologies Applications Segment

AFIS = Automated Fingerprint Identification System

TWIC = Transportation Worker Identity Credential program

56%

16%

9%

4%

15%

Revenue Share in 2008

• Viable public segments area forming in the area of Health Care, driven by a need for logical and physical access solutions pursuant to HIPAA regulations and patient care, Financial Services, focused on employee and customer security and service enhancements, as well as commercial and corporate biometric adoption.

• Financial services, Commercial Enterprise and Health Care will take up to 29% of total revenue in 2008

Source: International Biometrics Group 2004

Page 26: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

How do you use it ?

Page 27: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Identification Matching 1:many (database)

“Have we seen this person before under another identity ?”

Page 28: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Verification Matching 1:1

“Is this person who he/she claims to be?”

Page 30: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

How is Unisys involved ?

Page 31: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Key Unisys Secure Government Engagements

ID Cards and Travel Documents • Malaysia MyKad multipurpose id card • South Africa HANIS ID System • Philippines Seafarers ID Design • European Commission Schengen Visa • Visa (Hungary, Lithuania) • Canada CIC Visa Field Trial • Australia Passport Updates website • China eTicket

Border Control • USA SBInet Land Border • Chile Immigration • US VISIT – Air Exit • NZ Customs • NZ Immigration

Biometrics • Australia Immigration • TSA Airport Access • Law Enforcement

Driver Registration • New Zealand • Philippines • Indiana • Sweden

Airport/Port Security • US Operation Safe

Commerce • TSA Air Cargo Integrity • China & Singapore Airport

Infrastructure • Port of Los Angeles

Security Roadmap • US Registered Traveler

Defence/Homeland Security • New Orleans Emergency Response • Virginia Voice Interoperability • US Defence Multimodal Biometrics R&D • Canada Defence IS Architecture • US Army In­transit RFID • US Transportation Security Administration

(TSA) Infrastructure

Justice/Public Safety • Western Australia Courts • Hong Kong Judiciary • Dutch Prosecutors • EU Criminal Records

System • London Metropolitan

Police • Georgia Justice Network • US Bureau of Prisons

(all are active in 2007)

Wins in 2006 w Canada CIC Visa w China eTicket w Australia DIAC w USA SBInet

Voter Registration • Philippines NSO • Dominican Republic • Panama

Page 32: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Border Security

• Challenge: – Protect the Nation's transportation systems

ensuring freedom of movement for people and commerce

• Value: – Provide frequent fliers a quicker pass through

security checkpoints – Verify passenger’s identity with increased

precision – Enhance border security and processing

efficiency with biometric technologies

• Payback: – Increased traveler satisfaction; More predictable

wait time for security check­in and exemption from random pat­downs

– Reduce identity fraud by using two biometrics

Page 33: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Unisys provides the IT solutions for key Chinese Airports Beijing and Ghangzhou

• Prime Systems Integrator

• Infrastructure Services – many subcontractors

Page 34: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Australia Passports

• Market Issues – Provide a world­class passports service to Australians

• Business Need – Reduce the incidence of identity fraud and to enhance border control

• Solution – Face Recognition Systems against large databases of existing photos – 1:5M

– Australian ePassport development – Securing the data in the chip – PKI – International Standards development (ISO & ICAO)

– Implemented in October 2005 and ~ 1 million ePassports issued by Australia so far

– Contract finished successfully in August 2005

Page 35: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Australia Passports Identity Mgmt

Identity Mgmt

Page 36: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

What does the Future Hold ?

Page 37: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

3 Little Pigs: Border Security

Page 38: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Border Security – pre September 11

Page 39: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Border Security – today

Page 41: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Understanding Faces

Page 42: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Understanding Faces – same person with face “tweaked”

Source: Cyberextruder

Page 43: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Photo

2D 3D

Page 44: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,
Page 45: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,
Page 46: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,
Page 47: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,
Page 48: Security & Biometrics in · Security & Biometrics in ... – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient,

Hands Up …

– Carrying around a Smart Chip every day – A unique id number embedded in a Smart Chip – You know the number off by heart – Can be used to buy services – You carry it around all the time and get a bit "antzy" if you leave it at home

– Is required as your primary means of interacting with family, friends and business associates

– You must have it to carry out a transaction – Can track your movements