Electronic passports set to thwart forgers Message-ID: <[EMAIL PROTECTED]> User-Agent: eGroups-EW/0.82 X-Mailer: Yahoo Groups Message Poster X-Originating-IP: 216.155.201.59 X-eGroups-Msg-Info: 1:12:0 X-Yahoo-Post-IP: 68.98.145.15 From: "David Bier" <[EMAIL PROTECTED]> X-Yahoo-Profile: bafsllc Sender: osint@yahoogroups.com MIME-Version: 1.0 Mailing-List: list osint@yahoogroups.com; contact [EMAIL PROTECTED] Delivered-To: mailing list osint@yahoogroups.com List-Id: <osint.yahoogroups.com> Precedence: bulk List-Unsubscribe: <mailto:[EMAIL PROTECTED]> Date: Wed, 10 Aug 2005 03:07:56 -0000 Subject: [osint] Reply-To: osint@yahoogroups.com Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit
"The e-passport initiative has its roots in legislation passed by Congress in May 2002 to improve border security. It called for 27 countries whose citizens don't need visas for entry into the USA to convert to electronic passports by October 2004. Congress has since delayed the deadline until October 2006." http://www.usatoday.com/travel/news/2005-08-08-electronic-passports_x.htm Electronic passports set to thwart forgers By Roger Yu, USA TODAY The U.S. passport is joining the digital age. After three years of research and discussion, the State Department has finalized most of the technical and logistical details of new, supposedly tamper-proof passports embedded with a "smart-card" chip. A "contactless smart chip and antenna" is flexible enough to embed in the cover of a standard passport booklet. If current plans hold, they'll become standard issue for U.S. travelers as soon as February. Proponents say the chip, which will contain the holder's personal data and digital photo, should allow speedier entry at borders for most travelers. Because the chip's data can't be altered, proponents say, forging passports will be virtually impossible. That, they say, gives authorities a potent new anti-terrorism weapon. When swiped across an electronic reader, the chip in the passport wirelessly transmits data to a customs officer's computer screen. The e-passport relies on radio frequency identification technology (RFID). E-passport development May 2002: The Enhanced Border Security and Visa Entry Reform Act requires the USA and other countries whose citizens don't need visas for entering the USA to develop electronic passports. The act sets a deadline of October 2004. March 2004: The Bush administration asks Congress to delay the deadline to October 2006 to allow participating countries more time to address technical issues. Congress agrees. April 2005: The State Department closes comment period, begins to firm up plans for the new e-passport. December 2005: State Department plans to test the new passport with diplomats and select government officials. February 2006: State Department expects to make e-passports available to U.S. travelers. Source: The State Department The new passport looks much like the traditional type. But the smart-card chip, embedded in the back page, makes it slightly thicker. If the chip is broken or malfunctions, the holder can continue to use the passport as a non-electronic passport, or buy a new one. Once the new version is available, it would take up to a year for all new passports to be issued in the new format. Americans with valid traditional passports won't have to replace them until they expire. The new passport will cost $97, or $12 more than the traditional version. Initially, U.S. diplomats will use the e-passport as a test, probably starting in December, says Frank Moss, deputy assistant secretary of State. If successful, the new passport will be available to the public next year, possibly as early as February, Moss says. Calls for better border security The Sept. 11 terrorist attacks prompted calls for improved border security. The new e-passport is perhaps the most visible aspect of the government's foray into digital technology for border control. The e-passport has raised concerns among critics who say it lacks adequate privacy safeguards. Wireless transmission of data compromises security, and important personal data could fall into the wrong hands, they say. With proper equipment, someone could remotely intercept personal data, they say. Wireless transmission could lead to what's called "skimming" or "eavesdropping," says Cedric Laurant of the Electronic Privacy Information Center, a Washington, D.C.-based advocacy group. In skimming, an intruder secretly uses a device to read the chip's data from as far away as several feet. ELECTRONIC PASSPORTS The new U.S. electronic passport will look like its predecessor in size and shape, although it will be slightly thicker. Photos of owners will still be included. How the new electronic features will be used: What happens at passport control (1) The officer swipes the data page through a special reader to read the two lines of printed characters on the bottom of the data page. This provides a key that';s unique to the passport and lets the process proceed. (2) When the passport is held over the reader (no contact is necessary), a radio field from the reader wakes up the chip, and the encrypted data are transferred to the reader, allowing the officer to conduct a visual check. (3) The officer holds your open passport over another reader, then checks a view of you, with the photo in your passport, and all the data from your passport (including your photo) on the monitor. The data on the monitor also verify that your passport was issued by a legitimate authority, and that it has not been altered. Security details A chip is embedded into the back cover. It contains data that cannot be read without the security key as shown in step 1 above. Privacy protection A thin radio shield can be sandwiched between the front cover and the first page. Whenever the passport is closed for instance, in your pocket or briefcase the digital information in the chip cannot be read. The shield will not set off airport metal detectors. Source: Axalto Americans walking with their passports could be essentially broadcasting their nationality and other personal information, Laurant says. Eavesdropping could occur at border checkpoints if someone intercepts the information as it's being transmitted from the chip to a reader. Moss says those concern are outdated. The agency has made technical adjustments to address them. The State Department has added a metallic anti-skimming material to the passport's cover and spine. It limits retrieval of the data to within an inch of the passport, Moss says. The State Department is also considering adding a layer of protection by encrypting the information so it can be read only by authorized devices, Moss says. Bernard Bailey, CEO of software developer Viisage, which is working with the State Department, says e-passport's technology is sound. It will improve national security while safeguarding traveler privacy, he says. E-passport roots Bill Connors, executive director of corporate-travel advocate the National Business Travel Association, says the government has adequately addressed the privacy concerns of his organization. "We feel that the passports are much more secure now," Connors says. The e-passport initiative has its roots in legislation passed by Congress in May 2002 to improve border security. It called for 27 countries whose citizens don't need visas for entry into the USA to convert to electronic passports by October 2004. Congress has since delayed the deadline until October 2006. The International Civil Aviation Organization, an international agency, created the technical specifications for e-passports worldwide, and that has helped to enhance international cooperation, says Paul Beverly of smart-card-maker Axalto. All e-passports will have the same underlying technology and will work with other countries' readers, Beverly says. If the U.S. meets its target dates for the e-passport introduction, it will be one of the first countries to use it, he says. Beverly says he's consulted with 20 governments about the chip technology and hasn't witnessed backlash from U.S. demands for a system of electronic passports. "There were some concerns about the very aggressive schedule, but that objection has largely gone away," he says. ------------------------ Yahoo! Groups Sponsor --------------------~--> <font face=arial size=-1><a href="http://us.ard.yahoo.com/SIG=12h1qh7gh/M=362329.6886306.7839369.3040540/D=groups/S=1705323667:TM/Y=YAHOO/EXP=1123650486/A=2894321/R=0/SIG=11dvsfulr/*http://youthnoise.com/page.php?page_id=1992 ">Fair play? Video games influencing politics. Click and talk back!</a>.</font> --------------------------------------------------------------------~-> -------------------------- Want to discuss this topic? Head on over to our discussion list, [EMAIL PROTECTED] -------------------------- Brooks Isoldi, editor [EMAIL PROTECTED] http://www.intellnet.org Post message: osint@yahoogroups.com Subscribe: [EMAIL PROTECTED] Unsubscribe: [EMAIL PROTECTED] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/