Security & Biometrics in Asia Pacific
Terry Hartmann
Those were the days …
8 October 2004 ?
What were you doing ?
11 September 2001
What were you doing ?
2004
• amazing changes have come about
• Congress has been confronted with so many new House resolutions addressing immigration control as a terrorism measure dealing with everything from illegals getting driver's licenses, to law enforcement cooperation, to visa security and tracking, to welfare benefits for illegals, to even considering the idea of something like a secure national identity card …
The 9/11 Report … Who, How ?
the 9/11 terrorists had no fewer than 63 driver's licenses among them without them, they could surely not have rented cars, boarded airplanes and otherwise prepared for their deadly attacks.
What has happened with Identity Management since September 11 ?
A new Paradigm
Identity Centric
Transaction Centric
How has Government Driven this shift ?
Defining the Landscape – Global Challenges
• Public Sector – Increased identity fraud – Increased need to ensure identification of visitors at our borders – Increased need to manage those who would seek to do harm – Increased number of persons in our jail systems – Controlling access to facilities, restricted areas, and information systems – Protection of private/personal information
• Transportation – Vulnerabilities of facilities, restricted areas, and information systems – Increase security and provide efficient, employee, passenger, and cargo management
– Monitoring airport and port campus activity for threats
• Finance – Increased credit card fraud – Increased attacks on accounts by unauthorised personnel – Vulnerabilities to facilities, restricted areas, and information systems
1. Something You Have – Driver license, passport, token (PKI), Smartcard …
2. Something You Know – PIN, Password, family name, date of birth, word/phrase
3. Something You are Still Entitled to – Passport not lost, citizenship not revoked
4. Something You Are (Biometrics) – Physical Characteristics – Behavioral Characteristics
Identity Concepts – Who are you ?
Public Perceptions Today
Australia’s Most Watched TV Program ?
Source: AC Nielsen
What is Identity Management all about ?
Fairy Tales, Fables & Folklore
Wolf in Sheep’s Clothing – Imposter Fraud
Matthew 7:15 "Beware of false prophets, which come to you in sheep's clothing, but inwardly they are ravening wolves."
What are Biometrics all about ?
Biometrics is the automated technique of measuring a physical characteristic or personal trait and comparing it to information in a database or on a token for the purposes of positive identification
Biometric – What is it?
Cinderella – the Biometric Foot
Cinderella can be traced back as far 85060 AD where a version was written down in China.
The Grimms' version also includes the stepsisters hacking off their heels and toes in order to squeeze their feet into the shoes = “spoofing”
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
2003 2004 2005 2006 2007 2008
Signature Voice Iris Facial Middleware Hand Geometry AFIS/LiveScan Fingerprint
Biometric Market Snapshot
Source: International Biometrics Group 2004
CAGR = 36.5%
AFIS = Automated Fingerprint Identification System
Comparative Technology Revenue Projection 20032008 ($M)
719
1,201
1,847
2,648
3,682
4,639
Fingerprint based revenue 56%
Other competing technologies 33%
Revenue by Application
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
2003 2004 2005 2006 2007 2008
Civil Identification Access Control/Attendance PC/Network Access Criminal Identificaiton Device Acces Retail/ATM/POS eCommerce/Telephony Suveillance
719
1,201
1,847
2,648
3,682
4,639
Source: International Biometrics Group 2004
Key Segments
Fingerprint, Face,Iris Logical/Physical access control 5. Health Care
Fingerprint PC/Network access control for data security (Logical access)
4. Commercial Enterprises
Fingerprint, Voice Logical access control 3. Financial Services
Fingerprint, Face,
Hand Geometry, Iris
Physical/Logical access control (TWIC, USVISIT)
2. Travel/ Transportation
AFIS (benefit systems, background searches, ID issuance)
Fingerprint, Face, Iris
Civil Identification
Criminal Identification
Employee access control (physical and logical)
1. Government Sector (incl. Law Enforcement)
Public Services
Military Operations
Intelligence
Judicial and Law Enforcement
(Federal, State/Provincial, Local/Municipal levels)
Leading Technologies Applications Segment
AFIS = Automated Fingerprint Identification System
TWIC = Transportation Worker Identity Credential program
56%
16%
9%
4%
15%
Revenue Share in 2008
• Viable public segments area forming in the area of Health Care, driven by a need for logical and physical access solutions pursuant to HIPAA regulations and patient care, Financial Services, focused on employee and customer security and service enhancements, as well as commercial and corporate biometric adoption.
• Financial services, Commercial Enterprise and Health Care will take up to 29% of total revenue in 2008
Source: International Biometrics Group 2004
How do you use it ?
Identification Matching 1:many (database)
“Have we seen this person before under another identity ?”
Verification Matching 1:1
“Is this person who he/she claims to be?”
Watch List Matching
“Is this person on a list of wanted people ?”
How is Unisys involved ?
Key Unisys Secure Government Engagements
ID Cards and Travel Documents • Malaysia MyKad multipurpose id card • South Africa HANIS ID System • Philippines Seafarers ID Design • European Commission Schengen Visa • Visa (Hungary, Lithuania) • Canada CIC Visa Field Trial • Australia Passport Updates website • China eTicket
Border Control • USA SBInet Land Border • Chile Immigration • US VISIT – Air Exit • NZ Customs • NZ Immigration
Biometrics • Australia Immigration • TSA Airport Access • Law Enforcement
Driver Registration • New Zealand • Philippines • Indiana • Sweden
Airport/Port Security • US Operation Safe
Commerce • TSA Air Cargo Integrity • China & Singapore Airport
Infrastructure • Port of Los Angeles
Security Roadmap • US Registered Traveler
Defence/Homeland Security • New Orleans Emergency Response • Virginia Voice Interoperability • US Defence Multimodal Biometrics R&D • Canada Defence IS Architecture • US Army Intransit RFID • US Transportation Security Administration
(TSA) Infrastructure
Justice/Public Safety • Western Australia Courts • Hong Kong Judiciary • Dutch Prosecutors • EU Criminal Records
System • London Metropolitan
Police • Georgia Justice Network • US Bureau of Prisons
(all are active in 2007)
Wins in 2006 w Canada CIC Visa w China eTicket w Australia DIAC w USA SBInet
Voter Registration • Philippines NSO • Dominican Republic • Panama
Border Security
• Challenge: – Protect the Nation's transportation systems
ensuring freedom of movement for people and commerce
• Value: – Provide frequent fliers a quicker pass through
security checkpoints – Verify passenger’s identity with increased
precision – Enhance border security and processing
efficiency with biometric technologies
• Payback: – Increased traveler satisfaction; More predictable
wait time for security checkin and exemption from random patdowns
– Reduce identity fraud by using two biometrics
Unisys provides the IT solutions for key Chinese Airports Beijing and Ghangzhou
• Prime Systems Integrator
• Infrastructure Services – many subcontractors
Australia Passports
• Market Issues – Provide a worldclass passports service to Australians
• Business Need – Reduce the incidence of identity fraud and to enhance border control
• Solution – Face Recognition Systems against large databases of existing photos – 1:5M
– Australian ePassport development – Securing the data in the chip – PKI – International Standards development (ISO & ICAO)
– Implemented in October 2005 and ~ 1 million ePassports issued by Australia so far
– Contract finished successfully in August 2005
Australia Passports Identity Mgmt
Identity Mgmt
What does the Future Hold ?
3 Little Pigs: Border Security
Border Security – pre September 11
Border Security – today
Understanding Faces
Understanding Faces – same person with face “tweaked”
Source: Cyberextruder
Photo
2D 3D
Hands Up …
– Carrying around a Smart Chip every day – A unique id number embedded in a Smart Chip – You know the number off by heart – Can be used to buy services – You carry it around all the time and get a bit "antzy" if you leave it at home
– Is required as your primary means of interacting with family, friends and business associates
– You must have it to carry out a transaction – Can track your movements
Terry Hartmann Director and Global Solution Lead, Secure Identification & Biometrics