Security StrategiesArsenal Digital Solutions Automated Off-Site Data Protection for SMBs Network World's Security Strategies Newsletter, 05/17/07Identification isn't enoughBy M. E. KabayIn my last column, I started to discuss the REAL ID Act, which is currently back in the news because of a resurgence of strong opposition to its activation in 2008. I mentioned that I choose to dismiss one class of objections altogether: the notion that because there are ways around the restrictions of the REAL ID Act, it should be abandoned. A much more serious objection to REAL ID as a security measure is rooted in how we use identification and authentication for security. Bruce Schneier wrote clearly about this issue in an essay from a February 2004 “Crypto-Gram” newsletter. In “Identification and Security,” he makes the point that identification does not in itself tell us anything about the threat posed by an individual. Instead, an identifier allows authorities to compile profiles about individuals based on their recorded behavior - behavior that would be harder to compile without a unique, consistent identifier. Consider how much harder it is to track people who travel by bus and pay cash for their tickets than those who travel by air and use credit cards; but then ask yourself if travel patterns are sufficient to allow effective identification of terrorists.
The 9/11 terrorists all had identification papers - some authentic, some forged. You can read extensive excerpts from _9/11 and Terrorist Travel: A Staff Report National Commission on Terrorist Attacks Upon the United States_ on the Amazon Web site. If a suicide bomber is sitting beside you on your flight from Chicago to Tampa, I really don’t think that knowing that person’s name before or after the explosion makes very much difference - in the absence of specific intelligence about that specific person. Simply having employees of state departments of motor vehicles demand birth certificates, green cards, U.S. passports or other acceptable documentary evidence of legitimate standing as legal residents of the U.S. tells us NOTHING about the risks posed by any individual. More in my third and last commentary on this problem next time.
|
Contact the author: M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor of Information Assurance and CTO of the School of Graduate Studies at Norwich University in Northfield, Vt. Mich can be reached by e-mail and his Web site. Special discount for Network World Security Strategies readers: For a 10% discount on the upcoming INFOSEC Year in Review workshop in Marina Del Ray, Calif., on June 4-5, 2007, use code WNW07 when registering online or by phone. Arsenal Digital Solutions Automated Off-Site Data Protection for SMBs ARCHIVEArchive of the Security Strategies Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment