Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Common, It Isn't

October 29, 2002
It’s called the Common Access Card or CAC program. It’s the Federal government’s effort to update military and defense employee identification from bar code cards and, before that, the metal stamped “dog tags.”

Now in its second version, the CAC is basically a smart card which the government uses for its workers to verify identity, buy goods and logon to office and field computers.

There are about 4.3 million active service men and women, with another 20 million dependents. Earlier this past summer, the government hit a milestone one millionth card issued.

Expansion of Concept

While the CAC is extremely important to military and defense users, the program’s impact will surely expand beyond these users and into business and security applications. At last month’s American Society for Industrial Security (ASIS) International Exhibition and Seminar in Philadelphia, numerous electronic access control manufacturers were talking about the CAC and its financial-application sister standard, the mifare card. The CAC could also spin into a states-adopted drivers license; the American Association of Motor Vehicle Administers, for example, is very interested in CAC.

At its microchip heart, the CAC will store a variety of computer-readable data, ranging from name, rank and Social Security number to blood type and benefits eligibility. It could also store value, like a debit card, as well as a biometric and other data for computer access and even encrypted email.

The overall CAC plan replicates consumer credit cards by authenticating identity but goes further thanks to the embedded chip, which itself is partitioned to handle a multiple of application.

The transition has been slow going. The changeover for cards, for example, has a significant cost. The older bar code cards cost about $2.50 per person issued, while the new smart cards cost about $10. There is the cost of new types of readers to accommodate the smart cards as well as the cost on the computer side for databasing and transaction processing. There are the sheer numbers of potential end users. And then there is the challenge related to getting the various branches of the military and defense structure to sign on to the plan.

Current applications often center on online transactions, such as supply contracting and travel authorization.

Door Access App

Upcoming applications include physical access control. Depending on a facility and level of security, for instance, the CAC may combine with a PIN number and biometric, probably a fingerprint, for entrance to a building or office.

Still, the developers of the CAC stress the cards are primarily intended for business applications and not for command and control uses.

Various technology companies are involved in the CAC program. These firms include smart card companies, software companies and systems integrators. SchlumbergerSema, a unit of Schlumberger Ltd., is involved in the smart card and reader end of the program. Electronic Data Systems Corp. works with the Department of Defense (DoD) as a systems integrator on installation, while ActivCard Inc. provides the software for card issuance and use. The DoD uses ActivCard’s open standards-based IDM system, known by the DoD as the “issuance portal,” to initialize, personalize and manage user credentials and applications.

At the time of a CAC card’s issuance, ActivCard’s IDM system consolidates multiple credentials and applications on a single card into the ActivCard applets—special applications designed for smart cards stored in the cards, which are PIN, PKI and

Generic Container (GC). CAC users are then enabled to digitally sign and encrypt/decrypt email, approve electronic purchases, provide user authentication for network access and their demographic data and PKI certificates are stored in the GC. After issuance, ActivCard’s IDM system can add or update applications or information on the CAC card securely, in military locations around the world.

At this point, CACs boast 32 kilobytes of memory and use the Java programming language.

Spreading the Word

Government agencies other than the military are taking a close look at the CAC program, thanks in part to the aftermath pressure from September 11th.

The Common Access Card is still a work in progress.

Just weeks ago, for example, the Defense Department announced that is adding smart card middleware for Linux systems to its Common Access Card program, expanding capabilities beyond Microsoft Windows platforms for the first time.

The CAC program, at least in part, has also encouraged numerous manufacturers to form alliances and partnerships. Among the most important, Fargo Electronics, Inc., the card printer maker, has an ongoing program that recently welcomed Texas Instruments Radio Frequency Identification Systems, Plastic Card Systems, Inc. and ITC Systems to the Fargo Technology Alliance, a global technology group that promotes effective, advanced smart card solutions.

“The Fargo Technology Alliance now unites 29 smart card solution providers with Fargo’s international and domestic network of distribution partners. With the Alliance members—the very best smart, optical and proximity card application software developers and manufacturers—working together with our global distribution system, Fargo is able to provide a wider range of complete solutions for end users. This generates sales for all companies involved, and builds Fargo’s competitive advantage,” says Gary R. Holland, president and CEO of Fargo.

“The use of advanced technology, such as smart, proximity or optical cards, is creating new opportunities for distributed card personalization systems,” Holland notes. “The U.S. Department of Defense Common Access Card project, which uses over 1,500 Fargo printers, is a prime example of the implementation of this technology.

Texas Instruments Radio Frequency Identification Systems is a leading developer and manufacturer of field-proven (RFID) solutions used in a broad range of applications worldwide. TI RFID Systems’ line of ISO 15693 contactless 13.56 MHz cards and readers brings a new level of security to the access control market with 2,000 bits of memory, faster data transfer speeds, a unique and secure ID and at-the-door read-write programmability.

Radio Frequency ID

“The security market is embracing 13.56 MHz RFID technology for access control and we are working with Fargo on an RFID-enabled PVC card printer/encoder that is compatible with our access control as well as our standard card products,” says Bill Allen, eMarketing manager for TI RFID.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0919-Mobile-Feat-slide1_900px

    When Efficiency is the Outcome of Enhanced Security

    See More
  • graffiti feat

    Reduces Graffiti Repair Costs

    See More
  • internet of things

    Five key steps to full device defensibility

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!