Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Common, It Isn't

October 29, 2002
It’s called the Common Access Card or CAC program. It’s the Federal government’s effort to update military and defense employee identification from bar code cards and, before that, the metal stamped “dog tags.”

Now in its second version, the CAC is basically a smart card which the government uses for its workers to verify identity, buy goods and logon to office and field computers.

There are about 4.3 million active service men and women, with another 20 million dependents. Earlier this past summer, the government hit a milestone one millionth card issued.

Expansion of Concept

While the CAC is extremely important to military and defense users, the program’s impact will surely expand beyond these users and into business and security applications. At last month’s American Society for Industrial Security (ASIS) International Exhibition and Seminar in Philadelphia, numerous electronic access control manufacturers were talking about the CAC and its financial-application sister standard, the mifare card. The CAC could also spin into a states-adopted drivers license; the American Association of Motor Vehicle Administers, for example, is very interested in CAC.

At its microchip heart, the CAC will store a variety of computer-readable data, ranging from name, rank and Social Security number to blood type and benefits eligibility. It could also store value, like a debit card, as well as a biometric and other data for computer access and even encrypted email.

The overall CAC plan replicates consumer credit cards by authenticating identity but goes further thanks to the embedded chip, which itself is partitioned to handle a multiple of application.

The transition has been slow going. The changeover for cards, for example, has a significant cost. The older bar code cards cost about $2.50 per person issued, while the new smart cards cost about $10. There is the cost of new types of readers to accommodate the smart cards as well as the cost on the computer side for databasing and transaction processing. There are the sheer numbers of potential end users. And then there is the challenge related to getting the various branches of the military and defense structure to sign on to the plan.

Current applications often center on online transactions, such as supply contracting and travel authorization.

Door Access App

Upcoming applications include physical access control. Depending on a facility and level of security, for instance, the CAC may combine with a PIN number and biometric, probably a fingerprint, for entrance to a building or office.

Still, the developers of the CAC stress the cards are primarily intended for business applications and not for command and control uses.

Various technology companies are involved in the CAC program. These firms include smart card companies, software companies and systems integrators. SchlumbergerSema, a unit of Schlumberger Ltd., is involved in the smart card and reader end of the program. Electronic Data Systems Corp. works with the Department of Defense (DoD) as a systems integrator on installation, while ActivCard Inc. provides the software for card issuance and use. The DoD uses ActivCard’s open standards-based IDM system, known by the DoD as the “issuance portal,” to initialize, personalize and manage user credentials and applications.

At the time of a CAC card’s issuance, ActivCard’s IDM system consolidates multiple credentials and applications on a single card into the ActivCard applets—special applications designed for smart cards stored in the cards, which are PIN, PKI and

Generic Container (GC). CAC users are then enabled to digitally sign and encrypt/decrypt email, approve electronic purchases, provide user authentication for network access and their demographic data and PKI certificates are stored in the GC. After issuance, ActivCard’s IDM system can add or update applications or information on the CAC card securely, in military locations around the world.

At this point, CACs boast 32 kilobytes of memory and use the Java programming language.

Spreading the Word

Government agencies other than the military are taking a close look at the CAC program, thanks in part to the aftermath pressure from September 11th.

The Common Access Card is still a work in progress.

Just weeks ago, for example, the Defense Department announced that is adding smart card middleware for Linux systems to its Common Access Card program, expanding capabilities beyond Microsoft Windows platforms for the first time.

The CAC program, at least in part, has also encouraged numerous manufacturers to form alliances and partnerships. Among the most important, Fargo Electronics, Inc., the card printer maker, has an ongoing program that recently welcomed Texas Instruments Radio Frequency Identification Systems, Plastic Card Systems, Inc. and ITC Systems to the Fargo Technology Alliance, a global technology group that promotes effective, advanced smart card solutions.

“The Fargo Technology Alliance now unites 29 smart card solution providers with Fargo’s international and domestic network of distribution partners. With the Alliance members—the very best smart, optical and proximity card application software developers and manufacturers—working together with our global distribution system, Fargo is able to provide a wider range of complete solutions for end users. This generates sales for all companies involved, and builds Fargo’s competitive advantage,” says Gary R. Holland, president and CEO of Fargo.

“The use of advanced technology, such as smart, proximity or optical cards, is creating new opportunities for distributed card personalization systems,” Holland notes. “The U.S. Department of Defense Common Access Card project, which uses over 1,500 Fargo printers, is a prime example of the implementation of this technology.

Texas Instruments Radio Frequency Identification Systems is a leading developer and manufacturer of field-proven (RFID) solutions used in a broad range of applications worldwide. TI RFID Systems’ line of ISO 15693 contactless 13.56 MHz cards and readers brings a new level of security to the access control market with 2,000 bits of memory, faster data transfer speeds, a unique and secure ID and at-the-door read-write programmability.

Radio Frequency ID

“The security market is embracing 13.56 MHz RFID technology for access control and we are working with Fargo on an RFID-enabled PVC card printer/encoder that is compatible with our access control as well as our standard card products,” says Bill Allen, eMarketing manager for TI RFID.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • MFA for HIPAA Compliance

    Multi-factor authentication for HIPAA compliance: What it is, common objections, and why to insist on it

    See More
  • cyber security freepik

    Timing isn't everything but it helps

    See More
  • It’s Common Sense for Chemical Sector Security, Says DHS Secretary Napolitano

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • Physical Security and Environmental Protection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing