Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Time to Standardize ID Cards

June 26, 2002
There now is various business, security industry and government actions aimed at standardizing state and Federal identification systems for enhanced national security and the prevention of terrorism. The actions will influence the evolution of access control and identification cards and badges used by most businesses. Just last month, for example, President Bush signed into law a border security measure that, among other things, requires travel documents to contain machine-readable data such as fingerprints. Earlier this spring, the Security Industry Association (SIA), the trade association of security technology and service firms, through its Homeland Security Advisory Council, went on record urging Congress to enact even more legislation to standardize and modernize existing technology and practices used to identify and authenticate individual identity, specifically state and federal IDs; and develop sound policy to drive this standardization that is designed to keep citizens safe, while not infringing upon freedoms.

Overcoming Resistance

According to the SIA statement, the idea of a “national” identification card has been resisted in the past. But the idea of developing baseline standards for the production, issuance and authentication of all state and federal identification cards has become a pressing issue. These baseline standards should include:
  • Uniform appearances—ink types, colors, engravings, type of paper or plastic, size, shape, black light sensitive imaging);
  • Data set—photo, address, date of birth, digitally imprinted thumb print);
  • Incorporated technology—holograms, microchip, magnetic strip, bar code, proximity card, smart card, reader type);
  • Production requirements—identification of approved manufacturing practices; printer DPI settings, material specifications); and
  • Protocols and conditions for identification issuance—documents required as proof of identity in order to secure an ID card; establishment of 2-day waiting period, background checks). The SIA policy states, “In a country where a driver’s license is viewed as positive proof of identity and also allows for the acquisition of other identity documents, such as social security cards, birth certificates and passports, it is critical that some measure of security be placed on the production, issuance, and authentication of these powerful access devices.” Developments in the government sector will spill over the business and commercial use of ID and access cards. In addition, there are some product makers who have developed visitor access control systems based on the ability to “read” and audit trail people’s driver’s licenses. The security industry trade association believes that enacting Federal standards that dictate the baseline levels at which state and Federal identification cards/documents will be securely produced, issued and authenticated will, no doubt, require significant economic and political investments in policy development, software and hardware. Because of this controversies surrounding a national identity card or program, the SIA policy admits “it will take a significant amount of education and consensus building on this issue as civil liberties and privacy groups are seeking to derail the underlying security needs implicit in securing our nation’s identification documents.” But the SIA Homeland Security Advisory Council statement relates that “it is of paramount importance to develop sound policy that will drive the efforts to standardize certain identification documents such as driver’s licenses and passports. This policy should work to counter misinformation and paranoid scenarios that depict government tracking of the general public.” So it’s not surprising that the SIA advocates for strict policy controls and closed loop databases that work to ultimately protect the public’s right-to-privacy while securing against fraud and identity theft The association also believes ultimately that technology, such as smart card technology, will play a significant role in safeguarding a person’s identity and in making it nearly impossible to fraudulently produce a verifiable identification card. Given the need to secure, modernize and standardize the nation’s identification systems for homeland defense purposes, it is necessary to embrace this undertaking 100 percent or not to embrace it at all. Less than a full commitment to reforming and securing our nation’s identification system will not work to counter misinformation from privacy and civil liberty organizations, according to the industry group’s statement. Still, concepts like “trusted traveler” are controversial. Richard E. Smith, Ph.D. CISSP, and author of Authentication – From Passwords to Public Keys, published by Addison Wesley, says that “while I agree that it’s possible to build a hard-to-forge authentication card for trusted travelers, I don’t believe the notion is practical. The reasons have little to do with technology. The first problem is that the security checkpoints are intended to interdict a broad range of dangerous items, and it’s unrealistic to trust a large population of ‘trusted travelers’ to police themselves. If a dangerous item gets aboard a plane, it doesn’t matter how it got there once a terrorist gets hold of it. The existing arrangement tries to eliminate dangerous items by checking everyone, and this reduces the risk of people breaking the rules innocently or intentionally.” He goes on to say, “The second problem has to do with adjudicating the background checks: once you have the results in hand, how do you decide to deny a card?…or must you have had some documented association with a terrorist organization? What constitutes adequate documentation? Can a ‘reformed terrorist’ file suit to receive a trusted traveler card? If the adjudication process can’t eliminate 100 percent of terrorists without being unfair to some large number of travelers, then the responsible organizations will spend a lot of time in court.”

    Sidebar 1: What About “Trusted Traveler” Cards?

    U.S. airlines, crippled after September 11th and looking for ways to better handle their frequent business flyers, are urging the Transportation Security Administration (TSA) to consider development and approval of so-called trusted traveler cards. One method: a background check prior to receiving a card, which would provide a higher level of security, probably through biometrics built into a smart card. The concept is controversial and the TSA doesn’t have it on a fast track. However, just last month TSA gave the go-ahead for airline customers who are members of airline clubs to go through security only showing the club card and a photo ID but without a ticket or ticket receipt for that day.
  • Share This Story

    Looking for a reprint of this article?
    From high-res PDFs to custom plaques, order your copy today!

    Recommended Content

    JOIN TODAY
    To unlock your recommendations.

    Already have an account? Sign In

    • Iintegration and use of emerging tools

      Future Proof Your Security Career with AI Skills

      AI’s evolution demands security leaders master...
      Career Intelligence
      By: Jerry J. Brennan and Joanne R. Pollock
    • The 2025 Security Benchmark Report

      The 2025 Security Benchmark Report

      The 2025 Security Benchmark Report surveys enterprise...
      The Security Benchmark Report
      By: Rachelle Blair-Frasier
    • The Most Influential People in Security 2025

      Security’s Most Influential People in Security 2025

      Security Magazine’s 2025 Most Influential People in...
      Most Influential People in Security
      By: Security Staff
    Manage My Account
    • Security eNewsletter & Other eNews Alerts
    • eMagazine Subscriptions
    • Manage My Preferences
    • Online Registration
    • Mobile App
    • Subscription Customer Service

    More Videos

    Sponsored Content

    Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

    close
    • critical event management
      Sponsored byEverbridge

      Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

    • Charlotte Star Room
      Sponsored byAMAROK

      In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

    • Sureview screen
      Sponsored bySureView Systems

      The Evolution of Automation in the Command Center

    Popular Stories

    The Lourve

    The Lourve Heist: What Was the State of the Museum’s Security?

    Office supplies

    Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

    American Airlines

    Security Leaders Discuss Cyberattack on American Airlines Subsidiary

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    Going Down with the Ship

    Going Down with the Ship

    Top Cybersecurity Leaders

    Events

    September 18, 2025

    Security Under Fire: Insights on Active Shooter Preparedness and Recovery

    ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

    November 13, 2025

    Inside the 2025 Security Benchmark Report

    The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

    View All Submit An Event

    Products

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    See More Products

    Related Articles

    • Purdue University to Update ID Cards

      See More
    • Bus Pass System Issues ID Cards to Indian Students, Public

      See More
    • Smart Card Alliance to Host One-Day Tutorial on Smart Cards and ID Management

      See More

    Related Products

    See More Products
    • 9780367221942.jpg

      From Visual Surveillance to Internet of Things: Technology and Applications

    • facility manager.jpg

      The Facility Manager's Guide to Safety and Security

    • school security.jpg

      School Security: How to Build and Strengthen a School Safety Program

    See More Products

    Events

    View AllSubmit An Event
    • November 19, 2025

      From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

      When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 
    View AllSubmit An Event
    ×

    Sign-up to receive top management & result-driven techniques in the industry.

    Join over 20,000+ industry leaders who receive our premium content.

    SIGN UP TODAY!
    • RESOURCES
      • Advertise
      • Contact Us
      • Store
      • Want More
    • SIGN UP TODAY
      • Create Account
      • eMagazine
      • eNewsletter
      • Customer Service
      • Manage Preferences
    • SERVICES
      • Marketing Services
      • Reprints
      • Market Research
      • List Rental
      • Survey/Respondent Access
    • STAY CONNECTED
      • LinkedIn
      • Facebook
      • YouTube
      • X (Twitter)
    • PRIVACY
      • PRIVACY POLICY
      • TERMS & CONDITIONS
      • DO NOT SELL MY PERSONAL INFORMATION
      • PRIVACY REQUEST
      • ACCESSIBILITY

    Copyright ©2025. All Rights Reserved BNP Media.

    Design, CMS, Hosting & Web Development :: ePublishing