Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Time to Standardize ID Cards

June 26, 2002
There now is various business, security industry and government actions aimed at standardizing state and Federal identification systems for enhanced national security and the prevention of terrorism. The actions will influence the evolution of access control and identification cards and badges used by most businesses. Just last month, for example, President Bush signed into law a border security measure that, among other things, requires travel documents to contain machine-readable data such as fingerprints. Earlier this spring, the Security Industry Association (SIA), the trade association of security technology and service firms, through its Homeland Security Advisory Council, went on record urging Congress to enact even more legislation to standardize and modernize existing technology and practices used to identify and authenticate individual identity, specifically state and federal IDs; and develop sound policy to drive this standardization that is designed to keep citizens safe, while not infringing upon freedoms.

Overcoming Resistance

According to the SIA statement, the idea of a “national” identification card has been resisted in the past. But the idea of developing baseline standards for the production, issuance and authentication of all state and federal identification cards has become a pressing issue. These baseline standards should include:
  • Uniform appearances—ink types, colors, engravings, type of paper or plastic, size, shape, black light sensitive imaging);
  • Data set—photo, address, date of birth, digitally imprinted thumb print);
  • Incorporated technology—holograms, microchip, magnetic strip, bar code, proximity card, smart card, reader type);
  • Production requirements—identification of approved manufacturing practices; printer DPI settings, material specifications); and
  • Protocols and conditions for identification issuance—documents required as proof of identity in order to secure an ID card; establishment of 2-day waiting period, background checks). The SIA policy states, “In a country where a driver’s license is viewed as positive proof of identity and also allows for the acquisition of other identity documents, such as social security cards, birth certificates and passports, it is critical that some measure of security be placed on the production, issuance, and authentication of these powerful access devices.” Developments in the government sector will spill over the business and commercial use of ID and access cards. In addition, there are some product makers who have developed visitor access control systems based on the ability to “read” and audit trail people’s driver’s licenses. The security industry trade association believes that enacting Federal standards that dictate the baseline levels at which state and Federal identification cards/documents will be securely produced, issued and authenticated will, no doubt, require significant economic and political investments in policy development, software and hardware. Because of this controversies surrounding a national identity card or program, the SIA policy admits “it will take a significant amount of education and consensus building on this issue as civil liberties and privacy groups are seeking to derail the underlying security needs implicit in securing our nation’s identification documents.” But the SIA Homeland Security Advisory Council statement relates that “it is of paramount importance to develop sound policy that will drive the efforts to standardize certain identification documents such as driver’s licenses and passports. This policy should work to counter misinformation and paranoid scenarios that depict government tracking of the general public.” So it’s not surprising that the SIA advocates for strict policy controls and closed loop databases that work to ultimately protect the public’s right-to-privacy while securing against fraud and identity theft The association also believes ultimately that technology, such as smart card technology, will play a significant role in safeguarding a person’s identity and in making it nearly impossible to fraudulently produce a verifiable identification card. Given the need to secure, modernize and standardize the nation’s identification systems for homeland defense purposes, it is necessary to embrace this undertaking 100 percent or not to embrace it at all. Less than a full commitment to reforming and securing our nation’s identification system will not work to counter misinformation from privacy and civil liberty organizations, according to the industry group’s statement. Still, concepts like “trusted traveler” are controversial. Richard E. Smith, Ph.D. CISSP, and author of Authentication – From Passwords to Public Keys, published by Addison Wesley, says that “while I agree that it’s possible to build a hard-to-forge authentication card for trusted travelers, I don’t believe the notion is practical. The reasons have little to do with technology. The first problem is that the security checkpoints are intended to interdict a broad range of dangerous items, and it’s unrealistic to trust a large population of ‘trusted travelers’ to police themselves. If a dangerous item gets aboard a plane, it doesn’t matter how it got there once a terrorist gets hold of it. The existing arrangement tries to eliminate dangerous items by checking everyone, and this reduces the risk of people breaking the rules innocently or intentionally.” He goes on to say, “The second problem has to do with adjudicating the background checks: once you have the results in hand, how do you decide to deny a card?…or must you have had some documented association with a terrorist organization? What constitutes adequate documentation? Can a ‘reformed terrorist’ file suit to receive a trusted traveler card? If the adjudication process can’t eliminate 100 percent of terrorists without being unfair to some large number of travelers, then the responsible organizations will spend a lot of time in court.”

    Sidebar 1: What About “Trusted Traveler” Cards?

    U.S. airlines, crippled after September 11th and looking for ways to better handle their frequent business flyers, are urging the Transportation Security Administration (TSA) to consider development and approval of so-called trusted traveler cards. One method: a background check prior to receiving a card, which would provide a higher level of security, probably through biometrics built into a smart card. The concept is controversial and the TSA doesn’t have it on a fast track. However, just last month TSA gave the go-ahead for airline customers who are members of airline clubs to go through security only showing the club card and a photo ID but without a ticket or ticket receipt for that day.
  • Share This Story

    Looking for a reprint of this article?
    From high-res PDFs to custom plaques, order your copy today!

    Recommended Content

    JOIN TODAY
    To unlock your recommendations.

    Already have an account? Sign In

    • Security's Top Cybersecurity Leaders 2024

      Security's Top Cybersecurity Leaders 2024

      Security magazine's Top Cybersecurity Leaders 2024 award...
      Top Cybersecurity Leaders
      By: Security Staff
    • cyber brain

      The intersection of cybersecurity and artificial intelligence

      Artificial intelligence (AI) is a valuable cybersecurity...
      Logical Security
      By: Pam Nigro
    • artificial intelligence AI graphic

      Assessing the pros and cons of AI for cybersecurity

      Artificial intelligence (AI) has significant implications...
      Logical Security
      By: Charles Denyer
    Manage My Account
    • Security eNewsletter & Other eNews Alerts
    • eMagazine Subscriptions
    • Manage My Preferences
    • Online Registration
    • Mobile App
    • Subscription Customer Service

    The Money Laundering Machine: Inside the global crime epidemic - Episode 24

    The Money Laundering Machine: Inside the global crime epidemic - Episode 24

    Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

    Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

    Security’s Top 5 – 2024 Year in Review

    Security’s Top 5 – 2024 Year in Review

    More Videos

    Sponsored Content

    Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

    close
    • Crisis Response Team
      Sponsored byEverbridge

      Automate or Fall Behind – Crisis Response at the Speed of Risk

    • Perimeter security
      Sponsored byAMAROK

      Why Property Security is the New Competitive Advantage

    • Duty of Care
      Sponsored byAMAROK

      Integrating Technology and Physical Security to Advance Duty of Care

    Popular Stories

    Internal computer parts

    Critical Software Vulnerabilities Rose 37% in 2024

    Coding

    AI Emerges as the Top Concern for Security Leaders

    Half open laptop

    “Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

    Person working on laptop

    Governance in the Age of Citizen Developers and AI

    Shopping mall

    Victoria’s Secret Security Incident Shuts Down Website

    2025 Security Benchmark banner

    Events

    June 24, 2025

    Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

    For today's security teams, making informed decisions in the first moments of a crisis is critical.

    August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

    View All Submit An Event

    Products

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    See More Products

    Related Articles

    • SEC0111_innovation_printer

      Quickly Print Single or Double Sided ID Cards

      See More
    • SEC1119-prod-slide2_900px

      Prints Up to 230 Cards per Hour

      See More
    • Facial recognition

      Japan introduces facial recognition to unified ID system

      See More
    ×

    Sign-up to receive top management & result-driven techniques in the industry.

    Join over 20,000+ industry leaders who receive our premium content.

    SIGN UP TODAY!
    • RESOURCES
      • Advertise
      • Contact Us
      • Store
      • Want More
    • SIGN UP TODAY
      • Create Account
      • eMagazine
      • eNewsletter
      • Customer Service
      • Manage Preferences
    • SERVICES
      • Marketing Services
      • Reprints
      • Market Research
      • List Rental
      • Survey/Respondent Access
    • STAY CONNECTED
      • LinkedIn
      • Facebook
      • YouTube
      • X (Twitter)
    • PRIVACY
      • PRIVACY POLICY
      • TERMS & CONDITIONS
      • DO NOT SELL MY PERSONAL INFORMATION
      • PRIVACY REQUEST
      • ACCESSIBILITY

    Copyright ©2025. All Rights Reserved BNP Media.

    Design, CMS, Hosting & Web Development :: ePublishing

    Security Magazine logo
    search
    cart
    facebook twitter linkedin youtube
    • Sign In
    • Create Account
    • Sign Out
    • My Account
    Security Magazine logo
    • NEWS
      • Security Newswire
      • Technologies & Solutions
    • MANAGEMENT
      • Leadership Management
      • Enterprise Services
      • Security Education & Training
      • Logical Security
      • Security & Business Resilience
      • Profiles in Excellence
    • PHYSICAL
      • Access Management
      • Fire & Life Safety
      • Identity Management
      • Physical Security
      • Video Surveillance
      • Case Studies (Physical)
    • CYBER
      • Cybersecurity News
      • More
    • BLOG
    • COLUMNS
      • Cyber Tactics
      • Leadership & Management
      • Security Talk
      • Career Intelligence
      • Leader to Leader
      • Cybersecurity Education & Training
    • EXCLUSIVES
      • Annual Guarding Report
      • Most Influential People in Security
      • The Security Benchmark Report
      • The Security Leadership Issue
      • Top Guard and Security Officer Companies
      • Top Cybersecurity Leaders
      • Women in Security
    • SECTORS
      • Arenas / Stadiums / Leagues / Entertainment
      • Banking/Finance/Insurance
      • Construction, Real Estate, Property Management
      • Education: K-12
      • Education: University
      • Government: Federal, State and Local
      • Hospitality & Casinos
      • Hospitals & Medical Centers
      • Infrastructure:Electric,Gas & Water
      • Ports: Sea, Land, & Air
      • Retail/Restaurants/Convenience
      • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
    • EVENTS
      • Industry Events
      • Webinars
      • Solutions by Sector
      • Security 500 Conference
    • MEDIA
      • Videos
        • Cybersecurity & Geopolitical Discussion
        • Ask Me Anything (AMA) Series
      • Podcasts
      • Polls
      • Photo Galleries
    • MORE
      • Call for Entries
      • Classifieds & Job Listings
      • Continuing Education
      • Newsletter
      • Sponsor Insights
      • Store
      • White Papers
    • EMAG
      • eMagazine
      • This Month's Content
      • Advertise
    • SIGN UP!