Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Identification: Multi-tech ID for Mission Control

July 1, 2006
Steven Gelfound, director of information technology for NCMEC, is leading the charge to provide access with a smart card-based two-factor authentication.


The pressure from enterprises for better ways to identify people and allow them secure but convenient access to a diversity of services and networks has generated business-centric applications emphasizing multiple technologies and even “out-of-the-box” solutions. It some cases, the designs save time and money; in other cases, it can make money.

At Clemson University, for example, the Tiger 1 Card is the institution’s official ID card. In addition to being the student’s personal identification card, many departments use the Tiger 1 Card as a means to grant access to their information and services.

Clemson University’s Tiger 1 Card provides identification, physical and logical access as well as dining and university services.

ID and debit card

Tiger 1 Cards serve as debit cards to access funds deposited into “TigerStripe” accounts, enabling students to obtain university dining services, check out library books and access residential halls, campus recreation centers and athletic ticket privileges. From an instructor requiring to see a student’s Tiger 1 Card to take a test to needing it to purchase discounted software, the Tiger 1 Card is a necessity of every day campus life, according to Andy Bulkley, GE Security, engineered systems manager of hardware solutions.

Another organization is pioneering a thumbnail-sized “cardlet.”

While best known for helping to find missing children, the National Center for Missing & Exploited Children’s (NCMEC) mission includes helping prevent the sexual exploitation of children, and assisting victims, their families and the professionals who serve them. One important element of this mission is the CyberTipline -- a system used by law enforcement officials to track cases and evidence, investigate offenders and bring them to justice.

And smart card technology just joined NCMEC in this effort by providing strong, two-factor security to ensure that their ultra-sensitive and private information remains secure.

“Ten years ago our recovery rate for missing children was 62%. Last year it was more than 96%, and technology played a significant role in the increase,” said Steven Gelfound, director of information technology for NCMEC.

CyberTipline is a Congressionally mandated system used by NCMEC to handle leads from individuals reporting the sexual exploitation of children. CyberTipline, nationally available, assists all levels of law enforcement by providing enhanced information sharing and collaborative efforts to combat these crimes, tracking all cases and evidence.

Instead of a full sized plastic card, the NCMEC smart card is a thumbnail-sized “cardlet.” It contains a full microprocessor and Cyberflex Access software capability, but it is small enough to fit in a USB token.

IT driven solution

While access to CyberTipline was secured with a virtual private net (VPN) system from Cisco, individual access from authorized organizations was still password based, which created a problem. Despite NCMEC’s strong password policies, case officers tended to write them down, introducing risk. Also, since these law enforcement officials change assignments frequently and everyone is busy, it often becomes expedient just to pass along the login information. Finally, important parts of the password policy like regularly changing passwords were just unrealistic to enforce.

Said Gelfound, “We decided the best way to ensure security was to implement two-factor authentication.”

After extensive testing and enhancement of the system to meet ease of use and installation goals, NCMEC is rolling out a new two-factor online security solution. It replaces the username and password with Cyberflex Access smart card technology from Gemalto of Austin, Tex. But instead of a full sized plastic card, the smart card is a thumbnail-sized “cardlet.” It still contains the full microprocessor and Cyberflex Access software capability, but it is small enough to fit in a USB compatible reader token from Omnikey. The token is about the size of a small jump drive. Software in the smart card works with a single sign-on application from MetaPass to provide secure, strong authentication to NCMEC’s Web-based VPN and CyberTipline system.

Built-in security features like data encryption and login security updates are all automatic and invisible to the user.

For users, the system couldn’t be simpler to use. Login starts by inserting the Gemalto smart card token into a USB port and clicking on a single icon. The user enters a PIN code to authenticate him to the smart card, and then the smart card initiates the secure connection to the NCMEC system over the Internet, automatically signing in to both the VPN front end and the CyberTipline system.

Gelfound and his IT team are so impressed with the convenience and security of the new solution they decided to implement smart cards for internal system security too.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

    Access Control is Only the Beginning for Multi-Function Cards

    See More
  • Why Access Control and Identification is Healthy for Your Organization

    See More
  • Printing Tech for ID & Visitor Cards

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing