Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

ePassport, eSecurity, eehPrivacy

September 12, 2006


For identification technology, whether public or private, the goal has been verification of identity at the cost of some convenience. But what about privacy and real security?

Not so suddenly, enterprises and their chief security officers must balance increased security with concerns centering on privacy and hacker intrusions.

A case in point: Gemalto last month receives an order for the U.S. Electronic Passport when the United States Government Printing Office (GPO) placed its first order with the company, following Gemalto’s electronic passport technology qualification completion. The GPO and U.S. Department of State evaluated the solution at their testing facilities and confirmed it fully satisfies the agency’s requirements for privacy protection, security, durability, manufacturing yield, and transaction speed and communications performance. The GPO, on behalf of the U.S. Department of State, plans to incorporate the electronic capability in all new passports to be issued in 2007. The United States produced over ten million passports in 2005.

The electronic passport (e-passport) technology includes a secure operating system software running in a large capacity contactless microprocessor chip. The chip is embedded in a module that is highly resistant to damage and then is integrated into the passport booklet cover.

Chip Info

The computer chip in the passport will contain all the information that is now printed on the document’s data page including a digitized photograph of the passport owner. The text data and the photograph can be read with a contactless reader at a border entry point and the electronically provided data can be compared to the information printed in the passport at issuance.

Not to be confused with RFID, secure personal identification devices using contactless smart card technology have built-in and active security and encryption capabilities to protect information access and communications. More than 30 nations worldwide have already pledged to adopt passport technology that conforms to an international standard for electronic identification data.

Some have raised security concerns.

A recent security conference hosted by Black Hat suggests that biometric e-passports used in the UK and other countries can be hacked. The demonstration exposed a vulnerability that could potentially allow criminals to clone embedded code and enter countries illegally.

Luke Grunwald, a security consultant with DN-Systems in Germany, demonstrated how data stored in the passport could be transferred onto bank chips, which could be implanted in forged passports.

But according to Randy Vanderhoof, executive director of the Smart Card Alliance, “The smart card industry does not see a security threat for electronic passports when data can be copied because the data can’t be changed or altered. Even if someone could copy the information on your chip, it doesn’t achieve anything, because that information is locked. It can’t be changed. It’s of no use to anyone else because your picture is on the chip and they’re not you. It’s no different than someone trying to use a lost or stolen passport. The whole program is designed to eliminate the risks of anyone altering or using someone else’s passport credential, and it does.”

The objectives of this global program were to make passports virtually impossible to counterfeit and prevent anyone other than the passport owner from using it. The e-passport program achieves that in two ways:



  • First, the information on the printed page, including the bearer’s photograph, is stored on the chip and displayed on a screen at passport control. By comparing the digital information, the printed passport and the person, passport control can confirm everything is OK. They will immediately see a discrepancy if someone is attempting to use someone else’s chip information.
  • Second, the information on the chip is digitally signed by the issuing country’s passport authority. That information is locked and any changes would be detected at passport control. It also means any attempt to create false data and a fake passport credential would be detected. Unlike today’s paper passport, where a photo can potentially be replaced, the digital photo and other information on the e-passport chip cannot be changed.
  • Together these two capabilities mean that no one could use a lost or stolen passport, or even a copy of one, to illegally enter the country. This makes the new e-passports far more secure than today’s documents. Other features prevent anyone from reading U.S. e-passports without the holder handing it over and the cover opened. This protects people’s privacy.

    RFID Conflicts

    Beyond e-passports, there continues to be legislative fights over radio frequency identification systems.

    A number of proposals in California introduced by State Senator Joe Simitian, has grabbed the attention of the security industry. In a letter to the Senator recently, the executive director of the Security Industry Association, Richard Chace, said, that the Security Industry Association (SIA) respectfully expresses its opposition to Senate Bill 768, the Identity Information Protection Act of 2005, and related legislation (Senate Bills 432, 682, and 1078) that could severely impede the use of Radio Frequency Identification (RFID) technology. SIA is an international trade association and leading voice for more than 340 manufacturers, distributors, and integrators of electronic and physical security equipment.

    “SIA and its members agree there may be some legitimate concerns about the use of RFID technology in certain applications. However, we strongly believe these legislative proposals could have dire unintended consequences on technology used to ensure the validity of identification credentials. The legislation could set several dangerous precedents: The legislation seems to assume that technology innovation is static; in reality, problems are addressed quickly through the rapid technological evolution for which our industry is known. SIA is concerned that your legislation could lock in a set of criteria that will be obsolete and actually less safe than what technology could make available tomorrow.

    “In our opinion, the aforementioned Senate bills give the appearance of favoring particular technologies by banning or restricting the use of RFID to very specific applications. This is neither a customary nor advisable purpose of legislative activity.”

    Share This Story

    Looking for a reprint of this article?
    From high-res PDFs to custom plaques, order your copy today!

    Recommended Content

    JOIN TODAY
    To unlock your recommendations.

    Already have an account? Sign In

    • Iintegration and use of emerging tools

      Future Proof Your Security Career with AI Skills

      AI’s evolution demands security leaders master...
      Columns
      By: Jerry J. Brennan and Joanne R. Pollock
    • The 2025 Security Benchmark Report

      The 2025 Security Benchmark Report

      The 2025 Security Benchmark Report surveys enterprise...
      The Security Benchmark Report
      By: Rachelle Blair-Frasier
    • The Most Influential People in Security 2025

      Security’s Most Influential People in Security 2025

      Security Magazine’s 2025 Most Influential People in...
      Most Influential People in Security
      By: Security Staff
    Manage My Account
    • Security eNewsletter & Other eNews Alerts
    • eMagazine Subscriptions
    • Manage My Preferences
    • Online Registration
    • Mobile App
    • Subscription Customer Service

    More Videos

    Sponsored Content

    Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

    close
    • critical event management
      Sponsored byEverbridge

      Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

    • Charlotte Star Room
      Sponsored byAMAROK

      In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

    • Sureview screen
      Sponsored bySureView Systems

      The Evolution of Automation in the Command Center

    Popular Stories

    The Lourve

    The Lourve Heist: What Was the State of the Museum’s Security?

    Office supplies

    Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

    American Airlines

    Security Leaders Discuss Cyberattack on American Airlines Subsidiary

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    Going Down with the Ship

    Going Down with the Ship

    Top Cybersecurity Leaders

    Events

    September 18, 2025

    Security Under Fire: Insights on Active Shooter Preparedness and Recovery

    ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

    November 13, 2025

    Inside the 2025 Security Benchmark Report

    The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

    View All Submit An Event

    Products

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    See More Products

    Related Articles

    • epassports rolled out in Bangladesh

      Bangladesh rolls out ePassport infrastructure

      See More
    • The Cyber 101 Discussion

      A new crystal ball: A view of the trends that will shape 2021

      See More
    • Rail worker

      The new normal has created more lone workers than ever – They need to be protected

      See More
    ×

    Sign-up to receive top management & result-driven techniques in the industry.

    Join over 20,000+ industry leaders who receive our premium content.

    SIGN UP TODAY!
    • RESOURCES
      • Advertise
      • Contact Us
      • Store
      • Want More
    • SIGN UP TODAY
      • Create Account
      • eMagazine
      • eNewsletter
      • Customer Service
      • Manage Preferences
    • SERVICES
      • Marketing Services
      • Reprints
      • Market Research
      • List Rental
      • Survey/Respondent Access
    • STAY CONNECTED
      • LinkedIn
      • Facebook
      • YouTube
      • X (Twitter)
    • PRIVACY
      • PRIVACY POLICY
      • TERMS & CONDITIONS
      • DO NOT SELL MY PERSONAL INFORMATION
      • PRIVACY REQUEST
      • ACCESSIBILITY

    Copyright ©2025. All Rights Reserved BNP Media.

    Design, CMS, Hosting & Web Development :: ePublishing