Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

ePassport, eSecurity, eehPrivacy

September 12, 2006


For identification technology, whether public or private, the goal has been verification of identity at the cost of some convenience. But what about privacy and real security?

Not so suddenly, enterprises and their chief security officers must balance increased security with concerns centering on privacy and hacker intrusions.

A case in point: Gemalto last month receives an order for the U.S. Electronic Passport when the United States Government Printing Office (GPO) placed its first order with the company, following Gemalto’s electronic passport technology qualification completion. The GPO and U.S. Department of State evaluated the solution at their testing facilities and confirmed it fully satisfies the agency’s requirements for privacy protection, security, durability, manufacturing yield, and transaction speed and communications performance. The GPO, on behalf of the U.S. Department of State, plans to incorporate the electronic capability in all new passports to be issued in 2007. The United States produced over ten million passports in 2005.

The electronic passport (e-passport) technology includes a secure operating system software running in a large capacity contactless microprocessor chip. The chip is embedded in a module that is highly resistant to damage and then is integrated into the passport booklet cover.

Chip Info

The computer chip in the passport will contain all the information that is now printed on the document’s data page including a digitized photograph of the passport owner. The text data and the photograph can be read with a contactless reader at a border entry point and the electronically provided data can be compared to the information printed in the passport at issuance.

Not to be confused with RFID, secure personal identification devices using contactless smart card technology have built-in and active security and encryption capabilities to protect information access and communications. More than 30 nations worldwide have already pledged to adopt passport technology that conforms to an international standard for electronic identification data.

Some have raised security concerns.

A recent security conference hosted by Black Hat suggests that biometric e-passports used in the UK and other countries can be hacked. The demonstration exposed a vulnerability that could potentially allow criminals to clone embedded code and enter countries illegally.

Luke Grunwald, a security consultant with DN-Systems in Germany, demonstrated how data stored in the passport could be transferred onto bank chips, which could be implanted in forged passports.

But according to Randy Vanderhoof, executive director of the Smart Card Alliance, “The smart card industry does not see a security threat for electronic passports when data can be copied because the data can’t be changed or altered. Even if someone could copy the information on your chip, it doesn’t achieve anything, because that information is locked. It can’t be changed. It’s of no use to anyone else because your picture is on the chip and they’re not you. It’s no different than someone trying to use a lost or stolen passport. The whole program is designed to eliminate the risks of anyone altering or using someone else’s passport credential, and it does.”

The objectives of this global program were to make passports virtually impossible to counterfeit and prevent anyone other than the passport owner from using it. The e-passport program achieves that in two ways:



  • First, the information on the printed page, including the bearer’s photograph, is stored on the chip and displayed on a screen at passport control. By comparing the digital information, the printed passport and the person, passport control can confirm everything is OK. They will immediately see a discrepancy if someone is attempting to use someone else’s chip information.
  • Second, the information on the chip is digitally signed by the issuing country’s passport authority. That information is locked and any changes would be detected at passport control. It also means any attempt to create false data and a fake passport credential would be detected. Unlike today’s paper passport, where a photo can potentially be replaced, the digital photo and other information on the e-passport chip cannot be changed.
  • Together these two capabilities mean that no one could use a lost or stolen passport, or even a copy of one, to illegally enter the country. This makes the new e-passports far more secure than today’s documents. Other features prevent anyone from reading U.S. e-passports without the holder handing it over and the cover opened. This protects people’s privacy.

    RFID Conflicts

    Beyond e-passports, there continues to be legislative fights over radio frequency identification systems.

    A number of proposals in California introduced by State Senator Joe Simitian, has grabbed the attention of the security industry. In a letter to the Senator recently, the executive director of the Security Industry Association, Richard Chace, said, that the Security Industry Association (SIA) respectfully expresses its opposition to Senate Bill 768, the Identity Information Protection Act of 2005, and related legislation (Senate Bills 432, 682, and 1078) that could severely impede the use of Radio Frequency Identification (RFID) technology. SIA is an international trade association and leading voice for more than 340 manufacturers, distributors, and integrators of electronic and physical security equipment.

    “SIA and its members agree there may be some legitimate concerns about the use of RFID technology in certain applications. However, we strongly believe these legislative proposals could have dire unintended consequences on technology used to ensure the validity of identification credentials. The legislation could set several dangerous precedents: The legislation seems to assume that technology innovation is static; in reality, problems are addressed quickly through the rapid technological evolution for which our industry is known. SIA is concerned that your legislation could lock in a set of criteria that will be obsolete and actually less safe than what technology could make available tomorrow.

    “In our opinion, the aforementioned Senate bills give the appearance of favoring particular technologies by banning or restricting the use of RFID to very specific applications. This is neither a customary nor advisable purpose of legislative activity.”

    Share This Story

    Looking for a reprint of this article?
    From high-res PDFs to custom plaques, order your copy today!

    Recommended Content

    JOIN TODAY
    To unlock your recommendations.

    Already have an account? Sign In

    • Cyber tech background

      Security’s Top Cybersecurity Leaders 2026

      Security magazine’s Top Cybersecurity Leaders 2026 award...
      Security Leadership and Management
    • Iintegration and use of emerging tools

      Future Proof Your Security Career with AI Skills

      AI’s evolution demands security leaders master...
      Career Intelligence
      By: Jerry J. Brennan and Joanne R. Pollock
    • The 2025 Security Benchmark Report

      The 2025 Security Benchmark Report

      The 2025 Security Benchmark Report surveys enterprise...
      The Security Benchmark Report
      By: Rachelle Blair-Frasier
    Manage My Account
    • Security Newsletter
    • eMagazine Subscriptions
    • Manage My Preferences
    • Online Registration
    • Mobile App
    • Subscription Customer Service

    More Videos

    Sponsored Content

    Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

    close
    • critical event management
      Sponsored byEverbridge

      Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

    Popular Stories

    Pixelated brain

    Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

    Red block among white blocks

    Plenty of Associations, But Not Enough Association

    Person on iPhone

    The Olympics Are Going Mobile — Your Security Strategy Has to Follow

    Phone showing hearts and flirty emojis

    Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

    Red and blue pawns with thought bubbles

    Implementing Meaningful De-Escalation Training in Your Security Program

    SEC 2026 Benchmark Banner

    Events

    April 8, 2026

    The Future of Executive Protection: Layering Technology, Intelligence, and Response

    Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

    April 15, 2026

    How AI is Closing the Decision Gap in Leading GSOCs

    Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

    View All Submit An Event

    Products

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

    See More Products
    SEC 2026 Top Cybersecurity Leaders

    Related Articles

    • epassports rolled out in Bangladesh

      Bangladesh rolls out ePassport infrastructure

      See More
    • The Cyber 101 Discussion

      A new crystal ball: A view of the trends that will shape 2021

      See More
    • Rail worker

      The new normal has created more lone workers than ever – They need to be protected

      See More
    ×

    Sign-up to receive top management & result-driven techniques in the industry.

    Join over 20,000+ industry leaders who receive our premium content.

    SIGN UP TODAY!
    • RESOURCES
      • Advertise
      • Contact Us
      • Store
      • Want More
    • SIGN UP TODAY
      • Create Account
      • eMagazine
      • Newsletter
      • Customer Service
      • Manage Preferences
    • SERVICES
      • Marketing Services
      • Reprints
      • Market Research
      • List Rental
      • Survey/Respondent Access
    • STAY CONNECTED
      • LinkedIn
      • Facebook
      • YouTube
      • X (Twitter)
    • PRIVACY
      • PRIVACY POLICY
      • TERMS & CONDITIONS
      • DO NOT SELL MY PERSONAL INFORMATION
      • PRIVACY REQUEST
      • ACCESSIBILITY

    Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

    Design, CMS, Hosting & Web Development :: ePublishing