Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Politics of Deadlines

By Clarissa Jacobson
November 21, 2006
The HSPD-12 is now in their court. “Not knowing what actually is required makes it difficult to develop products,” points out Larry Midland of Hirsch.


A telephone survey by Security Magazine of chief security officers at enterprise-level companies discovered confusion and lack of knowledge or the Homeland Security Presidential Directive 12 (HSPD-12). A New York City CSO, working for a major financial firm, told Security Magazine's researcher, "I still don't see agreement on much of the plan." The goal of the mandate is to enhance security and increase government efficiency by reducing identity fraud.

Ambitious and difficult, compliance is no easy feat. Unlike other types of security technology introduced to government chief security officers and their business brothers and sisters, this time security manufacturers will have to start the ball rolling.

HSPD-12 spells out big money for the companies that supply the services and products that organizations and their security executives will be forced to implement, but a final deadline may be unrealistic. Is it possible? Is the technology there? What is expected and needed to make it a reality? Four top industry experts were asked these questions to get their opinions on the impact HSPD-12 is having on the industry and how they’re responding.

Says Keith Wilson of Smartnet, “I think the embedded culture and resistance to change which is encountered in many agencies is the most significant hurdle which needs to be overcome for successful implementation.”

IDENTIFICATION AUTHENTICATION

The first issue facing the successful implementation of HSPD-12 is the determination of the criteria necessary to authenticate an employee’s identity. The Federal Information Processing Standards publication (FIPS 201-1) lays out a thorough process for applicant verification. Traditional methods of identity validation include a Driver’s License, a passport, Social Security card, and a birth certificate. However, with the HSPD-12 directive, the process becomes much more difficult. The smart card (an ID card implanted with computer chips or radio frequency identification “RFID”) must carry two fingerprints, a photo, personal data and a Public Key Infrastructure (PKI) certificate.

Larry Midland, president and CEO of Hirsch Electronics, explains the hurdle that organizations are now facing, and said “the concept of “verifying identity” now means that a government employee or contractor, must go through a formal process of collecting personal identifying data, followed by a background check prior to being issued a credential.” FIPS 201-1 is broken down into two processes: Personal Identity Verification (PIV) I and II. Keith Wilson at IT firm Smartnet points out that PIV II requires fingerprints and facial biometrics to be captured during the identity proofing and registration and re-verified during the issue of the card.

Midland believes that once the federal, state and local governments accept the approach, then it will become more of a standard. Midland says, “Corporate IT departments are already using PKI to enable a single card to gain access to the computer network as well as doors in buildings throughout the enterprise.”

The standards outlined by FIPS 201-1 are only useful if the cards themselves are designed to prevent fraud and tampering. Erik Larsen of Lenel Systems International lists visual safeguards, such as micro printing, guilloche printing (spirograph-like curves) and holograms as some of the techniques currently used.

Kirk Brafford at government-centric MAXIMUS feels that the best fraud and tampering safeguard is the verification of the PIV through reading the contact integrated circuit chip on the card. This requires a computer-based program, middleware, a card reader and the cardholder’s PIN entered by the person using the card. In addition to incorporating these security features, PIV II further requires that all smart cards work in conjunction with biometrics.

Accreditation is just beginning. All suppliers have to go through an accreditation process before the awarding of contracts. Larsen says it does not matter who does it, whether it’s the National Institute of Standards & Technology (NIST) or the General Services Administration (GSA), but the process is firmly defined and that manufacturers and suppliers must submit for accreditation. Brafford goes further to say that it should be mandatory that a laboratory run by an accredited government testing organization that test and certify suppliers’ hardware be FIPS 201-1 certified.

Compliance with the standards set up by FIPS 201 is step one in being accredited. The GSA has established an Approved Product List and testing procedures to confirm compliance with the significant aspects of the NIST standards. A consumer will be able to check the GSA website to see if products and services are listed as having passed compliance requirements. Wilson adds that the Federal Acquisitions (FAR) and Defense Federal Acquisition Regulations (DFAR) clauses govern the awarding of contracts and once the product(s) is certified, then normal competition for contracts will occur.

IMPLEMENTATION DIFFICULTIES

Additional difficulties exist in the implementation of HSPD-12. According to Midland, one of the main challenges is that there have been so many specifications published that the target is always moving. “Not knowing what actually is required makes it difficult to develop products.” He also states that government customers previously put projects on hold until they were assured of compliance, which adversely affected a number of companies.

Wilson said it comes down to budget. “Most agencies mandated by OMB [Office of Management and Budget] don’t have the budgets to implement these systems and no money is planned.” Furthermore, many government agencies are waiting for an OMB decision on the centralized PIV Card issuance plan and the related costs for using this Shared Issuance Provider (SIP). Brafford explains, “This delay of an SIP plan or the approval for federal agencies to go forward on their own has slowed the process for many hardware vendors to commit resources for an unknown business case model.”

For Larsen, the problem comes down to having several pieces from different vendors working together. “There are a lot of companies offering one piece of the solution and leaving the integration up to the integrator or the end-user.” Larsen sees value in a complete solution. It should also meet the requirements of NIST, FIPS 201 and, according to Larsen, “address the real world struggles of getting a new PIV credential to an applicant using a secure process.”

SO, IS IT POSSIBLE?

Though the road to HSPD-12 compliance is rocky, everyone interviewed agreed that the technology exists today to execute the directive. However, interfaces between components still need development as well as finalization of specifications. Wilson cites the example of PIV II fingerprint requirements; it was not confirmed until a month or so ago. That leaves little time for manufacturers to finalize design and integrate the solution prior to the HSPD-12 mandate.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Clarissa Jacobson is with Peter A. Sokoloff & Co., an investment-banking firm that specializes in mergers and acquisitions of companies in the security industry. Visit them at www.sokoloffco.com. Email the author at cjacobson@sokoloffco.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Gone Are the Days of the Specialist?

    See More
  • cybersecurity-laptop

    Breaking down the politics of gender and nationality on cybercriminal forums

    See More
  • Tax documents and coffee mug

    Phishing tax scams increase as tax deadlines approach

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Database Hacker's Handboo

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing