Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Government in the Cards

By Bill Zalud
November 1, 2007


Government identity management programs took center stage at the Smart Card Alliance just weeks ago. Critical security initiatives have now entered the issuing phase and over the next year will put millions of smart card-based IDs in the hands of all maritime workers at the nation’s seaports and all federal employees. It’s the biggest boost to the smart card industry in the U.S.

And the Registered Traveler program is now speeding frequent flyers through 12 airports nationwide, although the takeoff of the program has been slow.

The Transportation Security Administration (TSA) and U.S. Coast Guard plan to issue secure Transportation Worker Identification Credentials (TWIC) to 750,000 maritime workers and merchant mariners at U.S. seaports took a big step forward this week.

“As of (now), real workers at the Port of Wilmington began the process of applying for the TWIC card,” John Schwartz, assistant director of the TWIC Program Office told attendees at the Alliance event.

The smart card-based TWICs are tamper-resistant biometric credentials containing the worker’s fingerprint template to allow for a positive link between the card itself and the individual. Embedded in the card is a dual interface microprocessor chip, a small computer chip that can be read by either inserting the card in a slot in a “contact” card reader or by holding the card within 10 centimeters of a “contactless” card reader.

“The TWIC program, like the U.S. electronic passport program, is an excellent example of using smart card technology in a way that provides high security and protects personal privacy at the same time,” Randy Vanderhoof, executive director of the Smart Card Alliance, told the Zalud Report.

Due to the harsh maritime environment, program managers wanted to use secure contactless technology for better reliability of cards and readers. At the same time, they wanted a high level of personal security. The solution was to encrypt the contactless transmission of the biometric template from the TWIC card to the reader.

GSA Shared Services and HSPD-12

As federal agencies come to grips with the reality of issuing PIV-II smart cards to comply with the looming HSPD-12 deadline, the shared services option developed by the General Services Administration has won a lot of recent converts -- 67 federal agencies representing 860,000 federal employees and contractors to be exact, according to Michael Butler, program manager for the project. GSA branded the program USAccess.

After making a contract award in April, the GSA began issuing cards in September. The program is on track to issue hundreds of thousands of cards in the coming year and meet the program’s deadlines, Butler said.

Pooling demand under a shared services contract benefited government agencies in terms of cost and investment, Butler reported. The GSA charges a $49 initial cost for PIV-II credentials, with an ongoing $3 per month infrastructure support cost.

“People are starting to get excited and ask what they can do with smart cards,” said Butler.

Registered Traveler Takes Off

Want to get through airport security lines in 10 minutes or less? That’s exactly what the smart card-based Registered Traveler expedited security lane access program delivers to America’s frequent flyers.

“The actual time is two or three minutes right now in most airports, because the program is still new and not that many people are in the lines,” said Bryan Ichikawa, solutions architect for Unisys, one of the system integrators providing Registered Traveler systems.

State plans to add RFID technology to driver’s licenses “create border security and personal privacy concerns for citizens,” said Neville Pattinson, vice president government affairs and standards for Gemalto North America and chair of the Alliance Identity Council. At issue is the fact that the RFID technology currently recommended by DHS for border crossing security “transmits an ID number 30 feet with no security basically, and it can be cloned easily, as we demonstrated on Capitol Hill recently. That’s why we’ve been positioning secure contactless smart card technology as a better alternative,” said Pattinson.

The Center for Democracy and Technology (CDT), a public interest, public policy not for profit organization focused on civil liberties and technology policies, has developed guidelines for privacy and security.

Sophia Cope, staff attorney and Ron Plesser Fellow for CDT, presented the organization’s recommended guidelines for privacy and security sensitive policies, then went on to explain how DHS proposals for REAL ID, WHTI PASS card and enhanced driver’s licenses violated them.

“Decentralization is more privacy friendly than centralization,” said Cope, pointing out that the DHS proposals rely on a centralized database. “Centralized identity systems can lead to commercial and government abuse.”

“Going back and slapping privacy and security on at the end will not be as effective as designing it in from the beginning,” said Cope. But, she noted that is exactly what DHS is doing by proposing long range EPC Global Gen 2 RFID tags for identity programs. “In the case of enhanced driver’s licenses, there has been no rule making at the federal level and no privacy impact analysis as required by federal mandates,” said Cope.

As to REAL ID, one concern is that the proposed security features “get so watered down it becomes a farce, because in the end it is not any more secure than it is today,” Cope said.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Government in the Cards

    See More
  • Multi-tasking – It’s in the Cards

    See More
  • Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

    Access Control is Only the Beginning for Multi-Function Cards

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing