DHS Privacy Office Bashes RFID Technology To Track People - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


DHS Privacy Office Bashes RFID Technology To Track People

The privacy office says the technology offers little performance benefit for identification purposes when compared with other methods.

The Department of Homeland Security's Privacy Office has issued a draft report that strongly criticizes privacy and security risks of using radio frequency identification devices for human identification. Public comment on the paper is being taken until May 22.

The privacy office says the technology offers little performance benefit for identification purposes compared with other methods and could turn the government's identification system into a surveillance system.

Several government agencies, including the Department of Defense, have had success in managing inventory, tracking blankets, food, and other essentials through the supply chain. RFID tags communicate information by radio waves through antennae on small computer chips attached to objects. A reader identifies the number on the tag, which in turn categories the object.

Now, the DHS wants to deploy RFID to identify and track individuals to cross international borders, for example, saying the technology offers better encryption and forgery controls. But tampering with identification documents isn't unique to RFID. It's one of many digital technologies, including contact chips, bar codes, magnetic stripes and watermarked printing that could curtail forgery.

At the border in the US-VISIT program, at airports in the ePassport program, Computer Assisted Passenger Prescreening System (CAPPS II) program, and at entrances to secure government facilities, checking identification cards is routine. There's a misconception that RFID improves speed of identification, the reports states. "If RFID is tied to a biometric authentication factor, it can reliably identify human beings; but tying RFID to a biometric authentication negates the speed benefit."

The privacy subcommittee believes the "small incremental benefits" RFID offers encompass "a larger number of privacy concerns." The government agency's concerns lie in the ability to collect, save, store, and process information. And, "the silent, unnoticeable operation of radio waves means individuals will always have difficulty knowing when they are being identified and what information is being communicated, leaving them vulnerable to increased security risks such as skimming and eavesdropping."

Slamming the DHS's request to track individuals, the committee said RFID would deprive individuals the ability to control when they are identified and the information gathered. And, the report said, "RFID technology exposes security weaknesses that non-radio-frequency-based processes do not share."

The committee recommends if the DHS chooses to deploy RFID technology to track individuals, people should have the option to turn off signals associated with tracking their presence or activities. To mitigate eavesdropping and skimming, the DHS should ensure only authorized readers can receive signals from DHS-authorized RFID tags.

Other recommendations include keeping the tag data encrypted at all times, and keep the database unconnected from the Internet. The DHS should also limit use, and design the RFID chip so no two communication sessions appear alike.

The committee will review the report at the June 7 public Advisory Committee meeting in San Francisco.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
IT Careers: 10 Industries with Job Openings Right Now
Cynthia Harvey, Freelance Journalist, InformationWeek,  5/27/2020
How 5G Rollout May Benefit Businesses More than Consumers
Joao-Pierre S. Ruth, Senior Writer,  5/21/2020
IT Leadership in Education: Getting Online School Right
Jessica Davis, Senior Editor, Enterprise Apps,  5/20/2020
Register for InformationWeek Newsletters
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll