REAL ID an International ID
Sovereignty - Complete independence and self-government.
Free Enterprise - an economic and political doctrine holding that a capitalist economy can regulate itself in a freely competitive market through the relationship of supply and demand with a minimum of governmental intervention and regulation.
EPC RFID Tags in Security Applications - Passport Cards, Enhanced Drivers Licenses, and Beyond
In this paper, we explore the systemic risks and challenges created by increasingly common use of EPC (Electronic Product Code) for security applications. As a central case study, we examine the recently issued United States Passport Card and Washington State "enhanced" drivers license (WA EDL), both of which incorporate Gen-2 EPC tags. We explore several issues:
1. Cloning: We report on the data format of Passport Cards and WA EDLs and demonstrate their apparent susceptibility to straightforward cloning into off the shelf EPC tags. We show that a key anti-cloning feature proposed by the U.S. Department of Homeland Security (the tag-unique TID) remains undeployed in these cards.
2. Read ranges: We detail experiments on the read-range of Passport Cards and WA EDLs across a variety of physical configurations. These read ranges help characterize both issues regarding owner privacy and vulnerability to clandestine "skimming" and cloning.
3. Design drift: We find that unlike Passport Cards, WA EDLs are vulnerable to scanning while placed in protective sleeves, and also to denial-of-service attacks and covert-channel attacks.
As written, I therefore believe that both REAL ID and PASS ID would constitute a national ID card program unless the process is done via a rulemaking process that is fully negotiated and would require Congressional approval for any changes to the program that would take place after the initial rulemaking process. Such issues as advanced biometrics, the use of RFID, and international data sharing are simply too important to be left in the hands of future unelected or non-governmental agents. If not repealed, any replacement for REAL ID must contain extensive and detailed provisions regarding what DHS can not do in the future or it will simply be a blank check.
LAS VEGAS — It’s one of the most hostile hacker environments in the country –- the DefCon hacker conference held every summer in Las Vegas.
But despite the fact that attendees know they should take precautions to protect their data, federal agents at the conference got a scare on Friday when they were told they might have been caught in the sights of an RFID reader.
The reader, connected to a web camera, sniffed data from RFID-enabled ID cards and other documents carried by attendees in pockets and backpacks as they passed a table where the equipment was stationed in full view.
It was part of a security-awareness project set up by a group of security researchers and consultants to highlight privacy issues around RFID. When the reader caught an RFID chip in its sights — embedded in a company or government agency access card, for example — it grabbed data from the card, and the camera snapped the card holder’s picture.
This year they planned to add data collected from the RFID reader and camera (below) — to raise awareness about a privacy threat that’s becoming increasingly prevalent as RFID chips are embedded into credit cards, employee access cards, state driver’s licenses, passports and other documents.
You have probably heard of Radio Frequency Identification (RFID) technology in many different contexts. RFID describes a broad range of technologies that allow the identification and tracking of physical items using radio waves, and have far-reaching implications for processes as wide-ranging as factories, hospitals, airports, battlefields and retail sales.
The integration of RFID technology with other information technology makes a paradigm shift now possible. RFID technology can track patient safety by error-proofing processes for medication, as well as providing global visibility of worldwide shipments, which will improve the flow of commerce and the security of nations. The future role of RFID will dramatically increase its impact over that of its predecessors.
The potential of RFID is indeed great. The supply chain management industry refers to the “three V’s of RFID”: visibility, velocity, and value. RFID promises to increase visibility to make earlier and better decisions and actions possible. Second, RFID will enable the flow of goods and information to be accelerated, with a higher certainty of information for decision making. Finally, RFID will enable important enhancement of value, often in new ways. As described by Professor Wyld, RFID offers the potential to provide increased safety for patients, faster movement of automobiles from manufacturer to dealer, and greater national security.
A Surveillance Society or a Free Society - By Mark Lerner, for the Constitutional Alliance, Inc.
The Big Question - should government control the people or should the people control government?
Orwell’s prediction of a future big brother government came true. Whether acknowledged or not, Americans now live in a surveillance society.
Most of that American public falls into one of the categories the Department of Homeland Security (DHS) calls “potential threats;” environmentalists, animal lovers, anti-war protestors, pro-lifers, evangelical Christians, observant Jews, Constitutionalists, returning veterans, and third party candidate supporters are all “potential domestic terrorists.”
Just how far is the American public willing to let the government go in order to assure public safety? Do the people want the police on every block, all emails read by the government, phone calls overheard, or every financial transaction monitored? Do the people want sensors placed in cities that detect how much an individual perspires, in order to assess and monitor supposed guilt?
How about computer software programs that decide whether or not the way people walk or dress presents a threat to the government? In Britain citizens are captured on surveillance cameras an average of 300 times a day; does the American public want to be subjected to this level of scrutiny?
FBI Investigates $9 Million ATM Scam - Reported by John Deutzman; MYFOXNY.
A Fox 5 investigation exposes a worldwide ATM scam that swindled $9 million and possibly jeopardized sensitive information from people around the world. Law enforcement sources told Fox 5 it's one of the most frightening well-coordinated heists they've ever seen. (Watch video report)
What Is the Fusion Process?
“The concept of fusion has emerged as the fundamental process to facilitate the sharing of homeland security-related and crime-related information and intelligence. For purposes of this initiative, fusion refers to the overarching process of managing the flow of information and intelligence across levels and sectors of government. It goes beyond establishing an intelligence center or creating a computer network. The fusion process supports the implementation of risk-based, information-driven prevention, response, and consequence management programs. At the same time, it supports efforts to address immediate and/or emerging threat-related circumstances and events. Data fusion blends data from different sources, including law enforcement, public safety, and the private sector, resulting in meaningful and actionable intelligence and information. The fusion process also allows for relentless reevaluation of existing data in context with new data in order to provide constant updates. The fusion process turns information and intelligence into actionable knowledge.” Page 2; Version 1.0 - Version Date:
Know where your kids are? Check Google Maps - By Michael Liedtke; Associated Press
“The new software to be released Wednesday will enable people with mobile phones and other wireless devices to automatically share their whereabouts with family and friends…..
"This adds a social flavor to Google maps and makes it more fun," said Steve Lee, a Google product manager…..
It could also raise privacy concerns, but Google is doing its best to avoid a backlash by requiring each user to manually turn on the tracking software and making it easy to turn off or limit access to the service……
Google also is promising not to retain any information about its users' movements. Only the last location picked up by the tracking service will be stored on Google's computers, Lee said…..
There are no current plans to sell any advertising alongside Google's tracking service; although analysts believe knowing a person's location eventually will unleash new marketing opportunities. Google has been investing heavily in the mobile market during the past two years in an attempt to make its services more useful to people when they're away from their office or home computers…..”- By Michael Liedtke
RFID Chips easily compromised -Video; DeepSec 2007: Melanie Rieback - The RFID Guardian
REAL ID: Connecting the Dots to an International ID - By Pennsylvania Representative Sam E. Rohrer
August 24, 2008 - NewsWithViews.com
"History offers many examples of societies which have sought to increase security by sacrificing freedom. America itself provides many pertinent instances. However, our founding fathers have not left us without wisdom on this issue. Ben Franklin has famously stated, "People willing to trade freedom for temporary security deserve neither and will lose both."
REAL ID undoubtedly exemplifies a scenario in which a difficult tension exists between freedom and security. By commandeering every state's driver's license issuing process, REAL ID threatens the results warned by Franklin - loss of both freedom and security. It has become the biometric enrollment phase of a plan to implement a terribly invasive tracking system, largely without public knowledge or approval.
REAL ID is merely the current face of a far larger, international government and private economic effort to collect, store, and distribute the sensitive biometric data of citizens to use for the twin purposes of government tracking and economic control.
At issue are much more than standardized or non-duplicative driver's licenses. This effort extends worldwide, threatening every person alive today. Although very legitimate security concerns exist in this age of terrorism, this Act extends far beyond terrorism prevention or protection of the innocent. Keeping that broad picture in mind, let us move to some background behind the face of REAL ID implementation in America."......
"The priority mission of U.S. Customs and Border Protection (CBP) is to prevent terrorists and terrorists' weapons from entering the country while facilitating legitimate travel and trade.
BCI will maintain border crossing information on travelers who are admitted or paroled into the United States, this information includes: Certain biographical information; a photograph (if available); certain itinerary information provided by air and sea carriers and any other forms of passenger transportation, including rail, which is or may subsequently be mandated, or is or may be provided on a voluntary basis; and the time and location of the border crossing.
Previously, maintenance of this information was covered by the Treasury Enforcement Communications System (TECS) ``system of records notice.'' See 66 FR 52984, dated October 18, 2001. As part of DHS's ongoing effort to increase transparency regarding the collection of information at the Department, as well as its efforts to specifically review the personally identifiable information maintained on the TECS information technology platform, DHS and CBP have identified different data sets that call for individual notices so as to provide appropriate routine uses, retention, and exemptions to the Privacy Act."
"At the time of arrival at the border, the travel document, either through a CBP Radio Frequency Identification (RFID) Reader reading a unique RFID number from the RFID chip contained in the travel document, or through the CBP Machine Reader reading the MRZ of the travel document, will be used to retrieve the biographical data and photograph associated with the travel document from NEDS and populate a record in BCI, following admission/parole, to permit CBP to electronically verify identity and citizenship, to perform law enforcement queries to identify security risks to the United States and to expedite CBP processing upon arrival in and prior to departure from the United States.
Upon admission/parole of the individual by CBP at the United States border or its functional equivalent, a record of the crossing will be created in BCI.
Prior to mission/parole and during the process of inspecting the individual, information relating to identity and citizenship is compiled by the CBP in TECS, as part of the screening process to determine admissibility. For records where traveler-specific information is accessed from a non-federal authority's travel document database at the time of the traveler's crossing, the biographical data and photograph will be first collected from the traveler by the issuing authority of the respective travel document and the issuing authority will maintain its own travel document database; the data from such issuing authorities will not reside in NEDS.
At the time of arrival at the border, the travel document, either through a CBP RFID Reader reading the RFID number from the RFID chip contained in the travel document, or through the CBP Machine Reader reading the MRZ of the travel document, will be used to access that traveler's biographic data and photograph, displaying it in TECS; upon admission to the United States, that data will be recorded in BCI.
CBP also uses this information to perform law enforcement queries to identify security risks to the United States and to expedite CBP border processing. For records where the information is provided by another component of DHS or another federal government authority, such as the State Department's Visa and Passport database or USCIS Permanent Resident Card data, the information will be transferred from the federal authority's or DHS's system of records, displayed in TECS, and then used to create a record in BCI at the time of admission or parole into the United States."
Vision 2015 – A Globally Networked and Integrated Intelligence Enterprise (10MB)
Integrate foreign, military, and domestic intelligence capabilities through policy, personnel and technology actions to provide decision advantage to policy makers, warfighters and homeland security officials and law enforcement personnel.- J.M. McConnell - Director of National Intelligence
We live in a dynamic world in which the pace, scope, and complexity of change are increasing. The continued march of
globalization, the growing number of independent actors, and advancing technology have increased global connectivity, interdependence and complexity, creating greater uncertainties, systemic risk and a less predictable future. These changes have led to reduced warning times and compressed decision cycles. Although this interconnected world offers many opportunities for technological innovation and economic growth, it also presents unique challenges and threats. In this environment, the key to achieving lasting strategic advantage is the ability to rapidly and accurately anticipate and adapt to complex challenges.
Not only will the type of customer change within our existing federal policy-making sets, but the range of customers will broaden to emphasize other federal departments (e.g., Health and Human Services, Agriculture, Commerce), state and local agencies, international organizations, and private sector and non-governmental organizations.
Global Tracking System - Amanda Teegarden; Freedom21 PowerPoint
Global Information Infrastructure for the Global Supply Chain
A Presentation of OK-SAFE, Inc. 2008 In Collaboration with V.L. Davis & D. Niwa, Researchers
The Department of Homeland Security (DHS) invites interested persons to participate in this rulemaking by submitting written comments or data, and has requested comments on specific portions of this rulemaking as described in section VI below. We also invite comments relating to the economic, environmental, energy, or federalism impacts that might result from this rulemaking action.
REAL ID Drivers License Agreement DLA
Uniformity among all member jurisdictions concerning the exchange of information on driver licenses, identification cards, records, convictions, withdrawals and other data related to the driver licensing process;
REAL ID Memo DLA Implementation Funding 6-15-06
Throughout the DLA development process, we often heard from jurisdictional reps that a significant barrier to DLA involvement would be the costs. These NHTSA grants may be the means to overcome that barrier. By being actively involved in your State's strategic traffic safety planning process and ensuring DLA inclusion, your state will be positioned to apply for a NHTSA grant project that includes DLA implementation. Further information on this strategic planning effort can be obtained through your Regional/State NHTSA representative or possibly by contacting your jurisdiction’s lead agency for federal transportation grants.
REAL ID Biometric Fact Sheet Proposed Legislation Final Rules
Biometrics relies on computers to automatically identify individuals based on unique physical characteristics. Many nations, states, municipalities, organizations, schools and businesses are already using biometrics, like facial recognition, digital fingerprinting and iris recognition. The result is a slow methodical global enrollment process, filling databases with personal-biometric information.
Robert Mocny (Department of Homeland Security, US-Visit) stated that “information sharing is appropriate around the world,” and DHS plans to create a “Global Security Envelope of internationally shared biometric data that would permanently link individuals with biometric ID, personal information held by governments and corporations.”
REAL ID Your Body is Your ID 7-13-08
U.S. citizens are being identified and enrolled in this system without their knowledge, through DL/ID cards and passports. A global biometric system relies on common standards designed by two international organizations, over which U.S. citizens have no control, the American Association of Motor Vehicle Administrators (AAMVA) and the International Civil Aviation Organization (ICAO), part of the United Nations (UN). AAMVA sets biometric DL/ID card standards and provides the information-sharing network, AAMVA net, which will include Mexico, Canada and other nations under the REAL ID ACT of 2005 (a federal DL/ID law that imposes these international standards on state ID). ICAO sets facial recognition photo and international biometric “e-Passport” standards (enrollment is 50 million/year).
“The methodology Governor Rendell allowed to be employed is illegal on several accounts. Constitutional law provides the right for every citizens to be secure in their persons. Furthermore, statutory law would require a specific exemption to the prohibition against taking personal information like a faceprint. This exemption has been granted in specific criminal cases for the purpose of keeping a record of the physical characteristics (i.e. DNA or fingerprints) of criminals should they again run afoul of the law. However, neither PennDOT nor Viisage has inherent authority nor have they granted any exception
to take biometric information from the citizens of the Commonwealth. This is particularly egregious since it is being done without informed consent. In fact, when asked how “constitutional issues related to privacy [have] been addressed,” Governor Rendell’s Secretary of Transportation responded by saying, “PennDOT has determined that the use of this tool is not a constitutional violation. Obtaining a driver’s license is a privilege. The state is entitled to condition the grant of that privilege on the individual’s consent to have [sic] their picture taken and used as necessary to protect security and for
other legitimate government functions. It is PennDOT’s responsibility to take steps to ensure the integrity of the process, and facial recognition software is one tool we use to do that” (Feb. 15 letter from PennDOT). The actions allowed by Governor Rendell further violate statutory law. PennDOT, as an agency created by the legislature of Pennsylvania, has only those powers given it by the legislature.”
PennDot Viisage Timeline
The Arizona state legislature has made it quite clear that it wants nothing to do with the federal Real ID drivers' license plan. Lawmakers on Wednesday sent a bill to the governor prohibiting the state from implementing the proposed national ID card program. The legislation had sailed through the state House on a 51-1 vote after clearing the state Senate last month by a 21-7 vote.
The United States, Canada, and Mexico are making progress to standardize fingerprint-based biometric technology. Moreover, the three countries are cooperating in conducting trials and reviewing the compatibility of their biometric traveler systems.
China’s All-Seeing Eye- Naomi Klein; May 29, 2008
With the help of U.S. defense contractors, China is building the prototype for a high-tech police state. It is ready for export.
"The security cameras are just one part of a much broader high-tech surveillance and censorship program known in China as "Golden Shield." The end goal is to use the latest people-tracking technology — thoughtfully supplied by American giants like IBM, Honeywell and General Electric — to create an airtight consumer cocoon: a place where Visa cards, Adidas sneakers, China Mobile cellphones, McDonald's Happy Meals, Tsingtao beer and UPS delivery (to name just a few of the official sponsors of the Beijing Olympics) can be enjoyed under the unblinking eye of the state, without the threat of democracy breaking out. With political unrest on the rise across China, the government hopes to use the surveillance shield to identify and counteract dissent before it explodes into a mass movement like the one that grabbed the world's attention at Tiananmen Square."
"Remember how we've always been told that free markets and free people go hand in hand? That was a lie. It turns out that the most efficient delivery system for capitalism is actually a communist-style police state, fortressed with American "homeland security" technologies, pumped up with "war on terror" rhetoric. And the global corporations currently earning superprofits from this social experiment are unlikely to be content if the lucrative new market remains confined to cities such as Shenzhen. Like everything else assembled in China with American parts, Police State 2.0 is ready for export to a neighborhood near you." - Naomi Klein
DHS Wants to Spy on Americans, Dems Charge
The Department of Homeland Security wants to set up a new program to illegally spy on Americans, two senior Democratic lawmakers charged Thursday in a letter urging colleagues to deny funds for the program.
"We are left to conclude that the only reason to stand up a new office would be to gather domestic intelligence outside the rigorous protections of the law -- and, ultimately, to share this intelligence with local law enforcement outside of constitutional parameters," Thompson and Harman wrote.
Be Scared, Be Very Scared - Brian Ervin UTW – April 30, 2008
Along with what he called its "blatant violation" of the Constitution, as well as its potential as an interim step toward a "Big Brother"-type New World Order, Brogdon said the Real ID Act will, if it's not stopped, "proliferate identity theft like we have never seen before."
Senate Homeland Security Subcommittee Hearing – REAL ID Act of 2005 - Video
Will it be Freedom or Slavery? - Republic Magazine
"Born into this world we are poked with needles then assigned a 9-digit number. From the moment your unknowing parents hand you over, you cease being a free individual. You are now a piece of inventory that is assigned a value. Welcome to involuntary servitude. Even prior to the inception of the Social Security Number, instruments have been introduced to aid in the tracking of that inventory. Drivers’ Licenses, Credit Cards, License Plates, and Employee ID numbers are only a short list of identifiers that code you into their control system. Today, with the advent of modern technology that utilizes radio frequencies and global positioning systems, the coded system has been perfected to the point where you can be physically tracked almost to the place where you stand. These technologies should never be applied to people, as it is an infringement of our freedom and privacy. If applied to individual lives, these technologies will not stop where they begin, and will form invisible shackles around us that can never be removed. Is this real freedom? Johann Goethe made a statement during his life that will forever hold true: “None are more hopelessly enslaved than those who falsely believe they are free. “ Technologies like the VeriChip, smart cards, pay pass credit cards, secure Social Security cards and Real ID are no different than having a house arrest locator strapped to your ankle. Yet this house has no walls, windows, or doors — its borders extend as far as the radio frequencies can travel, the satellites can trace, and the databases can hold. In this issue we will explore the dark side of the technologies that are being sold to us as a means to make our lives easier and safer. As you read these pages, allow the words of Benjamin Franklin to linger: “He who sacrifices freedom for security deserves neither.” May the words of our sixth issue of Republic Magazine aid you in the choice you make: Will it be freedom or slavery?" – Editor Gary S. Franchi Jr.
· REAL INVASIVE – Will create America’s first national identity card, increase the threat of
identity theft, enable the routine tracking of individuals, and propel us toward a surveillance society.
· REAL RED TAPE – Will mean bureaucratic nightmares, long lines, repeated trips, and higher fees
for individuals trying to get licenses and IDs.
· REAL EXPENSIVE – With a cost in the billions, REAL ID is a hidden tax increase that will force
Americans to either pay higher fees to get their IDs, or pay more in state taxes.
· REAL POINTLESS – Will do little if anything to protect against terrorism.
States Rebel - Concerns about Real ID Act turn into Boston Tea Party
REAL ID Act of 2005 – Public Law 109 -13
“Officials from the U.S. and Germany have initialed a bilateral agreement to share access to biometric data. The agreement also provides for the spontaneous sharing of data and DNA samples of known and suspected terrorists, and marks a high point in U.S.- German cooperation in the war on terror.”
The REAL ID Act of 2005 is a REAL BAD IDEA.
The biometric data and the other personal data will become part of both a national and international database of information, accessible not only by state agencies, but by the federal government and foreign governments, including Mexico and Canada and potentially by corporations.
Biometric information belongs to the individual, not the state, and should not be shared with other agencies, other countries, or any corporations. This is a fundamental tenant of a Free People.
“Robert Mocny, acting program manager for the U.S. Visitor and Immigrant Status Indicator Technology program, sketched the outline of a Global Security Envelope of internationally shared biometric data that would permanently link individuals with their personal data held by governments and corporations.”
“Mocny sketched a federal plan to extend biometric data sharing to Asian and European governments and corporations, so as to create a Global Security Envelope of identity management.”
All of our Oklahoma US Representatives voted for the REAL ID Act of 2005 and the Senate passed it on a voice vote in the middle of the night when no one was around.
Could it really be that our Oklahoma US Delegation really understood what they voted for?
MAY 11th is the day Home Land Security plans to breech States rights and move to limit your freedom of movement unless you acquiesce to their demands.
The Oklahoma State Legislature is all that is standing in the gap to protect your freedom and privacy.
Please call your US Senators and Representatives and ask them to reconsider the ramifications of the
REAL ID Act of 2005 and to support H.R. 1117 REAL ID Repeal and Identification
On behalf of the State of
Thank you and the State of
Act and implementing regulations.
This document serves as your official notification that the Department of Homeland Security has granted your request for an extension of the compliance date until December 31, 2009. If you have questions or require additional assistance, please contact Mr. Darrell Williams at (email@example.com) or (202) 447-3836. – Richard C. Barth, Ph.D.
Please send technical comments and problems to: webmaster
Fair Use Notice: This site contains copyrighted material, the use of which may not always have been specifically authorized by the copyright owner. Such material is made available for educational purposes, and as such constitutes "fair use" of any such copyrighted material as provided for in Section 107 of the U.S. Copyright Act. In accordance with Title 17 U.S.C. Section 107 the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.
Copyright ©2007 Oklahomans for Sovereignty and Free Enterprise, Inc. All Rights Reserved