TIP: Click on subject to list as thread! ANSI
echo: consprcy
to: All
from: Steve Asher
date: 2003-01-09 00:42:26
subject: UK Plan For Biometric Database

Date sent:         Tue, 07 Jan 2003 09:34:28 -0800
To:                politech{at}politechbot.com
From:              Declan McCullagh 
Subject:           FC: U.K. plan to create huge biometric database, 
                   from RISKS Digest
Send reply to:     declan{at}well.com

---

Date: Sun, 05 Jan 2003 01:09:40 +0000
From: Markus Kuhn 
Subject: Risks of diverse identification documents

The Home Office is currently running a consultation exercise on the
introduction of an identity infrastructure for Britain. This would 
consist of a biometric database with basic records of the entire 
population. Anyone in the database would be able to get an identity 
card, which would essentially enable the holder to grant easily read 
access to his or her record to any peer who needs some form of assurance 
about one's identity. Details on the consultation are on

   http://www.homeoffice.gov.uk/dob/ecu.htm

The system proposed is nothing unusual and quite similar to what most
European and many Asian countries have used successfully for several
decades.

Such identity infrastructures are generally widely accepted in these
countries, where most people consider them today to be a desirable 
and effective protection against what has become known in some countries 
that still lack them as "identity theft".

Nevertheless, there is fierce opposition to the proposals from various
British privacy advocacy groups. Similar discussions can be observed at 
the moment in the US and Japan.

While much of the opposition is of a somewhat religious/tinfoil-hat nature
and therefore difficult to address, some of it has been voiced by notable
computer-security experts and therefore deserves some serious response.

The probably most commonly recurring theme is that the introduction of a
national identity card would lead to over-reliance on a single document. 
The need to corrupt only the issuing procedures of a single mechanism 
-- so the often expressed concern -- would ultimately make identity theft 
easier rather than harder. This is probably based on the implicit assumption 
that independent identity systems perform independent checks with statistically
independent failure probabilities. Therefore their security should increase
exponentially with the number of verification systems and more would be
better.

Defense-in-depth and its use of multiple diverse security mechanisms is 
in general a feature of sound security engineering. However, applying this
general idea in the context of government infrastructures against identity
theft this way is in my opinion horribly wrong and naive for a number of
reasons, which I'd like to address very briefly.

The most obvious problem is that the UK's present alternative 
-- identification based on multiple documents and issuing procedures 
-- adds very little as none of the currently widely available documents 
is protected by controls of desirable strength. This is just illustrated 
again by recent media demonstrations on how easily it is to abuse UK birth 
certificates:

   http://news.bbc.co.uk/1/hi/programmes/kenyon_confronts/2625395.stm

In practice, anyone wishing to verify an identity gets only the *minimal*
protection of all the ID schemes in common use, because as soon as you 
break one of them, you can quite easily proliferate your fake identity 
into several other systems. Get a fake UK birth certificate (fairly easy) 
and apply with it for a fake UK drivers license (therefore also not much 
more difficult), use both to get a fake UK passport and all three to 
comfortably get fake account access, education degrees, travel documents, 
security clearances, etc. etc. Most of the existing systems depend on 
each other, which leads easily to circular verification (A thinks B knows 
I and B thinks A knows I). They all lack the somewhat more expensive 
direct checks of non-document evidence that for example a properly 
protected distributed add-only database of the biometric long-term 
history of those registered could support economically and effectively.

Multiple documents? Unfortunately, the world of fake ID documents currently
works more like "Buy one, get three more free!" The number of systems
doesn't count much after all.

But this is not the only reason why it is so crucial to have at least one
identification scheme that is seriously difficult to break, while having
more than one of these is unlikely to be worth the cost and hassle.

There is first of all also the problem that within a single infrastructure,
it is far easier for those in charge of its integrity to verify and ensure
that the overall policies such as the separation of duties for critical
checks really leads to checks that are independent by design, and not by
chance.

Another reason is that the costs for the training/equipment/time/etc.
necessary for the adequate verification of security documents increases 
at least linearly with the number of different document types accepted. 
And the risk of fraudsters finding by brute-force search one accepted 
type of identification for which a particular verifier is not well 
prepared to recognize comparatively simple fakes increases even 
exponentially with the overall number of different identification 
forms accepted.

Hence I am not surprised by the desire in the UK government to finally 
also offer its tax payers one single simple cheap properly engineered 
and run identity infrastructure. It is needed to replace all the existing 
often ridiculously weak alternatives (including old birth certificates, 
old driving licenses, magstripe-cards, knowing mother's maiden name or 
showing a laser-printed utility bill) that are all currently used by 
especially the UK financial industry as acceptable means for gaining 
access to critical personal information and property.

Perhaps the discussion should first of all be driven by comparing 
actual practical identity-theft versus privacy-violation statistics 
in countries with and without proper government-provided identification 
infrastructures, instead of naively applying generic security recipes 
such as more-mechanisms-are-better to an application area with far 
more specific properties.

Markus Kuhn, Computer Lab, Univ of Cambridge, GB
http://www.cl.cam.ac.uk/~mgk25/ 


-------------------------------------------------------------------------
POLITECH -- Declan McCullagh's politics and technology mailing list
You may redistribute this message freely if you include this notice.
To subscribe to Politech: http://www.politechbot.com/info/subscribe.html
This message is archived at http://www.politechbot.com/
Declan McCullagh's photographs are at http://www.mccullagh.org/
-------------------------------------------------------------------------
Like Politech? Make a donation here: http://www.politechbot.com/donate/
Recent CNET News.com articles: http://news.search.com/search?q=declan
-------------------------------------------------------------------------

Cheers, Steve..

--- 
* Origin: < Adelaide, South Oz. (08) 8351-7637 (3:800/432)
SEEN-BY: 633/267 270
@PATH: 800/7 1 640/954 774/605 123/500 106/1 379/1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.