Feeds

ID cards technology is ready, says UK minister

But we're still adding up the bill

  • alert
  • submit to reddit

Internet Security Threat Report 2014

UK government ministers gave a vote of confidence to the technology underpinning its controversial ID card scheme, as proposals for the national scheme were reintroduced in Parliament on Wednesday. The scheme will link personal information such as names and addresses to biometrics - a computer scan of a person's iris, face or fingerprint. From 2008, UK passport applicants will also receive an identity card, under plans outlined in the government's ID Card Bill.

Junior Home Office minister Andy Burnham told reporters that biometric technology is already used in identity documents in countries such as Hong Kong, the Philippines and Belgium. These are much smaller deployments than envisaged in the UK, where government IT schemes have a famously patchy record.

Burnham acknowledged there had been problems in the past but said the phased introduction of the scheme, and support from the IT industry throughout the planning process, would help a smooth introduction. He said the technology is ready for widespread deployment.

Under the Identity Cards Bill, ID cards would be phased in from 2008 before been made compulsory at some later (as yet unspecified) date. The government estimates running costs will amount to £584m a year - or £93 per card, around 9 per cent up on November 2004 estimates of £85 per card. The government says 70 per cent of these costs will be spent to introduce biometric passports in any case, arguing now is the perfect time to introduce ID cards.

The reasons - and emphasis - behind "why we need ID cards" varies each time we visit the Home Office. This time around guarding against identity theft, a crime estimated to cost £1.3bn a year, was highlighted as the top reason ahead of strengthening immigration controls, guarding against the misuse of public services and (last year's number one) fighting organised crime and terrorism.

It's questionable whether ID cards can play any meaningful role in combating ID fraud but Burnham has sticking to his guns on this point. Banks would pay for verification services based on ID card technology that left customers less open to fraud, he said. ®

Bootnote

The Register arrived for press conference fashionably late and were further detained as reception by a Home Office security guard who demanded an NuJ card as identification. A passport, with a US-issued biometric visa inside, and a Register business card were not enough for our man. He called a press officer who arrived quickly and helpfully ushered us into the meeting.

Related stories

UK ID scheme rides again, as biggest ID fraud of them all
EU biometric visa trial opts for the tinfoil sleeve
ID cards: Part II
Home Office defends ID card plans (again)

Remote control for virtualized desktops

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
State Dept shuts off unclassified email after hack. Classified mail? That's CLASSIFIED
Classified systems 'not affected' - but, is this reconnaissance?
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.