Feeds

US.gov sets Real ID rules in stone

Privacy advocates, security mavens, states' rights renew assault

Choosing a cloud hosting partner with confidence

Critics have renewed their offensive on a federal law mandating changes to state-issued drivers licenses after the US Department of Homeland Security on Friday issued final rules implementing the controversial measure.

Security researchers and advocates of civil liberties and states' rights lined up to attack the rules, which are required under the REAL ID Act of 2005. They direct states to add new features to drivers licenses, check applicants citizenship status and verify the authenticity of documents provided during the application process.

People from states that don't comply with the requirements by next year could be blocked from boarding airplanes and entering buildings controlled by the federal government.

"REAL ID creates a United States where individuals are either 'approved' or 'suspect,' and that is a real danger to security and civil rights," said Melissa Ngo, director of the Identification and Surveillance Project at the Electronic Privacy Information Center.

The American Civil Liberties Union and security consultant Bruce Schneier also weighed in, arguing the measure did little to fight the threat of terrorism or make people more secure.

Legislatures from 17 states have passed resolutions objecting to the changes, which they say will increase the cost of issuing drivers licenses. The US Senate is debating the repeal of the REAL ID act.

In a statement issued with the new rules, DHS Security Michael Chertoff countered the chorus of critics, saying the changes would make people safer.

"Americans understand today that the 9/11 hijackers obtained 30 drivers licenses and ID's, and used 364 aliases," he said. The changes would add only about $8 to the cost of issuing a drivers license and in exchange would help officials spot falsified documents and applicants who are criminals or illegal aliens, he said.

DHS has sought to mollify critics by scaling back some of the most controversial requirements, reducing costs and extending the deadline for state compliance. DHS is providing about $360m in assistance for states to implement the measures.®

Internet Security Threat Report 2014

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
NATO declares WAR on Google Glass, mounts attack alongside MPAA
Yes, the National Association of Theater Owners is quite upset
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.