Feeds

Border Agency plans Olympic identity card

Access card to be 'inclusive and far reaching'

5 things you didn’t know about cloud backup

The Border Agency is developing a "pretty inclusive and far reaching" Olympic accreditation card for the 2012 games.

The card will provide access to both the county and to the venues, chief executive Lin Homer told the Secure Document World conference in London on 23 April 2008.

When asked by GC News about the extent of the card's use, Homer said the agency was "in the fairly early stages" of developing it. But she added: "To the extent that we can develop a system that ticks as many boxes as we can, we will do that.

"My hope it that it will be a pretty inclusive and far reaching offering, but we have still got a little bit of time and a lot of work," she added, describing the project as an opportunity to develop processes that can then be used permanently.

Homer said Project Semaphore, the forerunner of the e-Borders scheme which will eventually record extensive data on all international passenger movements, has led to 1,700 arrests. The agency will start procurement of e-Borders this summer.

The agency has no plans to verify the biometrics of everyone entering and leaving the UK. "I don't think as a key public service we would want to oblige (the use of) biometrics," she said.

However, she hopes to expand voluntary use of biometrics at UK borders, such as the Iris scheme which allows those enrolled to clear passport control more quickly by using an automated iris scanner. Homer, who said she is enrolled with Iris, described more voluntary schemes as "a fantastic opportunity" for the agency.

In another session, Bob Carter of the Identity and Passport Service said UK identity cards will use the strengthened Extended Access Control (EAC) protocol to protect data held on card chips.

EAC will be used by European Schengen countries, within which national borders are not normally enforced, for new passports holding scans of at least two fingerprints. All Schengen countries are meant to introduce these by 28 June 2009.

Carter said EAC means that identity document chips will only provide data to readers with valid digital certificates, whereas documents using Basic Access Control – employed by most countries, including at present UK passports – will release data to any device with the correct software. "For the first time, it is the chip which decides if it wants to talk or not to talk," he said. "The chip is in control."

Some security experts have expressed alarm at the standard of security on the current generation of passport chips. However, Carter said he could not discuss any implementation schedule of EAC for UK passports. Germany is already issuing passports using EAC.

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

The essential guide to IT transformation

More from The Register

next story
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Redmond resists order to hand over overseas email
Court wanted peek as related to US investigation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.