Contenu connexe
Similaire à Homeland Security
Similaire à Homeland Security (20)
Plus de Arab Federation for Digital Economy
Plus de Arab Federation for Digital Economy (20)
Homeland Security
- 1. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
P a r t n e r s i n B u i l d i n g U A E ' s S e c u r i t y & E c o n o m y
Homeland Security
Exploring the Role of National Identity
Management Infrastructure
Presented by Dr. Ali M. Al-Khouri
In: Homeland Security Summit Middle East
27-28 May 2013 | Abu Dhabi | UAE
- 2. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
- 3. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Introduction: Definitions
- 4. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security
Wikipedia Definition
.. refers to the broad national effort by all
levels of government to protect its
territory from hazards, both internal and
external, natural and man-made.
Homeland Security,
URL=http://en.wikipedia.org/wiki/Homeland_Security
- 5. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security & Terrorism
Terrorism evokes conjectures of images [violence and destruction]
… associated with the term “Terrorism”..
which can be defined as a primarily a
psychological tool of “strategic leveraging”
and a form of “propaganda by deed,” that
can be utilized by both anti-state partisan
revolutionary groups and state leaderships.
Hall Gardner
Professor of International Politics at
the American University of Paris
“modern day terrorism is conducted
not necessarily by physical gore but
a concerted psychological warfare ..”
- 6. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security
Forms of Terrorism
Classical Definition
1. Anti-state terrorism
disrupt states and undermine governments,
black and gray
market economies.
2. State-sponsored terrorism
disrupt political economies of rival states, attack
leaders and supporters of opposition
movements.
3. Totalitarian terrorism
Fear & control society
4. Street terrorism
kidnapping, drug smuggling, contract killing ..
- 7. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security
Forms of Terrorism
Neo Definition
1. Bio Terrorism [biological and chemical warfare]
2. Cyber Terrorism [loss of billions of dollars]
3. Nuclear Terrorism
4. Eco Terrorism [Ecological destruction]
5. Narco Terrorism [drug abuse]
6. ??
assumed newer
proportions and
has gone
beyond physical
realms into
virtual realms
- 8. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security
Emerging Threats
… each form of
terrorism use Identity
or misuse Identity.
- 9. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Identity Terrorism
- 10. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Homeland Security
Identity is required for any transaction
Imposters carry out
illegal transactions
using aliases and
fraudulent identities.
- 11. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
It takes 130 person-hours to
rebuild a digital identity
after it has been
compromised. . .
Identity Terrorism
Identity in the Digital World
A 2010 report from the U.S.
Department of Justice
- 12. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Identity Terrorism
Reported and Published Cases
- 15. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Modern Identity Management Systems
- 16. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Personal Identification
• Identity Protection
• Legal Sanction
Fighting Identity Terrorism
Conventional Identity Documents
- 17. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Personal Identification
• Identity Protection
• Legal Sanction
Modern Identity Documents
Fighting Identity Terrorism
Conventional Identity Documents
• Identity Protection
• Fraud Prevention
• Fraud Containment
• Document Protection
• Legal Protection
• Transaction Assurance
- 18. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Fighting Identity Terrorism
Identity, Document & Transaction Management
- 19. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Fighting Identity Terrorism
Modern Identity Management Systems
Provide Identity Protection
Digital Identity
Profile
Core Identity
parameters
Multiple
Biometric data
Digital Certificates
- 20. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Fighting Identity Terrorism
Prevent Identity Abuse
• Digital Notarization of
transactions
• Time-Stamped transactions
Prevent Identity Fraud
• Digital Identity in a Smart
Card
• Identity data signed by the
ID Issue
• Smart Card as a Secure
Document
Prevent Identity Misuse
• Identity verification online,
on demand
• Transaction stakeholders
identified online
- 21. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Smart National ID Card
Multiple Security Capabilities
- 22. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
ID Enabled e-Transactions
Government, Businesses and Citizens
Modern
Identity
Management
enable remote
transactions
with complete
protection to
the three
dimensions of
Identity
Management.
- 23. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Protection of Transactions
using ID Credentials for Trust
Improved trust and
ensures
compliance to the
legal systems in
the country.
key to transactional protection
- 24. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Digital Signature and Trust
- 25. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital Signature Solution
Enabled Trust in Transactions
Digital Signature
as a Service is
embedded in the
UAE ID Program as a
key component that
provides unique
signatures for any
transaction that
needs credential
verification and
transaction
assurance.
- 26. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Content of Digital Signature
All these
are
verifiable.
- 27. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital Signature Solution:
System Architecture
provide Digital
Identity to
individuals in a
Smart Card with
unique
certificates to
every individual.
- 28. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital Signature Solution:
System Architecture
- 29. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital Signature Solution:
System Architecture
- 30. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital Signature Solution
Public Key Infrastructure Technology
Digital Signature
Server components
• User Registration and Life-Cycle Management
• Centralised Policy Management
• Digitally Signed and Time-Stamped Transaction
Management
• Certificate and Card Verification Service
• Transaction Verification Service
• Time Stamping Service
• Audit Logger
• Databases: Identity Repository, Transaction Database,
Audit Trails, ID card Hotlist and CRL Database.Digital Signature
Client
• Active X & Java based Plug-in
• UAE ID Card based Access Control Component
• Digital Signing & Time Stamping Component
- 33. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Interoperability and Standardisation
- 34. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Interoperability Standardization
different
sides of the
same coin!
enabled by
meaningless
without
Efficient & Effective eGovernment Services
Inter and Intra-Government Interoperability
- 35. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Digital ID Profiles
Enrolment Process
Interoperable Identity
standards
service delivery systems
enable
access
create
provide
enable
standardization
of how Identity is
integrated into
different
applications for
service access and
privilege
management
Government Service Delivery Model
… ability to lay down the standards for interoperability
- 36. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
customer experience
standards
establish
(data exchange for
Identity profiles)
data movement across
networks becomes
easier
Federated
Identity
Management
enable
Enhancing Customer Experience
… need for standardisation
- 37. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Interoperability of
different devices
Digital
ID
Profiles
Packaging of
Digital ID Profiles
ID Card
integration with
the applications
ID Validation
mechanisms
Multifactor
authentication
Data Exchange
mechanism
Delivery of e-Services
using National ID Card
eGov Transformation
… areas of identity interoperability and standardisation
- 38. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
eGov Transformation
… standards that need to be established
Authentication
mechanisms for
determining ID
Data
Exchange
Identity Profile
Integration
Usage of ID in
Service Delivery
- 39. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
• Introduction: Definitions
• Identity Terrorism
• Modern Identity Management Systems
• Digital Signature and Trust
• Interoperability and Standardisation
• Concluding Remarks
Agenda
• Concluding Remarks
- 40. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
Conclusion
Final Remarks
• Identity Security is no longer isolated from
Homeland Security
• The asymmetric threats related to identity theft
and abuse is now a strategic threat.
• Likely to see new forms of identity theft in the
increasingly digitised world..
• Modern Identity Management provide higher
levels of security and privacy
• Serious and focused international cooperation
and collaboration is fundamental to
comprehend, safeguard critical infrastructure,
cyberspace, and people.
- 41. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
http://www.emiratesid.gov.ae/ar/media-center/publications.aspx
More Information
Read our recent research publications
www.id.ae
- 42. www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved
….
Thank You
Dr. Ali M. Al-Khouri
Director General
Emirates Identity Authority
United Arab Emirates
ali.alkhouri@emiratesid.ae
www.emiratesid.ae
“I know not with what
weapons World War III
will be fought, but World
War IV will be fought
with sticks and stones.”
Albert Einstein