Homeland Security
Upcoming SlideShare
Loading in...5
×
 

Homeland Security

on

  • 530 views

 

Statistics

Views

Total Views
530
Views on SlideShare
521
Embed Views
9

Actions

Likes
1
Downloads
19
Comments
0

1 Embed 9

https://twitter.com 9

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Homeland Security Homeland Security Presentation Transcript

  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedP a r t n e r s i n B u i l d i n g U A E s S e c u r i t y & E c o n o m yHomeland SecurityExploring the Role of National IdentityManagement InfrastructurePresented by Dr. Ali M. Al-KhouriIn: Homeland Security Summit Middle East27-28 May 2013 | Abu Dhabi | UAE
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved• Introduction: Definitions• Identity Terrorism• Modern Identity Management Systems• Digital Signature and Trust• Interoperability and Standardisation• Concluding RemarksAgenda
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved• Introduction: Definitions• Identity Terrorism• Modern Identity Management Systems• Digital Signature and Trust• Interoperability and Standardisation• Concluding RemarksAgenda• Introduction: Definitions
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedHomeland SecurityWikipedia Definition.. refers to the broad national effort by alllevels of government to protect itsterritory from hazards, both internal andexternal, natural and man-made.Homeland Security,URL=http://en.wikipedia.org/wiki/Homeland_Security
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedHomeland Security & TerrorismTerrorism evokes conjectures of images [violence and destruction]… associated with the term “Terrorism”..which can be defined as a primarily apsychological tool of “strategic leveraging”and a form of “propaganda by deed,” thatcan be utilized by both anti-state partisanrevolutionary groups and state leaderships.Hall GardnerProfessor of International Politics atthe American University of Paris“modern day terrorism is conductednot necessarily by physical gore buta concerted psychological warfare ..”
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedHomeland SecurityForms of TerrorismClassical Definition1. Anti-state terrorismdisrupt states and undermine governments,black and graymarket economies.2. State-sponsored terrorismdisrupt political economies of rival states, attackleaders and supporters of oppositionmovements.3. Totalitarian terrorismFear & control society4. Street terrorismkidnapping, drug smuggling, contract killing ..
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedHomeland SecurityForms of TerrorismNeo Definition1. Bio Terrorism [biological and chemical warfare]2. Cyber Terrorism [loss of billions of dollars]3. Nuclear Terrorism4. Eco Terrorism [Ecological destruction]5. Narco Terrorism [drug abuse]6. ??assumed newerproportions andhas gonebeyond physicalrealms intovirtual realms
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedHomeland SecurityEmerging Threats… each form ofterrorism use Identityor misuse Identity.
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved• Introduction: Definitions• Identity Terrorism• Modern Identity Management Systems• Digital Signature and Trust• Interoperability and Standardisation• Concluding RemarksAgenda• Identity Terrorism
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedHomeland SecurityIdentity is required for any transactionImposters carry outillegal transactionsusing aliases andfraudulent identities.
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedIt takes 130 person-hours torebuild a digital identityafter it has beencompromised. . .Identity TerrorismIdentity in the Digital WorldA 2010 report from the U.S.Department of Justice
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedIdentity TerrorismReported and Published Cases
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedIdentity Terrorism
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedIdentity Terrorism
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved• Introduction: Definitions• Identity Terrorism• Modern Identity Management Systems• Digital Signature and Trust• Interoperability and Standardisation• Concluding RemarksAgenda• Modern Identity Management Systems
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved• Personal Identification• Identity Protection• Legal SanctionFighting Identity TerrorismConventional Identity Documents
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved• Personal Identification• Identity Protection• Legal SanctionModern Identity DocumentsFighting Identity TerrorismConventional Identity Documents• Identity Protection• Fraud Prevention• Fraud Containment• Document Protection• Legal Protection• Transaction Assurance
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedFighting Identity TerrorismIdentity, Document & Transaction Management
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedFighting Identity TerrorismModern Identity Management SystemsProvide Identity ProtectionDigital IdentityProfileCore IdentityparametersMultipleBiometric dataDigital Certificates
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedFighting Identity TerrorismPrevent Identity Abuse• Digital Notarization oftransactions• Time-Stamped transactionsPrevent Identity Fraud• Digital Identity in a SmartCard• Identity data signed by theID Issue• Smart Card as a SecureDocumentPrevent Identity Misuse• Identity verification online,on demand• Transaction stakeholdersidentified online
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedSmart National ID CardMultiple Security Capabilities
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedID Enabled e-TransactionsGovernment, Businesses and CitizensModernIdentityManagementenable remotetransactionswith completeprotection tothe threedimensions ofIdentityManagement.
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedProtection of Transactionsusing ID Credentials for TrustImproved trust andensurescompliance to thelegal systems inthe country.key to transactional protection
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved• Introduction: Definitions• Identity Terrorism• Modern Identity Management Systems• Digital Signature and Trust• Interoperability and Standardisation• Concluding RemarksAgenda• Digital Signature and Trust
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedDigital Signature SolutionEnabled Trust in TransactionsDigital Signatureas a Service isembedded in theUAE ID Program as akey component thatprovides uniquesignatures for anytransaction thatneeds credentialverification andtransactionassurance.
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedContent of Digital SignatureAll theseareverifiable.
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedDigital Signature Solution:System Architectureprovide DigitalIdentity toindividuals in aSmart Card withuniquecertificates toevery individual.
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedDigital Signature Solution:System Architecture
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedDigital Signature Solution:System Architecture
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedDigital Signature SolutionPublic Key Infrastructure TechnologyDigital SignatureServer components• User Registration and Life-Cycle Management• Centralised Policy Management• Digitally Signed and Time-Stamped TransactionManagement• Certificate and Card Verification Service• Transaction Verification Service• Time Stamping Service• Audit Logger• Databases: Identity Repository, Transaction Database,Audit Trails, ID card Hotlist and CRL Database.Digital SignatureClient• Active X & Java based Plug-in• UAE ID Card based Access Control Component• Digital Signing & Time Stamping Component
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedElectronic Document SecurityProcess
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedRobust IdentityBenefit Realisation
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved• Introduction: Definitions• Identity Terrorism• Modern Identity Management Systems• Digital Signature and Trust• Interoperability and Standardisation• Concluding RemarksAgenda• Interoperability and Standardisation
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedInteroperability Standardizationdifferentsides of thesame coin!enabled bymeaninglesswithoutEfficient & Effective eGovernment ServicesInter and Intra-Government Interoperability
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedDigital ID ProfilesEnrolment ProcessInteroperable Identitystandardsservice delivery systemsenableaccesscreateprovideenablestandardizationof how Identity isintegrated intodifferentapplications forservice access andprivilegemanagementGovernment Service Delivery Model… ability to lay down the standards for interoperability
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedcustomer experiencestandardsestablish(data exchange forIdentity profiles)data movement acrossnetworks becomeseasierFederatedIdentityManagementenableEnhancing Customer Experience… need for standardisation
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedInteroperability ofdifferent devicesDigitalIDProfilesPackaging ofDigital ID ProfilesID Cardintegration withthe applicationsID ValidationmechanismsMultifactorauthenticationData ExchangemechanismDelivery of e-Servicesusing National ID CardeGov Transformation… areas of identity interoperability and standardisation
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedeGov Transformation… standards that need to be establishedAuthenticationmechanisms fordetermining IDDataExchangeIdentity ProfileIntegrationUsage of ID inService Delivery
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved• Introduction: Definitions• Identity Terrorism• Modern Identity Management Systems• Digital Signature and Trust• Interoperability and Standardisation• Concluding RemarksAgenda• Concluding Remarks
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedConclusionFinal Remarks• Identity Security is no longer isolated fromHomeland Security• The asymmetric threats related to identity theftand abuse is now a strategic threat.• Likely to see new forms of identity theft in theincreasingly digitised world..• Modern Identity Management provide higherlevels of security and privacy• Serious and focused international cooperationand collaboration is fundamental tocomprehend, safeguard critical infrastructure,cyberspace, and people.
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reservedhttp://www.emiratesid.gov.ae/ar/media-center/publications.aspxMore InformationRead our recent research publicationswww.id.ae
  • www.emiratesid.ae © 2013 Emirates Identity Authority. All rights reserved….Thank YouDr. Ali M. Al-KhouriDirector GeneralEmirates Identity AuthorityUnited Arab Emiratesali.alkhouri@emiratesid.aewww.emiratesid.ae“I know not with whatweapons World War IIIwill be fought, but WorldWar IV will be foughtwith sticks and stones.”Albert Einstein