Network access made simple, secure
As part of its multifaceted network security strategy, the Army is studying the ethical and legal implications of replacing personal passwords with devices that can read fingerprints, recognize voices and faces, and capture a host of other personal biometric information.
As part of its multifaceted network security strategy, the Army is studying
the ethical and legal implications of replacing personal passwords with
devices that can read fingerprints, recognize voices and faces, and capture
a host of other personal biometric information.
Recently anointed as the Defense Department's executive agent for biometrics
research and development, the Army has created a biometrics security office
under the tutelage of Phillip Loranger, formerly the chief of the Command
and Control Protect Division within the Army's Information Assurance Office.
The Army has taken the lead in researching and developing biometric
security solutions that Loranger said will fill one of the most common network
security gaps: personal passwords.
"Passwords are cool, but passwords are the way we get into systems,"
said Loranger, speaking recently at the annual Army Directors of Information
Management Conference. Loranger demonstrated how easy it is for hackers
to crack password files and gain entry into Army networks.
"Passwords are not you. Biometrics is you," Loranger said. "This is
your finger and no one else's."
The term biometrics refers to the ability to scan and capture a digital
image of a unique human characteristic, such as a fingerprint, and compare
that captured image to a stored image that has been previously determined
to belong to an authorized user. Biometrics can be used in security applications
because qualities such as fingerprints and voice sound waves are unique
to each person.
Congress kick-started the Army's biometrics program when it added $15
million to the service's fiscal 2000 budget. Although the service will need
additional funding for the program this year, prices for biometric verifiers
have fallen drastically.
According to a recent study by Eric Bowman of Identix Corp., the average
price per access point was less than $500, compared with more than $6,000
six years ago. Voice signature verifiers on average cost about $1,000,
while fingerprint and hand geometry devices range from $300 to $1,200, according
to Bowman.
The Army plans to study a wide range of biometric security solutions
to meet its network access and authentication challenge. Initial research
will be conducted on fingerprint, iris, voice and face identification, retina
scanning, handwriting and keystroke analysis, wrist-vein recognition, and
finger and hand geometry.
But initial plans call for the biometrics solutions to be used in conjunction
with a wide array of traditional security technologies, including firewalls
and encryption.
The concern is that one technology cannot provide foolproof assurance
and personnel authentication. For example, one of the challenges facing
the biometrics program is to determine how to differentiate between the
fingerprint of a living human being and from one that is severed — a potential
problem in the reality of the battlefield.
"We believe we need a combination of technology," said Lt. Gen. William
Campbell, director of information systems for Command, Control, Communications
and Computers, who characterized the Pentagon's Non-secure Internet Protocol
Routing Network as "horribly, horribly vulnerable."
The Defense Department's focus on biometrics may be expanding before
it begins. The Defense Advanced Research Proj-ects Agency, for example,
recently began a program known as Human Identification at a Distance, which
seeks to use biometrics to identify not only facial characteristics but
also behaviors. According to Loranger, the goal is to reach the point where
a computer can recognize its owner and turn itself on.
NEXT STORY: Figuring taxes on your mutual fund sales