10.07.2015 Views

Report - Guardian

Report - Guardian

Report - Guardian

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The LSE Identity Project <strong>Report</strong>: June 2005 191Multiple RegistrationsA key aspect of government claims about ID cards is the assertion that it will not bepossible for the same person to register more than once with different details, sincebiometrics will expose attempts to achieve this. However, this assertion should betreated cautiously because it depends on several assumptions that have yet to be proven.Firstly, this assumes a perfect biometric system, whereas it is far from clear thatbiometrics can meet this challenge for a population of over 50 million people.Secondly, this also assumes that the system as a whole is perfect and will not containsecurity weaknesses that can be exploited to create multiple registrations containing thesame biometrics.Of course, this might not be seen as a major problem, as anyone seeking to makemultiple registrations with the same biometrics would presumably have to be lucky tofind themselves with biometrics that are problematic. However, it is possible that waysof creating such situations will be discovered. We can expect technical attacks, wherebypeople try to create false identities using rubber finger covers, printed contact lenses andso on. But it is not ‘normal cases’ that are the source of most problems in securesystems; rather, it is usually one of the many ‘special cases’ that is exploited to subvertsecurity.There will, for example, be people whose biometrics are not fully satisfactory, and forwhom the National Identity Register will have to make special provisions, such asholding data on known false matches. There are certain to be many such special cases,all of which have to be very carefully considered and implemented in a way thatprevents their exploitation. The problem with this situation is that those who are seekingto defend the system only succeed if they find and eliminate all vulnerabilities, whereasan attacker succeeds if he can find just one that has been overlooked. In practice, thisimbalance greatly increases the cost of maintaining security, because each minor changeto the system has to be extensively analysed in order to ensure that it does notinadvertently introduce any exploitable security weaknesses. This is one of the reasonswhy maintenance and support costs for secure systems are enormous when comparedwith those of their insecure counterparts.Of course, insiders will quickly get to know the ‘special cases’ and will be sufficientlyresourceful to recognise how they can be exploited. It is inevitable that this sort ofinformation will filter out to those who want to subvert the system.Banks go to enormous lengths to protect the privacy of their customers’ account details,but they face exactly this dilemma in that the banking system can only operateeffectively if there is widespread sharing of account data. It is thus inevitable that, nomatter how much the banks spend on security, it will still be possible for outsiders toobtain unauthorised access to account details.The basic problem here is easy to understand: the greater the number of people whoknow a secret, the less secret it is. A system such as the National Identity Register,involving thousands of staff, stands little chance of being highly secure.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!