Electronic Government
Progress in Promoting Adoption of Smart Card Technology
Gao ID: GAO-03-144 January 3, 2003
Smart cards--credit-card-like devices that use integrated circuit chips to store and process data--offer a range of potential uses for the federal government, particularly in increasing security for its many physical and information assets. GAO was asked to review the use of smart cards across the federal government (including identifying potential challenges), as well as the effectiveness of the General Services Administration (GSA) in promoting government adoption of smart card technologies.
Progress has been made in implementing smart card technology across government. As of November 2002, 18 federal agencies had reported initiating a total of 62 smart card projects. These projects have provided a range of benefits and services, ranging from verifying the identity of people accessing buildings and computer systems to tracking immunization records. To successfully implement such systems, agency managers have faced a number of substantial challenges: (1) sustaining executive-level commitment in the face of organizational resistance and cost concerns; (2) obtaining adequate resources for projects that can require extensive modifications to technical infrastructures and software; (3) integrating security practices across agencies, a task requiring collaboration among separate and dissimilar internal organizations; (4) achieving smart card interoperability across the government; and (5) maintaining the security of smart card systems and privacy of personal information. In helping agencies to overcome these challenges, not only GSA but also the Office of Management and Budget (OMB) and the National Institute of Standards and Technology (NIST) have roles to play. As the federal government's designated promoter of smart card technology, GSA assists agencies in assessing the potential of smart cards and in implementation. Although GSA has helped agencies significantly by implementing a governmentwide, standards-based contracting vehicle, it has not kept guidance up to date and has not addressed important subjects, such as building security standards, in its guidance. Further, OMB, which is responsible for setting policies for ensuring the security of federal information and systems, has not issued governmentwide policy on adoption of smart cards. In its role of setting technical standards, NIST is responsible for the government smart card interoperability specification, which does not yet address significant emerging technologies. Updated guidance, policy, and standards would help agencies to take advantage of the potential of smart cards to enhance security and other agency operations.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-03-144, Electronic Government: Progress in Promoting Adoption of Smart Card Technology
This is the accessible text file for GAO report number GAO-03-144
entitled 'Electronic Government: Progress in Promoting Adoption of
Smart Card Technology' which was released on February 04, 2003.
This text file was formatted by the U.S. General Accounting Office
(GAO) to be accessible to users with visual impairments, as part of a
longer term project to improve GAO products‘ accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
Report to the Chairman, Subcommittee on Technology and Procurement
Policy, House of Representatives:
January 2003:
ELECTRONIC GOVERNMENT:
Progress in Promoting Adoption of Smart Card Technology:
GAO-03-144:
GAO Highlights:
Highlights of GAO-03-144, a report to the Chairman, Subcommittee on
Technology and Procurement Policy, House of Representatives.
ELECTRONIC GOVERNMENT
Progress in Promoting Adoption of Smart Card Technology
Why GAO Did This Study:
Smart cards”credit-card-like devices that use integrated circuit
chips
to store and process data”offer a range of potential uses for the
federal
government, particularly in increasing security for its many
physical
and information assets. GAO was asked to review the use of smart
cards
across the federal government (including identifying potential
challenges),
as well as the effectiveness of the General Services Administration
(GSA)
in promoting government adoption of smart card technologies.
What GAO Found:
Progress has been made in implementing smart card technology
across government.
As of November 2002, 18 federal agencies had reported initiating
a total of 62
smart card projects. These projects have provided a range of
benefits and services,
ranging from verifying the identity of people accessing buildings
and computer
systems to tracking immunization records. To successfully
implement such systems,
agency managers have faced a number of substantial challenges:
* sustaining executive-level commitment in the face of organizational
resistance
and cost concerns;
* obtaining adequate resources for projects that can require
extensive modifications
to technical infrastructures and software;
* integrating security practices across agencies, a task
requiring collaboration
among separate and dissimilar internal organizations;
* achieving smart card interoperability across the government;
* maintaining the security of smart card systems and privacy
of personal information.
In helping agencies to overcome these challenges, not only
GSA but also the Office of
Management and Budget (OMB) and the National Institute of
Standards and Technology
(NIST) have roles to play. As the federal government‘s
designated promoter of smart
card technology, GSA assists agencies in assessing the
potential of smart cards and
in implementation. Although GSA has helped agencies
significantly by implementing a
governmentwide, standards-based contracting vehicle, it has
not kept guidance up to
date and has not addressed important subjects, such as
building security standards,
in its guidance. Further, OMB, which is responsible for setting
policies for ensuring
the security of federal information and systems, has not issued
governmentwide policy
on adoption of smart cards. In its role of setting technical
standards, NIST is
responsible for the government smart card interoperability
specification, which does
not yet address significant emerging technologies. Updated
guidance, policy, and
standards would help agencies to take advantage of the
potential of smart cards to
enhance security and other agency operations.
A Typical smart card (not to scale)
[See PDF for Image]
[End of Figure]
What GAO Recommends:
GAO recommends, among other things, that GSA establish
guidelines for federal building
security that address smart card technology; that OMB
establish policy on adoption of
smart cards for physical and logical security; and that
NIST continue to improve and
update the government smart card interoperability
specification. In commenting on a draft
of this report, agency officials generally agreed with
its content and recommendations.
To view the full report, including the scope
and methodology, click on the link above.
For more information, contact Linda Koontz at
(202) 512-6240 or koontzl@gao.gov
Letter:
Results in Brief:
Background:
Objectives, Scope, and Methodology:
Many Government Smart Card Projects Are under Way or Planned, Offering
a Variety of Benefits:
Successful Adoption of Smart Cards Can Be Achieved If Challenges Are
Met:
GSA‘s Effectiveness in Facilitating Federal Smart Card Adoption Has
Been Limited:
Conclusions:
Recommendations:
Agency Comments and Our Evaluation:
Appendix:
Appendix I: Information About Selected Government Smart Card Projects:
Department of Defense:
Department of the Interior:
Department of Transportation:
Department of the Treasury:
Department of Veterans Affairs:
Immigration and Naturalization Service:
Western Governors‘ Association:
Glossary:
Tables Tables:
Table 1: Summary Information on 62 Federal Smart Card Projects:
Table 2: Status of Major Tasks from the EPIC and GSA Smart Card Plans:
Figures:
Figure 1: A Typical Smart Card:
Figure 2: Features That May Be Incorporated into Smart Cards:
Figure 3: Distribution of 62 Federal Projects by Project Phase:
Abbreviations:
CAC: Common Access Card:
DOD: Department of Defense:
EBT: electronic benefits transfer:
EPIC: Electronic Processes Initiatives Committee:
FAA: Federal Aviation Administration:
GSA: General Services Administration:
GSC-IAB: Government Smart Card Interagency Advisory Board:
HPP: Health Passport Project:
ID: identification:
NIST: National Institute of Standards and Technology:
OIG: Office of Inspector General:
OMB: Office of Management and Budget:
PKI: public key infrastructure:
TSA: Transportation Security Administration:
VA: Department of Veterans Affairs:
WGA: Western Governors‘ Association:
Letter January 3, 2003:
The Honorable Tom Davis
Chairman, Subcommittee on Technology
and Procurement Policy
Committee on Government Reform
House of Representatives:
Dear Mr. Chairman:
As you know, technology plays an important role in helping the federal
government provide security for its many physical and information
assets. In particular, ’smart cards“[Footnote 1] offer the potential to
significantly improve the process of verifying the identity of people
accessing federal buildings and computer systems, especially when used
in combination with other technologies, such as biometrics. Further,
smart cards can be used to support other business-related functions,
such as tracking immunization records or storing cash value for
electronic purchases. The General Services Administration (GSA) has
promoted the adoption of smart card technology across government based
on a goal, set in 1998, of equipping all federal employees with a
standardized smart card for a wide range of services.
This report responds to your request that we review the federal
government‘s progress in promoting the use of smart cards as a way to
streamline and better secure interactions between individuals and
government agencies. Specifically, we agreed to assess (1) the extent
to which federal agencies have adopted smart card technologies and
realized the associated benefits, (2) the challenges of adopting smart
cards within federal agencies, and (3) the effectiveness of GSA in
promoting the adoption of smart card technologies within the federal
government.
Results in Brief:
As of November 2002, 18 agencies had reported initiating a total of 62
smart card projects in the federal government. These projects have
provided a range of benefits and services to agencies and individual
cardholders. Until recently, many of these projects were small-scale
demonstration projects, involving as few as 100 cardholders and
intended to show the value of using smart cards for identification or
to store cash value or other personal information. However, over the
last 2 years, much larger projects have been initiated to provide
agencywide identification credentials and support advanced
technologies to verify the identity of people accessing computer
systems. To date, the largest smart card program to be implemented in
the federal government is the Common Access Card (CAC) program of the
Department of Defense (DOD), which is intended to be used for
identification by about 4 million military and civilian personnel.
Results from projects that are already in place indicate that smart
cards offer many useful benefits, such as significantly reducing the
processing time required for deploying military personnel, tracking
immunization records of children, and verifying the identity of
individuals accessing buildings and computer systems.
While the technology offers benefits, launching smart card projects--
whether large or small--has proved challenging to federal agencies.
According to agency officials, the multiple benefits of smart card
adoption can be achieved only if key management and technical
challenges are understood and addressed. Major implementation
challenges include the following:
* Sustaining executive-level commitment. Without executive-level
support and clear direction, large-scale smart card initiatives may
encounter organizational resistance and cost concerns that lead to
delays or cancellation. DOD officials stated that having a formal
mandate to proceed with their CAC program has been crucial to its
success.
* Recognizing resource requirements. Implementing a smart card system
can be an expensive undertaking. Extensive upgrades may be needed to an
agency‘s technical infrastructure, such as installing smart card
readers on every computer system or developing new back-end systems to
process and keep track of the identities associated with each card. If
a public key infrastructure (PKI) is implemented in conjunction with
smart cards, additional costs may be incurred to modify existing
software applications so that they work with smart cards and
PKI.[Footnote 2] Nevertheless, to obtain significant benefits such as
increasing security over buildings, safeguarding computer systems and
data, and conducting financial and nonfinancial transactions more
accurately and efficiently, these costs may be justified.
* Integrating physical and logical security practices across
organizations. The ability of smart card systems to address both
physical and ’logical“ security[Footnote 3] means that unprecedented
levels of cooperation may be required among internal organizations that
often had not previously collaborated, such as physical security
organizations and information technology (IT) organizations. Further, a
departmentwide smart card initiative is likely to require substantial
changes in existing processes for credentialing individuals, verifying
those credentials when presented at building entrances, and accessing
and using computer systems.
* Achieving interoperability among smart card systems.[Footnote 4] As
agencies consider adopting smart cards and plan specific
implementations, it will be important to ensure that these
implementations are consistent across the government. Developing
standards to ensure that smart cards, card readers, and related
technologies such as biometrics can interoperate across government will
be critical to realizing the benefits that could be achieved by
investments in such technologies.
* Maintaining the security of smart card systems and privacy of
personal information. Although concerns about security are a key driver
for the adoption of smart card technology in the federal government,
the security of smart card systems themselves is not foolproof and must
be addressed when agencies plan the implementation of smart card
systems. In addition, protecting the privacy of personal information is
of growing concern and must be addressed with regard to the data
contained on smart cards.
These challenges have slowed the adoption of smart card technology in
past years; however, in the future, these challenges may prove less
difficult, not only because of increased management attention to
securing federal facilities and information systems, but also because
technical advances have improved the capabilities and reduced the cost
of smart card systems.
GSA‘s effectiveness in promoting smart card technology in the federal
government has been mixed. The agency has contributed significantly to
making it easier for federal agencies to acquire commercial smart card
products by implementing a governmentwide contracting vehicle based on
technical standards developed in collaboration with the National
Institute of Standards and Technology (NIST) and smart card vendors.
Further, it has taken action to organize federal smart card managers
and share information about the technology. While these activities have
been helpful, GSA has not taken other important steps to improve smart
card initiatives and deployment strategies. For example, GSA‘s
effectiveness in demonstrating the value and readiness of smart card
technology to other agencies and officials was limited because of
problems implementing its own internal smart card systems and
coordinating its smart card policies. Further, the agency has not kept
its administrative guidelines or implementation strategy up to date.
Nor has it established standards for the use of smart cards as a
component of federal building security processes. Finally, GSA has not
developed a framework for evaluating smart card implementations to help
agencies reduce risks and contain costs.
While GSA can unilaterally take a number of actions to promote smart
card adoption, it shares responsibility for governmentwide guidance
with the Office of Management and Budget (OMB) and NIST. OMB has
statutory responsibility to develop and oversee policies, principles,
standards, and guidelines used by agencies for ensuring the security of
federal information and systems, but it has not issued policy or
guidance specifically addressing smart cards since designating GSA the
lead for promoting the technology in 1996. NIST has continuing
responsibility for coordinating the development of technical standards
required by GSA‘s governmentwide smart card contract.
To enhance governmentwide security over federal personnel, buildings,
and information systems, we are making recommendations to NIST, GSA,
and OMB to take actions aimed at better supporting agency efforts to
deploy interoperable smart-card-based identification systems.
We received written comments on a draft of this report from the
Secretary of Commerce and DOD‘s Deputy Chief Information Officer. We
also received oral comments from officials of OMB‘s Office of
Information and Regulatory Affairs, including the Information Policy
and Technology Branch Chief; from the Commissioner of the Immigration
and Naturalization Service; from GSA‘s Associate Administrator for the
Office of Governmentwide Policy; and from officials representing FAA,
the Maritime Administration, the Transportation Security
Administration, and Chief Information Officer of the Department of
Transportation. All the agency officials who commented generally agreed
with our findings and recommendations.
Background:
Today, federal employees are issued a wide variety of identification
(ID) cards, which are used to access federal buildings and facilities,
sometimes solely on the basis of visual inspection by security
personnel. These cards often cannot be used for other important
identification purposes--such as gaining access to an agency‘s computer
systems--and many can be easily forged or stolen and altered to permit
access by unauthorized individuals. In general, the ease with which
traditional ID cards--including credit cards--can be forged has
contributed to increases in identity theft and related security and
financial problems for both individuals and organizations.[Footnote 5]
Smart cards are plastic devices about the size of a credit card that
contain an embedded integrated circuit chip capable of both storing and
processing data.[Footnote 6] Figure 1 shows a typical example of a
smart card. The unique advantage of smart cards--as opposed to cards
with simpler technology, such as magnetic stripes or bar codes--is that
smart cards can exchange data with other systems and process
information rather than simply serving as static data repositories. By
securely exchanging information, a smart card can help authenticate the
identity of the individual possessing the card in a far more rigorous
way than is possible with simpler, traditional ID cards. A smart card‘s
processing power also allows it to exchange and update many other kinds
of information with a variety of external systems, which can facilitate
applications such as financial transactions or other services that
involve electronic record keeping.
Figure 1: A Typical Smart Card:
[See PDF for image] - graphic text:
[End of figure] - graphic text:
Smart cards can also be used to significantly enhance the security of
an organization‘s computer systems by tightening controls over user
access. A user wishing to log on to a computer system or network with
controlled access must ’prove“ his or her identity to the system--a
process called authentication. Many systems authenticate users by
merely requiring them to enter secret passwords, which provide only
modest security because they can be easily compromised. Substantially
better user authentication can be achieved by supplementing passwords
with smart cards. To gain access under this scenario, a user is
prompted to insert a smart card into a reader attached to the computer
as well as type in a password. This authentication process is
significantly harder to circumvent because an intruder would need not
only to guess a user‘s password but also to possess the same user‘s
smart card.
Even stronger authentication can be achieved by using smart cards in
conjunction with biometrics. Smart cards can be configured to store
biometric information (such as fingerprint templates or iris scans) in
electronic records that can be retrieved and compared with an
individual‘s live biometric scan as a means of verifying that person‘s
identity in a way that is difficult to circumvent. A system requiring
users to present a smart card, enter a password, and verify a biometric
scan provides what security experts call ’three-factor“ authentication,
the three factors being ’something you possess“ (the smart card),
’something you know“ (the password), and ’something you are“ (the
biometric). Systems employing three-factor authentication are
considered to provide a relatively high level of security. The
combination of smart cards and biometrics can provide equally strong
authentication for controlling access to physical facilities.[Footnote
7]
Smart cards can also be used in conjunction with PKI technology to
better secure electronic messages and transactions. A properly
implemented and maintained PKI can offer several important security
services, including assurance that (1) the parties to an electronic
transaction are really whom they claim to be, (2) the information has
not been altered or shared with any unauthorized entity, and
(3) neither party will be able to wrongfully deny taking part in the
transaction. An essential component is the use of electronic encryption
keys, called ’private keys,“ that are unique to each user and must be
kept secret and secure. For example, storing and using private keys on
a user‘s computer leaves them susceptible to attack because a hacker
who gains control of that computer may then be able to use the private
key stored in it to fraudulently sign messages and conduct electronic
transactions. However, if the private key is stored on a user‘s smart
card, it may be significantly less vulnerable to attack and compromise.
Security experts generally agree that PKI technology is most effective
when deployed in conjunction with smart cards.[Footnote 8]
In addition to enhancing security, smart cards have the flexibility to
support a wide variety of uses not related to security. A typical smart
card in use today can store and process 16 to 32 kilobytes of data,
while newer cards can accommodate 64 kilobytes. The larger the card‘s
electronic memory, the more functions can be supported, such as
tracking itineraries for travelers, linking to immunization or other
medical records, or storing cash value for electronic purchases.
Other media--such as magnetic stripes, bar codes, and optical memory
(laser-readable) stripes--can be added to smart cards to support
interactions with existing systems and services or provide additional
storage capacity. For example, an agency that has been using magnetic
stripe cards for access to certain facilities could migrate to smart
cards that would work with both its existing magnetic stripe readers as
well as new smart card readers. Of course, the functions provided by
the card‘s magnetic stripe, which cannot process transactions, would be
much more limited than those supported by the card‘s integrated circuit
chip. Optical memory stripes (which are similar to the technology used
in commercial compact discs) can be used to equip a card with a large
memory capacity for storing more extensive data--such as color photos,
multiple fingerprint images, or other digitized images--and making that
card and its stored data very difficult to counterfeit.[Footnote 9]
Smart cards are grouped into two major classes: contact cards and
’contactless“ cards. Contact cards have gold-plated contacts that
connect directly with the read/write heads of a smart card reader when
the card is inserted into the device. Contactless cards contain an
embedded antenna and work when the card is waved within the magnetic
field of a card reader or terminal. Contactless cards are better suited
for environments where quick interaction between the card and reader is
required, such as high-volume physical access. For example, the
Washington Metropolitan Area Transit Authority has deployed an
automated fare collection system using contactless smart cards as a way
of speeding patrons‘ access to the Washington, D.C., subway system.
Smart cards can be configured to include both contact and contactless
capabilities, but two separate interfaces are needed, because standards
for the technologies are very different. Figure 2 shows some of the
capabilities and features that can be included in smart cards.
Figure 2: Features That May Be Incorporated into Smart Cards:
[See PDF for image] - graphic text:
[End of figure] - graphic text:
Since the 1990s, the federal government has considered the use of smart
card technology as one option for electronically improving security
over buildings and computer systems. In 1996, GSA was tasked with
taking the lead in facilitating a coordinated interagency management
approach for the adoption of multiapplication smart cards across
government. The tasking came from OMB, which has statutory
responsibility to develop and oversee policies, principles, standards,
and guidelines used by agencies for ensuring the security of federal
information and systems. At the time, OMB envisioned broad adoption of
smart card technology throughout the government, as evidenced by the
President‘s budget for fiscal year 1998, which set a goal of enabling
every federal employee ultimately to be able to use one smart card for
a wide range of purposes, including travel, small purchases, and
building access. In January 1998, the President‘s Management Council
and the Electronic Processing Initiatives Committee[Footnote 10] (EPIC)
established an implementation plan for smart cards that called for a
governmentwide, multiapplication card that would support a range of
functions--including controlling access to government buildings--and
operate as part of a standardized system. More recently, several
legislative bills have been proposed or enacted in the wake of the
events of September 11, 2001, to enhance national security and
counterterrorism by using smart card and biometric technologies to
better identify individuals entering the country or gaining access to
mass transportation systems.[Footnote 11]
Objectives, Scope, and Methodology:
Our objectives were to assess (1) the extent to which federal agencies
have adopted smart card technologies and realized the associated
benefits, (2) the challenges of adopting smart cards within federal
agencies, and (3) the effectiveness of GSA in promoting the adoption of
smart card technologies within the federal government.
To assess the extent of smart card adoption by federal agencies and
identify associated benefits and challenges, we reviewed smart card
project documentation, cost estimates, and other studies from GSA; OMB;
the Western Governors‘ Association (WGA), which was responsible for a
smart card project funded in part by the Departments of Agriculture and
Health and Human Services; the Department of Justice‘s Immigration and
Naturalization Service; DOD; and the Departments of Interior,
Transportation, Treasury, and Veterans Affairs (VA). We also held
discussions with key officials from these organizations regarding
project benefits and challenges. Discussions were also held with
representatives of the Smart Card Alliance, an association of smart
card technology vendors, regarding smart card technology benefits and
challenges. In addition, we reviewed publicly available materials and
reports on smart card technology issues and discussed key issues with
representatives of these organizations.
To assess GSA‘s effectiveness in promoting the governmentwide adoption
of smart cards, we reviewed contract task orders, examined pilot
project documentation, and assessed smart card plans and other reports
obtained from the agency. We also held discussions with key officials
in GSA‘s Office of Governmentwide Policy, Federal Technology Service,
and Public Building Service to obtain information on internal pilot
projects and other key plans and documents. We analyzed reports and
evaluations on the smart card program obtained from GSA‘s Office of
Inspector General. To obtain information on whether GSA had taken an
effective leadership role in fostering the adoption of smart card
technology across government, we interviewed officials from NIST; DOD;
VA; the Departments of Interior, Transportation, and Treasury; and OMB.
We also interviewed officials from WGA.
We performed our work between April and October 2002 in accordance with
generally accepted government auditing standards.
Many Government Smart Card Projects Are under Way or Planned, Offering
a Variety of Benefits:
Since 1998, multiple smart card projects have been launched, addressing
an array of capabilities and providing many tangible and intangible
benefits, such as ways to better authenticate the identity of
cardholders, increase security over buildings, safeguard computer
systems and data, and conduct financial and nonfinancial transactions
more accurately and efficiently. For some federal agencies, the
benefits of using smart card technology (such as improving security
over federal buildings and systems and achieving other business-related
purposes) have only recently been recognized, and many agencies are
still planning projects or evaluating the benefits of this technology
before proceeding with more wide-scale initiatives. Still, results from
several ongoing smart card projects suggest that the technology offers
federal agencies a variety of benefits.
According to information obtained from GSA, OMB, and other federal
agencies, as of November 2002, 18 federal agencies were planning,
testing, operating, or completing a total of 62 smart card projects.
These projects varied widely in size and technical complexity, ranging
from small-scale, limited-duration pilot projects to large-scale,
agencywide initiatives providing multiple services. The projects were
reported to be in varying stages of deployment. Specifically, 13
projects were in the planning stage, and 7 were being piloted. An
additional 17 projects were listed as operational, and 13 had been
completed. No information was provided about the project phase of the
remaining 12 initiatives; it is not clear whether these projects had
moved beyond the planning or pilot testing phases. Figure 3 shows the
status of the 62 federal smart card projects identified by GSA and OMB.
Table 1 provides additional summary information about these projects.
Figure 3: Distribution of 62 Federal Projects by Project Phase:
[See PDF for image] - graphic text:
[End of figure] - graphic text:
Table 1: Summary Information on 62 Federal Smart Card Projects:
Federal agency: Agriculture; Number of projects: 1; [Empty]; Status: 1
operational; Description: Agriculture has implemented a system using a
24k chip card to automatically collect marketing data from peanut
farmers under the peanut quota system..
Federal agency: Commerce; Number of projects: 5; [Empty]; Status: 1
planned; 1 pilot; (for 3, deployment status information not available);
Description: NIST is in the planning phase of its smart card project
and is completing a feasibility study, exploring PKI and biometrics.
The Patent and Trademark Office is piloting a smart card for its Patent
Work at Home program using two-factor authentication and PKI technology
for secure remote logical access. This card is also used as a property
pass and as a stored-value card for transit subsidies..
Federal agency: DOD; Number of projects: 26; [Empty]; Status: 1
planned; 3 pilot; 10 operational; 6 completed; (for 6, deployment
status information not available); Description: Most of these pilots/
programs were used within bases or among particular deployments and
date back to the mid to late 1990s. The majority of the projects, a
total of 22, used the smart card‘s ability to track various types of
information: inventory control, food service, manifesting, and
personnel accountability. Physical and/or logical access capabilities
were a part of a little less than half (10) of the projects. The
largest DOD deployment of smart cards (1.4 million cards), to date, is
the CAC program, which is still being implemented. DOD has set policy
directing that all its previous smart card programs be integrated into
the CAC, with the exception of financial applications. CAC is planned
for use by more than 4 million individuals and features PKI, physical
and logical access controls, and space reserved for organization-
specific applications, in addition to several technologies already in
use, such as magnetic stripes and barcodes..
Federal agency: Education; Number of projects: 1; [Empty]; Status: 1
planned; Description: The Student Financial Assistance Office plans to
use approximately 1,344 smart cards for physical access, transit
benefits, and asset management..
Federal agency: Energy; Number of projects: 1; [Empty]; Status: 1
operational; Description: Energy has a project to issue cards to 28
employees working to clean up and shut down the Rocky Flats Technology
site. The smart cards are to be used for physical access to restricted
areas..
Federal agency: GSA; Number of projects: 3; [Empty]; Status: 1
operational; 2 completed; Description: GSA headquarters has a smart
card in operation for physical and logical access. Medical and meeting
attendance applications have also been developed for use with this
card. A completed pilot at GSA‘s Willow Wood Facility used a smart card
for logical and physical access, for property management, and as a
travel/purchase/phone card. Smart cards were also used at the 1997
presidential inauguration for access control, housing, and telephone
support; they allowed security personnel to monitor movements within
the headquarters facility..
Federal agency: HUD; Number of projects: 2; [Empty]; Status: 1 pilot; 1
completed; Description: The completed project used a 2k chip card for
internal and physical access at HUD‘s headquarters building. HUD
discontinued the program in 1997 and decided to pursue proximity ID
cards..
Federal agency: Interior; Number of projects: 3; [Empty]; Status: 1
planned; 2 pilot; (for 1, deployment status information not available);
Description: The National Park Service is planning to implement a
Firefighters Training Card that will carry qualification and
certification information. The Bureau of Land Management has
distributed 1,100 cards to employees at five sites for physical access
and limited use with PKI-enabled applications. This pilot will most
likely be expanded agencywide. The Minerals Management Service is
piloting a smart card with about half its employees (600 cards) and is
planning to test its security applications..
Federal agency: Justice; Number of projects: 5; [Empty]; Status: 2
planned; (for 3, deployment status information not available);
Description: The organizations within Justice undertaking smart card
projects are the Management Division, Civil Division, Federal Bureau of
Investigation, Office of Inspector General, and National Drug
Intelligence Center..
Federal agency: Labor; Number of projects: 1; [Empty]; Status: 1
operational; Description: Labor has 720 smart cards in use..
Federal agency: NASA; Number of projects: 1; [Empty]; Status: 1
planned; Description: PKI certificates will be used to authenticate and
grant NASA employees and contractors physical and logical access at
NASA facilities..
Federal agency: National Science Foundation; Number of projects: 1;
[Empty]; Status: 1 planned; Description: The National Science
Foundation plans to issue 1,500 smart cards..
Federal agency: Social Security Administration; Number of projects: 1;
[Empty]; Status: 1 planned; Description: Within the Social Security
Administration, 8,868 cards will be used to track government property..
Federal agency: State; Number of projects: 1; [Empty]; Status: 1
operational; Description: Approximately 1,250 cards have been issued to
State employees for physical and logical access. The cards also carry
State PKI certificates. Plans call for 20,000 employees in the national
capital region to receive this card in the near future..
Federal agency: Transportation; Number of projects: 3; [Empty]; Status:
3 planned; Description: Transportation is planning three pilot projects
to implement smart card technology. First, the FAA Identification Media
project plans to issue over 10,000 cards to federal employees and
contract personnel primarily for physical access to FAA facilities.
Second, the Transportation Security Administration‘s Transportation
Worker Identification Card is planned to be issued to approximately 10-
15 million transportation workers for physical and logical access to
facilities and systems. Third, a stored value card is planned to be
issued to 25,000 Transportation employees as part of the Federal
Transit Administration Assistance program. Information gathered using
this card will provide better data for ridership analysis and transit
route planning..
Federal agency: Treasury; Number of projects: 2; [Empty]; Status: 1
planned; 1 operational; Description: Treasury planned to distribute
10,500 cards to test various uses including physical and logical
access, property management, biometrics, and food service eligibility.
Upon validation, officials expect the project to be expanded
agencywide. IRS is using smart cards to obtain secure dial-in access to
the IRS local area network..
Federal agency: U.S. Agency for International Development; Number of
projects: 1; [Empty]; Status: 1 completed; Description: The U.S. Agency
for International Development implemented a pilot smart-card-based
national electronic payment system in Armenia. The project has been
discontinued..
Federal agency: Veterans Affairs (VA); Number of projects: 3; [Empty];
Status: 1 operational; (for 2, deployment status information not
available); Description: VA has issued 24,038 cards containing
demographic, emergency, and eligibility data as well as PKI
certificates to allow digital signatures on electronic service delivery
transactions at two sites. An additional two VA hospital locations
separately tested smart cards as ID badges and for electronic purchases
to be used for vending, cash registers, and automatic teller machines..
Source: GSA and OMB.
[End of table]
Many pilot projects initiated in the late 1990s deployed smart cards
for specific, limited purposes in order to demonstrate the usefulness
of the technology. For example, GSA distributed smart cards to
approximately 3,000 staff and visitors at the 1997 presidential
inauguration to control physical access to that event. The cards
contained information that granted individuals access to specific event
activities and allowed security personnel to monitor movements within
the event‘s headquarters facility as well as maintain records on those
entering secure areas.
Likewise, many smart card pilot projects were implemented by the
military services to demonstrate the technology‘s usefulness in
enhancing specific business operations, such as creating electronic
manifests to help deploy military personnel more efficiently, managing
medical records for military personnel, and providing electronic cash
to purchase goods and food services at remote locations. Officials at
military bases and installations participating in these pilots reported
that smart cards significantly reduced the processing time required for
deploying military personnel--from several days to just a few hours.
Recently, broader and more permanent projects have begun. Among federal
agencies, DOD has made a substantial investment in developing and
implementing an agencywide smart card system. DOD‘s CAC is to be used
to authenticate the identity of nearly 4 million military and civilian
personnel and to improve security over on-line systems and
transactions. The cards are being deployed in tandem with the rollout
of a departmentwide PKI. As of November 2002, DOD had issued
approximately 1.4 million CACs to military and civilian personnel and
had purchased card readers and middleware[Footnote 12] for about 1
million of its computers. More information about DOD‘s program appears
in appendix I.
The Department of Transportation is also developing two large smart
card pilot projects, which will be focused on controlling access to and
improving security at the nation‘s many transportation hubs as well as
at federal facilities controlled by the department. One pilot aims to
distribute smart cards to approximately 10,000 FAA employees and
contractor personnel for access to the department‘s facilities.
Subsequent phases will be implemented across the agency to
approximately 100,000 employees. In the second pilot, transportation
worker identification cards will be issued to about 15 million
transportation workers across the United States and is intended to
improve physical and logical access to public transportation
facilities. Transportation plans to document results from the pilot
project, including benefits and costs.
Other federal agencies are now using smart cards for controlling
logical access to computer systems and networks. For example, the
Internal Revenue Service (IRS) distributed smart cards to approximately
30,000 of its revenue agents and officers for use when accessing the
agency‘s network remotely through notebook computers. According to an
IRS official, the cards are still in use and working well.
In July 2002, the Department of the Treasury announced plans to launch
a pilot project to assess the use of smart cards for multiple purposes,
including both physical and logical access. Treasury plans to
distribute smart cards equipped with biometrics and PKI capabilities to
approximately 7,200 employees during its pilot test. Treasury‘s main
department offices and five Treasury bureaus will be involved in the
pilot test: U.S. Secret Service; IRS; Bureau of Alcohol, Tobacco, and
Firearms; Bureau of Engraving and Printing; and the Federal Law
Enforcement Training Center. According to Treasury officials, if the
smart card pilot proves successful, it will be implemented across the
department.
While efforts such as these represent a recent trend toward adopting
agencywide smart cards for security functions, almost half (42 percent)
of the projects that have been undertaken to date, as identified by GSA
and OMB, involved storing either cash value on the cards for use in
making small purchases or other information for use in processing
electronic payment transactions, transit benefits, or agency-specific
applications. Many of these projects (45 percent) used smart cards that
supported a combination of media, such as magnetic stripes, bar codes,
and optical memory stripes. Further, the majority (86 percent) of these
non-security-oriented projects involved cards used internally, usually
to support formerly paper-based functions. For example, in October
1994, the 25TH Infantry Division in Hawaii was issued 30,000 smart
cards configured to support medical documentation, mobility processing,
manifesting, personnel accountability, health care, and food service.
In this pilot, the most notable benefit was seen in deployment
readiness. The deployment process, which normally took a day or more,
was reduced to a matter of hours.
In another example of a stored-value card project, the Departments of
Agriculture and Health and Human Services supported a project by the
WGA to issue smart cards to approximately 12,000 individuals--including
pregnant women, mothers, and children--who were eligible for electronic
benefits transfer (EBT) programs such as the Women, Infants, and
Children program, Head Start, Food Stamps, and other public health
programs in three different states. The smart cards contained a circuit
chip that included demographic, health, appointment, and EBT
information, as well as a magnetic stripe that included Medicaid
eligibility information. The smart cards also allowed grocery and
retail establishments to track food purchases and rebate offers or
coupon redemptions more accurately. Users helped control information
stored on the card with a personal identification number and were
provided with kiosks to read or view information stored on the card.
According to WGA officials, the pilot was a success because
participants had immediate access to healthcare appointment and
immunization records. In addition, federal and state agencies were able
to track benefits and baby formula purchases more accurately, resulting
in manufacturers no longer questioning the process used by these
government organizations to collect millions in rebate offers.
To demonstrate that a single smart card could have many uses and
provide many benefits, GSA‘s Federal Technology Service introduced a
multipurpose smart card to its employees during a pilot project
conducted in the summer of 1999. The card functioned as a property
management device, boarding pass for American Airlines, credit card for
travel, and stored-value calling card. The card used fingerprint
biometric technology, as well as digital certificates for use in
signing E-mail messages. In addition, the card contained a contactless
interface--an embedded antenna--that allowed cardholders to access
transit services by waving the card near a card reader to
electronically pay for these services.
Appendix I provides more detailed information about smart card projects
at several government agencies.
Successful Adoption of Smart Cards Can Be Achieved If Challenges Are
Met:
The benefits of smart card adoption identified by agency officials can
be achieved only if key management and technical challenges are
understood and met. While these challenges have slowed the adoption of
smart card technology in past years, they may be less difficult in the
future, not only because of increased management concerns about
securing federal facilities and information systems, but also because
technical advances have improved the capabilities and reduced the cost
of smart card systems. Major implementation challenges include:
* sustaining executive-level commitment;
* recognizing resource requirements;
* coordinating diverse, cross-organizational needs and transforming
organizational security practices;
* achieving interoperability among smart card systems; and:
* maintaining security and privacy.
Sustaining Executive-Level Commitment:
Nearly all the officials we interviewed indicated that maintaining
executive-level commitment is essential to implementing a smart card
system effectively. According to officials both within DOD and in
civilian agencies, the formal mandate of the Deputy Secretary of
Defense to implement a uniform, common access identification card
within DOD was essential to getting a project as large as the CAC
initiative launched and funded.[Footnote 13] The Deputy Secretary also
assigned roles and responsibilities to the military services and
agencies and established a deadline for defining smart card
requirements. DOD officials noted that without such executive-level
support and clear direction, the smart card initiative likely would
have encountered organizational resistance and cost concerns that would
have led to significant delays or cancellation.
Treasury and Transportation officials also indicated that sustained
high-level support had been crucial in launching smart card initiatives
within their organizations and that without this support, funding for
such initiatives probably would not have been available. In contrast,
other federal smart card pilot projects have been cancelled due to lack
of executive-level support. Officials at VA indicated that their pilot
VA Express smart card project, which issued cards to veterans for use
in registering at VA hospitals, would probably not be expanded to full-
scale implementation, largely because executive-level priorities had
changed, and support for a wide-scale smart card project had not been
sustained.
Recognizing Resource Requirements:
Smart card implementation costs can be high, particularly if
significant infrastructure modifications are required or other
technologies, such as biometrics and PKI, are being implemented in
tandem with the cards. However, in light of the benefits of better
authenticating personnel, increasing security over access to buildings,
safeguarding computer systems and data, and conducting financial and
nonfinancial transactions more accurately and efficiently, these costs
may be acceptable. Key implementation activities that can be costly
include managing contractors and card suppliers, developing systems and
interfaces with existing personnel or credentialing systems, installing
equipment and systems to distribute the cards, and training personnel
to issue and use smart cards. As a result, agency officials stated that
obtaining adequate resources was critical to implementing a major
government smart card system.
For example, Treasury‘s project manager estimated the overall cost for
the departmentwide effort at between $50 and $60 million; costs for the
FAA pilot project, which have not yet been fully determined, are likely
to exceed $2.5 million.
At least $4.2 million[Footnote 14] was required to design, develop, and
implement the WGA Health Passport Project (HPP) in Nevada, North
Dakota, and Wyoming and to service up to 30,000 clients. A report on
that project acknowledged that it was complicated and costly to manage
card issuance activities. The states encountered problems when trying
to integrate legacy systems with the smart cards and had difficulty
establishing accountability among different organizations for data
stored on and transferred from the cards. The report further indicated
that help-desk services were difficult to manage because of the number
of organizations and outside retailers, as well as different systems
and hardware, involved in the project; costs for this service likely
would be about $200,000 annually.[Footnote 15] WGA officials said they
expect costs to decrease as more clients are provided with smart cards
and the technology becomes more familiar to users; they also believe
smart card benefits will exceed costs over the long term.
The full cost of a smart card system can also be greater than
originally anticipated because of the costs of related technologies,
such as PKI. For example, DOD initially budgeted about $78 million for
the CAC program in 2000 and 2001 and expected to provide the device to
about 4 million military, civilian, and contract employees by 2003. It
now expects to expend over $250 million by 2003--more than double the
original estimate. Many of the increases in CAC program costs were
attributed by DOD officials to underestimating the costs of upgrading
and managing legacy systems and processes for card issuance. Card
issuance costs likely will exceed $75 million out of the over $250
million now provided for CAC through 2003, based on information
provided by DOD. These costs are for installing workstations, upgrading
legacy systems, and distributing cards to personnel.
According to DOD program officials, the department will likely expend
over $1 billion for its smart cards and PKI capabilities by 2005. In
addition to the costs mentioned above, the military services and
defense agencies were required to fund the purchase of over 2.5 million
card readers and the middleware to make them work with existing
computer applications, at a cost likely to exceed $93 million by 2003.
The military services and defense agencies are also expected to provide
funding to enable applications to interoperate with the PKI
certificates loaded on the cards. DOD provided about $712 million to
issue certificates to cardholders as part of the PKI program but
provided no additional funding to enable applications.[Footnote 16]
Integrating Physical and Logical Security Practices Across
Organizations:
The ability of smart card systems to address both physical and logical
(information systems) security means that unprecedented levels of
cooperation may be required among internal organizations that often had
not previously collaborated, especially physical security
organizations and IT organizations. Nearly all federal officials we
interviewed noted that existing security practices and procedures
varied significantly across organizational entities within their
agencies and that changing each of these well-established processes and
attempting to integrate them across the agency was a formidable
challenge. Individual bureaus and divisions often have strong
reservations about supporting a departmentwide smart card initiative
because it would likely result in substantial changes to existing
processes for credentialing individuals, verifying those credentials
when presented at building entrances, and accessing and using computer
systems.
DOD officials stated that it has been difficult to take advantage of
the multiapplication capabilities of its CAC for these very reasons.
The card is primarily being used for logical access--for helping to
authenticate cardholders accessing systems and networks and for
digitally signing electronic transactions using PKI. DOD only recently
has begun to consider ways to use the CAC across the department to
better control physical access over military facilities. Few DOD
facilities are currently using the card for this purpose. DOD officials
said it had been difficult to persuade personnel responsible for the
physical security of military facilities to establish new processes for
smart cards and biometrics and to make significant changes to existing
badge systems.
In addition to the gap between physical and logical security
organizations, the sheer number of separate and incompatible existing
systems also adds to the challenge to establishing an integrated
agencywide smart card system. One Treasury official, for example, noted
that departmentwide initiatives, such as its planned smart card
project, require the support of 14 different bureaus and services. Each
of these entities has different systems and processes in place to
control access to buildings, automated systems, and electronic
transactions. Agreement could not always be reached on a single
business process to address security requirements among these diverse
entities.
Achieving Interoperability Among Smart Card Systems:
Interoperability is a key consideration in smart card deployment. The
value of a smart card is greatly enhanced if it can be used with
multiple systems at different agencies, and GSA has reported that
virtually all agencies agree that interoperability at some level is
critical to widespread adoption of smart cards across the government.
However, achieving interoperability has been difficult because smart
card products and systems developed in the past have generally been
incompatible in all but very rudimentary ways. With varying products
available from many vendors, there has been no obvious choice for an
interoperability standard.
GSA considered the achievement of interoperability across card systems
to be one of its main priorities in developing its governmentwide Smart
Access Common ID Card contract. Accordingly, GSA designed the contract
to require awardees to work with GSA and NIST[Footnote 17] to develop a
government interoperability specification. The specification, as it
currently stands, includes an architectural model, interface
specifications, conformance testing requirements, and data models. A
key aspect of the specification is that it addresses aspects of smart
card operations that are not covered by commercial standards.
Specifically, the specification defines a uniform set of command and
response messages for smart cards to use in communicating with card
readers. Vendors can meet the specification by writing software for
their cards that translates their unique command and response formats
to the government standard. Such a specification previously had not
been available.
According to NIST officials, the first version of the interoperability
specification, completed in August 2000, did not include sufficient
detail to establish interoperability among vendors‘ disparate smart
card products. The officials stated that this occurred because
representatives from NIST, the contractors, and other federal agencies
had only a very limited time to develop the first version. Version
2,[Footnote 18] released in June 2002, is a significant improvement,
providing better definitions of many details, such as how smart cards
should exchange information with software applications and card
readers. The revised specification also supports DOD‘s CAC data model
in addition to the common data model developed for the original
specification. However, it may take some time before smart card
products that meet the requirements of version 2 are made available,
because the contractors and vendors (under the Smart Access Common ID
contract) will have to update or redesign their products to meet the
enhanced specification. Further, potential interoperability issues may
arise for those agencies that purchased and deployed smart card
products based on the original specification.
While version 2 addressed important aspects of establishing
interoperability among different vendors‘ smart card systems, other
aspects remain unaddressed. For example, the version 2 specifications
for ’basic services interface“ provide for just 21 common functions,
such as establishing and terminating a logical connection with the card
in a specified reader. Other fundamental functions--such as changing
personal ID numbers and registering cards when they are issued to
users--are not included in the basic services interface. For such
functions, vendors must use what are known as ’extended service
interfaces.“ Because vendors are free to create their own unique
definitions for extended service interfaces and associated software,
interoperability problems may occur if interface designs or software
programs are incompatible. NIST officials stated that, at the time the
specification was finalized, it was not possible to define a standard
for the functions not included in the basic services interface because
existing commercial products varied too widely. According to the NIST
officials, greater convergence is needed among smart card vendors‘
products before agreement can be reached on standards for all important
card functions--including changing passwords or personal
identification numbers--as part of extended service interfaces.
In addition, the guidelines do not address interoperability for
important technologies such as contactless smart cards, biometrics, and
optical memory stripes. GSA and NIST officials indicated that federal
agencies are interested in adopting contactless and biometric
technologies but that more needs to be done to evaluate the
technologies and develop a standard architectural model to ensure
interoperability across government. The government has not yet adopted
industry-developed contactless and biometric standards, which are
generally not extensive enough to ensure interoperability among
commercial products from different vendors. According to one NIST
official, a thorough risk assessment of optical stripe technology needs
to be conducted first, because the security issues for a ’passive“
technology such as optical stripes are different from those of ’active“
chip-based smart cards.[Footnote 19] Although there is no work under
way to include optical stripe technology as an option within the
Government Smart Card Interoperability Specification, the guidance does
not preclude the use of this technology.
Maintaining the Security of Smart Card Systems and Privacy of Personal
Information:
Although concerns about security are a key driver for the adoption of
smart card technology in the federal government, the security of smart
card systems is not foolproof and must be addressed when agencies plan
the implementation of a smart card system. As discussed in the
background section of this report, smart cards can offer significantly
enhanced control over access to buildings and systems, particularly
when used in combination with other advanced technologies, such as PKI
and biometrics. Although smart card systems are generally much harder
to attack than traditional ID cards and password-protected systems,
they are not invulnerable. In order to obtain the improved security
services that smart cards offer, care must be taken to ensure that the
cards and their supporting systems do not pose unacceptable security
risks.
Smart card systems generally are designed with a variety of features
designed to thwart attack.[Footnote 20] For example, cards are assigned
unique serial numbers to counter unauthorized duplication and contain
integrated circuit chips that are resistant to tampering so that their
information cannot be easily extracted and used. However, security
experts point out that because a smart-card-based system involves many
different discrete elements that cannot be physically controlled at all
times by an organization‘s security personnel, there is at least a
theoretically greater opportunity for malfeasance than would exist for
a more self-contained system.[Footnote 21]
In fact, a smart-card-based system involves many parties (the
cardholders, data owner, computing devices, card issuer, card
manufacturer, and software manufacturer) that potentially could pose
threats to the system. For example, researchers have found ways to
circumvent security measures and extract information from smart cards,
and an individual cardholder could be motivated to attack his or her
card in order to access and modify the stored data on the card--perhaps
to change personal information or increase the cash value that may be
stored on the card. Further, smart cards are connected to computing
devices (such as agency networks, desktop and laptop computers, and
automatic teller machines) through card readers that control the flow
of data to and from the smart card. Attacks mounted on either the card
readers or any of the attached computing systems could compromise the
safeguards that are the goals of implementing a smart card system.
Smart cards used to support multiple applications may introduce
additional risks to the system. For example, if adequate care is not
taken in designing and testing each software application, loading new
applications onto existing cards could compromise the security of the
other applications already stored on the cards. In general,
guaranteeing the security of a multiapplication card can be more
difficult because of the difficulty of determining which application is
running inside a multiapplication smart card at any given time. If an
application runs at an unauthorized time, it could gain unauthorized
access to data intended only for other applications.
As with any information system, the threats to a smart card system must
be analyzed thoroughly and adequate measures developed to address
potential vulnerabilities. Our 1998 report on effective security
management practices used by leading public and private
organizations[Footnote 22] and a companion report on risk-based
security approaches[Footnote 23] identified key principles that can be
used to establish a management framework for an effective information
security program. In addition, the National Security Agency‘s draft
guidelines[Footnote 24] for placing biometrics in smart cards include
steps that could be taken to help protect information in smart card
systems, such as encrypting all private keys stored in the smart card
and defining a system security policy with a user certification process
before access to the system is granted.
In addition to security, protecting the privacy of personal information
is a growing concern and must be addressed with regard to the personal
information contained on smart cards. Once in place, smart-card-based
systems designed simply to control access to facilities and systems
could also be used to track the day-to-day activities of individuals,
potentially compromising their privacy. Further, smart-card-based
systems could be used to aggregate sensitive information about
individuals for purposes other than those prompting the initial
collection of the information, which could compromise privacy. The
Privacy Act of 1974[Footnote 25] requires the federal government to
restrict the disclosure of personally identifiable records maintained
by federal agencies, while permitting individuals access to their own
records and the right to seek amendment of agency records that are
inaccurate, irrelevant, untimely, or incomplete. Accordingly, agency
officials need to assess and plan for appropriate privacy measures when
implementing smart card systems.
To address privacy concerns, officials with the WGA indicated that some
participants in the HPP were made aware of the information that would
be stored on their cards. Kiosks were installed in some grocery stores
to encourage individuals to view the information stored on the cards.
Similarly, GSA officials provided employees access to information
stored on their headquarters ID cards and said they received few
complaints about the cards.
While individuals involved in these projects had few concerns, others
may require more assurances about the information stored on smart cards
and how government agencies will use and share data. GSA, NIST, and
other agency officials indicated that security and privacy issues are
challenging, because governmentwide policies have not yet been
established and widespread use of the technology has not yet occurred.
As smart card projects evolve and are used more frequently, especially
by citizens, agencies are increasingly likely to need policy guidance
to ensure consistent and appropriate implementation.
GSA‘s Effectiveness in Facilitating Federal Smart Card Adoption Has
Been Limited:
GSA‘s efforts to promote smart card technology in the federal
government have focused on coordination and contracting-related
activities. The agency has taken several useful actions to organize
federal smart card managers and coordinate planning for the technology.
Its chief contribution has been to make it easier for federal agencies
to acquire commercial smart card products by implementing a
governmentwide contracting mechanism based on a standard developed in
collaboration with NIST and smart card vendors. However, GSA has been
less successful in other areas that are also important for promoting
adoption of smart cards. For example, officials from other federal
agencies indicated that GSA‘s effectiveness at demonstrating the
technology‘s readiness for deployment was limited by its lack of
success in implementing smart cards internally or developing a
consistent agencywide position on the adoption of smart cards. Further,
the agency did not keep its implementation strategy or administrative
guidelines up to date. Nor has the agency established standards for the
use of smart cards as a component of federal building security
processes. Finally, GSA has not developed a framework for evaluating
smart card implementations to help agencies reduce risks and contain
costs.
GSA Has Addressed Many Planned Tasks Associated with Promoting Smart
Cards:
GSA has advanced federal adoption of smart card technology by
addressing many of the major tasks outlined in the 1998 EPIC plan--
which called for a standard governmentwide, multipurpose smart card
system--and by developing its own smart card plan.[Footnote 26] In
response to OMB‘s 1996 tasking that GSA take the lead in promoting
federal adoption of smart cards, the agency first established a
technology office to support its smart card initiative and work with
the President‘s Management Council on deploying the technology across
government.[Footnote 27] Beginning in 1998, GSA took steps to address
tasks identified in the EPIC plan and its own plan, many of which
required the collaboration and support of multiple agencies. For
example, GSA worked with the Department of the Navy to establish a
technology demonstration center to showcase smart card technology and
applications and established a smart card project managers‘ group and
Government Smart Card Interagency Advisory Board (GSC-IAB).[Footnote
28] The agency also established an interagency team to plan for uniform
federal access procedures, digital signatures, and other transactions,
and to develop federal smart card interoperability and security
guidelines. GSA‘s Office of Governmentwide Policy was similarly
established to better coordinate and define governmentwide electronic
policies and technology standards in collaboration with other federal
agencies and stakeholders.
For many federal agencies, GSA‘s chief contribution to promoting
federal adoption of smart cards was its effort in 2000 to develop a
standard contracting vehicle for use by federal agencies in procuring
commercial smart card products from vendors.[Footnote 29] Under the
terms of the contract, GSA, NIST, and the contract‘s awardees worked
together to develop smart card interoperability guidelines--including
an architectural model, interface definitions, and standard data
elements--that were intended to guarantee that all the products made
available through the contract would be capable of working together.
Major federal smart card projects, including DOD‘s CAC and
Transportation‘s planned departmentwide smart card, have used or are
planning to use the GSA contract vehicle.
GSA‘s achievements in promoting the federal adoption of smart card
technology can be gauged by the progress it has made in addressing
tasks laid out in the EPIC plan and its own smart card plan. Table 2,
which provides more detailed information on major tasks from the EPIC
and GSA plans and their current status, shows that GSA has taken steps
to address many of these tasks.
Table 2: Status of Major Tasks from the EPIC and GSA Smart Card Plans:
Task: Form a customer advisory board to provide ongoing advice on the
government‘s card service program; Source: EPIC plan; Milestone: July
1997; Status: Addressed; Comments: GSA established a GSC-IAB in 2000
and smart card project managers‘ group in 1998..
Task: Establish interagency team to evaluate several specific smart
card applications; Source: EPIC plan; Milestone: January 1998; Status:
Partially addressed; Comments: GSC-IAB and NIST helped evaluate some
smart card applications and standards, but not all issues have been
addressed..
Task: Establish a federal card services risk management forum; Source:
EPIC plan; Milestone: March 1998; Status: Open; Comments: Some agencies
have completed risk assessments and shared the information with the
smart card project managers group, but no forum has been established to
address outstanding issues across government..
Task: Establish contract for common access ID program; Source: EPIC,
GSA plans; Milestone: September 1998; Status: Addressed; Comments: The
Smart ID contract was made available for agency use in May 2000..
Task: Develop and issue final federal smart card interoperability
guide; Source: EPIC, GSA plans; Milestone: June 1998; Status:
Addressed; Comments: Working with NIST, GSA issued the first version of
the guidelines in August 2000 and revisions in June 2002..
Task: Prototype multiapplication cards; Source: EPIC plan; Milestone:
September 1998; Status: Addressed; Comments: Since 1998, GSA and
several other agencies have prototyped multiapplication cards..
Task: Establish a Web-based clearinghouse for smart cards; Source: EPIC
plan; Milestone: May 1998; Status: Addressed; Comments: GSA established
its smart card Web site at www.smart.gov..
Task: Establish interagency work groups to address common access and
core card applications; Source: GSA plan; Milestone: September 1998;
Status: Addressed; Comments: Through the GSC-IAB and NIST, common
access and core card applications and interfaces have been addressed..
Task: Implement and evaluate pilot projects; Source: GSA plan;
Milestone: March 1999; Status: Partially addressed; Comments: GSA
launched several pilot projects but did not always evaluate the
initiatives, according to the Office of Inspector General..
Task: Work with international governments and establish on-line
services; Source: GSA plan; Milestone: October 1998; Status: Partially
addressed; Comments: GSA and NIST are working with several
international standards groups, but no on-line services have been
established..
Task: Develop and implement a smart card pilot project to improve
electronic building access; Source: GSA plan; Milestone: September
1998; Status: Partially addressed; Comments: Some limited pilot project
testing has been completed to improve electronic building access..
Task: Work with Sandia National Laboratories to develop a high-level
vulnerability assessment framework for smart card access controls;
Source: GSA plan; Milestone: September; 1998; Status: Partially
addressed; Comments: Framework is not yet complete, though some initial
analysis has been conducted..
Task: Develop a joint security access program and technology center to
demonstrate smart card technology; Source: GSA plan; Milestone:
September; 1998; Status: Open; Comments: Although a technology center
has been established, no work has been completed on a joint security
access program. NIST and the Department of State recently established
an Interagency Interoperability Task Force to address some of these
issues..
Task: Launch pilot internally and explore business lines for smart
cards; Source: GSA plan; Milestone: December 1999; Status: Addressed;
Comments: GSA established a business line for smart cards in 1999..
Task: Develop biometric application interface program for smart cards
and conduct pilot projects; Source: GSA plan; Milestone: September;
1998; Status: Partially addressed; Comments: GSC-IAB, GSA, NIST, and
DOD are considering standards for biometrics and some pilots are under
way..
Task: Develop interagency framework for managing card services across
government, including evaluating and testing for compliance; Source:
GSA plan; Milestone: Fall 1998; Status: Open; Comments: GSC-IAB, GSA,
and NIST are considering evaluation and testing suites for smart cards
but have not yet developed an interagency framework..
Source: GAO.
[End of table]
GSA Has Not Fully Addressed Other Key Promotion Activities:
Although GSA accomplished many of the tasks for promoting smart card
adoption that were planned in 1998, many additional activities
essential to advancing the adoption of smart cards across government
still need to be addressed. Evolving federal security needs and steady
advances in smart card technology mean that federal agency needs likely
have changed since 1998. For example, in the wake of the events of
September 11, 2001, increased management attention has been paid to
security both for access to federal buildings as well as for protecting
information systems. At the same time, advances in smart card
technology have led to commercial products that are both cheaper and
more capable, potentially altering cost/benefit calculations that
agencies may have made in the past. Thus far, OMB has not issued any
further policy or guidance related to smart card technology, although
it was in the process of identifying and examining smart card
technology issues at the time of our review.
In light of factors that have arisen or changed since GSA‘s smart card
promotion objectives were set in 1998, we identified the following four
specific issues that have not been addressed by GSA:
* Showing leadership by successfully adopting smart cards internally. A
key element of effectively promoting the adoption of a new technology
such as smart cards is to demonstrate the technology‘s effectiveness in
an operational setting by successfully undertaking well-coordinated
pilot projects that demonstrate the technology‘s benefits. One of the
objectives in GSA‘s 1998 smart card plan was to lead by example in
implementing and showcasing smart cards. Yet GSA‘s pilot projects have
generally not allowed the agency to lead by example. According to a
report completed by GSA‘s Office of Inspector General (OIG) in
September 2000, there has been ’no continued centralized management or
direction of GSA‘s internal smart card implementation, nor any
coordination and monitoring of pilots.“[Footnote 30] For example, the
OIG reported that some of GSA‘s projects lacked management support and
adequate funding, resulting in delays and partially completed project
tasks. In terms of coordination, GSA has been unable to develop and
implement a strategy to deploy smart card technology in a standard
manner across the agency. For example, two divisions within GSA, the
Federal Supply Service and the Public Building Service, while operating
in areas where smart cards have a known benefit, did not use GSA‘s
standard governmentwide contracting vehicle, which requires adherence
to the government smart card interoperability specification. In
addition, draft guidance on implementing a standard smart-card-based
identification system across GSA was not prepared until April 2002 and
is still incomplete and unapproved.
Officials at three federal agencies, actively engaged in developing
their own smart card systems, said that GSA‘s internal track record for
implementation had raised doubts about its ability to promote smart
cards governmentwide. A Department of the Interior official stated that
GSA had not been successful in building a business case for smart card
adoption, and that, as a result, the Public Building Service was not
supporting the Federal Technology Service‘s efforts to implement smart
card technology at government facilities, causing problems for tenant
agencies looking to move to smart-card-based systems. Similarly, a DOD
official stated that GSA did not have the expertise to successfully
implement smart cards or assist others attempting to do so because it
lacked practical experience deploying the technology internally and
working collaboratively with different organizations on management and
technical issues.
* Maintaining an up-to-date implementation strategy and smart card
guidelines. GSA‘s implementation strategy for smart cards consists of
the plan it prepared in 1998 as well as the EPIC plan, also developed
in 1998. Neither addresses recent issues related to smart card
implementation, such as advances in smart card technology or increased
federal security concerns since the attacks of September 11, 2001. In
2002, GSA began to survey federal agencies, through the
GSC-IAB, on smart card implementation issues they were
experiencing.[Footnote 31] According to GSA officials, the GSC-IAB
survey will provide input to the agency that can be used to update its
agenda for promoting federal smart card adoption. However, GSA has not
yet committed to developing a new planning document with revised
objectives and milestones.
GSA also has not updated its smart card administrative guidelines since
2000. In October 2000, GSA issued its guidelines for implementing smart
cards in federal agencies.[Footnote 32] GSA developed the guidelines
’to provide step-by-step guidance for those agencies wishing to utilize
the Smart Identification Card contract vehicle to procure and implement
an interoperable employee identification card.“ Although the stated
purpose of this document was to complement the Smart Identification
Card contract, the section discussing standards and specifications does
not refer to the government smart card interoperability specification
recently developed by GSA and NIST, nor does it provide explicit
guidance on using the interoperability specification or other critical
technologies, such as contactless cards and biometrics.
* Coordinating the adoption of standard federal building security
processes. GSA has not taken action to develop and coordinate standard
procedures for federal building security, which would help agencies
implement smart-card-based ID systems in a consistent and effective
manner. GSA is responsible for managing security at over 7,300 federal
facilities, with widely varying security needs.[Footnote 33] In 1999,
several internal GSA organizations--including the Office of
Governmentwide Policy, the Federal Technology Service, the Federal
Supply Service, and the Public Building Service--proposed working
together to develop a standard approach for federal building security
using smart card technology. However, this proposal has not been
adopted, nor has any alternative strategy been developed for deploying
smart card technology at federal facilities. Officials in the Federal
Technology Service and the Public Building Service said that they
intended to work together to develop a strategy for smart card use at
federal facilities, but they have not yet begun to do so.[Footnote 34]
Although not part of a concerted standards setting process, the Federal
Technology Service‘s recently launched pilot smart card project could
serve in the future as a basis for a federal building security
standard. The pilot involved upgrading and standardizing building
security systems at three government facilities in Chicago, Illinois.
The project is based on smart cards with biometric capabilities to
identify employees entering these facilities. At least three federal
agencies are expected to participate in the project, and its costs have
been estimated to range between $450,000 and $500,000. If the project
is successful, it may serve as an example for other federal agencies
interested in using smart card technology for their building security
processes.
* Evaluating projects to reduce implementation risks and costs.
Although GSA has developed administrative and business case guidelines
to help agencies identify smart card benefits and costs, as well as
establishing the smart card program managers‘ group and the GSC-IAB to
discuss project issues, it has not established a framework for
evaluating smart card projects to help agencies minimize implementation
costs and risks and achieve security improvements. In September 2000,
the GSA OIG reported that measurable standards were needed to assess
smart card projects and help GSA lead the smart card program. It also
suggested that more information and lessons learned from smart card
pilot projects were needed to make improvements in the federal smart
card program and to better ensure success.[Footnote 35] GSA agreed with
the issues identified by the OIG but has not yet taken action to
address recommendations cited in the report.
Officials from other agencies indicated that more information is needed
on smart card implementation costs and opportunities for cost savings
to help agencies make a business case for the technology and to address
implementation challenges. According to one agency official, more
information sharing is needed on smart card implementation strategies
that work and that help reduce project management costs and problems
with software and hardware implementation. Agency officials also
indicated that measures are needed to determine whether smart cards are
working as intended to improve security over federal buildings,
computer systems, and critical information, as called for by the
President‘s Management Agenda and the Office of Homeland Security. GSA
officials indicated that many of these issues likely would be addressed
by the GSC-IAB at some later date but that no specific milestones for
doing so had been set.
Conclusions:
Progress has been made in implementing smart card technology across
government, with increasingly ambitious projects, such as DOD‘s CAC,
being initiated in recent years as federal managers focus on
implementing smart cards to enhance security across organizations. To
successfully implement smart-card-based systems, agency managers have
faced a number of substantial challenges, including sustaining
executive-level commitment, obtaining adequate resources, integrating
physical and logical security practices, achieving interoperability
among smart card systems, and maintaining system security and privacy
of personal information. As both technology and management priorities
evolve, these challenges may be becoming less insurmountable,
particularly with the increased priority now being placed on heightened
security practices to better maintain homeland security. Further, the
interoperability challenge may be significantly reduced as continuing
efforts are made to increase the scope and usefulness of the government
smart card interoperability specification.
However, without overall guidance and budgetary direction from OMB,
agencies may be unnecessarily reluctant to take advantage of the
potential of smart cards to enhance security and other agency
operations. Although OMB has statutory responsibility to develop and
oversee policies, standards, and guidelines used by agencies for
ensuring the security of federal information and systems, it has not
issued any guidance or policy on governmentwide adoption of smart cards
since 1996, when it designated GSA the lead for promoting federal
adoption of the technology.
GSA continues to play an important role in assisting agencies as they
assess the potential of smart cards and move to implement them. GSA has
already provided important technical and management support by
developing the Smart Access Common ID contract vehicle, supporting
NIST‘s development of the government smart card interoperability
specification, and setting up the GSC-IAB. However, GSA has not taken
all the steps it could have to provide full support to agencies
contemplating the adoption of smart cards. Its implementation strategy
and administrative guidance have not been kept up to date and do not
address current priorities and technological advances. Nor have
building security standards been adopted or an evaluation process
developed that address implementation of smart card systems. If such
tasks were addressed, federal agency IT managers would face fewer risks
in deciding how and under what circumstances to implement smart-card-
based systems.
Recommendations:
We recommend that the Director, OMB, issue governmentwide policy
guidance regarding adoption of smart cards for secure access to
physical and logical assets. In preparing this guidance, OMB should
seek input from all federal agencies that may be affected by the
guidance, with particular emphasis on agencies with smart card
expertise, including GSA, the GSC-IAB, and NIST.
We recommend that the Director, NIST, continue to improve and update
the government smart card interoperability specification by addressing
governmentwide standards for additional technologies--such as
contactless cards, biometrics, and optical stripe media--as well as
integration with PKI, to ensure broad interoperability among federal
agency systems.
We recommend that the Administrator, GSA, improve the effectiveness of
its promotion of smart card technologies within the federal government
by:
* developing an internal implementation strategy with specific goals
and milestones to ensure that GSA‘s internal organizations support and
implement smart card systems, based on internal guidelines drafted in
2002, to provide better service and set an example for other federal
agencies;
* updating its governmentwide implementation strategy and
administrative guidance on implementing smart card systems to address
current security priorities, including minimum security standards for
federal facilities, computer systems, and data across the government;
* establishing guidelines for federal building security that address
the role of smart card technology; and:
* developing a process for conducting ongoing evaluations of the
implementation of smart-card-based systems by federal agencies to
ensure that lessons learned and best practices are shared across
government.
Agency Comments and Our Evaluation:
We received written comments on a draft of this report from the
Secretary of Commerce and DOD‘s Deputy Chief Information Officer. We
also received oral comments from officials of OMB‘s Office of
Information and Regulatory Affairs, including the Information Policy
and Technology Branch Chief; from the Commissioner of the Immigration
and Naturalization Service; from GSA‘s Associate Administrator for the
Office of Governmentwide Policy; and from officials representing FAA,
the Maritime Administration, the Transportation Security
Administration, and Chief Information Officer of the Department of
Transportation. All the agency officials who commented generally agreed
with our findings and recommendations.
In addition, Commerce commented that a governmentwide smart card
program was needed and that a central activity should be created to
manage and fund such an initiative. However, we believe that, with
sufficient policy guidance and standards to ensure broad
interoperability among agency systems, agencies can effectively develop
smart card programs tailored to their individual needs that also meet
minimum requirements for governmentwide interoperability.
DOD commented that NIST should be tasked with taking the lead in
developing and maintaining interoperability standards for smart cards
and biometrics. DOD also stressed the importance of biometric
technology interoperability with smart cards in support of the adoption
of a single set of authenticating credentials for governmentwide use.
Finally, DOD also commented that the use of smart card technology for
federal building security should be strengthened. We believe our
recommendations are consistent with the department‘s comments.
GSA noted that significant work had gone into developing smart card
technology and provided additional details about activities it has
undertaken that are related to our recommendations.
In addition, each agency provided technical comments, which have been
addressed where appropriate in the final report.
Unless you publicly announce the contents of this report earlier, we
plan no further distribution until 30 days from the report date. At
that time, we will send copies of this report to the Ranking Minority
Member, Subcommittee on Technology and Procurement Policy, Committee on
Government Reform, and other interested congressional committees. We
will also send copies to the Director, OMB; the Director, NIST; and the
Administrator, GSA. Copies will be made available to others upon
request. In addition, this report also will be available at no charge
on our home page at http://www.gao.gov.
If you have any questions concerning this report, please call me at
(202) 512-6240 or send E-mail to koontzl@gao.gov. Other major
contributors included Barbara Collier, Jamey Collins, John de Ferrari,
Steven Law, Freda Paintsil, and Yvonne Vigil.
Sincerely yours,
Linda D. Koontz
Director, Information Management Issues:
Signed by Linda D. Koontz:
[End of section]
Appendixes:
Appendix I: Information about Selected Government Smart Card Projects:
As part of our review, we examined smart card projects managed by the
Departments of Defense (DOD), Interior, Transportation, Treasury, and
Veterans Affairs (VA), as well as the Immigration and Naturalization
Service (INS) and the Western Governors‘ Association (WGA). These
projects supported a variety of applications and used or considered
smart card technology to improve logical and physical controls over
systems and facilities, as well as to store information for other
purposes, such as conducting financial transactions. The following
provides more information on these projects.
Department of Defense:
In 1999, the Deputy Secretary of Defense issued a policy directive that
called for the implementation of a standard smart-card-based
identification system for all active duty military personnel, DOD
civilian employees, and eligible contractor personnel, to be called the
Common Access Card (CAC) program.[Footnote 36] The directive assigned
the Department‘s Chief Information Officer overall responsibility to
develop departmentwide smart card policy and conduct oversight of the
program. Further, the Department of the Navy was made responsible for
developing departmentwide interoperability standards for using smart
card technology, and the National Security Agency was given the lead
for developing a departmentwide public key infrastructure (PKI) program
to be integrated with the CAC.
In October 2000, Defense began initial rollout with plans to distribute
cards to approximately four million individuals across the department
by 2003. The CAC is equipped with a 32-kilobyte chip formatted in a
standard manner to ensure interoperability among the military services
and defense agencies. It also includes a set of PKI credentials,
including an encryption key, signing key, and digital certificate. To
obtain a CAC, individuals must produce multiple forms of
identification. DOD‘s PKI-enabled computer systems then examine the
digital certificate produced by a user‘s card to determine whether the
cardholder is granted access to specific DOD systems. DOD is working to
adapt its E-mail systems to work with PKI to better ensure that
electronic messages are accessible only by designated recipients. In
addition, according to DOD, cardholders will be able in the future to
electronically sign travel vouchers using the digital certificates on
their cards.
In the future, DOD plans to add biometrics and other advanced
capabilities to the CAC. Biometric data will be stored on the card and
could include fingerprints, palm prints, iris scans, or facial
features. To store these data, the amount of memory on the card would
be doubled from 32 kilobytes to 64 kilobytes. DOD also plans to improve
physical security controls over installations and bases by adding a
contactless chip to the CAC to avoid delays when military personnel
enter facilities.
Department of the Interior:
In January 2002, the Department of the Interior‘s Bureau of Land
Management (BLM) launched a smart card pilot project to help improve
security over its sites and employees. The bureau has 164 major sites
and approximately 13,000 full-and part-time employees, including
contractors. About 1,100 employees were given smart cards for personal
identification and to improve safeguards at pilot sites in Nevada and
Arizona. The pilot‘s goal was to demonstrate the feasibility and
interoperability of smart cards and to communicate their potential to
employees throughout the bureau. In addition to distributing 1,000 more
smart cards to bureau employees by November 2002, the bureau expects to
equip about 1,000 of the existing cards with PKI certificates to be
used with PKI-enabled software applications to improve security over
systems and electronic transactions. According to bureau officials, the
project has been a success, and it plans to continue the rollout of
smart cards to remaining employees.
The bureauwide rollout is scheduled to begin in January 2003. The total
estimated cost of the effort is $5.8 million, and according to the
bureau‘s business case, this effort will break even in 2004. This
includes all contracts, labor costs, software, hardware, and
maintenance costs over a
5-year life cycle. The full implementation of the smart card system is
expected to eliminate redundant administrative processes for personal
identification and open up opportunities for additional applications by
establishing digital certificates for creating digital signatures. All
new and future building locations are planned to be equipped with the
smart card technology necessary to pursue this effort, and many
existing sites are being upgraded. BLM has reported experiencing a 70
percent drop in the cost of physical access systems since the cards‘
initial deployment. In one of the pilot locations, all processes are to
be outsourced (except for human resources, physical access, and
security officer functions), with bureau employees making all policy
and business decisions.
Department of Transportation:
The Department of Transportation currently has two large smart card
projects targeted for deployment. In the first pilot, the Federal
Aviation Administration (FAA) plans to distribute smart cards
internally to approximately 10,000 employees and on-site contractor
support personnel primarily to secure physical access to the agency‘s
facilities. Recently, the FAA released a request for proposal outlining
minimum requirements for smart card credentials. The agency plans to
procure smart cards through the General Services Administration (GSA)
Smart Access Common ID contract and will apply GSA‘s interoperability
specification. The card is planned to be a Java-based[Footnote 37]
hybrid (contact and contactless) card, containing a 32-kilobyte chip as
well as a magnetic stripe and barcode. The card will likely also
feature a biometric for enhanced authentication (most likely
fingerprint data).
The second pilot is being managed by the Transportation Security
Administration (TSA), which is scheduled to be transferred to the
Department of Homeland Security on March 1, 2003. For this pilot, the
TSA plans to issue smart identification (ID) cards to up to 15 million
’transportation workers“--defined as any persons who require unescorted
access to a secure area in any transportation venue. The pilot project
will be focused on major airports, seaports, and railroad terminals and
will include all modes of transportation. TSA‘s goal is to create a
standardized, universally recognized and accepted credential for the
transportation industry. Initially, the transportation worker ID will
be used for obtaining physical access to transportation facilities.
Subsequently, a phased approach will be used to add logical access
capabilities to the card. According to agency officials, the card will
be designed to address a minimum set of requirements, but it will
remain flexible to support additional requirements as needed. The card
will be used to verify the identity and security level of the
cardholder, and local authorities will grant access in accordance with
local security policies.
TSA has established working groups for various aspects of system
development, such as card design, identity documentation requirements,
and card policy. To share costs and leverage existing resource
investments, TSA is currently working with INS on its entry/exit
project to use established land, air, and sea ports as checkpoints. In
addition, TSA has established working relationships with industry
groups and coordinated with other agencies, such as Treasury and the
Federal Bureau of Investigation, and is looking to develop cost sharing
strategies for future implementations.
TSA‘s budget for fiscal year 2003 was not determined at the time of our
review, and agency officials said that the availability of funds would
determine how quickly the pilot would be implemented. The pilot will
likely be implemented within the next 3 years. According to one agency
official, the TSA program, if implemented successfully, would likely
become the largest civilian agency smart card initiative to date.
Department of the Treasury:
The Department of the Treasury plans to launch a proof of concept
project to assess several smart card technologies for possible
agencywide use for both physical and logical access. The project is
being funded and managed by Treasury‘s Chief Information Officer
Council at a cost of $2.8 million. Six Treasury organizations are
participating in the pilot: the Secret Service; the Internal Revenue
Service; the Bureau of Alcohol, Tobacco and Firearms; the Bureau of
Engraving and Printing; the Federal Law Enforcement Training Center;
and the main department. The Secret Service has been designated the
lead bureau and will also lead the future departmentwide smart card
project. In total, Treasury plans to issue about 10,000 smart cards.
These cards are to be Java-based devices with 32 kilobytes of storage,
capable of supporting multiple technologies for use in various
configurations. For example, the cards will support both contact and
contactless access, although not all will contain biometrics. All the
cards are expected to contain PKI certificates for creating digital
signatures and encrypting E-mail messages. The cards are also expected
to be equipped with two-dimensional barcodes and a magnetic stripe to
enable integration with existing systems.
Like DOD, Treasury plans to allocate space on the card for individual
bureaus to use in creating their own applications, such as the Federal
Law Enforcement Training Center‘s plan to use the cards when issuing
uniforms to students. A Treasury official believes that using smart
cards will simplify certain processes, such as property and inventory
management, that are currently paper-based and labor-intensive.
Information from this proof of concept project will be used to launch
an agencywide smart card project. GSA‘s Smart Access Common ID Contract
and interoperability guidelines will be used to ensure that appropriate
smart card technologies are evaluated. The proof of concept is expected
to last about 6 months, with the pilot ending in January 2003. At that
time, a report will be completed, and a business case for an agencywide
smart card solution will likely be prepared. Preliminary cost estimates
for implementing a Treasury-wide smart card system, which would support
around 160,000 employees, is in the range of $50 to $60 million.
Department of Veterans Affairs:
In April 2001, the Department of Veterans Affairs (VA) began issuing
cards for its VA Express Registration Card pilot project. Initiated in
1999, the project was to provide agency customers with a smart card
carrying medical and personal information that could be used to speed
up registration at VA hospitals. The card was also intended to be
usable by non-VA hospitals equipped with the necessary readers to
access patients‘ VA benefits information.
At the time of our review, about 24,000 smart cards had been issued
through two VA hospitals located in Milwaukee, Wisconsin, and Iron
Mountain, Michigan. The cards are PKI enabled and can also be used
throughout VA‘s network of hospitals--the majority of which do not have
smart card readers--because they include all the same patient
information found printed on the front of the older Veteran
Identification Cards, which are still in use. The PKI capabilities of
the card allow patients with a home computer and card reader to
securely access their information on-line and digitally sign forms,
saving time and offering convenience for both the patient and the
agency. For those without Internet access, kiosks were installed at the
two pilot locations, allowing Express Card holders to access their
information, make any necessary changes, or request PKI certificates.
The VA Express Card program used GSA‘s Smart Access Common ID contract
for procurement and technical assistance.
According to agency officials, using the Express Card reduced
registration time at hospitals by 45 minutes. Patients involved in the
pilot project had access to express registration services, thus saving
time. However, although the Express Card program is still in use, VA
officials have decided not to expand beyond the two pilot locations.
The reasons given were the expense of back-end automation,
complications integrating the new system with legacy systems, and the
lack of an existing card reader infrastructure at other VA hospitals.
The agency maintains card management, support, and issuance
capabilities at the pilot locations to support the smart cards that are
still in use.
Immigration and Naturalization Service:
The Department of Justice‘s INS currently has a card-based project
under way to control access at the nation‘s borders. The project
includes two types of cards--Permanent Resident Cards and Border
Crossing Cards (also known as ’Laser Visas“). As part of the Border
Crossing Cards project, INS is working with the Department of State to
produce and distribute the cards. Under the Illegal Immigration Reform
and Immigrant Responsibility Act of 1996,[Footnote 38] every Border
Crossing Card issued after October 1, 2001, is required to contain a
biometric identifier and be machine readable. The Laser Visas will
store biographical information along with a photograph of the
cardholder and an image of the cardholder‘s fingerprints. The Permanent
Resident Cards will store similar information. Information from the
Laser Visas is stored in a central INS database. As of June 2002, more
than five million Laser Visas and approximately six million Permanent
Resident Cards had been issued.
The Permanent Resident Card and Laser Visa make use of optical stripe
technology, with storage capacity ranging from 1.1 megabyte to 2.8
megabytes, to store large amounts of information, but they do not
contain integrated circuit chips to process data. As part of a cost-
benefit analysis conducted in 1999, INS considered implementing chip-
based smart cards and determined that smart card technology was not the
best solution. This decision was based, in part, on the limited storage
capacity of smart cards at the time. INS examined smart cards with 8
kilobytes of memory, which did not provide enough memory to store the
fingerprint data required by law. Smart cards now have a storage
capacity of up to 64 kilobytes and are capable of storing color photo
images of individuals as well as full fingerprint images.
Western Governors‘ Association:
In June 1999, WGA launched the Health Passport Project (HPP) in three
states--Nevada, North Dakota, and Wyoming--to evaluate and test a range
of applications and technologies based on a common smart card platform.
The project was to be conducted within an 18-month demonstration period
and be integrated with other state-administered prenatal, physician
care, nutrition, and early childhood education programs. Each state was
expected to maintain common demographic information as well as clinical
data on individuals participating in the pilot project. Selected sites
also tested unique applications related to electronic benefits transfer
(EBT), insurance eligibility, and health appointment information. WGA
had overall responsibility for managing the HPP contract, and each
state was responsible for providing on-site management, technical
support, and funding as needed. The Departments of Agriculture and
Health and Human Services also provided project funding and support,
with GSA providing technical assistance as requested. The HPP
initiative involved the distribution of 2,348 cards to individuals in
Bismarck, North Dakota; 991 cards in Cheyenne, Wyoming; and 8,459 cards
in Reno, Nevada. With additional state funding, the HPP initiative has
continued to operate beyond the demonstration period, which concluded
in December 2001.
The HPP platform consists of smart cards, special card readers attached
to health providers‘ personal computers, card readers installed at
grocery or retail establishments and register systems, servers to
maintain backup databases, kiosks, and a network. The health passport
card contains an
8-kilobyte chip, storing demographic, health, and benefit information
on participants as well as a magnetic stripe for Medicaid eligibility
information. Smart card readers are used to read and write information
to the card. These devices are linked to HPP workstations and to the
Women, Infants, and Children EBT application, which allows benefits to
be stored on the card and used at grocery and retail establishments
that have card readers installed at point-of-sale register locations.
Kiosks are free-standing machines that operate by a touch screen
feature and read information stored on the card.
In December 2001, the Urban Institute and the Maximus consulting firm
prepared a report for WGA, which reviewed the results of the HPP
initiative. The report stated that HPP was successful in bringing a
concept to life. HPP enabled participants to use the EBT and healthcare
appointment and immunization information more effectively and
conveniently, because information was stored on the card. Project
participants also liked using the cards and kiosks to access their
personal information, and many liked being able to electronically track
appointments and health care records. In addition, retailers liked the
cards and the ability to track EBT data more accurately. WGA officials
further noted that HPP has helped federal and state governments
maintain more accurate information on EBT distributions and baby
formula purchases, which can be used to request coupon rebates from
manufacturers. More accurate sales information is available and shared
with manufacturers to resolve disputes over rebates and to obtain more
timely refunds.
[End of section]
Glossary:
Attack:
An attempt by one or more parties involved in a smart-card-based
transaction to cheat by taking advantage of potential weaknesses in the
security of the card.
Authentication:
The process of confirming an asserted identity with a specified or
understood level of confidence.
Biometrics:
Measures of an individual‘s unique physical characteristics or the
unique ways that an individual performs an activity. Physical
biometrics include fingerprints, hand geometry, facial patterns, and
iris and retinal scans. Behavioral biometrics include voice patterns,
written signatures, and keyboard typing techniques.
Biometric template:
A digital record of an individual‘s biometric features. Typically, a
’livescan“ of an individual‘s biometric attributes is translated
through a specific algorithm into a digital record that can be stored
in a database or on an integrated circuit chip card.
Card edge:
The set of command and response messages that allow card readers to
communicate effectively with the chips embedded on smart cards.
Contactless smart card:
A smart card that can exchange information with a card reader without
coming in physical contact with the reader. Contactless smart cards use
13.56 megahertz radio frequency transmissions to exchange information
with card readers.
Confidentiality:
The assurance that information is not disclosed to unauthorized
entities or processes.
Digital signature:
A special encrypted code, attached to an electronic message, that can
be used to prove to a third party that the message was, in fact, signed
by the originator. Digital signatures may also be attached to other
electronic information and programs so that the integrity of the
information and programs may be verified at a later time.
Electronic government:
Government‘s use of technology, particularly Web-based applications, to
enhance the access to and delivery of government information and
services to citizens, business partners, employees, other agencies, and
government entities.
Identification:
The process of determining to what identity a particular individual
corresponds.
Interoperability:
The ability of two or more systems or components to exchange
information and to use the information that has been exchanged.
Middleware:
Software that allows a software application running on another system
to communicate and exchange data with the integrated circuit chip on a
smart card.
Nonrepudiation:
The assurance that the identity of the sender of an electronic message
can be proven and that delivery of the message to the recipient can
also be proven so that neither party can later deny having processed
the message.
Privacy:
The ability of an individual to decide when and on what terms elements
of his or her personal information should be revealed.
Public key infrastructure (PKI):
A system of hardware, software, and policies, and people that, when
fully and properly implemented, can provide a suite of information
security assurances--including confidentiality, data integrity,
authentication, and nonrepudiation--that are important in protecting
sensitive communications and transactions.
Smart card:
A tamper-resistant security device--about the size of a credit card--
that relies on an integrated circuit chip for information storage and
processing.
FOOTNOTES
[1] Smart cards are plastic devices--about the size of a credit card--
that use integrated circuit chips to store and process data, much like
a computer. This processing capability distinguishes these cards from
traditional magnetic stripe cards, which cannot process or exchange
data with automated information systems.
[2] A public key infrastructure is a system of computers, software, and
data that relies on certain cryptographic techniques for some aspects
of security. For more information, see U.S. General Accounting Office,
Information Security: Advances and Remaining Challenges to Adoption of
Public Key Infrastructure Technology, GAO-01-277 (Washington, D.C.:
Feb. 26, 2001).
[3] Access to computer systems is known as ’logical access,“ in
contrast to ’physical access,“ which applies to buildings and other
physical facilities.
[4] Interoperability is the ability of two or more systems or
components to exchange information and to use the information
exchanged.
[5] See U.S. General Accounting Office, Identity Theft: Available Data
Indicate Growth in Prevalence and Cost, GAO-02-424T (Washington, D.C.:
Feb. 14, 2002).
[6] The term ’smart card“ may also be used to refer to cards with a
computer chip that only stores information without providing any
processing capability. Such cards, known as stored-value cards, are
widely used for services such as prepaid telephone service or satellite
television reception. While this report includes some information on
federal use of stored-value cards, it focuses chiefly on cards with
processing capability.
[7] For more information about biometrics, see U.S. General Accounting
Office, Technology Assessment: Using Biometrics for Border Security,
GAO-03-174 (Washington, D.C.: Nov. 15, 2002).
[8] For more information about PKI technology, see U.S. General
Accounting Office, Information Security: Advances and Remaining
Challenges to Adoption of Public Key Infrastructure Technology, GAO-01-
277 (Washington, D.C.: Feb. 26, 2001).
[9] Cards with an optical memory stripe are known as laser cards or
optical memory cards.
[10] EPIC, an interagency body, was established to help improve the
delivery of electronic commerce activities across government and to
assist the President‘s Management Council on such issues during the
1990s. In 2000, EPIC was replaced by the Electronic Government
Coordinating Committee.
[11] These bills included the Enhanced Border Security and Visa Entry
Reform Act of 2002, P.L. No. 107-173, 116 Stat. 543, and the Department
of Transportation and Related Agencies Appropriations Act, 2003,
S.2808, 107TH Cong. (2002).
[12] Middleware is software that allows a software application running
on another system to communicate and exchange data with the integrated
circuit chip on a smart card.
[13] Deputy Secretary of Defense, Memorandum on Smart Card Adoption and
Implementation (Washington, D.C.: Nov. 10, 1999).
[14] According to the project‘s final report, additional costs were
incurred that have not been quantified.
[15] Jenny Bernstein, Robin Koralek, Cheryl Owens, Nancy Pindus, and
Barbara Selter, Final Report--The Health Passport Project: Assessment
and Recommendations (December 2001).
[16] Office of the Inspector General, Department of Defense,
Implementation of DOD Public Key Infrastructure Policy and Procedures,
Report No. D-2002-030 (Dec. 28, 2001).
[17] NIST is the lead agency in the Standards Technical Working Group,
which was established by the Government Smart Card Interagency Advisory
Board (GSC-IAB) to develop and update the Government Smart Card
Interoperability Specification. In addition, NIST is responsible for
developing a comprehensive conformance test program for the
specification.
[18] Government Smart Card Interoperability Specification, Version 2.0,
NIST Internal Report 6887 (June 27, 2002).
[19] Optical stripe technology is considered ’passive“ because it
simply serves as a platform to store data; it cannot perform any
processing functions. Chip-based cards, however, are capable of
actively processing information and interacting with other systems.
[20] In this context, an attack is an attempt by one or more parties
involved in a smart-card-based transaction to cheat by taking advantage
of potential weaknesses in the security of the card.
[21] Bruce Schneier and Adam Shostack, ’Breaking Up Is Hard to Do:
Modeling Security Threats for Smart Cards“ in USENIX Workshop on Smart
Card Technology (USENIX Press, 1999), pp. 175-185.
[22] U.S. General Accounting Office, Information Security Management:
Learning from Leading Organizations, GAO/AIMD-98-68 (Washington, D.C.:
May 1998).
[23] U.S. General Accounting Office, Information Security Risk
Assessment: Practices of Leading Organizations, GAO/AIMD-00-33
(Washington, D.C.: Nov. 1999).
[24] National Security Agency, Guidelines for Placing Biometrics in
Smartcards, Draft Version 1.0 (Sept. 15, 1998).
[25] 5 U.S.C. § 552a.
[26] GSA, Office of Smart Card Initiatives--Overview and Concepts (May
1998). The document includes 13 key objectives for implementation in
1998.
[27] This office was eventually moved into the Federal Technology
Service so that it could also monitor 13 pilot projects aimed at
fostering the adoption of smart card technology.
[28] In 2000, GSA established the Government Smart Card Interagency
Advisory Board to address government smart card issues, standards, and
practices as well as to help resolve interoperability problems among
agencies.
[29] GSA released the solicitation (GS-TFF-99-203) for its Smart
Identification Card on January 7, 2000. In May 2000, the contract was
awarded to five vendors.
[30] Office of Inspector General, GSA, Review of Smart Card
Initiatives, Report Number A000874 (Sept. 11, 2000), p. 5.
[31] GSA contracted with Maximus, a private consulting firm, to conduct
a survey of agencies, private sector partners, and others to help
identify issues critical to the smart card initiative and define future
goals and objectives for the GSC-IAB.
[32] GSA, Smart Card Policy and Administrative Guidelines (Oct. 20,
2000).
[33] The Department of Justice established five security categories for
federal buildings, ranging from facilities that require limited
security (category 1) to buildings that require a maximum level of
security mechanisms or safeguards (category 5). No criteria exist on
the security or electronic devices that need to be installed at
facilities that fall within these categories.
[34] For a discussion of the full range of building security
technologies, including smart cards, see U.S. General Accounting
Office, National Preparedness: Technologies to Secure Federal
Buildings, GAO-02-687T (Washington, D.C.: Apr. 25, 2002).
[35] Office of the Inspector General, GSA, Review of Smart Card
Initiatives, Report A000874 (Sept. 11, 2000).
[36] Deputy Secretary of Defense, Memorandum on Smart Card Adoption and
Implementation (Washington, D.C.: Nov. 10, 1999).
[37] Java is a high-level, object-oriented programming language
developed by Sun Microsystems that is well suited for use on the World
Wide Web. Java card technology supports multiple, independently secure
applications with a single smart card and is compatible with existing
smart card standards from many organizations, such as the
internationally recognized International Standards Organization.
[38] The Illegal Immigration Reform and Immigrant Responsibility Act of
1996 was enacted as division C of the Omnibus Consolidated
Appropriations Act, P.L. No. 104-208, 110 Stat. 3009-546 (1996).
GAO‘s Mission:
The General Accounting Office, the investigative arm of Congress,
exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO‘s commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO‘s Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as ’Today‘s Reports,“ on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select ’Subscribe to daily E-mail alert for newly
released products“ under the GAO Reports heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. General Accounting Office
441 G Street NW,
Room LM Washington,
D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S.
General Accounting Office, 441 G Street NW, Room 7149 Washington, D.C.
20548: