Professional Documents
Culture Documents
Personal Identification Modern Development and Security Implications 2Nd Edition David J Haas Online Ebook Texxtbook Full Chapter PDF
Personal Identification Modern Development and Security Implications 2Nd Edition David J Haas Online Ebook Texxtbook Full Chapter PDF
https://ebookmeta.com/product/outcomes-2-personal-development-
health-and-physical-education-hsc-course-david-neeves/
https://ebookmeta.com/product/multimedia-security-algorithm-
development-analysis-and-applications-kaiser-j-giri/
https://ebookmeta.com/product/contemporary-european-security-1st-
edition-david-j-galbreath/
https://ebookmeta.com/product/information-security-handbook-
enhance-your-proficiency-in-information-security-program-
development-2nd-edition-anonymous/
Decision Analysis for Managers A Guide for Making
Better Personal and Business Decisions 2nd 2nd Edition
David Charlesworth
https://ebookmeta.com/product/decision-analysis-for-managers-a-
guide-for-making-better-personal-and-business-decisions-2nd-2nd-
edition-david-charlesworth/
https://ebookmeta.com/product/extreme-intelligence-development-
predicaments-implications-1st-edition-sonja-falck/
https://ebookmeta.com/product/civil-militia-africa-s-intractable-
security-menace-1st-edition-david-j-francis/
https://ebookmeta.com/product/christmas-cherry-auction-
stepbrother-edition-sylvie-haas-bundles-6-sylvie-haas/
https://ebookmeta.com/product/making-modern-science-2nd-edition-
peter-j-bowler/
“The first edition of this book made an important contribution to the
history of our field. Fast, accurate, and counterfeit-proof identification
documents have never been more important than today. They undergird
our daily activities. Why this type of verification evolved, and how it
operates, is the focus of Personal Identification: Modern Development
and Security Implications. This second edition by David J. Haas, with
contributions from Brian Zimmer, reflects the enormous strides taken
in recent years—technologically and functionally. Frankly, no other
printed source comes close to this book in describing—in clear prose
with ample illustrations—the workings and significance of our new
digital world of identification.”
—Robert McCrie, John Jay College of Criminal Justice, USA
Personal Identification
• Chronicles the effects of large and mobile populations beginning a century ago.
• Chronicles the effects of “impersonal” electronic & computer communications at a
distance, and not face-to-face.
• The distribution of services and money by government agencies based on a person’s
identity – including “age” and “group” criteria.
• Describes recent national security and terrorism concerns that necessitates the need
to know: “You are who you say you are.”
Personal identification documents (IDs) and the societal need for “trusted” identi-
fication by the public is a relatively new social phenomenon. In 1900, most people
did not need or have any IDs until passports, with a photograph of the individual,
became mandatory when Great Britain entered World War I in 1914. In the United
States, the State-issued driver’s license is probably the only trusted ID in one’s
wallet today, but they became “trusted and secure” documents only recently with
the requirement for REAL ID. With the first photo driver’s license issued by the
State of Colorado in 1959, it took until 1984 for the last State (New York, 25 years
later) to comply.
As a direct result of 9/11, where terrorists used fake driver’s licenses to board
planes, Congress passed the Real ID Act in 2005 to make all State-issued driver’s
licenses more trusted, uniform, and tamper-resistant – what is now called the
Enhanced Driver’s License with non-drivers being issued Enhanced Identifica-
tion Cards. And with this, every US citizen can now possess a trusted and secure
personal identification document.
Personal Identification, Second Edition chronicles the path of personal identifica-
tion measures – including the latest developments of Real ID. Scholars and profes-
sional security managers understand that stability, security, and safety necessitate
these identity measures to ensure a safer America. The book explains the various
stages and advances, providing readers with a unique study of this fascinating
history of the relationship between identity and the means by which one validates
and proves their own identity. The enactment of the REAL ID Act of 2005, with
more secure and tamper-resistant documents for each citizen of the United States,
is being instituted so that one can trust: “you are who you say you are.” The State-
issued driver’s license is not a National ID Card – it is a Nationally Recognized ID
for each citizen.
David J. Haas received his BA in Physics and PhD in Biophysics at the State Uni-
versity of NY at Buffalo. For the next five years, he performed basic research in
protein crystallography at several institutions in Europe and the United States.
This basic research led to liquid nitrogen cryo-cooling, whereby macromolecular
crystals reduced radiation damage during X-ray analysis. Whereas this technique
was years ahead of its time, today cryo-crystallography is used at every Synchro-
tron worldwide for Structural Biology. In 1970, he joined Philips Electronic Instru-
ments in Mt. Vernon NY as principal X-ray scientist, designing some of the first
airport X-ray scanners used worldwide during the 1970s. Conceiving the idea of
self-expiring visitor badges (changes color in one day to prevent reuse), David and
his wife, Sandra, formed Temtec Inc. in 1981 in Suffern NY, and manufactured visi-
tor and temporary IDs for more than 20 years under the brand name TEMPbadge.
The company was sold in 2002. Besides many scientific papers and articles, David
and Sandra have dozens of patents to their credit. The first edition of his book Per-
sonal Identification – Its Modern Development and Security Implications was published
in 2009 by ASIS Intl. and has been updated substantially with this second edition.
Brian Zimmer has been President of the Coalition for a Secure Driver’s License
(CSDL) since July 2007, and Keeping Identities Safe since 2012. He has published
numerous articles, been cited in newspapers, and has spoken to social and politi-
cal organizations across the United States as an expert on driver’s license security.
He has testified before legislative bodies in more than a dozen States regarding the
REAL ID Act and before the US Senate on border security. In 1995, Mr. Zimmer
was recruited from the Department of Interior Office of the Secretary to the US
House of Representatives’ Offices of Procurement. As the Director of Information
Technology Procurement, he led the installation of modern IT infrastructure at
the House buildings, including the implementation of a new financial system and
integrated procurement system. From 2001 through 2006, Brian Zimmer served
as Senior Policy Advisor and Investigator for the Committee on the Judiciary, US
House of Representatives.
Personal Identification
Modern Development and
Security Implications
Second Edition
vii
Contents
viii
Contents
ix
Contents
x
PREFACE: THE MOTIVATION FOR
THIS HISTORICAL RESEARCH
I began this study to learn who invented the first photo ID badge and how
photo identification evolved into the plastic cards we have today. Once we
determined that it was only one individual who developed the first practi-
cal laminated photo IDs in 1940 (Ned Whitehead), the question arose as to
why these first tamper-resistant (secure) IDs evolved into various identi-
fication documents. Why do we have or even need ID documents today?
After several years of investigation, the answers have become clear. No
mass ID existed in early societies. The need for mass ID was created by
modern society primarily between the years 1914 and 1980.
We have identified the primary factors that created this societal need
for public-issued mass ID:
xi
Preface: The Motivation for This Historical Research
legislation from its beginning. The United States will certainly benefit
from the implementation of this law.
This book is not a detailed history of mankind or an outline of all the
technical advances nor does it have any political agenda. It simply pur-
ports to answer the question as to how and why we progressed from no
IDs a century ago to “Trusted-Secure” personal identification documents
today. When ASIS International decided to publish the first edition of this
study in 2009, I was pleased because ASIS had played an important role
in guiding the development of personal identification documents over the
years. I would also like to acknowledge two other organizations that have
facilitated personal identification in our lives, the American Association
of Motor Vehicle Administrators (AAMVA) founded in 1933, and all the
State Motor Vehicle Administrations, now more commonly abbreviated
DMV (Division of Motor Vehicle).
ID devices, credit cards, and other cards have been generically known
as portable identification data devices. They are portable because people
can conveniently carry or wear them. They identified the individual by
displaying some biometric, whether it is a photograph of the person, a
fingerprint, a signature, or some other characteristic. They visually trans-
mit (physically or electronically) the individuals’ personal identification
data to receptors or sensors where the verification was performed. The
positive identification of the individual is confirmed when the document
is created.
Whereas the development of each type of device is intended for a spe-
cific purpose, the portable identification data device migrated to perform
vastly different functions. IDs and credit cards have become the primary
devices for communicating with today’s omnipresent world of comput-
ers. It is the numbers on the card that the computer uses. These ID devices
were available long before the computer revolution, but computers now
use them to communicate and collect data on everyone. Many of these
uses are new, including forms of mass surveillance, as so clearly described
by author James B. Rule in his many writings (1). Whereas IDs were never
intended to be used to trace our activities, each ID serves as the primary
channel to communicate with all these computers around the world to
produce an entirely new form of information database: a mass surveillance
entity that evolved simply from the IDs being recorded by the various
computer databases. Now that this phenomenon exists, we must under-
stand and control it. This new phenomenon of computers reading and
storing our data every time a portable identification data device (card) is
used is called mass surveillance. The increased private and governmental
xii
Preface: The Motivation for This Historical Research
xiii
Preface: The Motivation for This Historical Research
address the issues of privacy and abuse in the most professional, unbiased
manner we have seen (6, 7).
We would like to mention a 1983 review paper relating to personal
identification documents: “Documentary Identification and Mass Surveil-
lance in the United States,” as edited by J.B. Rule, D. McAdam, L. Stearns,
and D. Uglow (2, 8, 9). Under a grant from the National Science Founda-
tion, they prepared this review with their opening lines: “A distinctive
feature of advanced industrial societies is the importance of personal doc-
umentation in relations between individuals and organizations…Many
aspects of these relations involve what we call mass surveillance and
social control.… By surveillance we mean any systematic attention to a
person’s life aimed at exerting influence over it. By social control we mean
efforts to define and bring about ‘correct’ actions or statuses. Surveillance
and social control are (now) ubiquitous social processes. The growth in
coverage and importance of these personal documents mirrors the grow-
ing role of direct relations between centralized organizations and private
individuals.”
These authors point out that in their survey of hundreds of households
in Brookhaven Town, New York (in 1983), they found an average of 28.8
different kinds of personal identification documents per household. The
six most common personal documents were social security cards, driv-
er’s licenses, credit cards, birth certificates, passports, and bank books.
Each document, whether the original or a certified copy, was obtained
by self-identification – meaning that the individual voluntarily filled out
the application form and presented his/her own “breeder” documents to
the issuing authority (institution). Continuing, they state that “it is easy
to obtain these six personal documents under false pretenses.… The dra-
matic proliferation of personal documentation since the beginning of the
20th century means much more than growing possession of certificates,
cards, and computer records. It reflects the growth of an important new
category of relationships between ordinary people and large, centralized
organizations (including governments).”
This book describes the origins of personal identification documents
over a wide span of time and a wide range of technology. However, we
have not addressed the subject of data collection and the analysis of inter-
net transactions which is still a developing issue. To facilitate understand-
ing and to make the text more useful, we have added extensive glossaries,
definitions, timelines, comparison charts, sidebar stories, patent lists, and
references (10). We also recommend that the reader use a new 21st-century
public service: Google Patent. One can simply enter any of the patents’
xiv
Preface: The Motivation for This Historical Research
numbers into this Internet service to read the original patents – to read the
“mind” of the inventor as they knew everyday life in their time! Thank
you, Google!
REFERENCES
1. Mass Surveillance; http://en.wikipedia.org/wiki/Mass_surveillance
2. Rule, James B; Privacy in Peril; How we are Sacrificing a Fundamental Right in
Exchange for Security and Convenience; Oxford University Press 2007 p 6.
3. National ID Cards and their worldwide status, http://en.wikipedia.org/
wiki/National_ID_card
4. Zavala A and James P, Personal Appearance identification Thomas Pub 1972.
5. Privacy Intl: Identity Cards- Frequently Asked Questions Aug 24, 1996;
Privacy.org
6. Kent S and Millett L Eds, IDs- Not That Easy National Academy Press,
Washington, DC 2002.
7. Kent S and Millett L, Who Goes There? Authentication Through the Lens of Privacy
National Research Council, The National Academies Press, 2003.
8. Rule J B and others. Documentary Identification and Mass Surveillance in the
United States. Social Problems 31(2): 1983, pp. 222–234.
9. Rule J B, Private Lives and Public Surveillance; Schocken Books New York 1972.
10. Identity Document; Wikipedia 2007.
xv
ACKNOWLEDGMENTS
This book is an outgrowth of years of curiosity as to who invented the
laminated photo identification badge and in modern times, who issued
the first secure personal identification documents. The study began by
researching the chronology and who developed various photo identifica-
tion technologies. With this publication, we have answered the question
of why we have personal identification and the importance for the United
States of the new REAL ID Driver’s License.
A book requiring several years of research would not have been possi-
ble without the assistance of my wife, Sandra, who assisted me during the
years of investigation and writing this book and was my business partner
at Temtec Inc. (TEMPbadge) for more than 20 years.
Because this book necessarily covers many topics, I am indebted to
the many people who assisted me. In particular, I want to acknowledge
the late Dr. Isidor Kreel MD, who contributed to Chapters 2, 3, and 4. Not
only did he study the new material that I obtained on these subjects but
he brought his vast lifelong knowledge to the forefront and was able to
document these subjects and provide early historical details.
I want to acknowledge Dr. Robert McCrie, Timothy Walsh, Peter Scott,
and William Kieckhafer who provided ongoing encouragement and sup-
port during the writing of the book. Their assistance was invaluable! I had
many interviews and communications with knowledgeable people on the
development of personal identification products and identification docu-
ments. Also, many others in the Professional Security Industry and ASIS
Intl. provided information: Dan Bowers, E. J. Criscuoli, Jr., Chuck Hard-
ester, John Hotchner, Lawrence Howe, Peter Liebhold, Ron O’Connor,
Richard Raia, Dino Redmand, and Derek Trimble. I would like to thank
John Fox, Historian of the FBI, for discussions and his copy of the 1941
FBI Security Manual. Also, Shelly Jackson of AAMVA provided invaluable
materials, and Brian Zimmer, President of Keeping IDentities Safe, DBA
Coalition for a Secure Driver’s License, for writing Chapter 7 on the REAL
ID driver’s license. Finally, I would like to acknowledge Susan Gagnon
from Polaroid who provided historical assistance and substantial early lit-
erature on Polaroid products.
xvi
Acknowledgments
This book would not have been possible without the assistance of
many individuals at libraries, museums, and private institutions around
the United States. The librarians provided reference services as well as
directed me to other possible sites for the information that I was seeking.
Furthermore, I was able to study hundreds of books and documents at the
library of ASIS International (formerly the American Society for Industrial
Security) in Alexandria, VA, the Smithsonian Institution, and the New
York City Public Libraries (NYPL). Also, I had continuing assistance from
our own Suffern Free Library and the Ramapo Catskill Library System
which located and delivered dozens of books and documents via their
interlibrary loan system. I would like to acknowledge Craig Wynne, who
worked with me during the writing and editing of the rough copy that I
assembled. Lastly, I would never have completed this manuscript if it has
not been accepted in 2009 for publication by the educational publishers
of ASIS International with Evangeline Papas as the publishing manager.
In my professional work and background experience, I have been associ-
ated with ASIS International for more than 40 years – ASIS International
is truly a success story and is a shining example of what a professional
society should be!
xvii
1
Personal Identification
and Its Components
1.1 THE MEANING OF PERSONAL IDENTIFICATION
Personal identification refers to a wide variety of topics, answering such
questions as: who am I? Where did I come from? Who were my parents?
What is my place in my family, my society, and in the universe? This book
does not deal with any of those philosophical questions. We will only
deal with the physical and social identifications of the person – the his-
torical development of the documents carried by a person for identifying
themselves, as well as how and to what degree a particular individual
may be differentiated from others. False documents of the type shown
in Figures 1.1 and 1.2 are an ongoing problem throughout the world, as
well as in the United States (1–3, Box 1.3). In this book, we describe the
documents required by our government to confirm identity (breeder
documents), how these documents are generated, how they may be
interpreted, and their degrees of reliability and security.
Most plastic cards are issued for a specific purpose other than personal
identification because they were not issued as trusted documents and
generally do not relate to your identification. Whereas there are several
sizes of plastic cards, almost the entire world has selected one standard
“credit card size” (CR-80 wallet size) – a size established during the 1950s.
Large retail stores first issued various-size charge cards, but the CR-80 was
selected by the Bank of America, American Express, and D iners Club in
1958. With lamination and sophisticated printing, these plastic cards can
DOI: 10.4324/9781003406341-1 1
PERSONAL IDENTIFICATION
2
PERSONAL IDENTIFICATION AND ITS COMPONENTS
3
PERSONAL IDENTIFICATION
4
PERSONAL IDENTIFICATION AND ITS COMPONENTS
5
PERSONAL IDENTIFICATION
Figure 1.4 Personal Identification Cards are compared by the Human Eye.
6
PERSONAL IDENTIFICATION AND ITS COMPONENTS
7
PERSONAL IDENTIFICATION
8
PERSONAL IDENTIFICATION AND ITS COMPONENTS
9
PERSONAL IDENTIFICATION
10
PERSONAL IDENTIFICATION AND ITS COMPONENTS
11
PERSONAL IDENTIFICATION
12
PERSONAL IDENTIFICATION AND ITS COMPONENTS
13
PERSONAL IDENTIFICATION
REFERENCES
1. US Dept of Justice: The Criminal Use of False Identification Nov 1976 #052-
003-00226-4
2. 9/11 Commission Report, The Final Report of the National Commission on
Terrorist Attacks upon the United States, Norton & Company 2004.
3. US House of Rep, Identification Documents Fraud and the Implication for
Homeland, Hearing SecurityOct 1, 2003 GPO 552-070-32193-4 2004
4. DeForest, S E, Personal Identification and Decision Criteria March 18, 2005,
www.lockergnome.com
5. Rule J B et al., Documentary Identification and Mass Surveillance in the
United States, Social Problems 31(2): 1983, pp. 222–234.
6. Rule J B, Privacy in Peril; How we are Sacrificing a Fundamental Right in Exchange
for Security and Convenience, Oxford University Press 2007.
14
PERSONAL IDENTIFICATION AND ITS COMPONENTS
15
2
The Evolution of
Personal Identification
From Prehistory to the 20th Century
… and God laid a mark upon Cain, lest any finding him shall
kill him.
16 DOI: 10.4324/9781003406341-2
THE EVOLUTION OF PERSONAL IDENTIFICATION
17
PERSONAL IDENTIFICATION
Table 2.1 Personal Identification Means throughout the Ages
Authorization
“Trusted Questionable (For Access Unique and
ID” “ID” only, Not ID) Recognized
Document/ Document/ Document/ Document/
Personal Identifier Object Object Object Object
Ancient times to the 20th Century
Face-to-Face, Visual, and Verbal Communications Yes
Tallies, Torn Contracts Pieces, and Codes Yes
Clay Tablets, Written documents, and Signatures, Yes
Rings, Seals, and Scarabs, Yes
1700s to Present
18
PERSONAL IDENTIFICATION
Authorization
“Trusted Questionable (For Access Unique and
ID” “ID” only, Not ID) Recognized
Document/ Document/ Document/ Document/
Personal Identifier Object Object Object Object
2001 to Present
US Government Employee Identification Cards Yes
with digital photo and electronic encoding
issued by federal, State, and local governments,
and military
1936 to Present
US Social Security Cards Yes
20
1936 to 2001
US Government issued Cards to the Public for Yes
medical, welfare, and other functions
1950 to Present
School/College/University/ Institution Yes
Identification Card (any) with photograph
Voter’s Registration Card Yes
Credit Card (American Express, Visa, MasterCard, Yes
Diners Card, etc.)
2001 to Present
Certification Certificate of Birth Abroad by Dept of Yes
State
Native American Tribal Document Yes
US Military Document or Draft Record Yes
Authorization
“Trusted Questionable (For Access Unique and
ID” “ID” only, Not ID) Recognized
Document/ Document/ Document/ Document/
Personal Identifier Object Object Object Object
US Certificate of US Citizenship Yes
US Certificate of Naturalization Yes
US Citizen ID Card with photograph (special issue Yes
only)
US Coast Guard Merchant Mariner Card with Yes
photograph
Foreign Passport with photograph (unexpired) Yes
US Alien Registration Receipt Card with Yes
photograph (unexpired)
US Temporary Residence Card with photograph Yes
(unexpired)
Document (unexpired)
US Refugee Travel Document with photograph Yes
(unexpired)
US Nonimmigrant Visa and Border Crossing Card Yes
with photograph (unexpired)
US Dept of State Driver’s License (unexpired) Yes
** Many more – For Complete List, see DHS website **
This list shows the many personal identification devices used throughout the ages. The device categories are Trusted
IDs, Questionable IDs, Authorization badges/devices, and other items used throughout history.
PERSONAL IDENTIFICATION
Table 2.2 US Driver’s License over the Years
Authorization Unique
“Trusted Questionable (For Access and
ID” “ID” only, Not ID) Recognized
Document/ Document/ Document/ Document/
Personal Identifier Object Object Object Object
The only “Trusted” Personal Identification Document available to the US public is the State-Issued Driver’s License.
1908 to 1958
Public Driver’s Licenses (without photographs) Yes Yes
22
1959 to 1984
Public Driver’s Licenses with Photograph, Yes?
All-Photo Insert, Laminated
1990 to 2008
Public Driver’s Licenses with Digital Yes?
Photograph, Laminated
2008 onward (Real ID Act of 2005)
Public Driver’s Licenses, Digitally Printed with Yes
Security Features
Note: This list shows the history of the driver’s license as personal identification in the United States.
THE EVOLUTION OF PERSONAL IDENTIFICATION
23
PERSONAL IDENTIFICATION
24
THE EVOLUTION OF PERSONAL IDENTIFICATION
25
PERSONAL IDENTIFICATION
26
Another random document with
no related content on Scribd:
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.