Security Document World - Day 1: Strategies to Disrupt Identity and Document Fraud
"Risk Mitigation at the Border – A Best Practices Approach to Identity Authentication"
Risk at a border point results from the inability of the traveler identity to be properly assessed. The technologies and processes used to assess the genuineness and authenticity of the claimed identity are the keys to the mitigation of this risk; and thereby, should be implemented to thwart the underlying criminal or terrorist activity that is being supported by a fraudulent identity claim.
This session reviews the types of document fraud being encountered today; several mitigation measures that can be readily implemented to address this issue; and deployment considerations for each type of border control point (primary, secondary, kiosk, mobile).
Mr. Townsend has been providing consultative services to both government and commercial organizations implementing identity and access management, public key infrastructure (PKI), and authorization solutions since 1990. These efforts have included the assessment and mitigation of ICAO document security object and PKI encoding deviations for numerous e-passport issuers, including the United States, the European Commission, the United Kingdom, Australia, New Zealand, the Kingdom of the Netherlands, Canada, Luxembourg, Malta, Italy, Switzerland, and the United Nations. This work included the analysis of the impact of these deviations on document and identity authentication processing.
Mr. Townsend was also instrumental in the development of tactical PKI solutions that were deployed to the operational edge of the US Department of Defense (DoD) network; as well as architecting and deploying PKI-based credential issuance, validation, and authorization solutions for the US Department of Homeland Security (DHS) Federal Emergency Response Official (FERO) Program for the implementation of mobility solutions to support First Responder access requirements.
Mr. Townsend continues to support the development of new and emerging security technologies and platforms through his expert participation with US and international standards bodies focused on the data structure and security framework of Identification Cards, Machine Readable Travel Documents, and Related Devices.