NEIL JOHNSTON Management Consultant Perspective |
Your
Identity- Can You Prove Who You Are?
|
Recently,
some of my neighbors warned me that they have found envelopes
in their mailbox torn open, and that they suspected some of their
letters had gone missing. |
The
digital age and the low cost sophisticated equipment to support
it, has provided the means and opportunity for criminals to copy
and duplicate documents, and pretend to be someone that they are
not. It's not a happy situation, particularly if it involves your bank account and the fraudulent means to drain it. A variation on the theme could be the obtaining of credit in your good name, and leave you with a mountain of debt that you have to explain away. I have heard
of a business person caught up in credit fraud which took two
years to reverse. His credit rating suffered so badly, that he
was ultimately forced to close his business. Credit rating agencies
are reluctant to remove any adverse information unless it is proven
through another recognised agency, such as the police. Gartner Research,
based in the US, reports that in the 12 months ending June 2003,
3.4% of US consumers were victims of identity theft. Personally,
my first line of defence has been to rent a post office box and
collect my own mail. To give some
idea of the scale of this type of fraud, for the last financial
year the ANZ Bank posted a loss of $51 million, and Westpac reported
a loss of $19 million. There is a call world-wide for banks to
tighten up their security systems, because they are more frequently
being penetrated. Most of the bank losses have been through the fraudulent use of credit cards. The response
to this avalanche of fraud has been to improve bank technology
e.g. the ANZ Bank has brought out the SmartCard, and Westpac is
looking at a similar strategy. In recent times we have seen a raft of legislation pertaining to privacy issues, and we will see more legislation relating to identity checks and what will be needed to substantiate them. And it may get down to such things as taking DNA samples, fingerprinting or eye scanning for you to prove who you are. E-mail is also a source of insecurity and identity stealing. I don't know how other pharmacists are finding it, but I am now getting up to 50 e-mails per day which are nothing more than "spam" in its most puerile form. I never object
to receiving unsolicited e-mails if they pertain to my profession
and have a ready "opt-out" system. It all adds to the cost of doing business on the Internet, and a convenience service is made more complex as a result. To add insult to injury, I am now receiving viruses at the average rate of two to three each day. Fortunately, my virus checker is a good one. Most people
are unaware of how insecure e-mails really are. Even if e-mails
are encrypted to improve security, there are programs available
to "crunch" and break common codes. The security of
encryption is measured by the number of "bits" used
by the "key" that creates the encryption. The first
encryption technology was built around a 40 bit PKI (Public Key
Infrastructure) system, which was quickly broken. Some browsers,
(older versions), use a 40 bit PKI system and need to be upgraded. With the increase in the "bit" size of encrypted documents comes more complexity in programming and use, and from a practical standpoint, a slowing down of document transmission. The more advanced the cryptology, the slower it is to encrypt and decrypt documents in a commercial environment. So these identity
stealers and privacy violators continue to escalate the cost of
doing business on the Internet and rob people of rightful gains
that would naturally accrue from an ethical use of the Internet. With the introduction
of e-health there is an imperative to move away from "old
technology" which includes items such as fax machines, that
are notoriously insecure. This movement is towards the use of
document encryption and transmission by e-mail or by Internet
document exchanges. A more secure
method of document transmission lies in the use of a closed Internet
document exchange. The system
involves desktop software that can generate "keys" and
can encrypt and decrypt documents. It currently utilises a 512
bit PKI system, with the ability to switch to 1024 bit PKI (or
higher) at any given time. It connects to a secure Internet database
that stores encrypted documents uploaded from the desktop, and
dispatches encrypted documents from storage to another nominated
recipient. Because it
is a closed system, all recipients have to be verified by a central
administrator and have their keys "signed" before they
can become operational. To ensure the quality of security, the keys are re-signed every twelve months. A document
exchange operates in an identical manner to a Virtual Private
Network (VPN) without the high cost factor of hardware. Being
a software solution it is much cheaper, and accessibility is worldwide
which gives it a convenience dimension over standard VPN's. Further,
the system is being developed so that specific groups of recipients
can be "tagged" to be visible to each other, but invisible
to all others, creating multiple VPN's. If a member
of HEALTH-Dx has another external interest, it will be possible
to set up a second wider network that is blind to the health network. Another variation
on the theme is that a member of the document exchange, while
tapping into the mainstream of health communicators, can set up
a substructure, which is confined to members of one organisation
e.g. a large medical practice. In practice, this means that documents
can be sent to the manager of a practice that may be confidential
and can only be sighted by the manager. However, other staff may
need access to some of these documents, and they can be given
access by the issuing of a "shared key" that is unique
for each individual. If they change employment it is a simple
process to cancel one key without having to dismantle the entire
permission system. Integrity
of documents in the stored area is maintained through the generation
of "message digests" that are 32 characters in length.
When a document is originally encrypted, a numerical digest of
that document is generated and encrypted with the document. A message
digest encrypted with the sender's private key creates a unique
electronic signature, as the recipient can decrypt using the sender's
public key. As all the above processes are handled by the software automatically, the user is able to manage with a minimal number of keystrokes at a reasonably high speed. HEALTH-Dx
has many applications. HEALTH-Dx is my choice of infrastructure to avoid theft of my identity, address privacy issues by ensuring only people authorised to view my confidential information can do so, plus register a document electronically so that it can be used in a court of law. In addition, I can use it for networking communications internally with staff, and externally with any other logical group of recipients, with only authorised recipients being able to see and identify each other on any given, completely separate, private network. You will also note that I have basically duplicated my "snail mail" security with the creation of a virtual Internet post office box. I am currently conducting a series of trials to ensure that the program is robust and free of "bugs". If anyone is interested in participating in a trial, please contact the writer at neilj@computachem.com.au |