Select Committee on Home Affairs Written Evidence


43.  Memorandum submitted by the UK Computing Research Committee

  The UK Computing Research Committee (UKCRC), an Expert Panel of the British Computer Society, the Institution of Electrical Engineers and the Council of Professors and Heads of Computing, was formed in November 2000 as a policy committee for computing research in the UK. Its members are leading computing researchers from UK academia and industry.

  UKCRC has the expertise to address the first two questions identified by the committee:

    —  the practical issues involved in the ID database and biometric identifiers;

    —  the security and integrity of the proposed system.

  This response to the consultation has been written specifically for the Committee.

1.  THE PRACTICAL ISSUES INVOLVED IN THE ID DATABASE AND BIOMETRIC IDENTIFIERS

  The Home Office plans to introduce biometric identity cards (passports, driving licenses) to counter "growing threats to security and prosperity of British Citizens from illegal migration and working, organised crime and terrorism, identity theft and fraud and fraudulent access to public services" (http://www.homeoffice.gov.uk/comrace /identitycards/index.html).

  This statement does not amount to a statement of requirements or a specification that would be adequate to begin designing a technical solution. The answers to the following questions are needed to ensure that any technical requirements that may be drawn up for the system actually meet the real-world requirements. If they do not, it is inevitable that the technical requirements will change, leading to delays, cost escalation, and loss of control over project risks. We are advised that that a current study of problems of large scale projects by the Royal Academy of Engineering will report that poor project definition is one of the major contributors to project failure. The Academy will also observe that there is a greater tendency for poor project definition in the public sector, where systems are intended to meet political ends, and the practicalities often have not been thought through.

1.1  Top-level objectives

    —  Has any independent study been undertaken to establish that the threats identified by the Home Office as requiring the introduction of ID cards are significantly lower in countries that already have ID cards?

    —  If so, what specific lessons can be learnt from existing national ID card systems?

    —  If not, what evidence exists that the proposed UK system would have the desired benefits, and at a level that justifies the costs of the system?

    —  Are there alternative solutions to the identified problems that would have a better ratio of benefits to costs?

1.2  Scope of the proposed system

    —  Identity information can be stored on the ID card as human readable and machine readable data as well as in many on-line or off-line computer data bases. A detailed specification of purpose, content and degree of cross linking of this information is essential. Note that an ID card may simplify unintentional cross-correlation between identity information held in independent databases with contentious privacy and political implications. The widespread use of the US social security number is an example of the misuse that can occur; in contrast, the implementation of the German local identity card shows how careful specification can reduce or eliminate these problems.

    —  Under what circumstances would a cardholder have to prove that they matched the biometric on their ID card, and what additional information about the cardholder would be called up under each identified circumstance? (This identifies a set of "required functions" for the ID system of card/biometrics/ID database).

1.3  Fundamental specification issues

    —  How long could this process be permitted to take (mean, median and maximum) before the delays became unacceptable in the most time-critical of the required functions?

    —  What level of false positive matches (fraudulent use not detected) is acceptable for the most demanding function for which the card would be required?

    —  What level of false negative matches (legitimate use rejected by the system) is acceptable for the most demanding function for which the card would be required?

    —  What level of failure to obtain any matches (biometric not able to be read) is acceptable for the most demanding function for which the card would be required?

    —  Would all necessary data about the cardholder be contained on the card itself, or would there need to be interrogation of one or more databases?

    —  How would the authenticity of the data on the card (or in any associated databases) be established initially? What is the acceptable error rate in this data?

    —  How sensitive (private/secret) is the data on the card or on any associated database? (This will influence the necessary security mechanisms).

    —  Will any databases be accessible from public terminals or connected to the Internet?

    —  How many people/locations will need to be able to read the data on any databases?

    —  How many people/locations will need to be able to alter the data on any databases?

    —  What mechanisms are required to allow the cardholder to have access to, or to modify, any or all of the data held about them?

1.4  The feasibility of biometric identification

  The Home Office draws on a feasibility study to show that a nationwide biometric ID card system could be implemented. The study has been published at http://www.homeoffice.gov.uk/docs2/feasibility_ study031111_v2.pdf. We believe this is a competent study and we support its conclusions, with the caveat that the analysis of error rates for the only biometric that appears to be feasible for the envisaged system (iris scanning) have been drawn from two sources of limited dependability. The first is a study of only 200 volunteers, a sample unrepresentative of the general population: http://www.cesg.gov.uk/site/ast/biometrics/media/BiometricTestReportpt1.pdf. The other is a study by the company that holds the patents for the technology and which would be a major beneficiary of any widespread introduction of iris scanning systems.

  We believe that a well-controlled, independent, large-scale study should be undertaken before any decision is made to commit to a particular biometric technology, to ensure that the necessary low error rates can be achieved for a population of 60 million people, and that no minority group is unacceptably disadvantaged by the chosen biometric.

1.5  The feasibility of building the proposed system

  In principle, there should be no insuperable technical challenge in constructing a database that could handle the likely volume of queries with acceptable performance and resilience. In practice, we have deep scepticism about the Home Office's ability to specify, procure and implement a national, software intensive system on the scale that would be necessary. We are aware of the improvements made through the OGC Gateway process, but we see nothing in that process which would deal with the engineering complexities of this (or any similar) project, and enable the procurement to proceed at reasonable levels of risk.

  Again and again, major public-sector IT projects overrun and are cancelled, or fail to deliver the expected benefits; recent examples include systems at Post Offices, the Passport Office, the Courts, and the Child Support Agency.[75] UKCRC believes that a major factor in these failures is the unwillingness of Departments and of major IT suppliers to accept that developing software-intensive systems is an engineering task of equivalent complexity to designing a modern aircraft or building a novel sky-scraper. Because the engineering complexity of the task is not recognised, insufficient attention is given to using the best science embedded in the strongest engineering processes (a mistake that would never be made by aeronautical or civil engineers). We believe that the quality of software engineering employed on many projects is lamentable and exposes the projects to unacceptable risks of failure; unless this problem is addressed vigorously and successfully, we believe that any national ID card system will overrun dramatically and will almost certainly fail to achieve its objectives.

2.  THE SECURITY AND INTEGRITY OF THE PROPOSED SYSTEM

  Security and integrity are not absolute qualities, they need to be defined in the context of the functions that the system must perform and the data that it will hold, and they need to be expressed in terms of the properties that the system must display and the allowable rate of failure for the different failure modes.

  The requirements specification must include a threat analysis related to the security and integrity of the system—what are the potential failures and security attacks that can occur, what are the probability, consequences and costs of these occurring.

2.1  Availability

    —  For how many minutes per year is it acceptable for the system to be completely unavailable? [This could happen as the result of technical failure or following a "denial of service" attack].

    —  What is the longest duration of any allowable loss of service for an individual function, or at an individual location?

    —  What will be the cost or consequence of system failures leading to longer periods unavailability than these limits?

2.2  Confidentiality

    —  What is the maximum number of personal database records that could be leaked by the system each year (or in total) before it was deemed too insecure to remain in operation? (even setting this limit as low as 1,000 [less than 0.002% of the population] would allow the theft of the personal details of the whole membership of the House of Commons and most Premier League football players each year!).

    —  How many people will need access to the system and what security clearance will each person and site require? (For example, will airlines or other commercial companies need access? If so, how is it envisaged that the confidentiality targets will be achieved?)

    —  What level of audit trail must the system maintain, for example to allow suspicious patterns of usage to be detected? There are examples of sensitive databases that achieve a low level of unauthorised access and unauthorised modification-the Police National Computer appears to be an example where the only known leaks have resulted from bribing individuals who have authorised access, and where measures including detailed audit trails are in place to detect such leaks. We believe that the PNC is not attached to the Internet.

    —  What will be the costs and consequences of a major breach of the system's confidentiality?

2.3  Integrity

    —  What level of barrier is needed to deter forgery of ID cards? Cambridge University have demonstrated that a moderately-equipped university research team can break the encryption of a secure commercial smartcards.[76] If the proposed ID card is important enough to justify its implementation costs, it must somehow be made secure against such attacks. Although defences can be identified for the known vulnerabilities, they are not likely to exist in current products and new types of attack are being identified every year.

    —  What will be the costs, consequences and recovery mechanisms following a successful penetration of the system that leaves the integrity of the system in doubt?

  UKCRC believes that any sensitive database that is attached to the Internet (or otherwise available to a large and changing population of users) will almost inevitably be successfully attacked. If the system is built on commercially available products, we do not believe that it could be made secure against intelligent, resourceful and sustained assault. The systems engineering of the proposed national ID system therefore needs to ensure that the inevitable failures will not be catastrophic or unacceptably costly.

  We conclude that the amount of data stored and its sensitivity must be kept to an absolute minimum if any national ID system is to have any chance of success. If the system amounts to no more than an authenticated name-and-address directory, it will probably not be worthwhile to make serious attempts to steal or modify the data; if it goes much beyond this, it is unlikely to remain confidential, available and uncompromised.

3.  SUMMARY

  UKCRC believes that:

    —  the Home Office should carry out a very careful Systems Engineering study to look at the costs, risks, and benefits of different approaches to meeting the overall need for a National ID system, before committing to any particular technology, to a given level of data on cards, and to the level of data available through associated databases.

    —  No existing system can meet the requirements, therefore it is essential that a complete and unambiguous specification of the system's requirements is drawn up, and that this specification is analysed rigorously to uncover any omissions or contradictions. We know this is technically feasible even for a system of this complexity; to fail to carry out this analysis before placing contracts would be unprofessional, and a serious waste of public funds.

    —  It is essential that a scientifically designed independent trial of competing biometric technologies is undertaken to ensure that the necessary low error rates can be achieved for a population of 60 million people, and that no minority group is unacceptably disadvantaged by the chosen biometric.

    —  Any system that is implemented will be novel, complex, and will require the use of the best available software engineering incorporating good computer science. This requires a significant change to current procurement practices but, without such changes, the project will fail.

January 2004








75   See, for example, S Pearce. Government IT Projects, Report 200, Parliamentary Office of Science and Technology, 7 Millbank, London, 2003. Back

76   See http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/SISW02.pdf and related papers. Back


 
previous page contents next page

House of Commons home page Parliament home page House of Lords home page search page enquiries index

© Parliamentary copyright 2004
Prepared 30 July 2004