National Identification Schemes (Nids): A Remedy Against Terrorist Attack?
نویسندگان
چکیده
The terrorist attacks of September 11, 2001 on the World Trade Center and the Pentagon have rekindled public debate about National Identification Schemes (NIDS) in the US, Canada, and other countries. While much of the debate has focused on the tradeoffs between security protection and the potential loss of privacy and other civil liberties, this paper examines the prior question of whether a NIDS would actually be effective in preventing terrorist attacks of the kind the world recently witnessed. It examines currently proposed NIDS and finds none that identify how they would contribute to reducing the threat of major terrorist attack. By relying on unfocused measures of questionable effectiveness, NIDS may actually create a false sense of security that leaves us more vulnerable than before. We therefore risk impairing our vital liberties with little gained in return. In this light, the oft-cited trade-off between liberty and security may be irrelevant, or worse, a distraction that prematurely concedes and obscures a dangerous presumption.
منابع مشابه
Distance-Bounding Proof of Knowledge Protocols to Avoid Terrorist Fraud Attacks
Real-time frauds can be applied against numerous zero-knowledge or minimal disclosure identification schemes that protect physical services, be it opening a door or verifying attributes of a certified device. In [4], Brands and Chaum proposed distance-bounding protocols to forbid mafia fraud attacks and let the terrorist fraud attack as an open issue. In this paper, we describe an extension of ...
متن کاملارزیابی دفاع مشروع پیشگیرانه علیه تروریسم
Abstract Scholars rightly believe that prohibiting the threat to or use of force is the most important achievement of the UN charter. Eventhough Article 51 offers an exception in this regard, the letters and substance of this article are clear about an ‘armed attack’ as a precondition to trigger the right to self-defense. Beside this legal fact, a Preemptive use of force against an imminent ...
متن کاملShedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks
The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distanc...
متن کاملHub Identification of the Metro Manila Road Network Using PageRank
We attempt to identify the different node hubs of a road network using PageRank for preparation for possible random terrorist attacks. The robustness of a road network against such attack is crucial to be studied because it may cripple its connectivity by simply shutting down these hubs. We show the important hubs in a road network based on network structure and propose a model for robustness a...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کامل