Have you ever had the pleasure of dealing with an agent of the Federal government? For example, have you been audited by the IRS? Did you notice what the “Agent” does to gain access to his (or her) computer—by inserting a “Smart ID” into a slot? Did you ask how your personal information is protected from disclosure or theft? What is to prevent the Agent from copying files to a thumb drive and taking them home?
Regarding the Smart ID, the “HSPD-12” is discussed in this publicly available article; please note the following:
HSPD-12, FIPS 201 and the PIV Card
Homeland Security Presidential Directive 12 (HSPD-12), issued by President George W. Bush on August 27, 2004, mandated the establishment of a standard for identification of Federal government employees and contractors. HSPD-12 requires the use of a common identification credential for both logical and physical access to federally controlled facilities and information systems. The Department of Commerce and National Institute of Standards and Technology (NIST) were tasked with producing a standard for secure and reliable forms of identification. In response, NIST published Federal Information Processing Standard Publication 201 (FIPS 201), Personal Identity Verification (PIV) of Federal Employees and Contractors, issued on February 25, 2005, and a number of special publications that provide more detail on the implementation of the standard.
Both Federal agencies and enterprises have implemented FIPS 201-compliant ID programs and have issued PIV cards. The FIPS 201 PIV card is a smart card with both contact and contactless interfaces that is now being issued to all Federal employees and contractors…
Additional information about FIPS 201 can be found on the Government Identity/Credentialing Resources page, from NIST, and from the Secure Technology Alliance Access Control Council.
If you engage the IRS employee in conversation, remembering the adage you catch more flies with honey than with vinegar, you’ll learn the computer cannot be compromised—all data on the device are encrypted; the only access to it is via the Smart ID. Data can be copied to an external “thumb drive” but everything copied will be encrypted; any file on that thumb drive is only readable by that specific device. Wouldn’t this be true of NSA devices as well? Why does Snowden never discuss dealing with such encryption: how would it be possible?