background preloader

Identity

Facebook Twitter

Department of Homeland Security | Preserving our Freedoms, Protecting America. HBGary search Emails. EDITORIAL: Obama's Internet passport. Federalized security screening at airports has been such a success that President Obama wants to apply the same government “expertise” to the realm of online commerce and commentary. The White House cybersecurity adviser joined Commerce Secretary Gary Locke on Jan. 7 to announce what amounts to a national ID card for the Internet. Their plan is straightforward. Instead of logging onto Facebook or one’s bank using separate passwords established with each individual company or website, the White House will take the lead in developing what it calls an “identity ecosystem” that will centralize personal information and credentials.

This government-approved system would issue a smart card or similar device that would confirm an individual’s identity when making online credit-card purchases, accessing electronic health care records, posting “anonymous” blog entries or even logging onto one’s own home computer, according to administration documents. Put another way, Mr. (pdf)National Strategy for Trusted Identities in Cyberspace. Secretary Locke, White House Cybersecurity Coordinator Howard Schmidt to Discuss Next Steps in Cybersecurity. Printer-friendly version U.S. Commerce Secretary Gary Locke and White House Cybersecurity Coordinator Howard A.

Schmidt are in Stanford, Calif., today at the Stanford Institute for Economic Policy Research to discuss the Obama administration’s efforts to enhance online security and privacy and next steps in meeting the challenges of a growing cyber world, with local industry and academic leaders in Silicon Valley. The public and private sectors have critical roles to play in creating a system that allows people to complete online transactions with greater confidence that their personal information is safe. The National Strategy for Trusted Identities in Cyberspace. Howard A. Schmidt June 25, 2010 02:00 PM EDT Cyberspace has become an indispensible component of everyday life for all Americans. We have all witnessed how the application and use of this technology has increased exponentially over the years.

Cyberspace includes the networks in our homes, businesses, schools, and our Nation’s critical infrastructure. It is where we exchange information, buy and sell products and services, and enable many other types of transactions across a wide range of sectors. But not all components of this technology have kept up with the pace of growth. Today, I am pleased to announce the latest step in moving our Nation forward in securing our cyberspace with the release of the draft National Strategy for Trusted Identities in Cyberspace (NSTIC). The Department of Homeland Security (DHS), a key partner in the development of the strategy, has posted the draft NSTIC at www.nstic.ideascale.com. Thank you for your input! Howard A. A National Program Office for Enhancing Online Trust and Privacy. Howard A. Schmidt January 07, 2011 06:34 PM EDT Today, at Stanford University, Commerce Secretary Gary Locke and I were pleased to announce that the Commerce Department will host a National Program Office (NPO) in support of the National Strategy for Trusted Identities in Cyberspace (NSTIC).

As I’ve written previously, the NSTIC fulfills one of the action items in the Cyberspace Policy Review (pdf) and is a key building block in our efforts to secure cyberspace. This holiday season, consumers spent a record $30.81 billion in online retail spending, an increase of 13 percent over the same period the previous year. This striking growth outshines even the notable 3.3-5.5 percent overall increase in holiday spending this past year. While clearly a positive sign for our economy, losses from online fraud and identity theft eat away at these gains, not to mention the harm that identity crime causes directly to millions of victims. This is the world envisioned in the NSTIC. Howard A. Commerce announces new shop to oversee online security. 2011 Trends: National Strategy for Trusted Identities in Cyberspace highlights key online privacy, security challenges.

Blackberrys, cell phones and communications devices are tagged with post-its during a briefing on Afghanistan and Pakistan in the Cabinet Room of the White House, March 26, 2009. (Official White House Photo by Pete Souza) The upcoming release of the final version of the White House “National Strategy for Trusted Identities in Cyberspace” highlights three key trends that face the world in 2011: online identity, privacy and security. Governments need ways to empower citizens to identify themselves online to realize both aspirational goals for citizen-to-government interaction and secure basic interactions for commercial purposes. Earlier today, Stanford hosted an event today where U.S. Commerce Secretary Gary Locke and White House cybersecurity coordinator Howard Schmidt talked about the Obama administration’s efforts to improve online security and privacy at the Stanford Institute for Economic Policy Research (SIEPR).

I go to a store. Let’s flash forward to today to 2011. Who are you again? This online identity stuff is very difficult—as I’ve written here before: much harder to truly grasp than it should be, in a peculiar way. I think that one of the reasons is that there are really two, logically separate things going on. Unless one puts a bit of mental legwork into understanding them—well, almost philosophically—all that follows in terms of technical solutions and so on can be irrelevant, at best. So, those two parts: 1. how do you “prove” you are who you say you are? And 2. Let me try it another way: (1) what are you trying to prove and how do you go about that? I hope to make some progress in illustrating why they’re quite different, but both very, very important. You never really prove anything, of course. What we do instead is use a number of arbitrary proxies for identity: tokens that either alone or in combination give a certain sense of assurance that their presenter is who they claim to be.

You see the point? Automated biometrics-based personal identifica. PIN Personal identification number. Personal identification number shown in a PIN mailer A personal identification number (PIN, pronounced "pin"; often redundantly PIN number) is a numeric password shared between a user and a system that can be used to authenticate the user to the system. Typically, the user is required to provide a non-confidential user identifier or token (the user ID) and a confidential PIN to gain access to the system.

Upon receiving the user ID and PIN, the system looks up the PIN based upon the user ID and compares the looked-up PIN with the received PIN. The user is granted access only when the number entered matches with the number stored in the system. Hence, despite the name, a PIN does not personally identify the user.[1] PINs are used for automated teller machines (ATMs) and at the point of sale, for debit cards and credit cards. In 2006, James Goodfellow, the inventor of the personal identification number, was awarded an OBE in the Queen's Birthday Honours.[3] PIN length[edit] IBM 3624[edit] (pdf)National Strategy forTrusted Identities inCyberspaceCreating Options for EnhancedOnline Security and Privacy.

Real ID Online? New Federal Online Identity Plan Raises Privacy and Free Speech Concerns. Coauthored by Seth Schoen The White House recently released a draft of a troubling plan titled "National Strategy for Trusted Identities in Cyberspace" (NSTIC). In previous iterations, the project was known as the "National Strategy for Secure Online Transactions" and emphasized, reasonably, the private sector's development of technologies to secure sensitive online transactions. But the recent shift to "Trusted Identities in Cyberspace" reflects a radical — and concerning — expansion of the project’s scope. The draft NSTIC now calls for pervasive, authenticated digital IDs and makes scant mention of the unprecedented threat such a scheme would pose to privacy and free speech online.

Is authentication really the answer? Probably the biggest conceptual problem is that the draft NSTIC seems to place unquestioning faith in authentication — a system of proving one's identity — as an approach to solving Internet security problems. A Real ID Society? Anonymity Much more could be said. Stefan Brands Rethinking Public Key Infrastructures and Digital Certificates; Building in Stefan Brands. The mathematical underpinnings of the U-Prove technology have been published in the book “Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy,” authored by Dr. Stefan Brands and published by The MIT Press in August 2000 (ISBN 0-262-02491-8, first edition) with a foreword by professor Ronald L. Rivest. The MIT Press has kindly granted us the permission to make the book contents available for free download, subject to the following copyright notice. Copyright notice You are hereby permitted to retrieve, print, and store a single copy of the entire book contents as made available here, for personal use only.

Contents for download All files are in Adobe PDF format. How to order a hard copy A hard copy can be ordered from, among others, the following bookstores online: Who Goes There?: Authentication Through the Lens of Privacy. Overview Authors Stephen T. Kent and Lynette I. Millett, Editors, Committee on Authentication Technologies and Their Privacy Implications, National Research Council Description Who Goes There? : Authentication Through the Lens of Privacy explores authentication technologies (passwords, PKI, biometrics, etc.) and their implications for the privacy of the individuals being authenticated. Who Goes There? [read less] Suggested Citation National Research Council.

Import this citation to: The Identity Project. The Identity Project. After years of having our complaints ignored, we were pleased to be invited by the TSA to participate in the ongoing “Multi-Cultural Coalition” organized by the Office of Traveler Specialized Screening and Outreach of the TSA Office of Civil Rights and Liberties, under the direction of the TSA Office of the Special Counselor. In response to an invitation to submit questions and concerns for the agenda of today’s TSA outreach briefing with this coalition — our first such — we submitted the following questions. We only got notice of the conference call and submitted our questions at the last minute, and didn’t expect these issues to be addressed on such short notice, but we were pleased to be able to put them on the table for TSA consideration, should the agency chose to respond: Now that the TSA is carrying out all fly/no-fly decision-making for domestic flights through Secure Flight, what is the procedure for obtaining judicial review of no-fly decisions?

Programma modernisering GBA Gemeentelijke Basis Administratie. Laws of Identity. De Laws of Identity zijn werkzame principes die door Kim Cameron in samenwerking met een groep denkers op het Internet zijn gedestilleerd uit diverse analyses ten aanzien van Identity Management. Zeven wetten[bewerken] Cameron formuleerde de volgende zeven wetten: User Control and Consent - De gebruiker bepaalt zelf welke gegevens worden gebruikt.Minimal Disclosure for a Constrained Use - Niet meer dan de minimaal noodzakelijke identificerende gegevens worden gebruikt.Justifiable Parties - Uitsluitend partijen die binnen een transactie betrokken moeten zijn, worden betrokken. Er is dus geen intermediair, of identiteitenverschaffer, die mee kan kijken.Directed Identity - De digitale identiteit wordt niet rondgebazuind. De gebruiker deelt zijn identiteit alleen zelf mee aan een bepaalde ontvanger.Pluralism of Operators and Technologies - Iedereen kan zelf bepalen welk product of hulpmiddel wordt ingezet.

Implementaties[bewerken] Zie ook[bewerken] Identity 2.0 Externe links[bewerken] IdentityBlog - Digital Identity, Privacy, and the Internet's Missing Identity Layer. Kim_cameron (kim_cameron) Identity 2.0. Identity 2.0 diagram by Dion Hinchcliffe[1] Identity 2.0, also called digital identity, is set of methods for identity verification on the internet using emerging user-centric technologies such as Information Cards or OpenID.

Identity 2.0 stems from the Web 2.0 theory of the World Wide Web transition. Its emphasis is a simple and open method of identitying transactions similar to those in the physical world, such as driver's license.[2] Industry analyst firm the Burton Group described it as follows: "In Identity 2.0, usage of identity more closely resembles today's offline identity systems, but with the advantages of a digital medium. As with a driver's license, the issuer provides the user with a certified document containing claims. The user can then choose to show this information when the situation requires". A major road block to creating Identity 2.0 is the strength of the existing infrastructure.

See also[edit] References[edit] External links[edit] Future Identity Ltd. Robin Wilton (futureidentity) Govt wants ISPs to record browsing history - Communications - Ne. Companies who provide customers with a connection to the internet may soon have to retain subscriber's private web browsing history for law enforcement to examine when requested, a move which has been widely criticised by industry insiders. The Attorney-General's Department yesterday confirmed to ZDNet Australia that it had been in discussions with industry on implementing a data retention regime in Australia. Such a regime would require companies providing internet access to log and retain customer's private web browsing history for a certain period of time for law enforcement to access when needed, according to Australian internet service provider sources.

Currently, companies that provide customers with a connection to the internet don't retain or log subscriber's private web browsing history unless they are given an interception warrant by law enforcement, usually approved by a judge. It is only then that companies can legally begin tapping a customer's internet connection. Australia's data retention proposal. Telecommunications industry sources have called the claims by Attorney-General media relations that web browsing history would not be recorded in a controversial data retention proposal "a bit cute" and a question of terminology and semantics.

ZDNet Australia broke the news on Friday that the Federal Government Attorney-General's Department was considering how it could best implement a data retention regime in Australia. "The Attorney-General's Department has been looking at the European directive on data retention, to consider whether such a regime is appropriate within Australia's law enforcement and security context," the Attorney-General's Department had said. "It has consulted broadly with the telecommunications industry. " Data retention requires telecommunications providers, including internet service providers (ISPs), to log and retain certain information on subscribers for local enforcement agencies to access when they require it. Europe has one The proposed Australian regime.

The Government Now Wants ISPs To Link Your Online History With Y.

IPprotection =antiPiracy

Livefyre Realtime Comment Platform - Coming Soon. Troll face. Livefyre Aims To Put Out The Comment Troll Problem; Gets Funding. DISQUS Comments | Powering Discussion on the Web. IntenseDebate comments enhance and encourage conversation on you. Consolidate Comments from Twitter, Facebook, Digg and More. WoW require its players to use Real ID log-ins to participate i. Should Blizzard Require Real World Names From World of Warcraft. Real ID. Gamers crave anonymity, so Blizzard scuttles Real ID plans. Global Voices Advocacy » China: Cracking down on micro-blogging. Biometrisch ID gaat in Engeland de prullenbak in. IPS - Identity cards. (pdf)id_card_security_guide_low. REAL-ID Implementation. Minister Van Quickenborne wil identiteitskaart in gsm stoppen | Vincent Van Quickenborne.

Hoger beroep tegen vingerafdrukdatabase. Fraude met DigiD blijkt verbluffend simpel.