Get flash to fully experience Pearltrees
Enlarge Photo Commerce Secretary Gary Locke says the National Oceanic and Atmospheric Administration’s Climate ... more > Federalized security screening at airports has been such a success that President Obama wants to apply the same government “expertise” to the realm of online commerce and commentary. The White House cybersecurity adviser joined Commerce Secretary Gary Locke on Jan. 7 to announce what amounts to a national ID card for the Internet. Their plan is straightforward.
This story originally appeared on CNET istockphoto.com STANFORD, Calif.--President Obama is planning to hand the U.S.
Printer-friendly version U.S. Commerce Secretary Gary Locke and White House Cybersecurity Coordinator Howard A.
Howard A. Schmidt
Howard A. Schmidt January 07, 2011 06:34 PM EDT Today, at Stanford University, Commerce Secretary Gary Locke and I were pleased to announce that the Commerce Department will host a National Program Office (NPO) in support of the National Strategy for Trusted Identities in Cyberspace (NSTIC). As I’ve written previously , the NSTIC fulfills one of the action items in the Cyberspace Policy Review (pdf ) and is a key building block in our efforts to secure cyberspace. This holiday season, consumers spent a record $30.81 billion in online retail spending , an increase of 13 percent over the same period the previous year.
Blackberrys, cell phones and communications devices are tagged with post-its during a briefing on Afghanistan and Pakistan in the Cabinet Room of the White House, March 26, 2009. (Official White House Photo by Pete Souza) The upcoming release of the final version of the White House “ National Strategy for Trusted Identities in Cyberspace ” highlights three key trends that face the world in 2011: online identity, privacy and security. Governments need ways to empower citizens to identify themselves online to realize both aspirational goals for citizen-to-government interaction and secure basic interactions for commercial purposes.
This online identity stuff is very difficult—as I’ve written here before: much harder to truly grasp than it should be, in a peculiar way. I think that one of the reasons is that there are really two, logically separate things going on. Unless one puts a bit of mental legwork into understanding them—well, almost philosophically —all that follows in terms of technical solutions and so on can be irrelevant, at best.
Personal identification number shown in a PIN mailer
The White House recently released a draft of a troubling plan titled " National Strategy for Trusted Identities in Cyberspace " (NSTIC). In previous iterations, the project was known as the "National Strategy for Secure Online Transactions" and emphasized, reasonably, the private sector's development of technologies to secure sensitive online transactions. But the recent shift to "Trusted Identities in Cyberspace" reflects a radical — and concerning — expansion of the project’s scope.
The mathematical underpinnings of the U-Prove technology have been published in the book “Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy,” authored by Dr. Stefan Brands and published by The MIT Press in August 2000 (ISBN 0-262-02491-8, first edition) with a foreword by professor Ronald L. Rivest .
After years of having our complaints ignored, we were pleased to be invited by the TSA to participate in the ongoing “Multi-Cultural Coalition” organized by the Office of Traveler Specialized Screening and Outreach of the TSA Office of Civil Rights and Liberties , under the direction of the TSA Office of the Special Counselor. In response to an invitation to submit questions and concerns for the agenda of today’s TSA outreach briefing with this coalition — our first such — we submitted the following questions. We only got notice of the conference call and submitted our questions at the last minute, and didn’t expect these issues to be addressed on such short notice, but we were pleased to be able to put them on the table for TSA consideration, should the agency chose to respond:
Artikel zet kanttekeningen bij stelsel van basisregistraties. Gemeenten voeren op dit moment het stelsel van basisregistraties in. Het doel: gegevens over burgers en bedrijven delen.
De Laws of Identity zijn werkzame principes die door Kim Cameron in samenwerking met een groep denkers op het Internet zijn gedestilleerd uit diverse analyses ten aanzien van Identity Management . De zeven wetten zijn dan ook geen wetten maar uitgangspunten om een goed werkend en vertrouwd stelsel van maatregelen te kunnen treffen om het beheer en gebruik van digitale identiteiten te kunnen realiseren. Op basis van de wetten is een open Identity Metasystem ontwikkeld, dat als een raamwerk in staat is Identity Management mogelijk te maken. [ bewerken ] Zeven wetten
Identity 2.0 diagram by Dion Hinchcliffe [ 1 ] Identity 2.0 , also called digital identity , is set of methods for identity verification on the internet using emerging user-centric technologies such as Information Cards or OpenID .
Companies who provide customers with a connection to the internet may soon have to retain subscriber's private web browsing history for law enforcement to examine when requested, a move which has been widely criticised by industry insiders. The Attorney-General's Department yesterday confirmed to ZDNet Australia that it had been in discussions with industry on implementing a data retention regime in Australia. Such a regime would require companies providing internet access to log and retain customer's private web browsing history for a certain period of time for law enforcement to access when needed, according to Australian internet service provider sources. Currently, companies that provide customers with a connection to the internet don't retain or log subscriber's private web browsing history unless they are given an interception warrant by law enforcement, usually approved by a judge. It is only then that companies can legally begin tapping a customer's internet connection.