Date post: | 17-May-2015 |
Category: |
Documents |
Upload: | kaliya-hamlin |
View: | 4,692 times |
Download: | 4 times |
HOPE XUpdates from the
Online Identity BattlefieldJoint Presentation by:
Aestetix @aestetix
Kaliya “Identity Woman” @identitywoman
Our Intentions:
1) Update on the history #nymwars Did we “win” with G+ acquiescing?
2) The Battle continues - at its center are key words & concepts and the struggle for meaning.
3) Share more about one battlefield : NSTIC
Hoped for result some of you choose to “participate” struggling & using this lever to protect psydonymity and anonymity.
Who are we? - contextual intro’s from each of usAestetix - reveiw of talk from Hope 9 Kaliya - Indie Advocate for user-centrism + IIW
How we Connected - NSTIC! Kaliya - What is NSTIC? - rapid historyAestetix - Experience w/ Nym Issues to NSTIC
Words & Concepts on the Battlefield: [Triangles - Circles] Trust Identity Verified Reputation
Paths Forward: Limited Liability Persona BC Government Solution Turtles all the Way Down Writing out what we want!
NSTIC Next Steps “Hacking the Trust Frameworks” + Next Meeting Florida Biometrics Con. How should it work from a freedom civil liberties perspective?
aestetix“is a mononym”
• #nymwars
• HOPE Number Nine
• What is a “real” name?
• NSTIC/IDESG
#nymwars
#nymwars
Eric Schmidt, Executive Chairman at Google:• “The only way to manage this is true transparency and no
anonymity. In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. We need a [verified] name service for people. Governments will demand it.” (Techonomy, August 2010)
• “If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place."(CNBC Interview, December 2009)
#nymwars
Mark Zuckerberg, CEO at Facebook:“The days of you having a different image for your work friends or co-workers and for the other people you know are probably coming to an end pretty quickly. Having two identities for yourself is an example of a lack of integrity.” (Interview, October 2011)
#nymwars
Ian Donald Calvin Euclid Zappa
Independent Advocate for the Rights and Dignity of our Digital Selves
Saving the world with User-Centric Identity
I have had my identity woman blog for almost 10 years
Early 2000’s I was working on developing Distributed Social Networks for Transformation
Protocol: How Control Exists after Decentralizationby Alexander R. Galloway
Protocols are Political
They matter! as Snowden said today at HOPEX
We founded IIW in 2005
Internet Identity Workshop
Unconference Format
Hailstorm SAMLv1 & 2
BTOracleSUN
XRIXDI
Passport
Microsoft
FireFly
Liberty Alliance
Kantara Intiative
Planetwork Link Tank
Identity Commons (1)
Identity Gang
Identity Commons (2)
OpenIDv2
OpenID Foundation
Open Identity Exchange
Information Card
Foundation
IMIIdentity Metasystem
Interoperability
Information Card
Standard
VENN OF IDENTITY
HigginsProject
Lots of Companies
Project to be annouced at
IIW
IBM
Project to be annouced at
IIW
Pamela Project
TIM
EInternet Identity Workshop
Loose Affiliations of People
Current Organizations
Organizations (no longer)
Company
Proprietary Service (no longer)
Protocol standardized at OASIS
Protocol standardized at OASIS
earlier version (no longer)
Independent Open Protocol
Independent Open Protocol
(no longer)
Paper:Shared Understanding
Event
Project with Code
Evolution of Identity Community
Broad Base of Participation BIG COMPANY SPONSORSMSFTPingIDSUNFacebookGoogleYahooCiscoPlaxoCommerce NetAdobeBTNovellFacebookAOLPing IdentityPaypal / eBay
NONPROFIT SPONSORSISOCKantara/Liberty AllianceInfo Card FoundationOASIS IDTrustMozillaHiggins ProjectBandit ProjectPlanetworkInternet Society
CORPORATE PARTICIPANTSPaypal Booz Allen Hamilton AppleBurton GroupHewlett PackaredInternational Business MachinesIntuitLexisNexisNippon Telegraph and Telephone CorporationNokia Siemens NetworksNRIOracleOrangeRackspaceRadiant LogicSony EricssonThe MITRE CorporationTucows IncVeriSign, Inc.Vodafone Group R &DAlcatel-LucentAcxiom Identity SolutionsAcxiom ResearchEquifaxLinkedInAmazon
SMALL COMPANYSPONSORSFuGen SolutionsOUNORel-IDPokenVidoopChimpAuthentrusSxipClaimID
IETFW3COASIS
SMALL COMPANY PATICIPANTSÅngströDigg, Inc.PrivoExpensifyFamilySearch.orgFreshBooksGigyaGluuJanrainKynetxNetMesh Inc.ProtivitiSocialtextTriCipher, Inc.Trusted-IDWave SystemsSix Apart
NONPROFIT PARTICIPANTSCenter for Democracy and TechnologyDataPortability ProjectIdM Network NetherlandsOCLCOpen Forum FoundationWorld Economic Forum
UNIVERSITY PARTICIPANTSGoldsmiths, University of LondonNewcastle UniversityStanford University
GOVERNMENT PARTICIPANTSOffice of the Chief Informaiton Office, Province of British Columbia
and more...
Lots of Open Standards
XRI/XDI
SAML
InformationCards
I founded this in 2010
Goal connect starutps around the world building tools for individual collect manage and get value from their personal
data along with fostering ethical data markets.
Privacy: Increasingly Complex as Volumes of Personal Data Grow
27Source: World Economic Forum, “Rethinking Personal Data: Strengthening Trust,” May 2012
The Leola Group
2014 I founded
NSTIC
Where did we meet?
2009
10. Build a cybersecurity-based identity management vision and strategy that addresses privacy and civil liberties interests, leveraging privacy-enhancing technologies for the Nation.
Table 2: NEAR-TERM ACTION PLAN
2009
13. Implement, for high-value activities (e.g., the Smart Grid), an opt-in array of interoperable identity management systems to build trust for online transactions and to enhance privacy.
Table 3: MID-TERM ACTION PLAN
Says w
e must m
aintain
anonym
ity
& pseudonym
ity in cy
berspace
Called for in President’s Cyberspace Policy Review (May 2009): a “cybersecurity focused identity management vision and strategy…that addresses privacy and civil-liberties interests, leveraging privacy-enhancing technologies for the nation.”Guiding Principles
–Privacy-Enhancing and Voluntary–Secure and Resilient–Interoperable–Cost-Effective and Easy To Use
NSTIC calls for an Identity Ecosystem, “an online environment where individuals and organizations will be able to trust each other because they follow agreed upon standards to obtain and authenticate their digital identities.”
36
What is NSTIC?
Where is this / Where are we?
CREEPY NSA (and others) SPYING
CREEPY NSA (and others) SPYING
Rules for Lawful Intercept
Where is this / Where are we?
CREEPY NSA (and others) SPYING
Rules for Lawful Intercept
IN THIS BIG YELLOW BOX
Where is this / Where are we?
CREEPY NSA (and others) SPYING
Rules for Lawful Intercept
NORMATIVE RULES BUSINESS PRACTICES
TECHNOLOGIES
FOR EVERY DAY LIFE
Business - Business
Business - Consumer
Business - Government
Citizen/Person - Gov
Where is this / Where are we?
CREEPY NSA (and others) SPYING
Rules for Lawful Intercept
NORMATIVE RULES BUSINESS PRACTICES
TECHNOLOGIES
FOR EVERY DAY LIFE
Business - Business
Business - Consumer
Business - Government
Citizen/Person - Gov
Where is this / Where are we?
What does the IDESG do:
It is proceeding to define how EVERYONE will be able to express their identity online in the future. It is to answer questions like:
* How can people define their own names, gender identity, race, other identifying information?
* Will we retain the right to use "nicknames"/pseudonyms?
* Will we be able to speak anonymously online?
The strategy document "says" we should be able to do so but this institution will define HOW the ecosystem actually built. Only if we are there to ensure our freedoms online will they be retained.
* What are the methods of verification of enrollment (how you get into the system) what methods of authentication (passwords or device ID or biometrics)?
As the White House announcement details below, today [April 2014] marked the release of the Cybersecurity Framework crafted by NIST – with input from many stakeholders – in response to President Obama’s Executive Order on Improving Critical Infrastructure Cybersecurity issued one year ago. NSTIC is not discussed in the framework itself – but both it and the IDESG figure prominently in the Roadmap that was released as a companion to the Framework. The Roadmap highlights authentication as the first of nine different, high-priority “areas of improvement” that need to be addressed through future collaboration with particular sectors and standards-developing organizations.
The inadequacy of passwords for authentication was a key driver behind the 2011 issuance of the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls upon the private sector to collaborate on development of an Identity Ecosystem that raises the level of trust associated with the identities of individuals, organizations, networks, services, and devices online.
The res
ults o
f this
WILL
BECOME
POLICY
NSTIC is focused on consumer use cases, but the standards and policies that emerge from the privately-led Identity Ecosystem Steering Group (IDESG) established to support the NSTIC – as well as new authentication solutions that emerge from NSTIC pilots – can inform advances in authentication for critical infrastructure as well.
NIST will focus in these areas:· Continue to support the development of better identity and authentication solutions through NSTIC pilots, as well as an active partnership with the IDESG;
· Support and participate in identity and authentication standards activities, seeking to advance a more complete set of standards to promote security and interoperability; this will include standards development work to address gaps that may emerge from new approaches in the NSTIC pilots
The res
ults o
f this
WILL
BECOME
POLICY
The BIG IDEA behind NSTIC IS NOT DUMB
+
Multi-FactorAuthentication
Authentication is NOT:Enrollment or
Identity Verification
You need strong multi-factor authentication for pseudonyms too.
The BIG IDEA behind NSTIC IS NOT DUMB
Text
Text
50states
3,144counties
Text
50states
3,144counties
19,355 incorporated places
50states
Lots of Government Entities in the US - who’s job it is to interact with citizens and provide services.
Each Government agency could issue a “strong” mutli-factor ID that included verification on enrollment.
Cost $12-$120 per person - per year to manage ID
This would be a National ID
People get services from the private sector with ID.
People get services from the private sector with ID.
Gov ID for employees, contractors under HSPD12 - 12million
How can they use this ID at their private sector accounts?
A tone of liability& “trust” issues
A tone of liability& “trust” issues
NSTIC
NSTIC
TRUST FRAMEWORKS
“TRUST” Frameworks
TECHNOLOGY
LEGAL/POLICY
TECHNOLOGY LEGAL/POLICY
TECHNOLOGY LEGAL/POLICY
TRUST FRAMEWORK
TRUST FRAMEWORK
We must create Legal/Policy - Tech that will underlies what should
become an Ecosystem..
We need lots of different parties at the table to create them.
We should have an “open” mutli-stakeholder process to figure it out.
Private sector will lead the effort• Not a government-run identity program• Private sector is in the best position to drive technologies and solutions…• …and ensure the Identity Ecosystem offers improved online trust and better customer experiences
Federal government will provide support• Help develop a private-sector led governance model• Facilitate and lead development of interoperable standards• Provide clarity on national policy and legal framework around liability and privacy• Fund pilots to stimulate the marketplace• Act as an early adopter to stimulate demand 70
What does NSTIC call for?
NPO
Jeremy Grant
Program Office Announced
inside: National Institute of Standardsunder: Department of Commerce
Friday, January 7, 2011
NPO Hires a STAFF
David TemoshuckNaomi Lefkovitz
James “Jim” Sheire
Michael “Mike” Garcia
NPO ACTION: Notice of Inquiry.
SUMMARY: The Department of Commerce (Department) is conducting a comprehensive review of governance models for a governance body to administer the processes for policy and standards adoption for the Identity Ecosystem Framework in accordance with the National Strategy for Trusted Identities in Cyberspace (NSTIC or “Strategy”).
The Strategy refers to this governance body as the “steering group.” The Department seeks public comment from all stakeholders, including the commercial, academic and civil society sectors, and consumer and privacy advocates on potential models, in the form of recommendations and key assumptions in the formation and structure of the steering group. The Department seeks to learn and understand approaches for: 1) the structure and functions of a persistent and sustainable private sector-led steering group and 2) the initial establishment of the steering group. This Notice specifically seeks comment on the structures and processes for Identity Ecosystem governance. This Notice does not solicit comments or advice on the policies that will be chosen by the steering group or specific issues such as accreditation or trustmark schemes, which will be considered by the steering group at a later date. Responses to this Notice will serve only as input for a Departmental report of government recommendations for establishing the NSTIC steering group.
NPONPO Workshops
Governance
Privacy
Technology
July 2011
May 2011
with IIW Oct 2011
NPO April 2011 at chamber of commerce
NPO Charter
“Committees” byImmaculate Conception
Bylaws
NPO Charter
“Committees” byImmaculate Conception
Bylaws
The First Plenary meeting was August 2012
NPO a complete 2 year work PLAN!
THE Identity Ecosystem Steering Group STRUCTURE NPO
THE SECRETARIAT
Put out a Bidand then hired
private company to run Secretariat
The Plenary
NPO THE IDESG STRUCTURE
THE SECRETARIAT
Any person and any organization in the world(yes the world) can sign up to be a part of making
the Identity Ecosystem Framework
The Plenary
NPO
THE SECRETARIAT
You pick a stakeholder category• Privacy Advocate• Small Business - Entrepreneur • Regulated Industries• Relying Party • etc...there are 14
The Plenary
NPO
THE SECRETARIAT
Each Stakeholder Group elects a member of the management council.
The Plenary
NPO
THE SECRETARIAT
THATS“Me”
I represent small businessesand entrepreneurs.
The Plenary
Chair Management
Council
Vice-Chair
NPO
THE SECRETARIAT
Chair Management
Council
Vice-Chair Vice-Chair
Plenary Chair
NPO
THE SECRETARIAT
The first multi-day face to face meeting was 18 months after we were first elected.
The management council meets every 2 weeks on the phone.
The Plenary
Chair Management
Council
Vice-ChairVice-Chair
Plenary Chair
PRIVACY
Security Standards
Trust FrameworkTrust Mark
Standards
Int’lPolicy
NPO
THE SECRETARIAT
Committees are where all the work happens.
The NPO defined all the committees BEFORE the
management council ever met.
The Plenary
Chair Management
Council
Vice-ChairVice-Chair
Plenary Chair
PRIVACY
Security Standards
Trust FrameworkTrust Mark
Standards
Int’lPolicy
NPO
THE SECRETARIAT
They meet in a “chairs call” every 2 weeks.
The committees elect chairs
The Plenary
Chair Management
Council
Vice-ChairVice-Chair
Plenary Chair
PRIVACY
Security Standards
Trust FrameworkTrust Mark
Standards
Int’lPolicy
NPO
THE SECRETARIAT
NYM ISSUES?
Aestetix tried to bring Nym Issues Committee forward...its still in limbo.
The Plenary
Chair Management
Council
Vice-ChairVice-Chair
Plenary Chair
NPO
THE SECRETARIAT
ManagementCouncil
Sub-Committees
The Plenary
NPO THE IDESG STRUCTURE
THE SECRETARIAT
Any person and any organization in the world(yes the world) can sign up to be a part of making
the Identity Ecosystem Framework
HOW MANY PEOPLE are active in IDESG? Under 100!
A difference can be made with this institution with not that many people showing up.
The Plenary
NPO THE IDESG STRUCTURE
THE SECRETARIAT
They have Face to Face meetings once a quarter.
+ they are all broadcast live.
NPO
The
Chair
Vice-Vice-
PlePRI
Sec Stan
Trust
Stan
InPol Communications:
30 Mailing listsNo Wiki
Document RepositoryDrupal Site
No clear vision from management council about what we are actually supposed to do.
10+ Committees& Sub-Committees
The
ChVi Vi
PlPRSe St
TrusSt
I P
THE SECRETARIAT
NPO
IDENTITY ECOSYSTEM STEERING GROUP
Year 1 Pilots
Year 2Pilots
Year3Pilots ?
• Daon, Inc.• The American Association of Motor
Vehicle Administrators• Criterion Systems• Resilient Network Systems, Inc.• University Corporation for
Advanced Internet Development
• Transglobal Secure Collaboration Participation
• Georgia Tech Research Institute• Exponent• ID.me, Inc.• Privacy Vaults Online, Inc.
NPO
The
Chair
Vice-Vice-
PlePRI
Sec Stan
Trust
Stan
InPol
BIG ISSUES:
DIVERSITY - INCLUSION
TRUST FRAMEWORK CREATION * NAMING ISSUES
REASONABLE PROCESS for CITIZEN INVOLVEMENT
The Importance of Diversity & Inclusion in theNSTIC
National Strategy for Trusted Identities in Cyberspace
IDESG Identity Ecosystem Steering Group
by Kaliya “Identity Woman” Hamlin Management Council Member for Small Business and Entrepreneur Stakeholder Group
October 18, 2013 - Boston PlenaryPresentation shared remotely in New Business Section
This was at close of plenary and was invited after Kaliya raised the issue of the lack of diverse participants in producing the outcomes of Security Committee was
reviewing. Told it was out of scope of the committee to address the issue and it should be brought to end of day chairs debrief.
63
CensusViewer US 2010 Census Latino Population as a heatmap by census tract.
63
Anti-Racist Organizations in the UShttp://en.wikipedia.org/wiki/Category:
Anti-racist_organizations_in_the_United_States
Ethnic & Racial Minorities in UShttp://en.wikipedia.org/wiki/
Category:Ethnic_groups_in_the_United_States
Asian Americanhttp://en.wikipedia.org/wiki/Category:Asian_American
Lists of US Cities with non-white majority populationshttp://en.wikipedia.org/wiki/Lists_of_U.S._cities_with_non-white_majority_populations
62
List of LGBT Groupshttp://en.wikipedia.org/wiki/
List_of_LGBT-related_organizations
63
Civil Liberties Advocacy Groups in the UShttp://en.wikipedia.org/wiki/
Category:Civil_liberties_advocacy_groups_in_the_United_States
Human Rights Advocacy Groups in the UShttp://en.wikipedia.org/wiki/
Category:Human_rights_organizations_based_in_the_United_States
64
National Council of Churcheshttp://en.wikipedia.org/wiki/
Category:Members_of_the_National_Council_of_Churches
List of Gurdwarashttp://en.wikipedia.org/wiki/List_of_gurdwaras_in_the_United_States
Why James Chartrand
Wears Women’s Underpants
http://www.copyblogger.com/james-chartrand-underpants/ 65
List of Women’s Organizations in the UShttp://en.wikipedia.org/wiki/List_of_women
%27s_organizations#United_States
65
List of Disabled Rights Organizations in the UShttp://en.wikipedia.org/wiki/
List_of_disability_rights_organizations
Alliance for Full Participation http://en.wikipedia.org/wiki/
Alliance_for_Full_Participation
69
69
http://criterioninstitute.org/about/our-approach/methodology/
in March I did a BLOG POST re: next election to IDESG Management Council
Articulating serious ISSUES
including lack of diversity almost no civil society groups
Uninvited by the NPO to a International ID Conference at White House Conference Center.
The Last Plenary....
Panel with the: NAACPAssociation of the BlindACLU
I was involved in helping design it.
They are Continuing AHEAD.....
NPO
The
Chai
Vic Vic
PlePRISec Sta
Trust Sta
IP
The list of DELIVERABLES
The list of DERIVED REQUIREMENTSCreated not by Plenary but by Deloitte Consultants
NPO
The
Chair
Vice Vice
PlePRISec Sta
Trust Sta
IPo Identity
EcosystemSteeringGroup
The
Chair Vice Vice
PlePRISec Sta
Trust Sta
I Po IDESG INC501(c)3
+ 501(c)6
THE SECRETARIAT
NPO
The
Chair
Vice Vice
PlePRISec Sta
Trust Sta
IPo Identity
EcosystemSteeringGroup
The
Chair Vice Vice
PlePRISec Sta
Trust Sta
I Po IDESG INC501(c)3
+ 501(c)6
THE SECRETARIAT
Now we are Independent
YEAH!
NPO
The
Chair Vice Vice
PlePRISec Sta
Trust Sta
I Po IDESG INC501(c)3
+ 501(c)6
Now we are Independent
YEAH!
Opportunity to “reset” the process+ how we are governed.
The main committee where key work is happening is in
the Trust Framework and Trust Mark Committee
The Nym Online Identity Battlefield
Key Words & Key Concepts
“Trust”
Bond between
parent and child
What is Trust?
(at different scales)
http://www.flickr.com/photos/symphoney/127526363
People trusting themselves: SELF TRUST
http://www.flickr.com/photos/mikebaird/6827018401
People trusting each other: RELATIONSHIP TRUST
http://www.flickr.com/photos/west_point/5570799235
Groups of people working together: ORGANIZATIONAL TRUST
http://www.flickr.com/photos/wordridden/4735329102/
For organizations there is: MARKET TRUST
http://www.flickr.com/photos/nate/29593906
Beyond the business or nonprofits is: SOCIETAL TRUST
http://www.flickr.com/photos/bethscupham/7663247816
Beyond the societal trust is: ECOSYSTEM TRUST
Bonus:TECHNICAL TRUST
“TRUST” Frameworks
TECHNOLOGY
LEGAL/POLICY
TECHNOLOGY LEGAL/POLICY
TECHNOLOGY LEGAL/POLICY
TRUST FRAMEWORK
The Trouble with Trust: and the Case for Accountability Frameworks
On my Identity Woman blog
National StrategyTrustedIdentities
Identity is socially constructed and contextual.
Identity is subjective
Identity is subjective
Pointers to thingswithin particular contexts.
AbrahamicCultural Frame
Relational Cultural Frame
Identity along with all things flows down from GOD.
Identity and all things are present in the world and relate to each other.
What does industry mean by “Trusted Identity”?Here are some headlines + press releases.
“Verified”AirBnB
“Verified”AirBnB
What does this mean to Verified
What does this mean to Verified
What does this mean to be Verified?
Who is qualified to validate or verify.
Who is qualified to certify verifiers.
FCCX - system
with Post Office run by Secure Key
(said: f6)
We didn’t have time to get into this.
?Anonymous
Limited Liability Persona
?Anonymous
?
?
? ?Per-Post Per-Session
Anonymous
Limited Liability Persona
?Anonymous
Limited Liability Persona
?Anonymous
!Verified
?Anonymous
!Verified
! ! !
Verified
! !!
Documentation In PersonVerification
BiometricCapture
?Anonymous
!Verified
?Anonymous
One Site Multi-Site
Self-Asserted VerifiedSociallyValidated
!
Pseudonymous
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?!
Verified Anonymity
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?!
Verified Anonymity
Ms.Sue Donna DOB = 1/21/19821823 6th Ave. Alameda, CA
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?!
Verified Anonymity
Ms.Sue Donna DOB = 1/21/19821823 6th Ave. Alameda, CA
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?!
Verified Anonymity
Over 18 yearsWoman Voter
CA Congressional District 9
Ms.Sue Donna DOB = 1/21/19821823 6th Ave. Alameda, CA
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
!!
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
!!
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
!!
?Anonymous
One Site Multi-Site
Self-Asserted SociallyValidated
Verified
!
Pseudonymous
!!
Limited Liability Persona
Persona 1 Persona 2
Context 1 Context 2
Persona 1
Persona 2Context
Context 1 Context 2
Persona
Reputation
ReputationKlout scores all the way down…
HoloCosmos.com Turtle Island
Back to Circles and Triangles
We won #nymwars….. right?
In Conclusion: HOPE!
We won #nymwars….. right?
In Conclusion: HOPE!
USING THE BC SERVICES CARD TO ACCESS ONLINE SERVICES
British Columbia Services Card
A Triple Blind System - very good & model to consider.
In Conclusion: HOPE!
Spring 2014 39
The Government set two specific tasks for the Panel:
1. Review the Province’s approach to digital services, recommending actions the Province can take to build citizens’ confidence in the Services Card and in the digital services that take advantage of the opportunities it creates.
2. Recommend principles and priorities for the design and implementa-tion of digital services and the next phase of the provincial identity management program to support the Province’s vision to save citizens’ time in their interaction with government and make it easier to access better quality services.
This was then broken down into five more specific questions:
�Where should the Province focus its efforts in using the Services Card to create new kinds of digital services, and why?
�How can the Province best balance privacy, security, cost effective-ness and convenience in the design of the Ser-vices Card to include key features such as pass code reset and managing transaction history?
�What actions can the Province take to build citizens’ confidence in
the Services Card and in the digital services that take advantage of opportunities it creates?
�How should the Province explore using data created from digital ser-vices to improve policy and services?
�What would it mean for BC’s identity manage-ment service to be used by organizations that aren’t part of government?
An independent chair and facilitator of the panel lead the process and developed the learning curriculum for participants. It involved learning from the govern-ment how the Services Card
worked and their perspec-tives on digital futures. It also included the views of the BC Civil Liberties Association and the BC Privacy Commissioner. As part of their deliberations participants explored dif-ferent possibilities through group discussion and sorting exercises.
The Citizen Panel report was completed and submitted to the government. The Office of Citizen Engagement is now weaving the outcomes of all three streams of engagement into the final report that is to be released this spring.
I asked David Hume the executive director, of Citizen Engagement for the Province
of British Columbia what resources he would recom-mend for those considering citizen engagement within their jurisdiction.
He suggested that the web site, Particiipedia.net, is a great place to explore a variety of case studies. More step-by-step guidance for such processes can be found at the National Coalition for Dialogue and Deliberation (ncdd.org) and the Canadian Coalition for Dialogue and Deliberation (c2d2.org). Additionally, the Environmental Protection Agency has good, broad guidance (epa.gov/oia/public-participation-guide/index.html).
From the White Paper: Designing the Digital Service Consultation
36 random from diversity of provinces met over 2 weekends to determine future policies of how tech should be used.
In Conclusion: HOPE!
Citizen Engagement for the British Columbia Services Card
In Conclusion: HOPE!
Opportunity that is NSTIC!
Protect Anonymity and Pseudonymity
Prevent Defense Industry Running ID
In Conclusion: HOPE!
CREEPY NSA (and others) SPYING
Rules for Lawful Intercept
IN THIS BIG YELLOW BOXWhere is NSTIC ?
Not - SEXY Secrecy
Not Resisting “the Man”
In an Open Government Process - anyone can join. The results will become Tech+ policy and affect EVERYONE!
DEFINING NORMATIVE RULES BUSINESS PRACTICES
TECHNOLOGIES
FOR EVERY DAY LIFE
Citizen/Person - GovBusiness - Consumer
Business - GovernmentBusiness - Business
Share your eMail with us.
Join an NSTIC and VOTEJoin an NSTIC Committee
My blog has details - its a simple 15 step process :)
Join Nym Rights! www.nymrights.org
Come to next Plenary:
Florida at the Biometrics Conference
Sept 17-19
www.idecosystem.org
Come to the next IIWlast week of October :)
Internet Identity Workshop
Questions
+ We posted a resource listidentitywoman.net/hopex