SlideShare a Scribd company logo
NSTIC
Update: What has been happening
since
The June 25th
2010 Announcement
Convener: Jay Unger
National Strategy for Trusted Identities in Cyberspace
Action: What should the Internet
Identity Community do to
contribute / get ready?
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC – Update & Action
What is NSTIC ?
National Strategy for Trusted
Identities in Cyberspace
● Blog post and link to draft
document on White House blog
on June 25th
2010
http://www.whitehouse.gov/blog/2010/06/25/
national-strategy-trusted-identities-cyberspace
● by Howard Schmidt
Cybersecurity Coordinator and
Special Assistant to the President
● Document still available at
http://www.dhs.gov/xlibrary/assets/ns_tic.pdf
● Public comments were accepted
at http://www.nstic.ideascale.com
 From June 25th
to January 19th
2010
 No new comment are being accepted but existing
comments can still be viewed
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
The NSTIC Document
● Document Summary
 36 Pages
 Written primarily by a contractor (Deloitte) with input from various government
agencies and some information technology organizations and business.
 High-level document – mostly vision, examples, and goals and objectives.
 Very little technical detail or technology specifics.
 No specific implementation plan or schedule.
 Fairly repetitive. Not very well written or presented.
 Examples are generally poor.
● Document Spirit
 Does recognize the need for a general identity mechanism on the internet.
–To support and enhance both public and private interaction between citizens and
government, businesses, organizations etc.
–To reduce risks associated with identity theft and fraud for all citizens.
–Recognizes the need to work with both the information industry and citizens.
–Views government leadership as
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
The NSTIC Document
● Reading between the lines
 Talks about present problems and limitations
– “ … the online environment today is not user-centric; individuals tend to have little control over their own
personal information. They have limited ability to utilize a single digital identity across multiple applications
…”
– “Over 10 million Americans are … victims of identity theft each year.”
– “… victims of identity theft can spend up to 130 hours reconstructing their identities (e.g., credit rating, bank
accounts, reputation, etc.) following an identity crime.”
– “The collection of identity-related information across multiple providers and accounts, coupled with the
sharing of personal information through the growth of social media, increases opportunities for data
compromise.”
 Discusses a vision of a “user centric identity ecosystem”
– “The Identity Ecosystem is an online environment where individuals, organizations, services, and devices
can trust one another through proper identification and authentication.”
– “… a world where individuals can seamlessly access information and services online from a variety of
sources …”
– “… and without the need to manage many accounts and passwords.”
– “ … eliminate redundant processes associated with collecting, managing, authenticating, authorizing, and
validating identity data … “
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
The NSTIC Document
● Reading between the lines
 Reference to well established concepts:
– Identity Provider - “ … responsible for the processes associated with enrolling a subject, and establishing
and maintaining the digital identity associated with an individual … “
– User Centric – “ … allow individuals to select the interoperable credential appropriate for the transaction.”
– Relying Party – “ … makes transaction decisions based upon its receipt, validation, and acceptance of a
subject’s authenticated credentials (sic) and attributes.
– Attributes – “Trusted and validated attributes provide a basis for organizations that offer online services to
make authorization decisions.
– Anonymity / Pseudonym – “An individual has the choice to … authenticate to a transaction anonymously
or a pseudonym without uniquely identifying himself.”
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
The NSTIC Process
“The Federal government - in collaboration with industry and the civil
liberties and privacy communities - should build a cyber security-based
identity management vision and strategy for the Nation.”
 Goals
– Build and implement an interoperable identity infrastructure aligned with the Identity Ecosystem Framework
– Enhance confidence and willingness to participate in the Identity Ecosystem
– Ensure the long-term success of the Identity Ecosystem
 Actions
– Designate a Federal Agency to Lead the Public/Private Sector Efforts Associated with Achieving the Goals of
the Strategy
– Develop a Shared, Comprehensive Public/Private Sector Implementation Plan
– Accelerate the Expansion of Federal Services, Pilots, and Policies that Align with the Identity Ecosystem
– Work Among the Public/Private Sectors to Implement Enhanced Privacy Protections
– Coordinate the Development and Refinement of Risk Models and Interoperability Standards
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
NSTIC Feedback after June 25th
2010
● IdeaScale Comments
 Comment period was very short (6/25-7/19).
 Over 500 comments were posted and voted on.
 Many “knee-jerk” comments from the fringes.
– “Hands off my Internet”, “No National ID”, “Government Power Grab”, etc.
 Most frequent (non knee-jerk) comment:
– Extend Public Comment Opportunity
 Several thoughtful and technically insightful comments and threads
– Various authentication methods, process for public engagement, leadership agency,
how government should participate, existing standards etc.
 No public follow-up response, communication or Announcements
● Press Coverage
 Lots of trade press coverage - Mostly favorable.
 Some general press coverage - Neutral.
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
NSTIC Feedback after June 25th
2010 (continued)
● Open Letter to Howard Schmidt at the White House on July 16th
2010
 From: Center for Democracy in Technology (CDT), Electronic Frontier Foundation
(EFF), Liberty Coalition http://www.cdt.org/files/pdfs/20100716_nstic_extend_ltr.pdf
 Requesting:
– “… that the public comment period be extended for at least 30 days to facilitate more robust
public discussion … that subsequent public comment periods on this topic extend for at
least 90 days”
– “… clarification on the agency's proposed timeline and process”
– “… an opportunity to convene an in-person discussion with an appropriate White House or
DHS official to discuss this important matter and engage in further public discussion.”
 Results:
– No extension of public comment period (IdeaScale was closed to new posts on 7/19/2010)
– CDT has had at least two follow-up meetings with the cyber-security staff at the
White House between mid-July and the present.
– CDT has had the opportunity to review and comment on new document drafts being
developed including an implementation plan and schedule.
– CDT has been informed that work is ongoing, internal agency reviews are being conducted,
and no announcements are expected before the beginning of next year

More Related Content

What's hot

Indonesian CSOs for IGF2013
Indonesian CSOs for IGF2013Indonesian CSOs for IGF2013
Indonesian CSOs for IGF2013
ICT Watch - Indonesia
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
Ian Tausig
 
Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Media
chuckbt
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
gallowayandcollens
 
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Bebo White
 
Inclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 PresentationInclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 Presentation
Smart Chicago Collaborative
 
Legal Information for Tennesseans (LIFT) Overview
Legal Information for Tennesseans (LIFT) OverviewLegal Information for Tennesseans (LIFT) Overview
Legal Information for Tennesseans (LIFT) Overview
Erik Cole
 
Federated Identity - DLNE 11th December
Federated Identity - DLNE 11th DecemberFederated Identity - DLNE 11th December
Federated Identity - DLNE 11th December
MyDigitalBiz-DLNE
 
Privacy applications on blockchain
Privacy applications on blockchainPrivacy applications on blockchain
Privacy applications on blockchain
Wilson Bright
 
Media law for community journalists and bloggers
Media law for community journalists and bloggersMedia law for community journalists and bloggers
Media law for community journalists and bloggers
jtownend
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
John J. Carney, Esq.
 
ADA Compliance for Hotels - Travel Tripper
ADA Compliance for Hotels - Travel TripperADA Compliance for Hotels - Travel Tripper
ADA Compliance for Hotels - Travel Tripper
Nancy Huang
 
Cdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaCdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinja
Lilian Edwards
 
Blockchain and Government: the Malta experience
Blockchain and Government: the Malta experienceBlockchain and Government: the Malta experience
Blockchain and Government: the Malta experience
StrategyWorks
 
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
NSW State Archives
 
Murray Privacy in the Context of Content Platforms & Discovery Tools
Murray Privacy in the Context of Content Platforms & Discovery ToolsMurray Privacy in the Context of Content Platforms & Discovery Tools
Murray Privacy in the Context of Content Platforms & Discovery Tools
National Information Standards Organization (NISO)
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
Mediabistro
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
gallowayandcollens
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
moldovaictsummit2016
 

What's hot (19)

Indonesian CSOs for IGF2013
Indonesian CSOs for IGF2013Indonesian CSOs for IGF2013
Indonesian CSOs for IGF2013
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
 
Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Media
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
 
Inclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 PresentationInclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 Presentation
 
Legal Information for Tennesseans (LIFT) Overview
Legal Information for Tennesseans (LIFT) OverviewLegal Information for Tennesseans (LIFT) Overview
Legal Information for Tennesseans (LIFT) Overview
 
Federated Identity - DLNE 11th December
Federated Identity - DLNE 11th DecemberFederated Identity - DLNE 11th December
Federated Identity - DLNE 11th December
 
Privacy applications on blockchain
Privacy applications on blockchainPrivacy applications on blockchain
Privacy applications on blockchain
 
Media law for community journalists and bloggers
Media law for community journalists and bloggersMedia law for community journalists and bloggers
Media law for community journalists and bloggers
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
ADA Compliance for Hotels - Travel Tripper
ADA Compliance for Hotels - Travel TripperADA Compliance for Hotels - Travel Tripper
ADA Compliance for Hotels - Travel Tripper
 
Cdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaCdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinja
 
Blockchain and Government: the Malta experience
Blockchain and Government: the Malta experienceBlockchain and Government: the Malta experience
Blockchain and Government: the Malta experience
 
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
 
Murray Privacy in the Context of Content Platforms & Discovery Tools
Murray Privacy in the Context of Content Platforms & Discovery ToolsMurray Privacy in the Context of Content Platforms & Discovery Tools
Murray Privacy in the Context of Content Platforms & Discovery Tools
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 

Similar to IIW-11 NSTIC Update

UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
kmimpactchallenge
 
Presentation kdid
Presentation kdidPresentation kdid
Presentation kdid
Gobernabilidad
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
Patrick McCormick
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Digital Catapult
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
M2SYS Technology
 
Hope x talk
Hope x talkHope x talk
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
Don Lovett
 
Innovating through public sector information
Innovating through public sector informationInnovating through public sector information
Innovating through public sector information
Jerry Fishenden
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
RightPatient®
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
Simon Aderinlola
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
Natalie Alesi
 
Harnessing Civic Tech & Data for Justice in STL
Harnessing Civic Tech & Data for Justice in STL Harnessing Civic Tech & Data for Justice in STL
Harnessing Civic Tech & Data for Justice in STL
Christopher Whitaker
 
Towards long-term preservation of linked data - the PRELIDA project
Towards long-term preservation of linked data - the PRELIDA projectTowards long-term preservation of linked data - the PRELIDA project
Towards long-term preservation of linked data - the PRELIDA project
PRELIDA Project
 
Our Data Coop - Intelligent Sharing for Community Benefit: An Introduction
Our Data Coop - Intelligent Sharing for Community Benefit: An IntroductionOur Data Coop - Intelligent Sharing for Community Benefit: An Introduction
Our Data Coop - Intelligent Sharing for Community Benefit: An Introduction
Common Futures
 
When Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government WebsitesWhen Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government Websites
Jeffrey Ryan Pass
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Timothy Holborn
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015
Jerry Fishenden
 
COMIT Sept 2016 - Open Data (Paul Wilkinson)
COMIT Sept 2016 - Open Data (Paul Wilkinson)COMIT Sept 2016 - Open Data (Paul Wilkinson)
COMIT Sept 2016 - Open Data (Paul Wilkinson)
Comit Projects Ltd
 
Open Goverment Data: Insights from the International Open Goverment Data Conf...
Open Goverment Data: Insights from the International Open Goverment Data Conf...Open Goverment Data: Insights from the International Open Goverment Data Conf...
Open Goverment Data: Insights from the International Open Goverment Data Conf...
Institute for Health Metrics and Evaluation - University of Washington
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social media
Patrick McCormick
 

Similar to IIW-11 NSTIC Update (20)

UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
 
Presentation kdid
Presentation kdidPresentation kdid
Presentation kdid
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - record
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Innovating through public sector information
Innovating through public sector informationInnovating through public sector information
Innovating through public sector information
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
Harnessing Civic Tech & Data for Justice in STL
Harnessing Civic Tech & Data for Justice in STL Harnessing Civic Tech & Data for Justice in STL
Harnessing Civic Tech & Data for Justice in STL
 
Towards long-term preservation of linked data - the PRELIDA project
Towards long-term preservation of linked data - the PRELIDA projectTowards long-term preservation of linked data - the PRELIDA project
Towards long-term preservation of linked data - the PRELIDA project
 
Our Data Coop - Intelligent Sharing for Community Benefit: An Introduction
Our Data Coop - Intelligent Sharing for Community Benefit: An IntroductionOur Data Coop - Intelligent Sharing for Community Benefit: An Introduction
Our Data Coop - Intelligent Sharing for Community Benefit: An Introduction
 
When Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government WebsitesWhen Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government Websites
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015
 
COMIT Sept 2016 - Open Data (Paul Wilkinson)
COMIT Sept 2016 - Open Data (Paul Wilkinson)COMIT Sept 2016 - Open Data (Paul Wilkinson)
COMIT Sept 2016 - Open Data (Paul Wilkinson)
 
Open Goverment Data: Insights from the International Open Goverment Data Conf...
Open Goverment Data: Insights from the International Open Goverment Data Conf...Open Goverment Data: Insights from the International Open Goverment Data Conf...
Open Goverment Data: Insights from the International Open Goverment Data Conf...
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social media
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

IIW-11 NSTIC Update

  • 1. NSTIC Update: What has been happening since The June 25th 2010 Announcement Convener: Jay Unger National Strategy for Trusted Identities in Cyberspace Action: What should the Internet Identity Community do to contribute / get ready?
  • 2. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC – Update & Action What is NSTIC ? National Strategy for Trusted Identities in Cyberspace ● Blog post and link to draft document on White House blog on June 25th 2010 http://www.whitehouse.gov/blog/2010/06/25/ national-strategy-trusted-identities-cyberspace ● by Howard Schmidt Cybersecurity Coordinator and Special Assistant to the President ● Document still available at http://www.dhs.gov/xlibrary/assets/ns_tic.pdf ● Public comments were accepted at http://www.nstic.ideascale.com  From June 25th to January 19th 2010  No new comment are being accepted but existing comments can still be viewed
  • 3. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action The NSTIC Document ● Document Summary  36 Pages  Written primarily by a contractor (Deloitte) with input from various government agencies and some information technology organizations and business.  High-level document – mostly vision, examples, and goals and objectives.  Very little technical detail or technology specifics.  No specific implementation plan or schedule.  Fairly repetitive. Not very well written or presented.  Examples are generally poor. ● Document Spirit  Does recognize the need for a general identity mechanism on the internet. –To support and enhance both public and private interaction between citizens and government, businesses, organizations etc. –To reduce risks associated with identity theft and fraud for all citizens. –Recognizes the need to work with both the information industry and citizens. –Views government leadership as
  • 4. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action The NSTIC Document ● Reading between the lines  Talks about present problems and limitations – “ … the online environment today is not user-centric; individuals tend to have little control over their own personal information. They have limited ability to utilize a single digital identity across multiple applications …” – “Over 10 million Americans are … victims of identity theft each year.” – “… victims of identity theft can spend up to 130 hours reconstructing their identities (e.g., credit rating, bank accounts, reputation, etc.) following an identity crime.” – “The collection of identity-related information across multiple providers and accounts, coupled with the sharing of personal information through the growth of social media, increases opportunities for data compromise.”  Discusses a vision of a “user centric identity ecosystem” – “The Identity Ecosystem is an online environment where individuals, organizations, services, and devices can trust one another through proper identification and authentication.” – “… a world where individuals can seamlessly access information and services online from a variety of sources …” – “… and without the need to manage many accounts and passwords.” – “ … eliminate redundant processes associated with collecting, managing, authenticating, authorizing, and validating identity data … “
  • 5. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action The NSTIC Document ● Reading between the lines  Reference to well established concepts: – Identity Provider - “ … responsible for the processes associated with enrolling a subject, and establishing and maintaining the digital identity associated with an individual … “ – User Centric – “ … allow individuals to select the interoperable credential appropriate for the transaction.” – Relying Party – “ … makes transaction decisions based upon its receipt, validation, and acceptance of a subject’s authenticated credentials (sic) and attributes. – Attributes – “Trusted and validated attributes provide a basis for organizations that offer online services to make authorization decisions. – Anonymity / Pseudonym – “An individual has the choice to … authenticate to a transaction anonymously or a pseudonym without uniquely identifying himself.”
  • 6. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action The NSTIC Process “The Federal government - in collaboration with industry and the civil liberties and privacy communities - should build a cyber security-based identity management vision and strategy for the Nation.”  Goals – Build and implement an interoperable identity infrastructure aligned with the Identity Ecosystem Framework – Enhance confidence and willingness to participate in the Identity Ecosystem – Ensure the long-term success of the Identity Ecosystem  Actions – Designate a Federal Agency to Lead the Public/Private Sector Efforts Associated with Achieving the Goals of the Strategy – Develop a Shared, Comprehensive Public/Private Sector Implementation Plan – Accelerate the Expansion of Federal Services, Pilots, and Policies that Align with the Identity Ecosystem – Work Among the Public/Private Sectors to Implement Enhanced Privacy Protections – Coordinate the Development and Refinement of Risk Models and Interoperability Standards
  • 7. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action NSTIC Feedback after June 25th 2010 ● IdeaScale Comments  Comment period was very short (6/25-7/19).  Over 500 comments were posted and voted on.  Many “knee-jerk” comments from the fringes. – “Hands off my Internet”, “No National ID”, “Government Power Grab”, etc.  Most frequent (non knee-jerk) comment: – Extend Public Comment Opportunity  Several thoughtful and technically insightful comments and threads – Various authentication methods, process for public engagement, leadership agency, how government should participate, existing standards etc.  No public follow-up response, communication or Announcements ● Press Coverage  Lots of trade press coverage - Mostly favorable.  Some general press coverage - Neutral.
  • 8. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action NSTIC Feedback after June 25th 2010 (continued) ● Open Letter to Howard Schmidt at the White House on July 16th 2010  From: Center for Democracy in Technology (CDT), Electronic Frontier Foundation (EFF), Liberty Coalition http://www.cdt.org/files/pdfs/20100716_nstic_extend_ltr.pdf  Requesting: – “… that the public comment period be extended for at least 30 days to facilitate more robust public discussion … that subsequent public comment periods on this topic extend for at least 90 days” – “… clarification on the agency's proposed timeline and process” – “… an opportunity to convene an in-person discussion with an appropriate White House or DHS official to discuss this important matter and engage in further public discussion.”  Results: – No extension of public comment period (IdeaScale was closed to new posts on 7/19/2010) – CDT has had at least two follow-up meetings with the cyber-security staff at the White House between mid-July and the present. – CDT has had the opportunity to review and comment on new document drafts being developed including an implementation plan and schedule. – CDT has been informed that work is ongoing, internal agency reviews are being conducted, and no announcements are expected before the beginning of next year