Context for my response to the NSTIC Governance NOI
Table of Contents to Blog Posts of My Response
My Complete Response in PDF form Kaliya-NSTIC-NOI
Introductory Letter of the Response.
Context for my NSTIC NOI response
I surprised myself when writing my response to the NSTIC (National Strategy for Trusted Identities in Cyberspace) Governance NOI (Notice of Inquiry). I wasn’t sure exactly what I was going to say because the questions seemed like they were way ahead of where they should be interms of where things were. I decided to begin by sharing important Context, Frames and Terms that were important before getting to the Questions of Governance and what should be done now.
I began with the word Ecosystem – what it meant and that a system was at the heart of this strategy not something simple or easily actionable.
I touched on the history of the Identity Community and how much conversation and intensive dialogue happened amongst that early community to get to a place where collaboration was natural and “easy”. A huge amount of effort went into developing shared language and understanding then and this is needed once again. The range of self identified stakeholders for NSTIC is quite large (the range of not self identified stakeholders it could be said is everyone on the planet or at least all those with a digital connection (via phone or interent).
I put forward two different methods/tools/processes that could be used to form shared language and understanding across this stakeholder community Polarity Management and Value Network Mapping.
I suggest that the governance structure proposed a “steering group” actually have a mandate to regularly listen to and act on the recommendations of the system that are generated via 3 different well established dialogic processes (Creative Insight Council, World Cafe and Open Space Technology [What we use at IIW]. I then answer the NOI questions referencing the ideas above.
I am going to be posting the whole of my Response in a series of posts and linking them all from there.
I began with one earlier last week which is focused on “trust” both as an emergent property of the overall system AND as the current name of technology and policy/legal frameworks for identity creation.
Links to NSTIC Response Posts:
[Read more…] about NSTIC Response by Identity Woman
Identity Rights
When to share your real name? Blizzard and their Real ID plans.
I was recently CCed in a tweet referencing this article “Why Real ID is a Really Bad Idea“about World of Warcraft implementing their version of a “Real ID” in a way that violated the trust of its users.
The woman writing the article is very clear on the identity “creep” that happened and got to the point of requiring users to use the Real ID account within the system to post on forums and EVEYWHERE they interacted on company websites.
She articulates clearly why this creates an unhealthy climate and a chilled atmosphere for many users.
[Read more…] about When to share your real name? Blizzard and their Real ID plans.
Thoughts on the National Strategy for Trusted Identities in Cyberspace
Update: This blog post was written while reading the first draft released in the Summer of 2010. A lot changed from then to the publishing of the document in April 2011.
Here is my answer to the NSTIC Governence Notice of Inquiry.
And an article I wrote on Fast Company: National! Identity! Cyberspace! Why you shouldn’t freak out about NSTIC.
Interestingly in paragraph two on the White House blog it says that NSTIC stands for “National Strategy for Trusted Initiatives in Cyberspace” rather than “National Strategy for Trusted Identities in Cyberspace”.
This first draft of NSTIC was developed in collaboration with key government agencies, business leaders and privacy advocates. What has emerged is a blueprint to reduce cybersecurity vulnerabilities and improve online privacy protections through the use of trusted digital identities.
[Read more…] about Thoughts on the National Strategy for Trusted Identities in Cyberspace
On Identity and Centralization
I was asked for a quote today to comment on F8 developments and the continuing apparent “centralization” of identity on that platform. It is not new for me to say these things but perhaps more crystallized…..
The turning point of the web becoming more social was mentioned several times today.
The issue at hand is fundamentally about FREEDOM: the freedom to choose who hosts your identity online (with the freedom to set up and host your own), the freedom to choose your persona – how you present yourself, what your gender is, your age, your race, your sex, where you are in the world. A prime example of WHY these freedoms are vital is the story of James Chartrand – you can read for yourself her story of being a “him” online as a single mother seeking work as a copy editor. Having a male identity was the way she succeeded.
We did a whole session at She’s Geeky the women’s technology unconference about women, identity and privacy online. ALL the women in that session had between 3-5 personas for different aspects of life and purposes. Many of those personas were ‘ungendered’ or male. I have not talked to many people of color about their online lives and persona management but should. I imagine that like women they choose for some of their persona not to identify racially.
Your “friends” shouldn’t be locked into a particular commercial context. This is where the work on client-side applications for identity management and social coordination for individuals are key. The browser was never designed to do these kinds of functions and I don’t think trying to make it do them is wise.
We need open “friend” standards where people are autonomous, without their identity tied to a commercial silo – like Google, Yahoo, Facebook, Microsoft, AOL, or any company. This is a vision of a web where I can “peer friend” my friends, and then no entity has power over our relationship. This requires people to be first-class objects on the web. Not easy to do, but essential for us to figure out.
Suicide Options for Facebook, LinkedIn and Twitter
I have another post up on ReadWriteWeb that went up just after Christmas covering people who are choosing to leave Facebook or considering doing so along with the tools to help them.
Fed Up with Facebook Privacy Issues? Here is how to End it All.
It highlights two different Web 2.0 suicide machines; one is an art project called Seppukoo.com .
The service creates a virtual memorial for you and posts you on a suicide wall & they give you points for how many friends you had and how many of them choose to follow you to the “after life”. The leader board is here. You can see the RIP page for one of the creators of the service – Gionatan Quintini here.
It received a cease and desist from Facebook and responded.
The response is not covered in the article (it wasn’t out when I wrote it). It has some great quotes that sound like language coming from the user-centric identity community.
5. My clients have the right to receive information, ideas, and photographs from those people whom are the legitimate proprietors of this data and can decide to share this data or to store it, with the prior consent of its respective owners. All of this is freedom of expression and the manifestation of thought and free circulation of ideas that is accepted and guaranteed in Europe and in the U.S.A.
6. Facebook cannot order the erasure of data that does not belong to it, acting against the free will of the owners of such data. This is not protection of privacy, but rather a violation of the free will of citizens that can decide freely and for themselves how to arrange their personal sphere.
Web 2.0 Suicide Machine is more comprehensive – covering LinkedIn & Twitter as well.
Here is the previous Read Write Web post on the changes in what is and is not public.
Demand for Web 2.0 suicides increasing
I went to the suidicemachine and got this message
We apologize to all our users for the breakdown of our service! Within the last hours the huge demand for 2.0 suicides completely overblew our bandwidth resources!
We are currently considering relocating to another serverfarm. Please consider suicide at a later moment and accept our apologies!
You can still try to catch a free slot, but chances are quiet low at the moment!
More from their site….
Faster, Safer, Smarter, Better Tired of your Social Network?
Liberate your newbie friends with a Web2.0 suicide! This machine lets you delete all your energy sucking social-networking profiles, kill your fake virtual friends, and completely do away with your Web2.0 alterego. The machine is just a metaphor for the website which moddr_ is hosting; the belly of the beast where the web2.0 suicide scripts are maintained. Our services currently runs with facebook.com, myspace.com and LinkedIn.com! Commit NOW!
You can even see video’s about what happens as one uses the machine.
ok the FAQ’s get eve better…..
I always get the message “Sorry, Machine is currently busy with killing someone else?”. What does this mean?
Our server can only handle a certain amount of suicide scripts running at the same time. Please consider your suicide attempt at a later moment! We are very sorry for the inconvenience and working on expanding our resources.If I kill my online friends, does it mean they’re also dead in real life?
No!What do I need to commit suicide with the Web 2.0 Suicide Machine?
A standard webbrowser with Adobe flashplugin and javascript enabled. So, it runs on Windows, Linux and Mac with most of browsers available.I can’t see my friends being killed, what happened?
Probably your flash-plugin is older than version 10? But yikes – you cannot stop the process anymore! Once you entered the login details, the machine is running the suicide script.If I start killing my 2.0-self, can I stop the process?
No!If I start killing my 2.0-self, can YOU stop the process?
No!What shall I do after I’ve killed myself with the web2.0 suicide machine?
Try calling some friends, talk a walk in a park or buy a bottle of wine and start enjoying your real life again. Some Social Suiciders reported that their life has improved by an approximate average of 25%. Don’t worry, if you feel empty right after you committed suicide. This is a normal reaction which will slowly fade away within the first 24-72 hours.Do you store any data on your webserver, like password of the user?
We don’t store your password on our server! Seriously, it goes directly into /dev/null, which is equal to nirvana! We only save your profile picture, your name and your last words! Will the 2.0 suicide machine be available for other networks such as twitter and plaxo? We are currently working on improving our products!. Currently we are working on Flickr and Hyves, but of course we are eagerly thinking of ways to get rid of our “Google Lifes”.How does it work technically?
The machine consists of a tweaked Linux server running apache2 with python module. Selenium RC Control is used to automatically launch and kill browser sessions. This all driven by a single python/cgi script with some additional self-written libraries. ?Each user can watch her suicide action in real-time via a VNC remote desktop session, displayed on our website via an flash applet rendered live into the client’s webbrowser. We are also running some customized bash scripts plus MySQL in the background for logging and debugging, jquery for the website and a modified version of the great FlashlightVNC application built in Flex. Web2.0 Suicide Machine consists of roughly 1800 lines of self-written code.Why do we think the web2.0 suicide machine is not unethical?
Everyone should have the right to disconnect. Seamless connectivity and rich social experience offered by web2.0 companies are the very antithesis of human freedom. Users are entraped in a high resolution panoptic prison without walls, accessible from anywhere in the world. We do have an healthy amount of paranoia to think that everyone should have the right to quit her 2.0-ified life by the help of automatized machines. Facebook and Co. are going to hold all your informations and pictures on their servers forever! We still hope that by removing your contact details and friend connections your data is being cached out from their servers. This can happen after days, weeks, months or even years. Just deactivating the account is thus not enough! [emphasis mine]How much does it cost to kill myself?
Usage of Web 2.0 Suicide machine is for free.Can I build my own suicide machine?
Theoretically yes! You’ll need a Linux WebServer (apache2) with perl and python modules (php should be installed as well). Further, you’ll need VNC-server and Java packages by Sun to launch selenium-remote applets. If you feel like contributing or setting up your own machine, please get in contact with us via email.
India says it will be creating National ID for Citizens
I found this last night on Slashdot – it was to important not to blog about. “India to Put All Citizen Info into Central Database”
Reading the article in The Independent this stood out for me
The creation of the ID or Unique Identification Number (UID) was a major plank of the manifesto of the ruling Congress Party during the recent election.
India is not a western democracy where “everyone” has papers and certificates of birth. As the article highlights
“This could be used as a security measure by the government which leaves migrant workers, refugees and other stateless people in India in limbo, without access to public services, employment and basic welfare.”
Our identities don’t come from government – they come from our social interactions and relationships.
The other issue that comes from this is “everyone in one database” is a giant honey pot.
Personal Anchors on the Web for Digital Identities
I have been evangelizing about user-centric identity on the web 5 years. I talk about the ideas with people constantly explaining and re-explaining different developments in the field, forward looking projects and visionary ideas community members talk about. I watch what I say carefully and I notice when I start thinking and explaining something differently.
The new term that has emerged for me this week is “anchor on the web”... as in Where is your anchor on the web? or People have an anchor on the web – this is there “identity” – the question is do they control (owning a domain name) it or is it controlled by the company that does.
I link this metaphor because it evokes the image of a boat that is you and an anchor that is linking you to somewhere – do you want this to land in a stable place that you have control over? Likely yes – if you anchor to someone else’s ship (have your name in their domain space) you are literally tied to them. Rather then being able to visit them on your own terms and leave if you like.
You can get copies of these images under CC license here.
In my last post I talked about facebook URLs and people getting their own domain name along with the contrast of usability with each. Chris Messina also wrote about facebook URLs and correctly points out that this is a battle over your digital identity.
I got a comment today from IWantMyName.com (they also have a blog) saying I was absolutely right about usability issues that domain registrars have.
You are absolutely right. It’s a common problem of domain registrars / hosting providers. They’re too focused on up-selling other services and the secondary market instead of serving the actual internet user. We’re watching the identity community closely with iWantMyName and will definitely provide identity management features in the future. For now, we already made the domain registration process easy and are helping users setting up apps like Gmail, Tumblr, Posterous etc.
Coincidently – today at SemTech the CEO of Nombray presented as part of Chris Saad’s talk about DataPortability. They let you very easily create a website under your own domain name that aggregates your information from around the web. I haven’t paid the $10 yet but I was very impressed with the usability of the sign up process and you can see my the 1/2 working site here.
There is of course Chi.mp too – but some how it feels a bit more like being tied to somewhere then actually owning your own domain (paying for it) and setting up the services under it.
The next level of interoperability and user-empowerment will be the way these systems map/document your online life and how they give you the data in a standard way when you leave their service to go to a different one.
I am hopeful these sites are the basis of what will become personal data stores that project VRM has brainstormed about and people/companies are developing.
UpDate: Wow and that was Post: 1000 for this blog!
Last day of Early Bird Registration
Today is the last day of early bird registration for the Internet Identity Workshop. No this is not an April Fools Joke either 🙂
ID Panel at SXSW
TWITTER HASH TAG FOR THIS PANEL
#sxswid
our handles
@identitywoman
@bobblakley
@etelos
@jsmarr
Panel Outline
1) Brief Intro
2) CONTEXT – 15 min
5m – looking back – enterprise IdM 101 – Bob Blakley
5m – SaaS is happening – Danny Kolke
5m – OpenID and Oauth
3) Discussion – 15-20min
4) Questions
LUNCH AFTERWARDS
we are heading over to Austin Iron Works to continue the conversation
http://idsxsw.eventbrite.com/
The next community event
INTERNET IDENTITY WORKSHOP
www.internetidentityworkshop.com
Identity events of the year – Part 2
This is part 2 and continues from part 1. I will re post this caveat again.
I am not going to do a “top ten list” – not really my style. I tend to take things as they are and appreciate the amazing, wonderful, mysterious, sensuous, intellectually stimulating but don’t “compare” in a sort of ordered list way. So just so there is clarity on the number of things I mention I will “number” them but this is NOT a top ten list – I wrote this post as a reflection without thought to order.
(un5) The emergence of Portable Contacts was a great development out of the Data Sharing Events that I put on with Laurie. The conversation between Joseph and the MSFT guys (Indu and Angus) lead to this – sort of a practical low hanging fruit thing to do – rather then solve everything – just how to get the list of contacts I have in one place out and importable to another. Joseph’s community leadership has really impressed me to. He is all about getting things done and finding the needed elements to make things happen.
(un6) I have enjoyed watching Marc draw on his fence – yes he does this literally – and talk about his vision of the social web evolving. He “published” a book containing some of what he has been talking about. You can describe Marc as many things but I for one respect him as a visionary – ahead of his time in seeing where things will be going on the web and what will be needed. (You can see his predictions for 2009 here) Just as an example of something he said that really struck me as original and important to think about looking ahead – he talked about how groups need to live autonomously – outside any one platform or silo – and that we need a language of social verbs that are open and standard across them. Maybe some more people will “get” what Marc has been saying in this regard and some open standards can evolve to address this.
(un7) In a year end review it would be a mistake to not name the IDTBD conversation that happened this summer. You can read the whole thread of the e-mail conversation in the google group – it is public. There were in the end two different ways to look at how to organize (and I think they can complementary) one put organizational form and structure first and the other put relationship and community first and said that needed form and structure could emerge from that. In the middle of the conversation we were referred to Clay Shirky’s work – both this video about LOVE in technical communities and how it is very long lasting and sustaining and his book – the power of organizing without organization. (He also has another talk about Coordination Costs that is informative). Identity Commons is an organization being held together with many of the new super low cost tools that mean organizational overhead that was needed to organize people as organized as we are isn’t needed like it was 5-10 years ago. Having said this there is much to be improved and in the survey we sent out after IIW we asked about IC and the community wanted us to focus on supporting/providing better communication between groups and also increased PR/outside world awareness of the collaborative work happening in the community.
(un8) The OpenID Foundation part of the Identity Commons community held its first elections for the community seats on the board.
(un9) Information Card Foundation launched and is part of the community of Identity Commons. I have been quite impressed with the energy and evangelism of Charles Andres. (they too are using a low organizational overhead model for getting things done). I actually got a the Azigo card selector working on my Mac and downloaded a “managed” card from an early behind the scenes trial of CivicID. I also failed at getting an “I’m over 18 card from Equifax” – Actually the experience of their knowledge based authentication made me think my identity has been “stolen” it asked me about a bunch of loans I haven’t taken out. So now I have a bunch of personal identity detective work to do this year (I will be blogging about those adventures).
(un10) Parity Communications shipped some pretty amazing stuff and it has been a long time coming*. They are behind the Equifax I’m over 18 card issuing site using their service called Card Press for issuing information cards. (as an aside I “get the whole stock photo with people holding their hands in a card shape – but why the girl with no top on?)
* Some background I first talked to Paul Trevithic and Mary Ruddy in the winter of 2004 while working for Identity Commons I knew I had to go out and meet them – to learn what they were up to and hopefully link/sync it with what Owen, Andrew & Drummond&Co. were up to around user-centric identity. They were into Social physics along with John Clippinger and both Paul and John were at the 2004 Planetwork Conference.
Over all it was an amazing year and it seems that the coming year will continue to have this field evolve.
I am working hard on pulling together two events before the next IIW (May 18-20 – put it on your calendars). One is specifically focused on “What are the Business Models” we should have an announcement about that next week but the dates will be the last week of Feb.
The other is focused on the intersection of identity technologies and the legal realm – I am meeting face to face with Lucy Lynch from ISOC in Eugene this week to work on details for that.
The Identity Futures group continues to percolate along and is working on developing a proposal to do some scenario visioning/planning.
I am hoping to spend some more time thinking about and talking to women to understand more about their needs and practices around identity online. Just in the last week while organizing She’s Geeky (the women’s only tech conference happening at the end of January) two women have mentioned they have had online stalker experiences recently. Several also have very particular ways of presenting themselves one example is a woman who professionally they use their first initial and last name – when they submit resume’s etc and in their general life online/socially they use their First name and last initial – to ensure that they are not findable at least by an employer initially doesn’t know their full name and thus their gender.
Identity events of the year – Part 1
I am not going to do a “top ten list” – not really my style. I tend to take things as they are and appreciate the amazing, wonderful, mysterious, sensuous, intellectually stimulating but don’t “compare” in a sort of ordered list way. So just so there is clarity on the number of things I mention I will “number” them but this is NOT a top ten list – I wrote this post as a reflection without thought to order.
This morning while swimming I got to reflecting about the year in identity and it did seem appropriate to share some of them.
(un1) Bob’s Relationship paper (that I hope Burton Group will release into the world) was put forward in draft form at IIW#7 (2008a) and the Data Sharing Summit in May. It framed the problem of identity and articulated some missing pieces to the puzzle we are solving – supporting an identity layer emerge. He high lighted the fact that identity happens in the context of relationship and finding ways to document the terms and conditions in a relationship – making the relationship itself its own node and not just a line in a social graph. Since the paper is mostly been available to enterprise clients of the Burton Group and some folks in the identity community this missing piece – the node of relationship itself has not been taken up. I am hopeful it will emerge. I think some of what the Higgins project is proposing as an R-Card – a place to co-manage relationship data between two parties in a transaction could for fill this.
Update: I spoke with Bob since this post and Burton will be releasing this paper in Q1.
(un2) Facebook’s emergence as the dominant social networking service and this being the anti-pattern that the communities that I have been participating in for 6 years now had articulated was a danger that needed to be addressed preemptively with open standards that worked between silo’s.
(un3) Related to this – I am remember that summer at the invitational gathering at Hollyhock (a retreat center in Canada I love and I became the accidental poster child for) I got to meet with colleagues who lead workshops there some of whom I have known for years. They knew I was into the web and social things there – “digital identity” but this year they “got” more of what I was talking about. The reason was because of issues they themselves had – one had pictures and e-mails and other things the community had put forward around someone’s life threatening illness. They found they couldn’t get the data out. … it wasn’t there. People informally in conversations I overheard were kinda freeked out by the service (you need to remember that in Canada Facebook has incredibly high penetration into the lives of “normal” folks about 40% of all Canadians are on it – so more normal folks then in the US).
So back to the open standards working between sites – putting at least doors between walled gardens – it seems that finding the agreement and finding adoption of such open standards is difficult – or perhaps more to the point it is not a “high business priority” – it is easy to have a big network just grow and become the default. I think the efforts of the open stack community are noble and I hope they succeed. I also think they need to address some of the things that facebook messes up. These include mushing all my worlds together- (water polo from when I was in highschool, kindergarten class at school, water polo from college, water polo from the national team, highschool, elementary school 1, elementary school too, my process facilitator community, the identity community, the all the worlds I am in they are all FLAT – my social reality isn’t flat. People and the topics I am interested in at any one time come closer and go out father. I have divers interests and everyone I know is not interested in everything I do. I know this. I am not trying to “hide” anything or “be secret” I just want to respect the attention of my friends. I hope this nuanced social understanding can be grasped by someone building these tools. It is not that complex.
It may be that this kind of nuance will show up in smart clients. I am hopeful that this year there will be at least one for twitter. (I want to have two kinds of twitter friends – the ones that I read ALL their tweets (scrolling back to see what happened when I was not online) and those that i will watch passively when I happen to be online too.
(un4) TWITTER really broke on to the scene this year. I started tweeting because of Phil Windley’s comment about how it got him connected to his remote team – as a water cooler replacement – to know what they were up to in daily life (I had had an account for about a year before but hadn’t gotten into it). I was also at a talking heads forum on collaboration for a day in January and several friends were there who were tweeters so I did the laborious work of finding people to follow (back then there was no people search – you sort of found people by who you saw following people you knew).
I have several more thoughts about big things of the year. I will continue to write in the next few days. I am going to get back into blogging. These last 8 months since IIW#7 2008a I have had some rather significant personal life background noise. It is why I haven’t been writing or getting out much. So one of my resolutions for the year is to blog more.
It continues here with Part 2.
Identity and personal control on horizon in web 2.0 2009 predictions
Mary Hodder is one of the 8 experts Fast Company tapped to predict evolutionary trends for web 2.o in 2009:
Mary Hodder, Founder of Dabble.com and VP of Product Development, Apisphere
“The future of social media is user’s owning their data, deciding who to send it to. Look for more companies that currently host the user’s identity to have less control over that, as things like Open ID take over and more companies try to compete by giving users more control over themselves. Look for ways users can own their own data, and companies that might offer that, sort of like a personal information bank. The changes may seem subtle but I think we’ll see companies now, like Facebook, who try to be everything to you: your bank account for info, your identity, your tools for publishing, and your bar/restaurant for socializing, having to give up some of those roles or hold them less powerfully. And I don’t think it’s natural for one company to hold all that power. It leaves you with very little control over your online self.
Of course, Facebook will fight this to the last, so they won’t be the first to give up some of this control. Others will and eventually to compete Facebook will follow. But they are the great example of the problem.
The other big change will be in companies finally building for revenue in the social and any other space online, as they build for growth in their free or social products.”
She is clearly pointing to emergence of Vendor Relationship Management tools and also the possibility of information card technologies that give users more control along with OpenID and OAuth that are linking web 2.0 services. She highlights the ‘business model’ issue that still has not been figured out for social networks or for identity technologies. We are hoping to address some of this at a special session of Internet Identity Workshop focused just on business models this winter.
It should be noted that 5/8 experts tapped were women the other 4 are Charlene Li, Rebecca Moore, Susan Mernit & Tara Hunt.
Cybersecurity report covers Identity
Lucy Lynch posted this “The CSIS Commission on Cybersecurity for the 44th Presidency ” to the ID-Legal e-mail list.
We are actually going to discuss it on our upcoming call along with figuring out our steward to Identity Commons. Lucy and I will be spending 2 days at the end of December face to face in Eugene planning strategy/execution/deliverables around having at least event in DC this winter/spring before the next IIW.
The CSIS Commission on Cybersecurity for the 44th Presidency has released its final report, “Securing Cyberspace for the 44th Presidency.” The Commissions three major findings are:
1. Cybersecurity is now one of the major national security problems facing the United States;
2. Decisions and actions must respect American values related to privacy and civil liberties; and
3. Only a comprehensive national security strategy that embraces both the domestic and international aspects of cybersecurity will improve the situation.”
There is a section on: Identity Management for CyberSecurity (page 67) that folks will want to read. CSIS is a Washington think tank, so this
is only advisory, but interesting to see some old models coming around again.
“CSIS was launched at the height of the Cold War, dedicated to the simple but urgent goal of finding ways for America to survive as a nation and prosper as a people. During the following four decades, CSIS has grown to become one of the nations and the worlds preeminent public policy institutions on U.S. and international security.”
Cybersecurity report covers Identity
Lucy Lynch posted this “The CSIS Commission on Cybersecurity for the 44th Presidency ” to the ID-Legal e-mail list.
We are actually going to discuss it on our upcoming call along with figuring out our steward to Identity Commons. Lucy and I will be spending 2 days at the end of December face to face in Eugene planning strategy/execution/deliverables around having at least event in DC this winter/spring before the next IIW.
The CSIS Commission on Cybersecurity for the 44th Presidency has released its final report, “Securing Cyberspace for the 44th Presidency.” The Commissions three major findings are:
1. Cybersecurity is now one of the major national security problems facing the United States;
2. Decisions and actions must respect American values related to privacy and civil liberties; and
3. Only a comprehensive national security strategy that embraces both the domestic and international aspects of cybersecurity will improve the situation.”
There is a section on: Identity Management for CyberSecurity (page 67) that folks will want to read. CSIS is a Washington think tank, so this
is only advisory, but interesting to see some old models coming around again.
“CSIS was launched at the height of the Cold War, dedicated to the simple but urgent goal of finding ways for America to survive as a nation and prosper as a people. During the following four decades, CSIS has grown to become one of the nations and the worlds preeminent public policy institutions on U.S. and international security.”
Finding Identity Projects in unexpected places
Two weekends ago I was in Austin Texas for the 4th National Coalition for Dialogue and Deliberation Conference. They hold their conference every 2 years and I have attended that last two. What was surprising this time was I actually found identity projects in the wild. I met Lou and Wayne (Lou is wearing black so he is from NY – Wayne is wearing the uniform from DC a suit ad tie.)
Lou is working on CivicID (a project of Gateway to gov)- they do 3rd party constituent validation. The plan right now is to issue OpenID’s that can be used on different services. Because they get third party validation the idea is that legislators will listen to electronic communication more because they know it is from actual constituents. I asked if they would be issuing claims based information cards and he said yes they would get to that.
Wayne is working on the OPen Forum Foundation their first Project is to address communication difficulties between:
* Constituents: Are you happy with your ability to communicate with your elected officials and the people who make the decisions about your world?
* Government decision-makers and staff: Are you able to handle the inflow of emails, faxes, and phone calls from constituents and respond in the way that you would like?
* Advocacy Groups: Do you find it easy to express the voice of your members to their elected officials in a way that gets heard and is productive?
Two years ago I was at NCDD talking to the online deliberation guys explaining identity – this time there were several projects that all were aware of it at least.
Practical Evolution – this has gone through several evolutions and is being used in Australia.
Intellitics – Tim Bomans Company is working on Zilino
DeepDebate.org a project lead by Lucas Ciof is working on a system to help dive into different
Idealogue Inc. by Noam Shore is also doing online tools for civic engagement.
It was quite exciting to see all this activity Tim Erickson has a post on his blog with videos about three of them.
I had dinner both Friday and Saturday night with the tech guys 🙂 – (Yes the first night I was the only woman at dinner and the second night one of two) I am hoping several of these guys come to IIW and share what they are working on.
Today I am headed to the Open Sustainability Network Camp and tomorrow to Bioneers (a conference I have been attending since 1999). I am hoping that I will be pleasantly surprised at both to find people doing interesting identity projects in the field.
I came to this field from a civil society perspective via my work with Planetwork. This does not mean however that I am anti-business or don’t care about the needs of large enterprises in this space. In the last several years I have come to appreciate how fundamentally essential their role is in making any of the original idealistic “user-centric” vision articulated in places like the ASN Paper happen. I also don’t think that business alone can get this layer to happen and without civil society engagement or uses it will take much longer. It is most definitely a both-and situation rather then an either-or.
I have often chosen to speak to the civil society perspective when I am in the community. There are already so many people who work at large enterprises and thinking about the business models. Perhaps this was a mistake because it may not be obvious how much I care about the business side of things. I CARE about it AND it is not all that matters. I am hoping in the next while to invite more people working day to day in the nonprofit, social and environmentally responsible business sector, advocacy groups and others to become more involved in the identity community. My finding of the projects at NCDD doing identity shows there is now a wider understanding of the use for identity and people beginning to experiment with application.
On Identity and Collaboration
The article that Martin Richards was working about OpenID at the last IIW was finally published in Infomation Week One Web, One WebID. It summarized the confusion in the market well. My dad – who knows nothing about the space summarized the article well (the capital letters are his)
From the article it looks like there is quite a way to go before there is a more secure system that is both WIDELY adopted and VERY secure to everybody’s satisfaction.
I say in the article I am ever optimistic about things becoming clear and harmonized
All of these plans will one day fit together, says Kaliya Hamlin, a freelance identity consultant who organizes the biannual [sic] Internet Identity Workshop and maintains a primary hub for the identity community. At the moment, however, at least to the layman, they form a bewildering jigsaw with lots of unconnected pieces and no unifying design.
I also know that markets and communities are not things you control. We can bring order to this space and I hope to continue to do so with my efforts in this community.
I was thinking about about the evolution of the community and the world-view/cultural differences that we have among us. I went back to surf through some of what Meg Wheatly had online to see if there was something that captured the essence of the model of organization we are working with. I thought with her experience coming from the corporate sector and doing organizational development work in large fortune 500 companies and her research into now living systems work she might have some words that articulate the essence of what we are doing with this model.
These few lines particularly jumped out at me form this interview with her:
The real eye-opener for me was to realize how control and order were two different things, and that you could have order without control… To understand order that arises, rather than order that is imposed through direction and control — that is a very significant new path.
I realized that was what we were doing with the Identity Commons organizational model – supporting the emergence of order rather then trying to control what happens. The question we are trying to solve how to have an identity layer/framework/social norms/standards for the internet and other digital systems is a HUGE and complex problem. It has not been solved by control and won’t be. However creating a space for order and clarity to emerge – for self organizing around different ideas, ways of doing things – and resourcing collaboration, cooperation and harmonization efforts WILL get us there faster then not having that space.
The process of articulating to the community – what you want to do – and how you want to do it – this creates accountability. This helps us see ourselves and what is going on in the community through the simple light weight formal processes and with these processes order emerges.
From the conversation today I articulated some further clarity. The whole point of having a loose collaborative space with a shared brand is to support stuff innovating not having the big corporations playing in the space approve every use of the Brand.
It is to support ideas bubbling and percolating and not feeling like one group or company needs to control that other group over there does or might do in the name of the organization.
In a group/organization agreeing to participate in Identity Commons, that group is making a commitment to collaborate and share information. Agreeing to participate one does not have to “AGREE” to all uses of the brand. In fact THE BRAND IS ABOUT THE COMMITMENT TO COLLABORATION and sharing along with a “meta’ out there future vision we do agree on but as we struggle to get there we KNOW we will might not agree. What we do agree on is a shared set of VALUES that are striving to be part of the technologies being built along with a recognition that as technologists that there is a scope and dimension of identity that goes well beyond “tech” because it is about people and our social nature.
Identity Commons was founded to provide this kind of support for a community of collaborating projects across a range of disciplines and not to be an industry trade association or a technical standards body.
You know your conference is to cheap when…
You know your conference is to cheap when other conferences offer you $200 discounts to register EARLY and yours only costs $200.
In case you missed it the Internet Identity Workshop has an announcement up and registration is open. Phil and I implore you to PLEASE register early so we know how many of you are coming.
We subtly softened our language about “user-centric identity” to take into account that there is some concern that this might be going to far in one direction and it may be that the parameters of the relationship in the middle is where the focus needs to be.
The Internet Identity Workshop focuses on what has been called user-centric identity. Basically asking the question how can people manage their own identity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with. IIW is a working meeting for a range of groups focused on the technical, social and legal issues arising with the emergence identity, relationship and social layer of the web.
I think this year Identity as a service will make a strong appearance. Companies like Symplified are doing interesting things that have application in the enterprise market first but could have usefulness on the consumer side maybe sooner then we think.
More from the announcement:
As a community we have been exploring these kinds of questions:
- How are social networking sites and social media tools applying user-centric identity? (this is the question I am interested in knowing more about. How is it working now that you can actually implement some of this stuff – it is not just big ideas any more)
- What are the open standards to make it work? (identity and semantic)
- What are technical implementations of those standards?
- How do different standards and technical implementations interoperate?
- What are the new social norms and legal constructs needed to make it work?
- What tools are needed to make it usably secure for end-users?
- What are the businesses cases / models that drive all this?
Our event is highly participatory anyone who wants to present can do so. The agenda is made all together on Tuesday morning. We do this unconference style – for those who have not yet been you can read what community leaders have said about the effectiveness of the format.
If you are NEW please come to Monday’s introductory session starting at 1pm. If you have attended before it is worth coming to get the latest updates on where things are.
Yes it is CHEAP – $200 if you are an independant, and $350 if you come from a corporateion. You get all your meals paid for (healthy food – some say the best ever conference food).
If you want to come and you can’t afford it – talk to us – we want you there if you want to be there.
If you are an Identity blogger and have been to IIW PLEASE blog about this one coming up. We also have a blog sidebar logo you an put up.
border=”0″ hspace=”3″ vspace=”3″ align=”left” title=”IIW2008 Registration banner”alt=”IIW2008 Registration banner” />
Identity Books Arrive
So I had two book shipments arrive today – i thought I would share them in case any of you out there also are reading or hope to read these books soon. Let me know.
From AMAZON today came
Identity and Control: How Social Formations Emerge, Second Edition by Harrison C. White.
This one was recommended by the Value Networks mailing list that I am on. It dives into the construction of sociocultural context. Chapter one is titled Identities and Control. Should be good.
I am a Strange Loop by Douglas Hofstadter (author of Godel, Escher, Bach) This one was recomended to my by Scott David at lunch when I met him in Seattle recently. A mutual friend introduced us five months ago in e-mail. He is a lawyer based in Seattle and participating in the ID-Legal group . The book asks the question “What do we mean when we say “I”?
I got three books that I hope will be useful in gaining some more skills/tools for communicating about identity topics.
Back of the Napkin: Solving Problems and Selling Ideas with PICTURES by Dan Roam
Presentation Zen: Simple Ideas on Presentation Design and Delivery by Garr Reynolds (I saw him present at SlideShare recently.
and
Indexed (the space betwen short, nerdy and oddly attractive) by Jessica Hagy (her blog) – think Hugh MacLeod but with diagrams on index cards rather then cartoons on the back of business cards.
Books I bought in Boston and shipped home arrived 🙂
Buckminster Fuller:Staring with the Universe is the catalogue from the Whitney Museum exhibit about him. This gets to our identity as beings on spaceship earth in the universe.
Uniforms: Why we are what we where by Paul Fussel
Ok these’s don’t exactly have to do with identity but they are fun – and besides “you are what you eat” right?
Slow Food: why our Food should be Good, Clean and Fair by Carlo Petrini – it is a translation of his manifesto originally in italian – this weekend happens to be Slow Food Nation
On Guerrilla Gardening: A Handbook for Gardening Without Boundaries by Richard Reynolds.
Last week Cody’s Books was closing in Berkeley. The bank of the company that owned the store recalled the loans. The store closed about 6 weeks ago and sat there with all the books inside. Then 2 weeks ago they sold all those remaining books at 40% off.
I got four Identity related books
Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition (2007) by Whitfield Diffie and Susan Landau.
Less Safe, Less Free: Why Americans are Loosing the War on Terror by David Cole and Jules Lobel
Who’s Watching You? The Chilling Truth about the State Surveillance, and Personal Freedom by Mick Farren and John Gibb
and
cybertypes: Race, Ethnicity and Identity on the Internet by Lisa Nakamura. (cybertypes is her updated word for stereotypes that appear on in the context of cyberspace).
Net Squared Talk about Identity
Last week I presented at the Net Squared Conference they have a focus on ‘remixing the web for social change’ – it was fun to be invited to speak at the event by the “Jon Steward Famous” Susan Tenby – (she was on the show for her testimony in front of congress about her role as the head of the Nonprofit Commons in Second LIfe – in her testimony she said her Avatar name Gliteractitca Cookie – and well this fun identity fact was what got her on John Stewart).

There was great live bloging coverage of my on the Net Squared blog posted by Brenda that you can read along with while you watch.
Identity Futures Dinner in South Bay Tonight
Sorry for this late notice on the blog but I just figured out where we are eating.
At the Internet Identity Workshop 2 weeks ago one of the session was about the Identity Futures work that we started last fall. We went over the events that we developed – see here.
John Kelly my collaborator developing them and those exercises couldn’t make IIW and we had a corum of folks who were in centered in the South Bay so we are having a meeting this evening over indian food to talk about next steps for this work.
If you are interested in this you are most welcome to attend. We are meeting at
We are meeting at 6 PM at Heritage of India 167 S Main St, Milpitas, CA 95035
PLEASE RSVP to me kaliya (at) Mac.com