Please see the prior post and the post before about how we got to discussing this. We can not forget that the Holocaust was enabled by the IBM corporation and its Hollerith machine. How did this happen? What were these systems? How did they work? and particularly how did the private sector corporation IBM end […]
Dear IDESG, I’m sorry. I didn’t call you Nazi’s.
The complaint was that I called my fellow IDESG colleagues Nazi’s. He was unsatisfied with my original statement about the tweet on our public management council mailing list. Some how this led to the Ombudsman taking on the issue and after I spoke with him in Tampa it was followed by a drawn out 5 week […]
BC Identity Citizen Consultation Results!!!!
This article explains more about the different parts of the British Columbia Citizen Consultation about their “identity card’ along with how it is relevant and can inform the NSTIC effort.
Resources for HopeX Talk.
I accepted an invitation from Aestetix to present with him at HopeX (10). It was a follow-on talk to his Hope 9 presentation that was on #nymwars. He is on the volunteer staff of the HopeX conference and was on the press team that helped handle all the press that came for the Ellsberg – […]
BC Government Innovation in eID + Citizen Engagement.
I wrote an article for Re:ID about the BC Government’s Citizen Engagement process that they did for their eID system. Here is the PDF: reid_spring_14-BC BC’S CITIZEN ENGAGEMENT:A MODEL FOR FUTURE PROGRAMS Because of my decade long advocacy for the rights and dignity of our digital selves, I have become widely known as “Identity Woman.” […]
The Trouble with Trust, & the case for Accountability Frameworks for NSTIC
There are many definitions of trust, and all people have their own internal perspective on what THEY trust. As I outline in this next section, there is a lot of meaning packed into the word “trust” and it varies on context and scale. Given that the word trust is found 97 times in the NSTIC […]
National! Identity! Cyberspace!: Why we shouldn't freak out about NSTIC.
This is cross posted on my Fast Company Expert Blog with the same title. I was very skeptical when I first learned government officials were poking around the identity community to learn from us and work with us. Over the last two and a half years, I have witnessed dozens of dedicated government officials work […]
Thoughts on the National Strategy for Trusted Identities in Cyberspace
Update: This blog post was written while reading the first draft released in the Summer of 2010. A lot changed from then to the publishing of the document in April 2011. Here is my answer to the NSTIC Governence Notice of Inquiry. And an article I wrote on Fast Company: National! Identity! Cyberspace! Why you shouldn’t […]
SSN's can be guessed
This just in from slashdot: “The nation’s Social Security numbering scheme has left millions of citizens vulnerable to privacy breaches, according to researchers at Carnegie Mellon University, who for the first time have used statistical techniques to predict Social Security numbers solely from an individual’s date and location of birth. The researchers used the information […]
Government data linked together…
From Slashdot: a story from The Guardian about FBI interest in connectivity between its own database resources and those abroad. It’s spearheading a program labeled ‘Server in the Sky’, meant to coordinate the police forces of the United States, the United Kingdom, Canada, Australia, and New Zealand to better fight international crime/terrorist groups. The group […]
From Slashdot: Most Scary to Least Scary
FBI datamining for more then just terrorists: “Computerworld reports that the FBI is using data mining programs to track more than just terrorists. The program’s original focus was to identify potential terrorists, but additional patterns have been developed for identity theft rings, fraudulent housing transactions, Internet pharmacy fraud, automobile insurance fraud, and health-care-related fraud. From […]
Announcing The Virtual Rights Symposium on Digital Identity & Human Rights
This is the first of what we hope to be an annual event about Digital Identity and Human Rights covering social issues, policy and legislation in this arena. The goal is to foster international cooperation on virtual rights through high quality dialogue and deliberation between legislators, researchers, service providers, and citizens. The symposium will begin […]