-ObamaCo. proposes ‘Identity ecosystem’ to replace passwords.

Posted: June 26, 2010 in 2010, Articles
Tags: , , ,

Obama doesn’t want us to have to hassle around having to log into sites and services we use, fumbling around with passwords and online ‘handles’. Instead he wants to build an “Identity Ecosystem” where our personal identities are tied to every single device we use, right down to the flash memory chips we plug into our cameras and other devices.

Government Computer News:

Imagine signing on to your computer, logging onto a secure Web site or handling a sensitive document electronically — all without needing a user name or password.

The draft national strategy for building a new “identity ecosystem” that the Obama administration released June 25 would accomplish that, according to its developers. The ecosystem would base authentication on trusted digital identities instead.

The plan, named the National Strategy for Trusted Identities in Cyberspace, would lay a blueprint for an online environment in which online transactions for both the public and private sectors are more secure and trusted. The strategy identifies the federal government as “primary enabler, first adopter and key supporter” of the identity ecosystem.

In the language of the strategy, “In the envisioned identity ecosystem individuals, organizations, services, and devices would be able to trust each other because authoritative sources establish and authenticate their digital identities.” What that means in real terms is that trusted providers such as a bank would issue security credentials that would then be accepted by other online resources such as social networking sites and e-mail providers. Rather than using a user name and password, the person would have the crediential on a device that would authenticate his or her identity to the computer and, by extension, to services that accept the credential. The strategy includes references to smart cards, USB drives, mobile devices, software certificates and trusted computing modules as possible authentication technologies.

The strategy provides a hypothetical case of of a woman whose husband has recently been in the hospital. She is able to access his medical information using her cell phone because everyone involved in the information exchange uses a “trustmark” that signifies they adhere to the identity ecosystem framework.

Make sure you don’t lose your phone somewhere, or someone can log in and make purchases without even having your personal passwords. Forget about having multiple anonymous email addresses for logging into the various things you might do online. You wont need to worry about all that hassle anymore, Obama’s new version of Big Bro’ has it all covered.

Individuals going online to send e-mails, make purchases and check their medical records would be able to forgo the dizzying array of user names and passwords and instead obtain more secure credentials for completing those transactions, under a proposed White House cyberspace policy issued Friday.

The National Strategy for Trusted Identities in Cyberspace lays out the Obama administration’s strategy for enhancing the security of business conducted online. An interagency team, led by the Homeland Security Department, spent a year developing the strategy, seeking input from about 70 industry advisory councils and associations.
www.federaltimes.com…

The title of the thrust is itself a euphemism. Titles such as ‘Identity Dragnet’, or ‘Identity Tracker’ just don’t ring a bell the way the cute and cuddly, all loving, all caring “Identity ECOSYSTEM’ does.

From the document:

Privacy protection and voluntary participation are pillars of the Identity Ecosystem. The Identity Ecosystem protects anonymous parties by keeping their identity a secret and sharing only the information necessary to complete the transaction. For example, the Identity Ecosystem allows an individual to provide age without releasing birth date, name, address, or other identifying data. At the other end of the spectrum, the Identity Ecosystem supports transactions that require high assurance of a participant’s identity. The Identity Ecosystem reduces the risk of exploitation of information by DRAFT National Strategy for Trusted Identities in Cyberspace June 25, 2010 2 unauthorized access through more robust access control techniques. Finally, participation in the Identity Ecosystem is voluntary for both organizations and individuals.

Sure it will start off voluntary, and then a ‘cyber attack’ ‘will occur’ and there you go they have the involuntary framework already in place. National ID has nothing on this, at all.

This isn’t just about bank security, it’s about everything from sending emails etc.

And of course they’ll word it where there’s privacy, but the Big Bro’ WILL know everything that each and everyone of us is doing. They’ve already proven total disregard to privacy laws and due process in literally every possible facet of the realm, don’t forget.

And it isn’t just your bank card, it is EVERY single device and component thereof.

Even if it were feasible, which apparently they think it is after spending a year developing it, this is one of the worst ideas I’ve seen yet out of either BushCo. or ObamaCo.

Thinking further, them merely building the infrastructure to be able to do this will in effect make it so. If they can do it, they will, as government proves again and again.

Do they really need to have my name attached to my video card, memory sticks, CPU, monitors, motherboard, cable modem, wireless Internet router, camera, flash memory sticks, mouse, keyboard, printer, DVD burner and hard disks? (to use just one example)

I often figure they already do. Perhaps this is their way of publicly legitimizing it much how BushCo. handled unveiling Total Information Awareness NSA spying on the grand scale, Fusion Centers and all of that.

People forget that Congress ruled TIA as unconstitutional, and ordered it to be shut down.

September 26, 2003
Privacy and civil-rights groups have hailed Congress’ decision to effectively kill a controversial Pentagon program to construct a powerful computerized surveillance system that critics feared would lead to unprecedented spying into the private lives of U.S. citizens.

The final bill also banned the government from using the technology envisioned by TIA in any other program.

The House of Representatives voted 407-15 to approve the conference committee’s bill on Wednesday, while the Senate approved it Thursday by a vote of 95-0.

“Congress has reaffirmed the fundamental privacy rights of all Americans,” said Timothy Edgar, legislative counsel for the American Civil Liberties Union (ACLU) which had lobbied against the TIA since its existence was first exposed by the New York Times one year ago. “This is a resounding victory for individual liberty.”
www.globalissues.org…

Now it has been applied far and wide, into every department and agency, and this new measure is the icing on the cake.

Maybe it’s also about knowing when we sell individual components to our friends, so they can swoop in and tax us for it.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s