PDA

View Full Version : Internet IDs Next! The Prez just asked for them!



Peter Lemkin
01-08-2011, 08:18 PM
http://www.cbsnews.com/8301-501465_162-20027837-501465.html

STANFORD, Calif. - President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID for Americans, a White House official said here today.


It's "the absolute perfect spot in the U.S. government" to centralize efforts toward creating an "identity ecosystem" for the Internet, White House Cybersecurity Coordinator Howard Schmidt said.


That news, first reported by CNET, effectively pushes the department to the forefront of the issue, beating out other potential candidates including the National Security Agency and the Department of Homeland Security. The move also is likely to please privacy and civil liberties groups that have raised concerns in the past over the dual roles of police and intelligence agencies.


The announcement came at an event today at the Stanford Institute for Economic Policy Research, where U.S. Commerce Secretary Gary Locke and Schmidt spoke.


The Obama administration is currently drafting what it's calling the National Strategy for Trusted Identities in Cyberspace, which Locke said will be released by the president in the next few months. (An early version was publicly released last summer.)


"We are not talking about a national ID card," Locke said at the Stanford event. "We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities."


The Commerce Department will be setting up a national program office to work on this project, Locke said.


Details about the "trusted identity" project are unusually scarce. Last year's announcement referenced a possible forthcoming smart card or digital certificate that would prove that online users are who they say they are. These digital IDs would be offered to consumers by online vendors for financial transactions.


Schmidt stressed today that anonymity and pseudonymity will remain possible on the Internet. "I don't have to get a credential if I don't want to," he said. There's no chance that "a centralized database will emerge," and "we need the private sector to lead the implementation of this," he said.


Inter-agency rivalries to claim authority over cybersecurity have exited ever since many responsibilities were centralized in the Department of Homeland Security as part of its creation nine years ago. Three years ago, proposals were were circulating in Washington to transfer authority to the secretive NSA, which is part of the U.S. Defense Department.


In March 2009, Rod Beckstrom, director of Homeland Security's National Cybersecurity Center, resigned through a letter that gave a rare public glimpse into the competition for budgetary dollars and cybersecurity authority. Beckstrom said at the time that the NSA "effectively controls DHS cyber efforts through detailees, technology insertions," and has proposed moving some functions to the agency's Fort Meade, Md., headquarters.

Jan Klimkowski
01-08-2011, 08:51 PM
My emphasis in bold:


Schmidt stressed today that anonymity and pseudonymity will remain possible on the Internet. "I don't have to get a credential if I don't want to," he said. There's no chance that "a centralized database will emerge," and "we need the private sector to lead the implementation of this," he said.

Yeah. Right. I believe that assertion. (Not.)

Dawn Meredith
01-12-2011, 01:57 PM
My emphasis in bold:


Schmidt stressed today that anonymity and pseudonymity will remain possible on the Internet. "I don't have to get a credential if I don't want to," he said. There's no chance that "a centralized database will emerge," and "we need the private sector to lead the implementation of this," he said.

Yeah. Right. I believe that assertion. (Not.)

They want to be able to censor the net. The net is where most get their news and
the government is not happy that more and more people are becoming aware of conspiracy-fact.

Dawn

David Guyatt
01-12-2011, 02:24 PM
It's "the absolute perfect spot in the U.S. government" to centralize efforts toward creating an "identity ecosystem" for the Internet, White House Cybersecurity Coordinator Howard Schmidt said.

It's an absolute perfect spot in the U S government to centralize efforts towards creating absolute internet control.

Ed Jewett
01-19-2011, 08:23 PM
White House Plans to Launch Internet ID System, Further Eroding Civil and Political Rights

by Tom Burghardt / January 18th, 2011
Urged by one and all to “tone down” what media pundits and political elites describe as “strident,” even “violent” rhetoric that has “poisoned” our “national conversation” and “sharply polarized” the population, the shooting rampage in Tucson which claimed six lives, including that of a nine-year-old girl is, in fact, emblematic of the moral bankruptcy and utter hypocrisy of those selfsame capitalist elites.
Faced with an unprecedented economic crisis that has destroyed the lives of tens of millions our fellow citizens, not to mention aggressive wars which have cratered entire societies and murdered hundreds of thousands of people who have done us no harm, when, pray tell, will the “conversation” turn to the unprecedented annihilation of democratic institutions and the rule of law which exonerates, even celebrates, those who murder, maim and torture on an industrial scale?
Just last week, the Obama administration announced plans to roll-out an “identity ecosystem” for the internet. Although passed over in silence by major media, at the risk of being accused of “incivility,” particularly when it comes to the “hope” fraudster and war criminal in the Oval Office, Americans need to focus — sharply — on the militarists, political bag men and corporate gangsters working to bring George Orwell’s dystopian world one step closer to reality.
Earlier this month, CNET (http://news.cnet.com/8301-31921_3-20027800-281.html) disclosed that the administration “is planning to hand the U.S. Commerce Department authority over a forthcoming cyber security effort to create an Internet ID for Americans.”
White House Cybersecurity Coordinator Howard Schmidt said that the secret state’s latest move to lower the boom on privacy and free speech will embed the surveillance op at the Commerce Department. Schmidt, speaking at the Stanford Institute for Economic Policy Research said Commerce is “the absolute perfect spot in the U.S. government” to centralize these efforts.
According to CNET, the move “effectively pushes the department to the forefront of the issue, beating out other potential candidates, including the National Security Agency and the Department of Homeland Security.”
Really? I don’t think so.
NSA Clearly in the Frame
Last week, Government Computer News (http://gcn.com/articles/2011/01/07/nsa-spy-cyber-intelligence-data-center-utah.aspx) reported that the secretive Pentagon spy shop broke ground on a “massive new National Security Agency cyber intelligence center in Utah.”
The multibillion dollar facility (cost overruns not included) “will have 100,000 square feet of raised-floor data center space and more than 900,000 square feet of technical support and administrative space” that “will support the Comprehensive National Cybersecurity Initiative.”
In September, NextGov (http://www.nextgov.com/nextgov/ng_20100927_6703.php) reported that then Deputy Director of National Intelligence for Collection, Glenn Gaffney, said the new data center “would support the intelligence community in providing foreign intelligence about cybersecurity threats and protect Defense Department networks.”
Back in 2009, investigative journalist, James Bamford, wrote in The New York Review of Books (http://www.nybooks.com/articles/archives/2009/nov/05/whos-in-big-brothers-database/?pagination=false) that “the mammoth $2 billion structure will be one-third larger than the US Capitol and will use the same amount of energy as every house in Salt Lake City combined.”
While corporate media tell us that the center will “enhance” the nation’s capacity to thwart “cyber threats” the fact is, Bamford wrote, the complex will “house trillions of phone calls, e-mail messages, and data trails: Web searches, parking receipts, bookstore visits, and other digital ‘pocket litter’.” In other words, the vast data repository will serve as “spy central” for our digital minders.
“Just how much information will be stored in these windowless cybertemples?” Bamford wondered. According to a report prepared for the Pentagon by the ultra-spooky MITRE Corporation (http://www.mitre.org/), “as the sensors associated with the various surveillance missions improve, the data volumes are increasing with a projection that sensor data volume could potentially increase to the level of Yottabytes (10 to the 24 Bytes) by 2015.”
This is “roughly equal to about a septillion (1,000,000,000,000,000,000,000,000) pages of text, numbers beyond Yottabytes haven’t yet been named,” Bamford avers.
Leaving aside disinformational pyrotechnics by media cheerleaders that the NSA’s data equivalent of a Wal-Mart super center will primarily exist for “cyber security,” “foreign intelligence” and protecting “Defense Department networks,” Bamford counters that “once vacuumed up and and stored in these near-infinite ‘libraries,’ the data are then analyzed by powerful infoweapons, supercomputers running complex algorithmic programs, to determine who among us may be — or may one day become — a terrorist.”
“In the NSA’s world of automated surveillance on steroids” Bamford avers, “every bit has a history and every keystroke tells a story.”
Or as Cryptohippie (https://secure.cryptohippie.com/pubs/EPS-2010.pdf) puts it far less delicately, every keystroke or cellphone ping is “criminal evidence, ready for use in a trial.”
Just what are they up to? Even Congress, always willing to give the Executive Branch a free pass when it comes to blanket surveillance, doesn’t know. Last week the Associated Press (http://news.yahoo.com/s/ap/20110112/ap_on_re_us/us_military_cyber_oversight_3) reported that “the Pentagon failed to disclose clandestine cyber activities in a classified report on secret military actions that goes to Congress.”
Citing “gaps” in reporting requirements on clandestine operations, “emerging high-tech operations are not specifically listed in the law,” AP averred. After all, “cyber oversight is still a murky work in progress for the Obama administration.”
Perhaps AP and other media outlets should look more closely at what’s hidden inside that “murky work” and where its authority comes from. “Oversight” is certainly not part of the equation.
Cybersecurity’s Brave New World
As Antifascist Calling (http://antifascist-calling.blogspot.com/2010/10/cyberwar-is-over-and-national-security.html) previously reported, the operational nuts-and-bolts of the Comprehensive National Cybersecurity Initiative (CNCI (http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative)) is a closely-held state secret that derives authority from classified annexes of the National Security Presidential Directive 54, Homeland Security Presidential Directive 23 (NSPD 54/HSPD 23) issued by our former “decider.”
Those 2008 orders are so contentious that both the Bush and Obama administrations have refused to release details to Congress, prompting a Freedom of Information Act lawsuit (http://epic.org/foia/NSPD54_complaint.pdf) by the Electronic Privacy Information Center (EPIC (http://epic.org/)) demanding the full text of the underlying legal authority governing “cybersecurity” be made public.
Details on the “trusted identity” scheme are scarce, but back in July Antifascist Calling (http://antifascist-calling.blogspot.com/2010/07/are-you-perfect-citizen-nsa-will-deploy.html) reported that the secret state had deployed New York Times reporterm, John Markoff, as a conduit for administration scaremongering (http://www.nytimes.com/2010/07/04/weekinreview/04markoff.html).
Schmidt told the “Gray Lady” that administration plans involved “a ‘voluntary trusted identity’ system that would be the high-tech equivalent of a physical key, a fingerprint and a photo ID card, all rolled into one.”
According to the Times, “the system might use a smart identity card, or a digital credential linked to a specific computer, and would authenticate users at a range of online services.”
U.S. Commerce Secretary Gary Locke was quick to downplay the more sinister implications of the hustle saying, “We are not talking about a national ID card.”
CNET reported Locke’s claim that “we are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy, and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities.”
Why bother with privacy when surrendering your rights is so convenient!
Touted as a warm and fuzzy “identity ecosystem,” Government Computer News (http://gcn.com/articles/2011/01/12/nstic-web-site-no-national-id.aspx) reported that the National Institute of Standards and Technology (NIST) has even launched a dedicated website hawking the National Strategy for Trusted Identities in Cyberspace (NSTIC (http://www.nist.gov/nstic/)).
According to NIST, “NSTIC envisions a cyber world — the Identity Ecosystem — that improves upon the passwords currently used to login online.”
We’re informed that the “Identity Ecosystem will provide people with a variety of more secure and privacy-enhancing ways to access online services. The Identity Ecosystem enables people to validate their identities securely when they’re doing sensitive transactions (like banking) and lets them stay anonymous when they’re not (like blogging). The Identity Ecosystem will enhance individuals’ privacy by minimizing the information they must disclose to authenticate themselves.”
Government Computer News tells us that the “identity ecosystem” isn’t envisaged as a “national Internet ID to track online activities.” The devil’s in the details and what little we do know should set alarm bells ringing.
The program office will “support and coordinate interagency collaboration” and “promote pilot projects and other implementations.” Which agencies are we talking about here? What pilot projects and “other implementations” are being alluding to? We don’t know.
We do know, however, that the National Security Agency and Department of Homeland Security have forged a Memorandum of Agreement (http://www.dhs.gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.pdf) which will increase Pentagon control over America’s telecommunications and electronic infrastructure.
In fact, as the Electronic Frontier Foundation disclosed (https://www.eff.org/foia/social-network-monitoring) in October, DHS has been tracking people online and that the agency even established a “Social Networking Monitoring Center” to explicitly do so.
Documents obtained by the civil liberties watchdog group revealed that the agency has been vacuuming-up “items of interest,” systematically monitoring “citizenship petitioners” and analyzing “online public communication.”
Wouldn’t an “identity ecosystem” greatly facilitate online spying, despite administration claims to the contrary?
While the system is “voluntary” and individuals will not be compelled to sign up, the secret state is lusting after a sure fire means to identify the billions of computers, smart phones and other digital devices that plague us.
And even if you choose not to “opt in,” well, plans are already afoot by advertising pimps and their partners in the national security state “to collect the digital equivalent of fingerprints from every computer, cellphone and TV set-top box in the world,” The Wall Street Journal (http://online.wsj.com/article/SB10001424052748704679204575646704100959546.html) recently disclosed.
As with all other aspects of the “War on Terror” threatscape, the closer one looks at the Obama regime’s “identity ecosystem” the less warm and fuzzy it becomes.
Tom Burghardt is a researcher and activist based in the San Francisco Bay Area. His articles are published in many venues. He is the editor of Police State America: U.S. Military "Civil Disturbance" Planning, distributed by AK Press (http://www.akpress.org/2002/items/policestateamerica). Read other articles by Tom (http://dissidentvoice.org/author/TomBurghardt/), or visit Tom's website (http://antifascist-calling.blogspot.com/).
This article was posted on Tuesday, January 18th, 2011 at 7:00am and is filed under Civil Liberties (http://dissidentvoice.org/category/civil-liberties/), Espionage/"Intelligence" (http://dissidentvoice.org/category/espionage/), Obama (http://dissidentvoice.org/category/obama/), Privacy (http://dissidentvoice.org/category/privacy/). ShareThis


One comment on this article so far ...

Comments RSS feed (http://dissidentvoice.org/2011/01/white-house-plans-to-launch-internet-id-system-further-eroding-civil-and-political-rights/feed/)
Don Hawkins (http://deepdodo.wordpress.com/) said on January 18th, 2011 at 11:11am # (http://dissidentvoice.org/2011/01/white-house-plans-to-launch-internet-id-system-further-eroding-civil-and-political-rights/#comment-79899)
An Internet ID does this mean people will know what am thinking darn is it to late to change my name to Zenon1 or just pay close attention to what a citizen means in the twenty first century. For now I guess today turn on c-span and get a good laugh from just a few of the greatest minds in human history. Probably like my house burning down and call an interior decorator who used to work on Wall Street and before that a used car salesman.



http://dissidentvoice.org/2011/01/white-house-plans-to-launch-internet-id-system-further-eroding-civil-and-political-rights/