The news you're not supposed to know...

Austrian Economics: Understand Economics, Understand the World
The Century of the Self: The Untold History of Controlling the Masses Through the Manipulation of Unconscious Desires
The Disappearing Male: From Virility to Sterility

The Obama Deception: The Mask Comes Off
Operation Gladio: The Hidden History of U.S. Sponsored False Flag Terrorism in EuropeThe New American Century: The Untold History of The Project for the New American Century
Article posted Jun 28 2010, 11:04 PM Category: Big Brother/Orwellian Source: InformationWeek Print

White House Preparing Biometric National Online ID Card For All Americans

The proposed system for authenticating people, organizations and infrastructure on the web at the transactional level will require an identity ecosystem.
By Mathew J. Schwartz

The Obama administration is set to propose a new system for authenticating people, organizations and infrastructure on the Web. The online authentication and identity management system would be targeted at the transactional level -- for example, when someone logs into their banking website or completes an online e-commerce purchase.

Making such a system effective, however, will require creating an "identity ecosystem," backed by extensive public/private cooperation, said White House cybersecurity coordinator Howard Schmidt, delivering the opening keynote speech at the Symantec Government Symposium 2010 in Washington on Tuesday.

"This strategy cannot exist in isolation," he said. "It's going to take all of us working together." Furthermore, "we should not have to dramatically change the way we do business -- this should be a natural path forward," he said.

That path forward will hinge on a new draft of the National Strategy for Trusted Identities in Cyberspace, due to be released Friday for the first time to the public, for a three-week comment period. Formerly known as the National Strategy for Secure Online Transactions, the report offers specific strategy and implementation recommendations, and may also recommend more sweeping policy and privacy changes.

The report builds on the Obama-commissioned Cyberspace Policy Review, which analyzed the government's information and communications infrastructure defensive capabilities. One of the report's recommendations was to "build a cybersecurity-based identity management vision and strategy that addresses privacy and civil liberties interests, leveraging privacy-enhancing technologies for the nation."

Simply issuing a Web-friendly biometric identification card to everyone in the country, of course, wouldn't necessarily make anyone or anything more secure, including online transactions. As the report also notes, to be effective, security tools and technology must be complemented by education. "There is always a necessity to do awareness and education of the end user," said Schmidt. "But you're not trying to teach the end user how to be a security expert."

Latest Big Brother/Orwellian
- Undercover Agents Fathered Children With Women After Infiltrating Activist Groups
- WeAreChange Blocked in France Because of New Censorship Law
- Pew Research Poll: 40% of Millennials Want to Restrict Free Speech
- France Responds to Paris Attacks by Rushing Through Internet Censorship Law
- After Endless Demonization of Encryption, Police Find Paris Attackers Coordinated Via Unencrypted SMS
- VIDEO: 'Safe Space' Students Silence Asian Woman For Saying 'Black People Can Be Racist'
- Fourth Grader Threatened With Sexual Harassment Charges For Writing Love Letter
- DEA Running Massive Wiretap Program Almost Entirely Through a Single California County Courthouse

No Comments Posted Add Comment

Add Comment


Verification *
Please Enter the Verification Code Seen Below

Please see our About Page, our Disclaimer, and our Comments Policy.

This site contains copyrighted material the use of which in some cases has not been specifically authorized by the copyright owner. Such material is made available for the purposes of news reporting, education, research, comment, and criticism, which constitutes a 'fair use' of such copyrighted material in accordance with Title 17 U.S.C. Section 107. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. It is our policy to respond to notices of alleged infringement that comply with the DMCA and other applicable intellectual property laws. It is our policy to remove material from public view that we believe in good faith to be copyrighted material that has been illegally copied and distributed by any of our members or users.

About Us - Disclaimer - Privacy Policy

Advanced Search


Remember Me
Forgot Password?

World's Most 'Adorable' Drug Kingpin Is Actually The Daughter of Texas DEA Head Honcho - 11/26Heroic Cops Protect Community by Raiding a Group of 90-Yo Women Playing Mahjong - 11/26Good News: Law Schools In Decline, Bar Passage Rates Plummeting - 11/26Let's Talk About...The Plague - 11/26VIDEO: Language Barrier Leads to Seattle Cops Punching Man 17 Times - 11/26VIDEO: Chicago Protester Gives Cop Epic Stare Down - 11/26Video Of Chicago Cop Murdering Teen Shows Another Shooting of Convenience - 11/25California Police Used Illegal Wiretap Warrants in Hundreds of Drug Prosecutions - 11/25

Man Follows Speeding Cop, Finds Out He Was Speeding To Buy PeanutsMission Creeps: Homeland Security Agents Confiscate Women's Panties For 'Copyright Infringement'Cop Shoots Couple's Dog, Threatens Jail For Trying To Save Dog's LifeSWAT Team Shoots Teen Girl & Her Dog During Pot Raid On Wrong HomeDurham, NC Cop Testifies Faking 911 Calls To Enter Homes Is "Official Policy"Indiana Sheriff Says US A "War Zone" To Justify New MRAP Military VehicleTampa Cops Surveil Pot Dealer, Catch Him Selling Pot, Raid His Home & Kill Him"You Just Shot An Unarmed Man!": Witness Says Police Shot His Friend With His Hands Up