{"id":10239,"date":"2011-01-10T21:30:07","date_gmt":"2011-01-10T20:30:07","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/?p=10239"},"modified":"2011-01-10T21:30:36","modified_gmt":"2011-01-10T20:30:36","slug":"government-to-back-trust-identities-for-internet-surfers","status":"publish","type":"post","link":"https:\/\/rinf.com\/alt-news\/sicence-technology\/government-to-back-trust-identities-for-internet-surfers\/","title":{"rendered":"Government To Back Trust Identities For Internet Surfers"},"content":{"rendered":"<p>by Jennifer Null from <a href=\"http:\/\/www.vergent.net\" rel=\"external\">Vergent<\/a><\/p>\n<p><a class=\"highslide\" onclick=\"return vz.expand(this)\" href=\"http:\/\/rinf.com\/alt-news\/wp-content\/uploads\/2011\/01\/obama.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/rinf.com\/alt-news\/wp-content\/uploads\/2011\/01\/obama-150x125.jpg\" alt=\"\" title=\"obama\" width=\"150\" height=\"125\" class=\"alignleft size-thumbnail wp-image-10242\" \/><\/a>President Obama is working together with Commerce Secretary Gary Locke in an attempt to create solutions for a more secure internet while also allying consumer\u2019s privacy concerns. To this end, the Obama administration has backed a program called the \u201cNational Strategy for Trusted Identities in Cyberspace\u201d which would create identity and privacy solutions designed to shore up internet security issues.<\/p>\n<p>Just what kind of solutions is Locke proposing? He didn\u2019t go into details, but he did say, \u201cWe\u2019re not talking about a national identity card or government control, but enhancements that perhaps eliminate the need to remember a dozen passwords.\u201d<\/p>\n<p>The Trusted Identities commission is still preparing the full strategy, but a first draft should be complete in the next few months.<\/p>\n<p>Locke told esecurityplanet.com : \u201cThe reality is the Internet faces something of a trust issue and it won\u2019t reach its full potential until users feel more secure. Identity theft and spam are just some of the most commonly known invasions of a user\u2019s privacy and security. People are worried about their personal information going out, and parents are worried about unwanted explicit material coming to their children.\u201d<\/p>\n<p>According to Howard A. Schmidt, who is also a member of the commission, this is a strategy aimed at creating an environment where people and businesses can shop or transact business online with confidence, \u201ctrusting the identities of each other and the identities of the infrastructure that the transaction runs on.\u201d<\/p>\n<p>Schmidt contradicts Locke to some extent by saying the initiative will include the creation of a credentials database wherein consumers can voluntarily sign up for a \u201csecure, interoperable, and privacy-enhancing credential\u201d such as a smart identity card or a digital certificate on a cell phone. Consumers can then use that identity to log into various online services, including banking, accessing electronic health records, and sending email.<\/p>\n<p>Proponents of the initiative say it\u2019s a necessary and much needed solution. Detractors, such as Internet lawyer and blogger Mike Young say the initiative is the next step in a chain of events to control the public and suppress free speech.  \u201cA government run \u2018trusted identity\u2019 program will invade your privacy with all of the inefficiencies and abuse you get from the DMV when applying for a driver\u2019s license,\u201d he writes. Young insists that while the program will ostensibly be run by the Department of Commerce, it\u2019s really a Department of Homeland security project.<\/p>\n<p>On the other hand, Cisco Systems blogger Jim Fenton argues that the proposed program won\u2019t be run anything like the DMV at all. \u201cThere is a concern that this will lead to a Government-run identity system with extensive surveillance power,\u201d he writes. \u201cThe idea. . . is much the opposite\u2014the user should get to choose an Identity Provider the trust. Although it doesn\u2019t specifically say this, users should have the ability to use more than one, just as they might do business with more than one bank or have more than one credit card or brokerage account. It is true that Identity Providers will be subject to legal process (e.g. subpoenas), but this isn\u2019t really any different from the non-online world.\u201d<\/p>\n<p>But Fenton expresses concerns about language concerning a \u201cGovernance Authority.\u201d Nowhere does the initiative define \u201cGovernance Authority,\u201d so the identity of such an organization remains unclear.<\/p>\n<p>Sound off:<\/p>\n<p>What do you think? Is this initiative just a grab at more government control\u2014Big Brother waiting to strike? Or is it a needed service that must be provided?<\/p>\n<p>Is it somewhat of an oxymoron to try to boost online privacy by creating a program that would be administered and monitored by the government?<\/p>\n<p><em>Jennifer Null is the Marketing Director at Vergent Communications, a <a href=\"http:\/\/www.vergent.net\" rel=\"external\">business internet and phone service provider delivering T1 Service, VoIP, MPLS VPN, and Hosted IP PBX services<\/a> to businesses nationwide.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by <a href=\"http:\/\/www.vergent.net\" rel=\"external\">Jennifer Null<\/a><br \/>\nPresident Obama is working together with Commerce Secretary Gary Locke in an attempt to create solutions for a more secure internet while also allying consumer\u00e2\u20ac\u2122s privacy concerns. To this end, the Obama administration has backed a program called the \u00e2\u20ac\u0153National Strategy for Trusted Identities in Cyberspace\u00e2\u20ac\u009d <\/p>\n","protected":false},"author":1213,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":{"0":"post-10239","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-sicence-technology"},"_links":{"self":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/10239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1213"}],"replies":[{"embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=10239"}],"version-history":[{"count":0,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/10239\/revisions"}],"wp:attachment":[{"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=10239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=10239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=10239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}