Obama’s Proposed Internet Identity Ecosystem
Independent Technical Researcher
December 1st, 2011
Reader Views: 239
One evening I was looking for some information on the National Institute for Standards website (www.nist.gov) when something on the sidebar caught my eye and it was an announcement about â€śNational Strategy for Trusted Identities in Cyberspaceâ€ť at http://www.nist.gov/nstic/.Â Being the techie that I am I was curiously drawn to it as I remember a previous announcement Jan 7, 2011 on CNet about establishing an Internet identity system (http://news.cnet.com/8301-31921_3-20027800-281.html.)
Weâ€™ve heard all the stories before about people getting their identities stolen through hackers, phishing, and workers within financial institutions illegally selling customersâ€™ confidential information.Â This is the premise for President Obamaâ€™s proposed Internet Identity Ecosystem.
How does this affect you?Â Imagine this.Â Your child gets issued a smart card from their school.Â This smart card has all of your personal information on it and your childâ€™s personal information, plus their school records.Â You can plug the card into a reader on your computer and access your childâ€™s records online by sending verification data from the card to a centralized network to verify itâ€™s â€śyou,â€ť and then to your childâ€™s school to access the records.
This card is issued only to you.Â According to the proposed Internet Identity Ecosystem (National Strategy for Trusted Identities in Cyberspace, pg 5), there will be no need to remember many different login passwords on the websites you like to visit.Â The issuer of the card could be from either an office of the government or a private issuing company (â€śstandardized reliable credentials and identity mediaâ€¦in use in both public and private sectors,â€ť National Strategy for Trusted Identities in Cyberspace, pg 13) has verified your identity so whenever you plug in the card, participating vendors will read the card and recognize that itâ€™s â€śyou.â€ťÂ No more painful memorizing a password for every site you interact with.
The card can also be tied into your banking records so itâ€™ll work just like a credit or debit card.Â No more carrying around several kinds of credit or debit cards so you can use it for online shopping or public shopping.Â At participating businesses, your transaction remains anonymous to the business, but the transaction is recognized as having come from â€śyouâ€ť as it goes around the network from the business to the government or private identity issuer network to your bank or credit card account.
Better yet, the card can be tied into other records instantly verifying your job occupation.Â It could be used to store or access your employment history, criminal history, and the Social Security Administration to ensure you are who you say you are on your job application.Â The card will contain and could be constantly updating your job information and criminal background as it communicates with theÂ network.Â In an â€śEnvision itâ€ť box contained within Obamaâ€™s proposal statement is an account of what if there was a â€śnational emergency eventâ€ť and youâ€™re a doctor.Â You as the doctor could log into a federal network tracking the event and receive directions on what side of town you should go to in order to better serve the victims (7. Envision It!, National Strategy for Trusted Identities in Cyberspace, pg 19).
The network for all of this is based on the governmentâ€™s current identity security network called the Federal Identity, Credential, and Access Management, or FICAM (National Strategy for Trusted Identities in Cyberspace, pg 6).Â The network is set up so that issuers grant a smart chipped card holder access to approved parts of the database system.Â Similarly, everything tied into the issued smart chip will be tied into databases about you and all your personal information will flow through it.Â Page 3 of the Federal Identity, Credential, and Access Management Roadmap and Implementation Guidance documents has a neat diagram of the FICAM network and presumptuously the Internet Identity Ecosystem network will be similarly structured.
This is all being done in the name of convenience and security.Â With this smart chip embedded on a card or even installed in your cell phone, you can conveniently access all of your information, your childâ€™s information, and the information other people allow you to see from anywhere you want when you want; your identity has been verified and you can buy things from any website or brick and mortar company with this card.
Whatâ€™s more alarming to me is the massive amount of data about me that could be going through this set up network.Â Everything you buy and sell; all your medical records, job history, criminal history, and personal identifying information will be running through a newly created centralized network.Â Some of it could reside within private data networks if you use a private identity verifying network, but whatâ€™s to keep the government from requiring your transaction records from being sent to them?Â The government already requires Internet search engines to retain search history by IP address and give them that information upon request.Â The question is what will they be doing with all of that data?Â Theyâ€™re bound to store it in a database somewhere.
Iâ€™ll let you draw your own conclusions about what the federal government plans to do with all this information but remember this: police states are always curious about what its slaves are doing.
For further reading:
To see all documents grouped in one spot go to: www.scribd.com/Peptum72
About the Author:
David Blair is a researcher and information technology specialist configuring network router line cards for Cisco customers.Â These documents can be viewed grouped together here:Â www.scribd.com/Peptum72
Delivered by The Daily Sheeple
Contributed by David Blair of Independent Technical Researcher.
Please share: Spread the word to sheeple far and wide
Leave A Comment...
The Daily Sheeple Home Page