Sovereignthink

Upholding Individual, State then National Sovereignty against the Enforcement of Global Governence and Tyranny

Posts Tagged ‘National Strategy for Trusted Identities in Cyberspace

Headline Update the NSTIC of Things and the NSTICing of everyone

leave a comment »


NSTIC-ing everyone with everything ever said or done ever. Total Information Awareness (TIA) is Total Justification of Judgment (TJJ) not justice.

 

National Strategy for Trusted Identities in Cyberspace (NSTIC)

January 7, 2011 ~ 11 AM – 12:30 PM
Stanford University

 

Secretary Gary Locke, U.S. Department of Commerce, and Howard A. Schmidt, Special Assistant to the President and Cybersecurity Coordinator at The White House,  spoke at an event about the National Strategy for Trusted Identities in Cyber Space (NSTIC). As part of the event a panel of CEO industry executives also discussed current and future real world applications of trusted identities.

 

The NDAA Kill Switch Police State and the i-9/11 economic event

 

Written by sovereignthink

2011/12/10 at 8:50 pm

The Kill Switch Terrortist Police State.

In the near future… now that Obama will sign the NDAA of 2011 into law?

There could be an e-9/11 event, in which the stock exchange and major financial institutions have their systems ‘hacked’.

Like America’s Economic 9/11 of September 11th, 2008, except this would be ‘terrorist’ driven.

NSTIC, Google & SEO

by Kristine Schachinger, December 29, 2011

In case you missed it, Google is now a credentialed provider of Trusted Identities for the federal government. This means that the NSTIC, or National Strategy for Trusted Identities in Cyberspace, framework now has federally recognized and certified identity providers.

But who are these providers exactly, what is the NSTIC and how does this affect the users in matters of privacy, anonymity or even SEO? Below is a video that helps easily explains what it means to be working with the #NSTIC and how these issues are addressed, or not addressed by the NSTIC Framework.

Obama Unleashes Cyber NSTIC

Written by sovereignthink

2011/01/11

Obama is planning to Grant the U.S. Commerce Department Authority over cybersecurity efforts to create an Internet NSTIC TrustMark IDentity for Americans

On Jan 7th at the Stanford Institute for Economic Policy Research, Presidential Branch Officials; the U.S. Commerce Secretary Gary Locke and Cybersecurity Coordinator Howard Schmidt announced The National Strategy for Trusted Identities in Cyberspace or NSTIC. Where by creating two tears of online ID-entities Trusted and Untrusted. The project has already been under field testing since mid twenty-ten.

Obama NSTIC Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen

Written by sovereignthink

2011/01/11

Obama Unleashes N-STIC for Trusted e-Citizen Registry 

Individual Citizen Registration for Personal Trusted ID entity Card.

 National Strategy for Trusted Identities in Cyberspace (NSTIC)

The National Strategy for Trusted Identities in Cyberspace

My First Black President is Creating a Second Class UnTrusted (Non-Registered) Citizen vs ID Trusted Entity Citizenship

DHS HITS US with NSTIC! HIDE, HIDE!!

Written by sovereignthink

2011/02/12

D.H.S. (Department of Homeland Security)

H.I.T.S. (High Impact Technological Solution)

U.S. (United States)

N.S.T.I.C. (National Strategy for Trusted Identities in Cyberspace)

H.I.D.E. (Homeland Identification & Detection Ethics)

H.I.D.E. (Hostile Intent Detection Enforcement)

Stop, Think, Connect the DHS Dots to Patriot Act, Infra-Guard, TSA, TIA, NSTIC and TrustMark Citizenship

Written by sovereignthink

2011/01/13 at 11:33 pm

Obama Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen with N-STIC for TrustMark IDentity Ecosystem Registry 

 

Will a standardized system for verifying Web identity ever catch on?

By Mark Milian, CNN

updated 7:36 AM EST, Wed February 15, 2012

(CNN) — My neighbor recently discovered a four-digit passcode that unlocks the front doors to our apartment building.

He shared the code with me, as well as with his girlfriend, buddies and a few other neighbors. I shared it with some people, and so did others. Within a few weeks, the building’s security system was buzzing constantly for people who didn’t actually have one of the dozen or so physical keys given to tenants.

On 1-year anniversary, organized NSTIC looking for fast track

By John Fontana for Identity Matters | <:time datetime=”2012-04-18″>April 18, 2012

With $16.5 million in funding and $10 million earmarked for pilot programs, the government-led plan to facilitate the build out of an identity layer for the Internet has a year of organization under its belt, an implementation challenge for its future and a few critics chirping in its ear.

Last April, the National Strategy for Trusted Identities in Cyberspace (NSTIC) was an Obama Administration mandate, a press conference and one ambitious guy sitting in a Commerce Building office above the nation’s oldest aquarium.

NSTIC set to hand out $2.5 million to direct ID effort

By John Fontana for Identity Matters | July 3, 2012 ZDNET

The organization driving the government-led digital identity strategy known as NSTIC said Monday it will name in the next few weeks a private organization that will shepherd the overall plan toward completion.

The move represents a significant milestone in the effort to create an “identity ecosystem” that provides secure identities for online transactions while limiting the disclosure of personal information. The system calls for both public and private accredited identity providers and a choice of identity credentials.

First NSTIC steering group meeting set for Aug. 15-16?

By John Fontana for Identity Matters | July 19, 2012 ZDNET

Vail, Colo. – The private-sector group named last week to lead the effort to create a digital identity strategy known as NSTIC will hold its first meeting Aug. 15-16 in Chicago.

In addition, the National Strategy for Trusted Identities in Cyberspace (NSTIC) will name in early September the winners of its pilot program to participate in a pilot program.

Finally On Wikipedia

 as of 7/22/2012

The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a proposal by the Obama administration to create secure online identities for Americans in cyber space. The aim of the proposal, according to Howard Schmidt, the White House Cybersecurity Coordinator, is to create an ‘identity ecosystem’ where individuals and organizations can complete online transactions with confidence that the individual who they are conducting business with is not impersonating someone else.

Schmidt also outlined that the NSTIC would also reduce the need to remember potentially insecure list of usernames and passwords. Schmidt highlighted that enrollment in the ‘identity ecosystem’ of individuals would be entirely voluntary and individuals can choose whether or not to obtain a credential. The measure also gives individuals control over what private information they use to authenticate themselves over time.

Background

The impetus for the policy move by the Obama Administration is part of the Cyberspace Policy Review published in June 2009. The NSTIC proposal was released in draft form in June 2010 along with a website set up by the Department of Homeland Security to elicit feedback and ideas from people. On April 15, 2011, the final draft of NSTIC was released by the White House. In this version of the draft the role of the federal government was toned down and highlighted its role as merely a facilitator in establishing the ecosystem. The effort has to be led by the private-sector.

Criticism

The proposal has generated a lot of criticism since it was released in draft form by the White House. A lot of criticism been centered around privacy implications of the proposal.

Shortly after the draft’s release, the Electronic Privacy Information Center, in conjunction with a number of other consumer-rights and civil liberties organizations,sent the Committee a statement in response to the draft NSTIC policy, requesting that the White House provide a clearer and more complete plan to create and safeguard Internet users’ rights and privacy.

The Obama White House released its final NSTIC guidelines in April 2011. While EPIC head, Marc Rotenberg, called NSTIC “historic,” he also cautioned that “…online identity is complex problem and the risk of ‘cyber-identity theft’ with consolidated identity systems is very real. The US will need to do more to protect online privacy.”

Additional Reading

The Complete Biometric Citizen Registry of Corp/Gov ID  for access to e-systems

The National Strategy for Trusted Identities in Cyberspace

http://epic.org/privacy/nstic.html

http://epic.org/privacy/cybersecurity/default.html

http://privacy.org/privacy_coalition_comments_trusted_ids.pdf

http://www.nist.gov/public_affairs/releases/whitehouse_nstic.cfm

Advertisements

The NDAA Kill Switch Police State and the i-9/11 economic event

with 27 comments


The Kill Switch Terrortist Police State.

In the near future… now that Obama will sign the NDAA of 2011 into law?

There could be an e-9/11 event, in which the stock exchange and major financial institutions have their systems ‘hacked’.

Like America’s Economic 9/11 of September 11th, 2008, except this would be ‘terrorist’ driven.

There could simply be 227 hours or 9 days and 11 hours, during this false flag operation, were the systems are ‘down’.

This blackout event would wipe out millions of small businesses, creates riots and havoc in supply lines or the distribution of goods.

A national ‘state of emergency’ is declared in the face of this disaster.

In major cities, martial law is declared, FEMA establishes relief camps for those in over populated/dangerous areas.

Rioters, looters and protestors (or domestic terrorists) use cell phones, streaming video and social networks to communicate and coordinate their opposition; as well as attack police and government officers.

Filming or taking pictures of police and government operations become a crime.

In the first week of the blackout event, the ‘e-Patriot’ act is passed into law, changing the internet forever.

With The Cyber Security Grid act of 2012 (CSG or ePatriot act) and the National Strategy for Trusted Identities in Cyberspace (or NSTIC) establishes the e-Citizen Registry. This is mandatory Individual Citizen Registration within  NSTIC for Trusted e-Citizen Registry.

Citizens are required to be e-verified with a biometric trustmark NSTIC registry company in order to ‘access’ the web. If you will ‘Your Online Drivers License is NSTIC

Call It Your Online Driver’s License

By NATASHA SINGER
Published: September 17, 2011
New York Times

WHO’S afraid of Internet fraud?

http://www.nytimes.com/2011/09/18/business/online-id-verification-plan-carries-risks.html

Who is hyping ID theft terror? Who is hyping cashless cyber society?

This removes all anonymity, freedom from censorship and places individuals legally liable for all web activity.

Further more, inciting, belligerent or inflammatory language and expression during this time of crisis, which could threaten public safety, the general welfare or cause disruption in distribution and communication, is banned.

100,000’s of websites and blogs are taken offline.

The Virtual Department of Transportation (or VDOT) is created. Cell phones and personal computing devices (PCDs) are tracked on the open Radio Frequency Identification (or RFID) Direct Short Range Communications Grid (or DSRC) (RFID -DSRC Grid). Using the dedicated 5.9-gigahertz smart grid, to track and triangulate subversives during unrest. This is integrated with Blue Force Situational Awareness (BFSA) and martial law forces.

In violation of the Posse Comitatus act and the Constitution, the DHS, TSA, FEMA and federal civilian national security forces; which have become just as powerful as the military, just as strong and just as well funded, act as an already standing internal army and under Continuity of Government (COG) processes take control of the Governance of the Nation.

Once the government’s secret police army takes over, DHS cyber security units emanate out of the threat fusion centers.

Under the National Defense authorization act of 2011 and CSG, citizens are arrested and detained as domestic terrorists.

Texas, Arizona, Utah, Idaho, Montana, Oregon and North Dakota enter into joint state nullification and interposition of Federal Enforcement Officers jurisdiction within the states, unless local officers are presented with search warrants, as per the constitution.

Even then the states retains the power of enforcement or arrest and the individual will not be surrendered to federal custody until after conviction in civil grand jury, as per the constitution.

Individual Counties throughout the Nation follow suit.

With over 1 million dead Americans, 25 million displaced and the suspension of the 2012 elections President Obama calls in NATO Troops to quell the insurrection of the states.

At this order the commanders of the US military arrest the commander and chief for treason.

The charge is violation of the oath of office and treason; founded on his order to militarily attack US citizens with foreign troops, in order to quell the practice of exercising the fundamental natural rights of the citizenry, as protected under the constitution.

93 senators are charged as well for voting for the NDAA of 2011 and supporting violations of the constitution.

203 financial magnets from the heads of the; IMF, World Bank, major financial institutions, 42 chairmen of ‘national’ central banks, including the heads of the US Federal Reserve, to the queen of England and Denmark, are charged with war crimes.

This is after investigations of mass medication, as well as, infrastructure or public domain corporate/government ownership and federal militarization of civil functions.

US Citizen Service Lecture; Issues on the Edge: Virtual worlds, Privacy & The Panopticon

‘Modern technologies are making it possible to observe everyone, everywhere, all the time. Panelists will discuss the legal theory of the self-censorship response to total surveillance, the operational view of a virtual world, and the history of a real panopticon prison.’

We are the resistance to tyranny and oppression

-sovereignthink

DHS HITS US with NSTIC! HIDE, HIDE!!

with 17 comments


DHS HITS US with NSTIC. HIDE, HIDE!

D.H.S. (Department of Homeland Security)

H.I.T.S. (High Impact Technological Solution)

U.S. (United States)

N.S.T.I.C. (National Strategy for Trusted Identities in Cyberspace)

H.I.D.E. (Homeland Identification & Detection Ethics)

H.I.D.E. (Hostile Intent Detection Enforcement)

B.A.D. R.E.P.

Biometric Administration Detector Registration Ethics Project  

New facial recognition app available on certain mobile phones.

The service, called FaceR CredentialME, is available on devices using the Android, Windows Mobile and RIM operating systems on the Sprint 3G or 4G networks and was launched in conjunction with Troy Security Solutions, a mobile products and solutions provider.

The biometric service allows a user to authenticate their identity via unique characteristics in their face recorded from the phone’s embedded camera for anything such as basic online services or corporate specific services. The biometric authentication can be used to entirely replace standard login methods or layered on top of them as a second factor of authentication for NSTIC and Trustmark security measures of the Smart Web Identity Ecosystem.

In addition to the service, there is also a released software development kit for application developers to include face recognition biometrics into their applications of private integrated CCTV and municipal surveillance systems. Applications meet Federal Threat Fusion Standards and Infraguard Civilian National Security Force integration ready.

Civilian Integration Programs – Crowd Sourcing National Security Surveillance

Unlike Active Snapcouts and Passive scanning Integration, the release of an application for the Apple App Store can target voluntary entertainment based enrollment. The app, called FaceR Celebrity, is the first of a series of applications under the FaceR moniker planned for release by the company. In addition to the FaceR series, Animetrics has also been developing higher-end systems for use by government and law enforcement.

While majority of the product developments to come out of Animetrics have had a primary purpose of biometric security and authentication, the new FaceR Celebrity application, while capable of security functions, has a separate purpose of entertainment. The app is able to utilize its biometric face recognition to take a picture of a user and figure out the person’s similarity to celebrities and other famous people.

For Real?

The Federal Government Says Yes.

Human Factors Behavioral Sciences Projects

These projects advance national security by developing and applying the social, behavioral, and physical sciences to improve identification and analysis of threats, to enhance societal resilience, and to integrate human capabilities into the development of technology

Mobile Biometrics System Project

Project Overview: The Science and Technology (S&T) Directorate Human Factors/Behavior Sciences Division (HFD) Mobile Biometrics Project develops prototype technologies for mobile biometrics screening at remote sites along U.S. borders, during disasters and terrorist incidents, at sea, and in other places where communications access is limited. The goal is to demonstrate mobile biometrics screening capabilities and technologies that meet the future needs of Department operational users, but currently are not available with conventional biometrics systems. This project is part of the Personal Identification Systems Thrust Area and Biometrics Program within HFD.

Multi-modal Biometrics Project

Project Overview: The Science and Technology (S&T) Directorate Human Factors/Behavior Sciences Division (HFD) Multi-modal Biometrics Project develops biometric technologies that accurately and rapidly identify individuals. The operational goal is to provide the capability to non-intrusively collect two or more biometrics (fingerprint, face image, and iris recognition) in less than ten seconds at a ninety-five percent acquisition rate without impeding the movement of individuals. The multi-modal technology will allow the Department to compare and match biometric samples from different sources, collected with different sensor technologies, under varying environmental conditions — a capability that eludes existing technology. This project is part of the Personal Identification Systems Thrust Area and Biometrics Program within HFD.

Science & Technology Directorate Human Factors/Behavioral Sciences Division

Mission

We will advance national security by developing and applying the social, behavioral, and physical sciences to improve identification and analysis of threats, to enhance societal resilience, and to integrate human capabilities into the development of technology. Learn more about Human Factors/Behavioral Sciences Projects.

Objectives

  • Enhance the analytical capability of the Department to understand terrorist motivation, intent, and behavior  
  • Improve screening by providing a science-based capability to identify unknown threats indicated by deceptive and suspicious behavior.
  • Improve screening by providing a science-based capability to identify known threats through accurate, timely, and easy-to-use biometric identification and credentialing tools.
  • Enhance safety, effectiveness, and usability of technology by systematically incorporating user and public input.
  • Enhance preparedness and mitigate impacts of catastrophic events by delivering capabilities that incorporate social, psychological and economic aspects of societal resilience.

Leadership

Dr. Rausch is the Director for the Human Factors/Behavioral Sciences Division (HFD) within the Department of Homeland Security Science and Technology (S&T) Directorate.

Organization

The division strives to identify and generate the best technologies for assisting our operational customers in the areas of Personal Identification Systems, Human Technology Integration, and Social and Behavioral Threat Analysis. The primary federal customers for the division include Customs and Border Protection (CBP), Federal Emergency Management Agency (FEMA), Immigration Customs Enforcement (ICE), Transportation Security Administration (TSA), U.S. Coast Guard (USCG), U.S. Citizenship and Immigration Services (USCIS), Office of Intelligence and Analysis (OIA) and U.S. Secret Service (USSS). End users also include federal, state, and local emergency management officials, first reponders, and private sector infrastructure owners and operators.

The Human Factors/Behavioral Sciences Division is comprised of three Thrust areas:

  • Personal Identification Systems
  • Human Technology Integration
  • Social and Behavioral Threat Analysis (SBTA) Thrust Area

Personal Identification Systems Thrust Area

This thrust area focuses on biometrics-based Research and Development to develop an accurate, contactless, near real-time capability to identify known threats at U.S. checkpoints while speeding the unconstrained movement of legitimate travelers. The Biometrics program develops biometrics-based technologies to identify known terrorists and criminals and prevent their movement into and out of the U.S. through effective, interoperable multi-biometrics capabilities in diverse areas, such as border crossings, ports-of-entry, and visa application sites. The Credentialing program develops and demonstrates tamper-proof credentialing systems incorporating multi-modal biometric information that can be used across the entire Department customer base.

Human Technology Integration Thrust Area

This thrust area integrates human factors into the development and use of homeland security technologies with the goal of achieving high levels of system effectiveness, safety, and acceptance. HFD conducts fundamental research designed to maximize human performance and feed the development of technologies for enhanced human performance. HFD also works with other divisions in S&T to ensure that human factors are appropriately integrated into the development and use of technologies. The Human Factors/Behavioral Sciences Division directly manages programs or, in some cases, the relevant portions of programs that are funded by other divisions by providing guidance and tools related to human systems integration.

Social and Behavioral Threat Analysis (SBTA) Thrust Area

This thrust area applies the social and behavioral sciences to improve the detection, analysis, and understanding of threats posed by individuals, groups, and radical movements. It also addresses the psychological, social, and economic impacts of catastrophic events to enhance risk analyses, risk communications, preparedness, response, resiliency, and recovery efforts. Programs within SBTA include motivation and intent; suspicious behavior detection; and community preparedness and resilience.

HIDE – Homeland Security, Biometric Identification & Personal Detection Ethics

Vision statement

We work to make the world a safer and freer place by promoting an open international dialogue on liberty, security and democracy and by building confidence and improving understanding among the main international and transnational actors. We also strives to advance a new and comprehensive, win-win, concept of surveillance technologies by building a new global second-track architecture based on search for common values and shared goals in the global community.

Mission statement

HIDE’s mission is to set up a platform devoted to ethical and privacy issues of biometrics and personal detection technologies which addresses transnational (European) and international problems. HIDE aims to become the preeminent catalyst for innovative policy solutions to emerging ethical problems in the area of surveillance technologies, especially where collaboration among national and international agencies, communities, businesses, and NGOs is crucial. HIDE promotes creative problem solving and provides for concrete tools for a successful dialogue

HIDE – Homeland Security, Biometric Identification & Personal Detection Ethics

HIDE is a project promoted by the European Commission (EC) and coordinated by the Centre for Science, Society and Citizenship, an independent research centre based in Rome (IT).

HIDE aims to establish a platform devoted to monitoring the ethical and privacy implications of biometrics and personal detection technologies. Detection technologies are technologies used to detect something or someone within a security or safety context. Personal Detection Technologies focus specifically on individuals, they include for example CCTV, infrared detectors and thermal imaging, GPS and other Geographical Information Systems (GISs), RFID, MEMS, smart ID cards, transponders, body scanners, etc. Biometrics is the application of technologies that make use of a measurable, physical characteristic or personal behavioural trait in recognizing the identity, or verifying the claimed identity of a previously registered individual.

Personal detection technologies and biometrics are increasingly interwoven within a variety of applications. Most of these applications seek to create sensor network infrastructures for continuous detection, authentication and identification of individuals within diverse settings ranging from, amongst others, commercial, transport, public locales and border control. Moreover, by developing multimodal signal analyses, these technologies may allow activity recognition, indoor movement monitoring and non-verbal communication cues (body language, facial expressions, speech intonation, etc) which may assist in the prediction of behaviour. In its recent Green Paper on Detection Technologies, the EC argues that personal detection technologies and biometrics are “inherently intrusive” and “their use needs to be carefully analyzed, in order to establish limitations to their intrusiveness where necessary”. HIDE meets this call and promotes open conversation between technology, security, ethics and policy experts as well as encouraging public discussions and dialogue. HIDE is based on the values of dialogue, responsibility, and integrity.

 

Free the System, Justify the System, Liberate the System, Republic the System.

What is the System? The System is Everything, It is The Tides, The Shores, The Land, The Art, The Laughter, The Life, The Light, The Galaxy.

The most Unique and Complex, Self Determining, Individually Regulated, Capable of Personal Capacity, The Private Pangaea of Potential is the Soul Sovereign Embodied Human Being. 

The absolute property right is this self personified. The individual is in soul sovereign possession of their mind, spirit and body.

This is the Sacred Treasure that America has sworn to Protect, Defend and Uphold.

From Molestation, Regulation, Policy, Enforcement, Infringement, Liens, Burden, Derailment, Entropy, Tyranny or Slavery.

We are a protectorate of the infinite indivisible individual, of all that can be personally created for private enrichment, happiness and joy, for their children’s benefit and growth, for the trade and benefit of others, for the progress of society, for the increase of the community trust and justice of the republic domain.

 

Obama Signs NDAA 2011-12 into Law, ending 222 years of the Bill of Rights?
(see this)
https://sovereignthink.wordpress.com/2011/12/16/obama-signs-ndaa-2011-into-law-ending-222-years-of-the-bill-of-rights/

What would that look like, the NDAA Police State, Kill-Switch, of all justice and civil liberties?
(see this)
https://sovereignthink.wordpress.com/2011/12/05/ndaa-is-a-declaration-of-war-on-the-united-states-by-the-united-states/

What is this new army of secret police we now face?
(see this)
https://sovereignthink.wordpress.com/2011/01/18/engineering-cyber-police-state-generation/

How would that happen? What could justify a roll out of full government control?

The NDAA Kill Switch Police State and the i-9/11 event.
(see this)
https://sovereignthink.wordpress.com/2011/12/10/the-kill-switch-police-state/

 

-sovereignthink

More…

Political Witch Hunt Begins Are You a TrustMarked NSTIC Registed Citizen or an Enemy Belligerent

If You See Something, Say Something…Well I see Criminal Propaganda Asking Fellow Holiday Shoppers to SPY on Each Other

Obama Unleashes Cyber NSTIC

Stop, Think, Connect the Dots; The Patriot Act, FIMA, DHS, Infra-Guard, TSA, NSTIC and TrustMark Citizenship

Obama NSTIC Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen

Citizen Spy Immunity Under New Bill

%d bloggers like this: