Posts Tagged ‘NSTIC’
Headline Update the NSTIC of Things and the NSTICing of everyone
NSTIC-ing everyone with everything ever said or done ever. Total Information Awareness (TIA) is Total Justification of Judgment (TJJ) not justice.
–
National Strategy for Trusted Identities in Cyberspace (NSTIC)
January 7, 2011 ~ 11 AM – 12:30 PM
Stanford University
Secretary Gary Locke, U.S. Department of Commerce, and Howard A. Schmidt, Special Assistant to the President and Cybersecurity Coordinator at The White House, spoke at an event about the National Strategy for Trusted Identities in Cyber Space (NSTIC). As part of the event a panel of CEO industry executives also discussed current and future real world applications of trusted identities.
The NDAA Kill Switch Police State and the i-9/11 economic event
Written by sovereignthink
2011/12/10 at 8:50 pm
The Kill Switch Terrortist Police State.
In the near future… now that Obama will sign the NDAA of 2011 into law?
There could be an e-9/11 event, in which the stock exchange and major financial institutions have their systems ‘hacked’.
Like America’s Economic 9/11 of September 11th, 2008, except this would be ‘terrorist’ driven.
by Kristine Schachinger, December 29, 2011
In case you missed it, Google is now a credentialed provider of Trusted Identities for the federal government. This means that the NSTIC, or National Strategy for Trusted Identities in Cyberspace, framework now has federally recognized and certified identity providers.
But who are these providers exactly, what is the NSTIC and how does this affect the users in matters of privacy, anonymity or even SEO? Below is a video that helps easily explains what it means to be working with the #NSTIC and how these issues are addressed, or not addressed by the NSTIC Framework.
Written by sovereignthink
2011/01/11
Obama is planning to Grant the U.S. Commerce Department Authority over cybersecurity efforts to create an Internet NSTIC TrustMark IDentity for Americans
On Jan 7th at the Stanford Institute for Economic Policy Research, Presidential Branch Officials; the U.S. Commerce Secretary Gary Locke and Cybersecurity Coordinator Howard Schmidt announced The National Strategy for Trusted Identities in Cyberspace or NSTIC. Where by creating two tears of online ID-entities Trusted and Untrusted. The project has already been under field testing since mid twenty-ten.
Obama NSTIC Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen
Written by sovereignthink
2011/01/11
Obama Unleashes N-STIC for Trusted e-Citizen Registry
Individual Citizen Registration for Personal Trusted ID entity Card.
National Strategy for Trusted Identities in Cyberspace (NSTIC)
The National Strategy for Trusted Identities in Cyberspace
My First Black President is Creating a Second Class UnTrusted (Non-Registered) Citizen vs ID Trusted Entity Citizenship
DHS HITS US with NSTIC! HIDE, HIDE!!
Written by sovereignthink
2011/02/12
D.H.S. (Department of Homeland Security)
H.I.T.S. (High Impact Technological Solution)
U.S. (United States)
N.S.T.I.C. (National Strategy for Trusted Identities in Cyberspace)
H.I.D.E. (Homeland Identification & Detection Ethics)
H.I.D.E. (Hostile Intent Detection Enforcement)
Stop, Think, Connect the DHS Dots to Patriot Act, Infra-Guard, TSA, TIA, NSTIC and TrustMark Citizenship
Written by sovereignthink
2011/01/13 at 11:33 pm
Obama Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen with N-STIC for TrustMark IDentity Ecosystem Registry
Will a standardized system for verifying Web identity ever catch on?
By Mark Milian, CNN
updated 7:36 AM EST, Wed February 15, 2012
(CNN) — My neighbor recently discovered a four-digit passcode that unlocks the front doors to our apartment building.
He shared the code with me, as well as with his girlfriend, buddies and a few other neighbors. I shared it with some people, and so did others. Within a few weeks, the building’s security system was buzzing constantly for people who didn’t actually have one of the dozen or so physical keys given to tenants.
On 1-year anniversary, organized NSTIC looking for fast track
By John Fontana for Identity Matters | <:time datetime=”2012-04-18″>April 18, 2012
NSTIC set to hand out $2.5 million to direct ID effort
By John Fontana for Identity Matters | July 3, 2012 ZDNET
The organization driving the government-led digital identity strategy known as NSTIC said Monday it will name in the next few weeks a private organization that will shepherd the overall plan toward completion.
The move represents a significant milestone in the effort to create an “identity ecosystem” that provides secure identities for online transactions while limiting the disclosure of personal information. The system calls for both public and private accredited identity providers and a choice of identity credentials.
First NSTIC steering group meeting set for Aug. 15-16?
By John Fontana for Identity Matters | July 19, 2012 ZDNET
Vail, Colo. – The private-sector group named last week to lead the effort to create a digital identity strategy known as NSTIC will hold its first meeting Aug. 15-16 in Chicago.
In addition, the National Strategy for Trusted Identities in Cyberspace (NSTIC) will name in early September the winners of its pilot program to participate in a pilot program.
as of 7/22/2012
The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a proposal by the Obama administration to create secure online identities for Americans in cyber space. The aim of the proposal, according to Howard Schmidt, the White House Cybersecurity Coordinator, is to create an ‘identity ecosystem’ where individuals and organizations can complete online transactions with confidence that the individual who they are conducting business with is not impersonating someone else.
Schmidt also outlined that the NSTIC would also reduce the need to remember potentially insecure list of usernames and passwords. Schmidt highlighted that enrollment in the ‘identity ecosystem’ of individuals would be entirely voluntary and individuals can choose whether or not to obtain a credential. The measure also gives individuals control over what private information they use to authenticate themselves over time.
Background
The impetus for the policy move by the Obama Administration is part of the Cyberspace Policy Review published in June 2009. The NSTIC proposal was released in draft form in June 2010 along with a website set up by the Department of Homeland Security to elicit feedback and ideas from people. On April 15, 2011, the final draft of NSTIC was released by the White House. In this version of the draft the role of the federal government was toned down and highlighted its role as merely a facilitator in establishing the ecosystem. The effort has to be led by the private-sector.
Criticism
The proposal has generated a lot of criticism since it was released in draft form by the White House. A lot of criticism been centered around privacy implications of the proposal.
Shortly after the draft’s release, the Electronic Privacy Information Center, in conjunction with a number of other consumer-rights and civil liberties organizations,sent the Committee a statement in response to the draft NSTIC policy, requesting that the White House provide a clearer and more complete plan to create and safeguard Internet users’ rights and privacy.
The Obama White House released its final NSTIC guidelines in April 2011. While EPIC head, Marc Rotenberg, called NSTIC “historic,” he also cautioned that “…online identity is complex problem and the risk of ‘cyber-identity theft’ with consolidated identity systems is very real. The US will need to do more to protect online privacy.”
Additional Reading
The Complete Biometric Citizen Registry of Corp/Gov ID for access to e-systems
The National Strategy for Trusted Identities in Cyberspace
http://epic.org/privacy/nstic.html
http://epic.org/privacy/cybersecurity/default.html
http://privacy.org/privacy_coalition_comments_trusted_ids.pdf
http://www.nist.gov/public_affairs/releases/whitehouse_nstic.cfm
The NDAA Kill Switch Police State and the i-9/11 economic event
The Kill Switch Terrortist Police State.
In the near future… now that Obama will sign the NDAA of 2011 into law?
There could be an e-9/11 event, in which the stock exchange and major financial institutions have their systems ‘hacked’.
Like America’s Economic 9/11 of September 11th, 2008, except this would be ‘terrorist’ driven.
–
–
There could simply be 227 hours or 9 days and 11 hours, during this false flag operation, were the systems are ‘down’.
This blackout event would wipe out millions of small businesses, creates riots and havoc in supply lines or the distribution of goods.
A national ‘state of emergency’ is declared in the face of this disaster.
In major cities, martial law is declared, FEMA establishes relief camps for those in over populated/dangerous areas.
Rioters, looters and protestors (or domestic terrorists) use cell phones, streaming video and social networks to communicate and coordinate their opposition; as well as attack police and government officers.
Filming or taking pictures of police and government operations become a crime.
In the first week of the blackout event, the ‘e-Patriot’ act is passed into law, changing the internet forever.
With The Cyber Security Grid act of 2012 (CSG or ePatriot act) and the National Strategy for Trusted Identities in Cyberspace (or NSTIC) establishes the e-Citizen Registry. This is mandatory Individual Citizen Registration within NSTIC for Trusted e-Citizen Registry.
Citizens are required to be e-verified with a biometric trustmark NSTIC registry company in order to ‘access’ the web. If you will ‘Your Online Drivers License is NSTIC’
Call It Your Online Driver’s License
By NATASHA SINGER
Published: September 17, 2011
New York Times
WHO’S afraid of Internet fraud?
http://www.nytimes.com/2011/09/18/business/online-id-verification-plan-carries-risks.html
Who is hyping ID theft terror? Who is hyping cashless cyber society?
This removes all anonymity, freedom from censorship and places individuals legally liable for all web activity.
Further more, inciting, belligerent or inflammatory language and expression during this time of crisis, which could threaten public safety, the general welfare or cause disruption in distribution and communication, is banned.
100,000’s of websites and blogs are taken offline.
The Virtual Department of Transportation (or VDOT) is created. Cell phones and personal computing devices (PCDs) are tracked on the open Radio Frequency Identification (or RFID) Direct Short Range Communications Grid (or DSRC) (RFID -DSRC Grid). Using the dedicated 5.9-gigahertz smart grid, to track and triangulate subversives during unrest. This is integrated with Blue Force Situational Awareness (BFSA) and martial law forces.
In violation of the Posse Comitatus act and the Constitution, the DHS, TSA, FEMA and federal civilian national security forces; which have become just as powerful as the military, just as strong and just as well funded, act as an already standing internal army and under Continuity of Government (COG) processes take control of the Governance of the Nation.
Once the government’s secret police army takes over, DHS cyber security units emanate out of the threat fusion centers.
Under the National Defense authorization act of 2011 and CSG, citizens are arrested and detained as domestic terrorists.
Texas, Arizona, Utah, Idaho, Montana, Oregon and North Dakota enter into joint state nullification and interposition of Federal Enforcement Officers jurisdiction within the states, unless local officers are presented with search warrants, as per the constitution.
Even then the states retains the power of enforcement or arrest and the individual will not be surrendered to federal custody until after conviction in civil grand jury, as per the constitution.
Individual Counties throughout the Nation follow suit.
With over 1 million dead Americans, 25 million displaced and the suspension of the 2012 elections President Obama calls in NATO Troops to quell the insurrection of the states.
At this order the commanders of the US military arrest the commander and chief for treason.
The charge is violation of the oath of office and treason; founded on his order to militarily attack US citizens with foreign troops, in order to quell the practice of exercising the fundamental natural rights of the citizenry, as protected under the constitution.
93 senators are charged as well for voting for the NDAA of 2011 and supporting violations of the constitution.
203 financial magnets from the heads of the; IMF, World Bank, major financial institutions, 42 chairmen of ‘national’ central banks, including the heads of the US Federal Reserve, to the queen of England and Denmark, are charged with war crimes.
This is after investigations of mass medication, as well as, infrastructure or public domain corporate/government ownership and federal militarization of civil functions.
US Citizen Service Lecture; Issues on the Edge: Virtual worlds, Privacy & The Panopticon
‘Modern technologies are making it possible to observe everyone, everywhere, all the time. Panelists will discuss the legal theory of the self-censorship response to total surveillance, the operational view of a virtual world, and the history of a real panopticon prison.’
We are the resistance to tyranny and oppression
-sovereignthink