Yet another identity initiative

Greyscale backing image
[Dave Birch] The International Telecommunication Union (ITU) is backing a new initiative on online identity management.  The ITU Focus Group on Identity Management aims to bring "global harmony to identity management" through a technology and platform-independent solution because it believes the use of multiple usernames and passwords is a boon for hacking, identity theft and other forms of cyber crime.  I couldn’t agree more.  How this is to be achieved, though, is another matter.  It’s not clear to me how this initiative differs from all of the other initiatives but more effort is always welcome.  The ITU initiative says that it will bring together key players in identity management including developers, software vendors, standards forums, manufacturers, telecom firms and academia.  They aim to promote interoperability among systems by providing an open mechanism based on a ‘trust-metric’ system that will allow different identity management solutions to communicate.  I’m looking forward to learning more, starting by contributing to their wiki if I can.

Technorati Tags: , ,

Unwelcome VISITors

Greyscale backing image
[Dave Birch] It looks as if Forum friend Max Most was right when she expressed doubts about the trajectory of the Department of Homeland Security’s US-VISIT program last November.  According to a Government Accounting Office (GAO) report the  US-VISIT program’s costs are spiraling out of control.  Accenture were awarded a $10 billion contract for US-VISIT back in 2004, and it is intended as a border control system. A digital photo and fingerprints are taken when foreigners enter the US (after standing in a queue for hours, as many of us have experienced) and these are "checked" against a government watchlists stored in a "hodgepodge of backend databases."  But there’s virtually no system in place to know when visitors have left the country.

Technorati Tags: , ,

If you can’t stand the heat, get out of the chatroom

Greyscale backing image
[Dave Birch] I’m always looking out for real-world problems that appear serious but where intelligent analysis shows that an effective digital identity infrastructure can support good solutions.  As such, I often use the "chatroom paradox" as a simple example of how the technology to deliver pseudonymity can balance the needs to stakeholders even in a contentious environment.  But I’m a technologist, so I tend to dwell on how online identities might be protected rather than why they might be protected.  A recent Israeli court ruling has made me think about this again.

Technorati Tags:

Help!

Greyscale backing image
[Dave Birch] I was in a conversation with someone in the identity management field earlier today and he made the point that most identity management implementations today are really just single sign-on with go-faster stripes.  I think this is true, but that doesn’t, I think, mean that they are not worthwhile.  Every survey shows that one of the simplest, and most immediate, elements of an identity management business case has to be the flood of ID-related calls to help desks!  That survey, in fact, reports that forty per cent of help desk calls originate from an identity management problem.  It goes on to say "Despite many organisations putting greater resources into identity management, the problem is putting massive strain on firms".  So clearly greater resources (what are these resources?  coal mines?  hydroelectric power?) are not in themselves a solution.

Technorati Tags:

Don’t use pervert@gov.uk

Greyscale backing image
[Dave Birch] There’s a real problem.  Perverts are using e-mail and instant messaging to contact children and lure them into dangerous situations.  Politicians need to find a solution — one, naturally, that will attract good newspaper headlines but not involve actually having to learn anything about the dynamics of the (complicated) problem — so they come up with an absolute corker.  Get perverts to register their e-mail addresses and IM names.  Home Secretary John Reid has also ordered work to be carried out, presumably by management consultants, on the feasibility of an online alarm system which would notify police every time a convicted paedophile used their registered details to log on to an internet chatroom, or any other site which could be used to "groom" victims.  Well, that’s that taken care of then, on to world hunger.

Technorati Tags:

Meaningful and unique

Greyscale backing image
[Dave Birch] More developments in the digital identity laboratory that is the interface between the real and virtual worlds in the Far East.  The Chinese authorities are concerned that Internet users there are are accessing online games and web sites with fake identity card numbers to preserve their anonymity.  This is because some games and web sites need a name and identity card number when registering new users.  The result has been that Chinese gamers can download software that can generate fake identity card numbers given fake names and addresses.  The software can even forge the identities of residents in Hong Kong, Taiwan and Korea, so that Chinese gamers can get on to servers in those countries.

Technorati Tags: , ,

Anonymity as substrate

Greyscale backing image
[Dave Birch]  Ben Laurie has previously pointed out that identity management systems are not the only way you are identified and tracked.  And this is a problem, because if society chooses a particular kind of identity management system — perhaps one which responds to European sensibilities around privacy and data protection — but has to deliver it on top of a surveillance infrastructure, then society’s choices are subverted.  In other words, there must be a substrate of anonymity to make higher level choices about pseduonymity or conditional anonymity valid.  So, as Ben puts it, the choices we make for identity management don’t control what information is gathered about us unless we are completely anonymous apart from what we choose to reveal.  But is this a realistic architecture for the real world?

Technorati Tags: , , ,

Get me some of that identity management!

Greyscale backing image
[Dave Birch]  In a recent meeting, a client remarked that their customer had expressed an interest in purchasing an identity management solution but had been quite unable to articulate what an identity management solution might do, or even what problem it might fix.  This reminded me that a while ago Digital ID World pointed me to an article by Paul Murphy noting out that one of the basic issues with identity management is the interpretation of the words used (mainly "identity" and "management").  What an excellent precis  of the current situation.

Technorati Tags: ,

More converts?

Greyscale backing image
[Dave Birch] The International Telecommunication Union (ITU) has issued a report "digital.life"  calling for more "joint efforts" to set up a coherent digital identity scheme that should be able to facilitate on-line interactions while protecting data and alleviating privacy concerns.  What caught my eye was that the report asks for digital identity management that is based on the use of "partial identities" depending on context and user choice.  This sounds very much like the real-digital-virtual identity model that we use whereby different groups of virtual identities are bound to different digital identities.

The report was drafted by a team of analysts from ITU’s Strategy and Policy Unit, covering chapters on "going digital," lifestyle, business, identity and living in the digital world.  Chapter 4, called "identity.digital" will be the one of most interest to blog readers.  It’s not bad: it covers a lot of the main issues in a fairly readable way and section 4.3.3 covers the benefits of pseudonymity as an operational mode, making the critical point that it should be up to individuals to determine the subset of their attributes that is communicated in order to effect a transaction.

Technorati Tags: ,

You’ve been fingered

Greyscale backing image
[John Elliott] A project we worked on for the Police IT Organisation last year is just going live in some UK police forces http://news.bbc.co.uk/1/hi/technology/6170070.stm. We worked on the business case and when we built the cost-benefit model, it was one of the most dramatic examples of a “no brainer” that I have ever seen. Fingerprint suspects on encounter and determine whether they are known criminals in 15 minutes, or take them down to the station and risk wasting, on average, four hours of police officer
time if the encounter results in release of the suspect.

Subscribe to our newsletter

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

By accepting the Terms, you consent to Consult Hyperion communicating with you regarding our events, reports and services through our regular newsletter. You can unsubscribe anytime through our newsletters or by emailing us.