NSTIC is the National Strategy for Trusted Identities in Cyberspace, "a White House initiative to work collaboratively with the private sector, advocacy groups, public sector agencies, and other organizations to improve the privacy, security, and convenience of sensitive online transactions." The government wants a way for people to be able to sign in to government sites without using government-issued identities.

NSTIC & Ethical Data Markets

Today I sent a letter out to the Startups in the Consortium. I thought I should post some of what I said to them here. There are now a few work products that we [PDEC] should review, the NSTIC Functional Model Elements & contents of Trust Frameworks.  I will be hosting a session at IIW […]

White Paper: What Could Kill NSTIC? A friendly threat assessment

At two events 18-months apart, teams of suits, geeks, and wonks (industry experts, technologists, public policy analysts) brainstormed and scored what could lead to failure of NSTIC, an international effort to create an identity ecosystem. The whitepaper at http://pde.cc/nsticrisks recaps the long list of potential threats, a shorter list of preventive strategies, compares the 2011 and 2012 events, and names the two greatest threats: poor user experience (harming trust, adoption, use) and imbalance among the forces tying the identity ecosystem together.

Could the Fiscal Cliff Kill NSTIC?

Cuts are coming to US federal government spending in the new year. Cuts will come by cleaver if a “fiscal cliff avoiding” budget is passed or with a chainsaw if Congress and the President fall over the “cliff.” High hopes fly for an international identity system that works across industries, technologies, governments, regulatory schemes and still […]

NSTIC Governance Workshop, March 15

Kaliya will be attending: Thursday, March 15, 2012 Main Auditorium, U.S. Department of Commerce – Herbert C. Hoover Building, 1401 Constitution Avenue NW, Washington, DC Since the creation of the Internet, there have always been difficult questions surrounding privacy, security and trust. How do we know with whom we are interacting? How do we know […]