Why Identity Commons is SOOOO important

This post by Phil who is pointing to Jim Harpers outing of RealID scheming by vendors who want to sell States their tools.

Bringing Your Public Onboard For Smoother Legislature Changes

… [E]very State DMV needs to find a way to educate their public so that they can ensure the legislature changes necessary to become Real ID compliant. So how exactly can you do this? This session will examine how you can change your public’s perception as quickly and as cost effectively as possible.

Listen to your people: Examining the direct impact on your public so that you understand the perception you are trying to change
Know which marketing methods will be most effective at reaching your public
Examine how much of your budget a public relations exercise is worth: Measuring cost against outcome

Highlights WHY we need user-centric and community centric identity to get clear about its message and to begin the real conversation about the implication NOT doing identity with these frameworks has.

This re-inspires my commitment to help catalyze with all of you the conversations and work that are happening and need to happen.

Will Netizen rights be protected?

From Slashdot:

“The NSA has a new assignment. No longer merely responsible for signals intelligence, the NSA now has the task of defending against cyber attacks on government and private networks. ‘The plan calls for the NSA to work with the Department of Homeland Security and other federal agencies to monitor such networks to prevent unauthorized intrusion, according to those with knowledge of what is known internally as the ‘Cyber Initiative.’ Details of the project are highly classified. Director of National Intelligence Mike McConnell, a former NSA chief, is coordinating the initiative. It will be run by the Department of Homeland Security, which has primary responsibility for protecting domestic infrastructure, including the Internet, current and former officials said. At the outset, up to 2,000 people — from the Department of Homeland Security, the NSA and other agencies — could be assigned to the initiative, said a senior intelligence official who spoke on condition of anonymity.'”

Because she Owns Her Image

This is quite an interesting case and highlights a flaw that can occur when people who use Creative Commons work.

A Texas family has sued Creative Commons after their teenaged daughter’s photo was used in an ad campaign for Virgin Mobile Australia. The photo had been taken by the girl’s youth counselor, who put it on Flickr, and chose a CC Attribution license, which allows for commercial use. Virgin did, in fact, attribute the photo to the photographer, fulfilling the terms of the license, but the family is still suing Virgin Mobile Australia and Creative Commons.

The photographer can license the work under CC (for comercial or non-comercial purposes) but that does not mean that the person in the photo has licensed their image to be used.

They should not be suing CC but instead Virgin Mobile because they failed to get permission from her to use her image.

I actually had this happen to me. An image was taken of me at HollyHock and the next year I went to the site to check out their programs I found out I was their new poster girl. I would have given them permission to use my image had they asked but they didn’t.

Cory Doctorow IF google went evil

THESE ARE ALL FROM A FICTIONAL ARTICLE at Radar – worth reading here are some highlights if you are in a rush….

He should have seen it coming, of course. The U.S. government had lavished $15 billion on a program to fingerprint and photograph visitors at the border, and hadn’t caught a single terrorist. Clearly, the public sector was not equipped to Do Search Right.

“We brokered a compromise with the DHS,” she said, reaching for the milk. “They agreed to stop fishing through our search records, and we agreed to let them see what ads got displayed for users.”

This isn’t P.I.I.”—Personally Identifying Information, the toxic smog of the information age—”It’s just metadata. So it’s only slightly evil.”

Airport DHS scrutiny is a gating function. It lets the spooks narrow down their search criteria. Once you get pulled aside for secondary at the border, you become a ‘person of interest’—and they never, ever let up. They’ll scan webcams for your face and gait. Read your mail. Monitor your searches.”

“The courts won’t let them indiscriminately Google you. But after you’re in the system, it becomes a selective search. All legal. And once they start Googling you, they always find something. All your data is fed into a big hopper that checks for ‘suspicious patterns,’ using deviation from statistical norms to nail you.”

“Now you’re a person of interest, Greg. You’re Googlestalked. Now you live your life with someone constantly looking over your shoulder. You know the mission statement, right? ‘Organize the World’s Information.’ Everything. Give it five years, we’ll know how many turds were in the bowl before you flushed. Combine that with automated suspicion of anyone who matches a statistical picture of a bad guy and you’re—”

The Stasi put everything about you in a file. Whether they meant to or not, what Google did is no different.

“We call it the Googlecleaner. It goes deep into the database and statistically normalizes you. Your searches, your Gmail histograms, your browsing patterns. All of it. Greg, I can Googleclean you. It’s the only way.”

We have reason to believe you’re in violation of the Computer Fraud and Abuse Act, Specifically, exceeding authorized access, and by means of such conduct having obtained information. Ten years for a first offense. Turns out that what you and your friend did to your Google records qualifies as a felony. And oh, what will come out in the trial…all the stuff you whitewashed out of your profile, for starters.”

US collecting detailed data on regular citizens who travel

From the Washington Post:

The U.S. government is collecting electronic records on the travel habits of millions of Americans who fly, drive or take cruises abroad, retaining data on the persons with whom they travel or plan to stay, the personal items they carry during their journeys, and even the books that travelers have carried, according to documents obtained by a group of civil liberties advocates and statements by government officials.

Officials yesterday defended the retention of highly personal data on travelers not involved in or linked to any violations of the law. But civil liberties advocates have alleged that the type of information preserved by the department raises alarms about the government’s ability to intrude into the lives of ordinary people

On “Democracy” in contemporary America

I just picked up two books by ‘the’ Naomi’s today.
I saw them in the book shop and I was compelled.

1) The End of America: A Letter of Warning To A Young Patriot
by Naomi Wolff

Naomi Wolff is on the Colbert Report
We don’t have a lot of time free societies close down very quickly she points out and we need a democracy movement to restore the rule of law.

2) The Shock Doctrine: The Rise of Disaster Capitalism
by Naomi Klein

This is a short film about the topic of the book.

3) I recently was pointed to the Century of the Self a film by the BBC. it is a documentary about the role of psychoanalysis, marketing, and public relations in the united states. The concluding installment covers the application of these techniques in the “democratic” political process.

It is well worth watching and is on the Internet Archive.

Computer ART becomes ‘bomb strapped to chest’

This story is shocking.

An MIT student wearing a device on her chest that included lights and wires was arrested at gunpoint at Logan International Airport this morning after authorities thought the contraption was a bomb strapped to her body.

Star Simpson, 19, was wearing a black hooded sweatshirt and approached an airport employee in Terminal C at 8 a.m. to inquire about an incoming flight from Oakland, according to Major Scott Pare of the State Police. She was holding a lump of what looked like putty in her hands. The employee asked about the plastic circuit board on her chest, and Simpson walked away without responding, Pare said.

“She said it was a piece of art and she wanted to stand out on career day,” Pare said. “She was holding what was later found to be playdough.”

Affixed to the front of her black sweatshirt was a pale beige circuit board with green LED lights and wires running to a 9-volt battery. Written on the back of the sweatshirt in what appeared to be gold magic marker was the phrase “socket to me” and below that was written “Course VI,” which refers to the electrical engineering and computer science program at MIT.

According to the MIT website, Simpson is from Kihei, Hawaii, and is a sprinter on the school’s swim team. On Simpson’s personal website at MIT, she says she is studying computers and enjoys tinkering in a student-run machine shop.

“In a sentence, I’m an inventor, artist, engineer, and student, I love to build things and I love crazy ideas,” the website says.

So where the whole incident started from was the security gaurd who thought her art was suspicious. From my experience with those kinds of people in airports or otherwise they were likely not that educated – certainly not aware of the ways of computer geeks and how this sort of art would be really not be a-typcial. Seems like we have some ‘diversity training’ needs of our own as a culture.

Scenario Planning Sunday Afternoon for Monday Panel

So for all of you coming to the scenario planning ‘exercise’ on Sunday for the DIDW panel on the Future of Internet Scale Identity we will be meeting in the Lobby of Tower 1 of the SF Hilton at 2pm.

With the numbers we have currently signed up I think this will do just fine as a meeting spot. If we move from this location go there and look on the middle desk in that lobby and we will leave a note about where we are. You can also text me at 415 425 1136 if that doesn’t work.

I have my final planning meeting with John Kelly tomorrow. I am hoping he can join me in facilitating the exercise either way we are good to go. We have about two dozen “event’s” that could happen in the future. Those who come will get to create more events. From there we will look at how the relate, and cluster. There is a bit more to it and then we will present what we discern on Monday. It should be a lot of fun.

Feel free to come even if you have not signed up or pinged me via e-mail.

She’s Geeky: An Women’s Tech (un)conference

I am producing another unconference this fall. It is for women working in technology called She’s Geeky. It is October 22-23 in Mountain View at the Computer History Museum.

I would encourage you all to let women you know in tech know about the event either via e-mail or blogging.

I am working with a great organizing team including Mary Hodder from Dabble, Susan Mernit from Yahoo!, Julia French from Covered Communications, Deb Roby a BlogHer Blogger, Melanie Swan, Heather Vesent from the Purple Tornado and Laurie Rae.

We have three simple goals with the event.

  • Exchange skills and learning from women from diverse fields of technology.
  • Discuss topics about women and technology.
  • Connect the diverse range of women in technology, computing, entrepreneurship, funding, hardware, open source, nonprofit and any other technical geeky fields.

What is the value of coming? It should be a great networking opportunity to meet other interesting women who you or your company might do business with. In this format you will get to learn more then you would just having interesting meetings in a hallway like you do at typical conferences that cost a lot more.

We have aimed to make it affordable and accessible for women costing $125 (until Sept 30). We have some great sponsors so far to help make up the difference Google, The Nonprofit Technology Network, Atlassian, Purple Tornado, Citizen Agency and are actively looking for other sponsors who would like to contribute to the event. Please contact me if you are interested.

It is an event where women can get exposed to new and different skills in industry niches they don’t normally work in. The unconference format is a perfect format to build community and relationships across niches. – I talked to a developer yesterday who was one of 12 women developers out of 600 people attending Ruby Conf. It can be lonely in one little niche – reaching out to women who share technical passion but are not in your niche is a needed thing.

I love the Identity Community and have lots of friends here. There are also not that many women in our little field. I have been really lucky to hang out in a few tech niches (Web 2.0, Open Source, NonProfit Tech) I noticed that there was often very little overlap between the people in these communities so part of the goal is to mix between niches and hopefully create some new friendship and business opportunities.

I personally have had very few ‘issues’ in being a women working in the industry – in fact it has been great. I also have been hanging out on several women in technology mailing lists and I feel really lucky to be in a community with a healthy culture that is welcoming and encouraging. This is not always the case.

With this event we have an opportunity with an all women’s space to dive deeper into the issues arising for women working in this field. The timing is opportune on the heals of the O’Reilly Women in Technology series that is running this month. There is a lot of intense commenting following those articles regarding the issues raised. In open space we do the same thing but face-to-face. My article was posted today: Process Geekiness: The Role of Face-to-Face Collaboration in Thriving Tech Communities

There is another fact about women in technology that inspired me to pull this event together. Many women who work in technology do so ‘accidently’ and therefore don’t have formal training in the sector – creating opportunities for next steps to deepen knowledge and skills on a career path is especially important. So the skill sharing is an opportunity for us accidental tech workers to learn something new and broaden horizons for next steps on a career path is another goal for She’s Geeky.

You can’t just show up and present anywhere – you can at She’s Geeky. At regular conferences and the other women in tech programs have formal themes, committees and selection processes. This is a great opportunity to show up and try something out.

If you are a women working in tech please join us if you can.

Soon we will know what you are thinking

This came through Slashdot and was on the BBC:

Since 9/11, some of the best scientific minds in the defence industry have switched their concentration from tracking nuclear missiles to tracking individuals such as suicide bombers.

This quote is in the side bar make it sound all OK. Opinion polls, both in the US and Britain, say that about 75% of us want more, not less, surveillance



Ian Kitajima flew to Washington from his laboratories in Hawaii to show me sense-through-the-wall technology.

“Each individual has a characteristic profile,” explained Ian, holding a green rectangular box that looked like a TV remote control.

Using radio waves, you point it a wall and it tells you if anyone is on the other side. His company, Oceanit, is due to test it with the Hawaiian National Guard in Iraq next year, and it turns out that the human body gives off such sensitive radio signals, that it can even pick up breathing and heart rates.

“First, you can tell whether someone is dead or alive on the battlefield,” said Ian.

“But it will also show whether someone inside a house is looking to harm you, because if they are, their heart rate will be raised. And 10 years from now, the technology will be much smarter. We’ll scan a person with one of these things and tell what they’re actually thinking.”

Phone troubles – Is Grand Central the Answer?

So, I got a shiny new iPhone (for facilitating office 2.0’s Unconference) but I can’t get it to work yet.

I have MetroPCS – the ‘ghetto phone’ for those of you who don’t know it works like this – you buy the handset, you pay them your monthly fee on time or they turn your phone off. You have unlimited local and long distance calling. SIMPLE. No bill’s, no rolling min, just a phone that works. The catch – your phone only works in your metro area. This is why I have another number (from T-Mobile) that I pay by the min for when I travel to different cities.

So I went to sign up for the new iPhone via my computer. It won’t just let me get an account. I have to get ‘pre-approved’ credit from an AT&T store. To be honest I have not done a lot to get ‘credit’ so I am not surprised. I don’t have a credit card. I don’t have a loan for a car or anything.

My husband and I went to the AT&T store so that I could piggy back on his account/credit and get a phone activated. I decided I would try and port my number. They want to know not only my phone number but my ‘account number’ (remember I have the ghetto phone plan – no bills no nothing that I see an ‘account number’ on). They also want to know my address in their records AND my name. I have this feeling that when I got this phone 4 years ago that I had a different address and I was still going by my maiden name. These things are all not ‘persistent’ I am not sure what their records say and if I don’t know I must not be me right?

All I knew and all they put in their system was my phone number. I get this phone call from them asking me to call them back and give them more information so they can port my number for me.

I am thinking it is all to much trouble and I should get a Grand Central number and a new number from them and tell everyone my grand central number.

Anyone have any thoughts on their service to date or making this kind of choice. With Google acquiring them they are not going to go out of business any time soon.

Kerberos Consortium launched

Kerberos Consortium has been launched by MIT. “We forsee a day when Kerberos-based authentication and authorization will be as ubiquitous as TCP/IP-based networking itself.” Here is the overview slide show

Their FAQ speaks to collaboration with active efforts

So, how does the MIT Kerberos Consortium fit in with things like the Liberty Alliance?

“We believe there is significant opportunity to work with Liberty and other SAML based formats. One area in which Liberty and Kerberos can work together is that Kerberos could carry SAML assertions to provide authorization information. Another way in which these technologies can work together is that Kerberos can be used as a mechanism to obtain SAML assertions. Ultimately, this work will allow Liberty to be used in client-server environments where Kerberos works best today and to allow Kerberos to take advantage of the expressive power of SAML and Liberty. This is one of the many projects where the initial designs have been sketched out but where work cannot proceed without the additional funding provided by the consortium.”

How about Open ID? Where does that fit in?

“There is a similar story for Open ID. Last year there was initial discussion between MIT and those involved in Open ID to confirm that there was mutual interest and ways we could work together. However, again, absent the consortium there is insufficient resources within MIT to realize this cooperation.”

I hope that folks from the new consortia comes to the Internet Identity Workshop December 3-5 in Mountain View. This is where we talk about how we can all get along in a big circle :).

Huge Shout out to Laurie – THANK YOU

Laurie Rae was an amazing help at the Data Sharing summit. I completely forgot to thank her in my last post – so she gets a whole ‘thank you post’ for herself that she totally deservers.

Laurie is not as well known an identity woman as me or Eve but has been working in this field for many years. She came to California both to attend the summit and to surf.
Marc had arranged for one of his staff people to be at the summit to help with set up, take money, run errands like get lunch etc. This person some how never arrived.

So when this gap in getting things done that needed to get done for the summit arose she stepped in and helped.


Next time we do an event you are actually going to attend the event.

This was us wearing IDENTITY hats she brought from her friend’s store in Edmonton called Identity.

Data Sharing Summit – Wiki Gardening Part 1

I spent a good portion of this afternoon at a (solo) wiki gardening party on the Data Sharing Summit Wiki.

There is a page called Outcomes in the top Nav Bar that documents pages on the Data Sharing wiki along with the many blog posts that cover outcomes of sessions, links to photos of the summit and next steps.

I am quite pleased with the range of good documentation and commentary and hope that by next week there is even more posted. I will have written up all the Problems and Offerings that people put forward at the beginning of the weekend.

It was a pleasure to work with Marc Canter to bring this group together. Many have commented to me about how incredible the focus and productivity were at the event. I asked folks at the closing what they thought got done and we have an amazing list. At the closing circle 95% of folks thought we should do it again and 95% liked the format. The thing I love about open space is that it allows anyone in the group to put forward their ideas and the group votes with its feet about what to do. I think for innovating and getting stuff done there is no better way.

I would like to thank Innovis for their generous donation of space. Plaxo was super and stepped up to resource me for my time – facilitating that group is not an easy thing to do – it takes a lot of energy. AOL paid for a great dinner on Friday Night and Clear Spring covered the drinks – I think eating together is as much a part of a conference as ‘the conference.’ Leverage and Cerado also contributed money to make the event possible.

I will be doing another Wiki Gardening Party next week for the Data Sharing Summit Wiki Wednesday from 11-3 on the Freenode Channel #datasharing if you want to join in.