SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Advancing Identity
               Management


Duane Blackburn
Office of Science & Technology Policy

November 27, 2007

                                        Biometrics.gov
The Executive Office of the President



       White House Office                     Office of the         National Security
       (HSC, Freedom Corps,
       Faith-Based Initiatives)
                                             Vice President              Council


                                         Domestic Policy Council
     Office of Management                                          Office of Science &
                                         Nat’l Economic Council
            & Budget                                               Technology Policy
                                            Nat’l AIDS Policy


           US Trade                             Council of          Office of National
         Representative                   Environmental Quality    Drug Control Policy



            Office of                     Council of Economic      Foreign Intelligence
          Administration                       Advisors              Advisory Board



Primarily career staff

Primarily political staff
Mix of political, detailees and career
                                                                                          Biometrics.gov
OSTP – What We Do
• Advise the President and others within the Executive
  Office of the President on the impacts of science and
  technology on domestic and international affairs;
• Lead an interagency effort to develop and implement
  sound science and technology policies and budgets;
• Work with the private sector to ensure Federal
  investments in science and technology contribute to
  economic prosperity, environmental quality, and
  national security;
• Build strong partnerships among Federal, State, and
  local governments, other countries, and the scientific
  community;
• Evaluate the scale, quality, and effectiveness of the
  Federal effort in science and technology.




                                                           Biometrics.gov
OSTP – How We Do It
► Engage the budget process; Work with OMB & agencies
► Review/Approve regulations, testimony, strategies, etc.
► Getting the word out
   ► Advisory committee meetings
   ► National Academies’ panels
   ► National Labs, universities, etc.
   ► Occasional workshops & conferences
► Coordinate Interagency Activities via the National
  Science and Technology Council




                                                   Biometrics.gov
NSTC Organizational Framework

                                        President
                                      Vice President



                                      Director, OSTP
                                                                                PCAST (private sector
                                                                                      advice)
Executive Secretary                         NSTC
  Agency POCs                Cabinet Secretaries, Agency Heads




               Exec. Sec.
                                       Committee
              Agency Reps
                                Co-Chairs, Agency Members
              OSTP, OMB




                            Subcommittee           Working Group   Task Force


                            Working Group
                                                    Task Force

                             Task Force




                                                                                     Biometrics.gov
New Concept? Or New Functionality?




New Applications and Technical Possibilities
                                          Biometrics.gov
IdM today: Lots of Interest!
► Identity Theft
► Financial
► Border Control
► Virtual Identities
► Law Enforcement
► Telecommunications
► Computing
► Benefits Management
► eGovernment
► Healthcare
► Defense
► Transportation

                                    Biometrics.gov
What is needed for the future?

► Identity Management Foundation
   ► What is “identity management?”
   ► Gravell: Identity Management HTML analogy
► Ensure Accurate Public Discussions
   ► “Promoting a scientifically educated and aware public is
     necessary if we are to make the appropriate decisions
     about the nation’s R&D investments, guide the adoption
     and debate the societal implications of new science and
     technologies, and reap the maximum benefits from our
     investments. The quality of these efforts underpins the
     entire US scientific enterprise.”
               ■ Science for the 21st Century



► Both of these require collaboration and
  consistency among the government, industry and
  academic communities                                          Biometrics.gov
Foundation Building Blocks

► HSPD-12; PIV
   ► Multiple groups with varying interests worked together
     to develop an approach that is generally agreeable
   ► Significant back-end infrastructure in place to establish
     a trusted root identity
   ► Large scale implementation
   ► Foundation is being leveraged for other public & private
     sector programs
► Federal Biometric Efforts
   ► Biometrics are closest real-time association with a core
     identity possible
   ► Federal system of systems enables “one person, one
     identity” when necessary

                                                                 Biometrics.gov
NSTC Subcommittee on Biometrics & IdM
          Co-Chair (Biometrics)                     Co-Chair (Overall)          Co-Chair (Identity Management)
         Brad Wing, DHS/US-VISIT                  Duane Blackburn, OSTP                 Jim Dray, NIST




                       Executive Secretary
                   Michelle Johnson, FBI (SETA)
                                                                   Emeritus Co-Chairs
                                                                    Kevin Hurst, OSTP
                                                                   Chris Miles, DHS S&T
                        Subcommittee
                         Department
                           Leads
                                                                                                IdM Task Force??




Interoperability                        Standards                   Biometrics RDT&E                 S&T Assistance




                                                                                    Privacy
                             Communications


                                                                                                     Biometrics.gov
Ensure Accurate Public Discussions

► Current discourse is fundamentally flawed
   ► People are clueless about what the private sector is
     already doing
   ► Government not adequately explaining plans and
     rationale for decisions
   ► Technical industry focusing on solutions without
     considering the driving business case
   ► Technology privacy community is in its infancy
       ■ learning to stand up, but isn’t walking yet
   ► Obstructionists are doing what they do best
   ► The media is loving the conflict
   ► The public is confused and irritated


                                                            Biometrics.gov
Discussing IdM programs


To correctly analyze, and truly understand, an IdM
system, one must properly understand several
factors:
   ► Business case
   ► Enrollment and vetting
   ► Technology Selection
   ► Usage (including maintenance and termination)




                                                     Biometrics.gov
Next Steps

► Start to build foundation
   ► IdM TF
      ■ What do we need to know?
      ■ Where do we need to focus?
   ► What other activities/people do we need to be aware of,
     collaborate with, etc.?
► Ensure accurate public discussions
   ► How do we ensure the public, press & Congress have a
     good understanding?
   ► ITAA can be a voice of learned reason
      ■ Only beneficial if done correctly




                                                               Biometrics.gov
Duane Blackburn
dblackburn@ostp.eop.gov
      202-456-6068




                          Biometrics.gov

Contenu connexe

En vedette

The challenges of information literacy in the prison environment
The challenges of information literacy in the prison environmentThe challenges of information literacy in the prison environment
The challenges of information literacy in the prison environmentJo Webb
 
2009 Asstr A Presentation Russian Animals
2009 Asstr A Presentation Russian Animals2009 Asstr A Presentation Russian Animals
2009 Asstr A Presentation Russian AnimalsPavel Red'ko
 
Blogger & Facebook for FoL
Blogger & Facebook for FoLBlogger & Facebook for FoL
Blogger & Facebook for FoLjulid
 
авиаперевозки Clients 2009
авиаперевозки Clients 2009авиаперевозки Clients 2009
авиаперевозки Clients 2009Pavel Red'ko
 
Trapper School Grad P P
Trapper  School  Grad  P PTrapper  School  Grad  P P
Trapper School Grad P Pnsbsd
 
Automatic generation of inspection checklist by user profiling
Automatic generation of inspection checklist by user profilingAutomatic generation of inspection checklist by user profiling
Automatic generation of inspection checklist by user profilingNicola Del Gobbo
 
cleveland_district3_narrative
cleveland_district3_narrativecleveland_district3_narrative
cleveland_district3_narrativeandy biggin
 
Huetouch Partner Proposal 2009
Huetouch Partner Proposal 2009Huetouch Partner Proposal 2009
Huetouch Partner Proposal 2009cookielady
 
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומןמצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומןelio2b
 
Dibujos de movil
Dibujos de movilDibujos de movil
Dibujos de movilcpremolino
 

En vedette (20)

Teach tutorassescue2012
Teach tutorassescue2012Teach tutorassescue2012
Teach tutorassescue2012
 
The challenges of information literacy in the prison environment
The challenges of information literacy in the prison environmentThe challenges of information literacy in the prison environment
The challenges of information literacy in the prison environment
 
2009 Asstr A Presentation Russian Animals
2009 Asstr A Presentation Russian Animals2009 Asstr A Presentation Russian Animals
2009 Asstr A Presentation Russian Animals
 
Guión 7 febrero
Guión 7 febreroGuión 7 febrero
Guión 7 febrero
 
Blogger & Facebook for FoL
Blogger & Facebook for FoLBlogger & Facebook for FoL
Blogger & Facebook for FoL
 
авиаперевозки Clients 2009
авиаперевозки Clients 2009авиаперевозки Clients 2009
авиаперевозки Clients 2009
 
Trapper School Grad P P
Trapper  School  Grad  P PTrapper  School  Grad  P P
Trapper School Grad P P
 
C sharp
C sharpC sharp
C sharp
 
Pex
PexPex
Pex
 
Automatic generation of inspection checklist by user profiling
Automatic generation of inspection checklist by user profilingAutomatic generation of inspection checklist by user profiling
Automatic generation of inspection checklist by user profiling
 
Advanced Music 12
Advanced Music 12Advanced Music 12
Advanced Music 12
 
cleveland_district3_narrative
cleveland_district3_narrativecleveland_district3_narrative
cleveland_district3_narrative
 
Aaa! Newsletter
Aaa! NewsletterAaa! Newsletter
Aaa! Newsletter
 
BCC 2009 - NSTC
BCC 2009 - NSTCBCC 2009 - NSTC
BCC 2009 - NSTC
 
E Skills Week Teacher Guide
E Skills Week Teacher GuideE Skills Week Teacher Guide
E Skills Week Teacher Guide
 
Huetouch Partner Proposal 2009
Huetouch Partner Proposal 2009Huetouch Partner Proposal 2009
Huetouch Partner Proposal 2009
 
CHAMPS LEYSIN 2014
CHAMPS LEYSIN 2014CHAMPS LEYSIN 2014
CHAMPS LEYSIN 2014
 
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומןמצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
מצגת אחריות הרשויות המקומיות לניצולי השואה בתחומן
 
Dibujos de movil
Dibujos de movilDibujos de movil
Dibujos de movil
 
Star 2013-pdfa-pdfa
Star 2013-pdfa-pdfaStar 2013-pdfa-pdfa
Star 2013-pdfa-pdfa
 

Similaire à Advancing Identity Management (2007)

Future Interoperability of Terrorist Biometric Systems (2008)
Future Interoperability of Terrorist Biometric Systems (2008)Future Interoperability of Terrorist Biometric Systems (2008)
Future Interoperability of Terrorist Biometric Systems (2008)Duane Blackburn
 
NSTC Subcommittee on Domestic IEDs
NSTC Subcommittee on Domestic IEDsNSTC Subcommittee on Domestic IEDs
NSTC Subcommittee on Domestic IEDsDuane Blackburn
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Duane Blackburn
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics ChallengeDuane Blackburn
 
NSTC Subcommittee on Forensic Science (2009)
NSTC Subcommittee on Forensic Science (2009)NSTC Subcommittee on Forensic Science (2009)
NSTC Subcommittee on Forensic Science (2009)Duane Blackburn
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryDuane Blackburn
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.Phil Wolff
 
Biometric Consortium Conference 2008 - Opening Keynote
Biometric Consortium Conference 2008 - Opening KeynoteBiometric Consortium Conference 2008 - Opening Keynote
Biometric Consortium Conference 2008 - Opening KeynoteDuane Blackburn
 
Role of Biometric Standards in IdM
Role of Biometric Standards in IdMRole of Biometric Standards in IdM
Role of Biometric Standards in IdMjbhkwtc
 
Augmented intelligence pietro_leo_sole24_ore_school
Augmented intelligence pietro_leo_sole24_ore_schoolAugmented intelligence pietro_leo_sole24_ore_school
Augmented intelligence pietro_leo_sole24_ore_schoolPietro Leo
 
Understanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalUnderstanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalAndrew Gregoris
 
Business Process Optimization - Jan 2010
Business Process Optimization - Jan 2010Business Process Optimization - Jan 2010
Business Process Optimization - Jan 2010IIBA Rochester NY
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance frameworkkaiyun7631
 
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MIT
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MITMachine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MIT
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MITPietro Leo
 
Tecna new and renewing 2013 member handbook
Tecna new and renewing 2013 member handbookTecna new and renewing 2013 member handbook
Tecna new and renewing 2013 member handbookkelseybouton
 
Let's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designLet's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designNikita Lukianets
 

Similaire à Advancing Identity Management (2007) (20)

Future Interoperability of Terrorist Biometric Systems (2008)
Future Interoperability of Terrorist Biometric Systems (2008)Future Interoperability of Terrorist Biometric Systems (2008)
Future Interoperability of Terrorist Biometric Systems (2008)
 
NSTC Subcommittee on Domestic IEDs
NSTC Subcommittee on Domestic IEDsNSTC Subcommittee on Domestic IEDs
NSTC Subcommittee on Domestic IEDs
 
Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)Federal Biometrics Overview for Venture Capitalists (2005)
Federal Biometrics Overview for Venture Capitalists (2005)
 
The National Biometrics Challenge
The National Biometrics ChallengeThe National Biometrics Challenge
The National Biometrics Challenge
 
BCC 2008 - NSTC
BCC 2008 - NSTCBCC 2008 - NSTC
BCC 2008 - NSTC
 
BCC 2007 - NSTC
BCC 2007 - NSTCBCC 2007 - NSTC
BCC 2007 - NSTC
 
NSTC Subcommittee on Forensic Science (2009)
NSTC Subcommittee on Forensic Science (2009)NSTC Subcommittee on Forensic Science (2009)
NSTC Subcommittee on Forensic Science (2009)
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.What could kill NSTIC? A friendly threat assessment in 3 parts.
What could kill NSTIC? A friendly threat assessment in 3 parts.
 
Biometric Consortium Conference 2008 - Opening Keynote
Biometric Consortium Conference 2008 - Opening KeynoteBiometric Consortium Conference 2008 - Opening Keynote
Biometric Consortium Conference 2008 - Opening Keynote
 
Role of Biometric Standards in IdM
Role of Biometric Standards in IdMRole of Biometric Standards in IdM
Role of Biometric Standards in IdM
 
Augmented intelligence pietro_leo_sole24_ore_school
Augmented intelligence pietro_leo_sole24_ore_schoolAugmented intelligence pietro_leo_sole24_ore_school
Augmented intelligence pietro_leo_sole24_ore_school
 
BCC 2006 - NSTC
BCC 2006 - NSTCBCC 2006 - NSTC
BCC 2006 - NSTC
 
The Social Media Doppler Effect
The Social Media Doppler EffectThe Social Media Doppler Effect
The Social Media Doppler Effect
 
Understanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalUnderstanding The Big Data Opportunity Final
Understanding The Big Data Opportunity Final
 
Business Process Optimization - Jan 2010
Business Process Optimization - Jan 2010Business Process Optimization - Jan 2010
Business Process Optimization - Jan 2010
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance framework
 
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MIT
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MITMachine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MIT
Machine Learning Crash Course 2017 - Genova - DIBRIS - IIT - MIT
 
Tecna new and renewing 2013 member handbook
Tecna new and renewing 2013 member handbookTecna new and renewing 2013 member handbook
Tecna new and renewing 2013 member handbook
 
Let's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designLet's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational design
 

Plus de Duane Blackburn

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-ApprovedDuane Blackburn
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesDuane Blackburn
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government NeedsDuane Blackburn
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerDuane Blackburn
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementDuane Blackburn
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Duane Blackburn
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)Duane Blackburn
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EDuane Blackburn
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Duane Blackburn
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...Duane Blackburn
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Duane Blackburn
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report Duane Blackburn
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Duane Blackburn
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual FoundationDuane Blackburn
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Duane Blackburn
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process OverviewDuane Blackburn
 
BCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeBCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeDuane Blackburn
 
BCC 2004 - Research Needs In Biometrics
BCC 2004 -  Research Needs In BiometricsBCC 2004 -  Research Needs In Biometrics
BCC 2004 - Research Needs In BiometricsDuane Blackburn
 
BCC 2004 - Interagency RDT&E Coordination
BCC 2004 -  Interagency RDT&E CoordinationBCC 2004 -  Interagency RDT&E Coordination
BCC 2004 - Interagency RDT&E CoordinationDuane Blackburn
 

Plus de Duane Blackburn (20)

What is I2 Final-Approved
What is I2 Final-ApprovedWhat is I2 Final-Approved
What is I2 Final-Approved
 
Potential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric ServicesPotential Opportunities for Common Federal Biometric Services
Potential Opportunities for Common Federal Biometric Services
 
BCC (2012): Federal Panel Identifying Future Government Needs
BCC (2012):  Federal Panel Identifying Future Government NeedsBCC (2012):  Federal Panel Identifying Future Government Needs
BCC (2012): Federal Panel Identifying Future Government Needs
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Where We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity ManagementWhere We Are Today – The Current Landscape of Identity Management
Where We Are Today – The Current Landscape of Identity Management
 
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...Research, Development, Test, and Evaluation: A Defensible Process for Federal...
Research, Development, Test, and Evaluation: A Defensible Process for Federal...
 
The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)The National Biometrics Challenge (2011)
The National Biometrics Challenge (2011)
 
Interagency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&EInteragency Coordination of Biometrics and Forensic RDT&E
Interagency Coordination of Biometrics and Forensic RDT&E
 
Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?Identity Management Policy - The End of the Beginning?
Identity Management Policy - The End of the Beginning?
 
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
NSTC Policy for Enabling the Development, Adoption and Use of Biometric Stand...
 
Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...Research Challenges in Combating Terrorist Use of Explosives in the United St...
Research Challenges in Combating Terrorist Use of Explosives in the United St...
 
NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report NSTC Identity Management Task Force Report
NSTC Identity Management Task Force Report
 
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations
 
Privacy and Biometrics: Building a Conceptual Foundation
Privacy and Biometrics:  Building a Conceptual FoundationPrivacy and Biometrics:  Building a Conceptual Foundation
Privacy and Biometrics: Building a Conceptual Foundation
 
Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)Using The National Science and Technology Council (NSTC)
Using The National Science and Technology Council (NSTC)
 
Federal Budget Process Overview
Federal Budget Process OverviewFederal Budget Process Overview
Federal Budget Process Overview
 
BCC 2005 - NSTC
BCC 2005 - NSTC BCC 2005 - NSTC
BCC 2005 - NSTC
 
BCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics CooperativeBCC 2005 - Justice Biometrics Cooperative
BCC 2005 - Justice Biometrics Cooperative
 
BCC 2004 - Research Needs In Biometrics
BCC 2004 -  Research Needs In BiometricsBCC 2004 -  Research Needs In Biometrics
BCC 2004 - Research Needs In Biometrics
 
BCC 2004 - Interagency RDT&E Coordination
BCC 2004 -  Interagency RDT&E CoordinationBCC 2004 -  Interagency RDT&E Coordination
BCC 2004 - Interagency RDT&E Coordination
 

Dernier

Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 

Dernier (20)

Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 

Advancing Identity Management (2007)

  • 1. Advancing Identity Management Duane Blackburn Office of Science & Technology Policy November 27, 2007 Biometrics.gov
  • 2. The Executive Office of the President White House Office Office of the National Security (HSC, Freedom Corps, Faith-Based Initiatives) Vice President Council Domestic Policy Council Office of Management Office of Science & Nat’l Economic Council & Budget Technology Policy Nat’l AIDS Policy US Trade Council of Office of National Representative Environmental Quality Drug Control Policy Office of Council of Economic Foreign Intelligence Administration Advisors Advisory Board Primarily career staff Primarily political staff Mix of political, detailees and career Biometrics.gov
  • 3. OSTP – What We Do • Advise the President and others within the Executive Office of the President on the impacts of science and technology on domestic and international affairs; • Lead an interagency effort to develop and implement sound science and technology policies and budgets; • Work with the private sector to ensure Federal investments in science and technology contribute to economic prosperity, environmental quality, and national security; • Build strong partnerships among Federal, State, and local governments, other countries, and the scientific community; • Evaluate the scale, quality, and effectiveness of the Federal effort in science and technology. Biometrics.gov
  • 4. OSTP – How We Do It ► Engage the budget process; Work with OMB & agencies ► Review/Approve regulations, testimony, strategies, etc. ► Getting the word out ► Advisory committee meetings ► National Academies’ panels ► National Labs, universities, etc. ► Occasional workshops & conferences ► Coordinate Interagency Activities via the National Science and Technology Council Biometrics.gov
  • 5. NSTC Organizational Framework President Vice President Director, OSTP PCAST (private sector advice) Executive Secretary NSTC Agency POCs Cabinet Secretaries, Agency Heads Exec. Sec. Committee Agency Reps Co-Chairs, Agency Members OSTP, OMB Subcommittee Working Group Task Force Working Group Task Force Task Force Biometrics.gov
  • 6. New Concept? Or New Functionality? New Applications and Technical Possibilities Biometrics.gov
  • 7. IdM today: Lots of Interest! ► Identity Theft ► Financial ► Border Control ► Virtual Identities ► Law Enforcement ► Telecommunications ► Computing ► Benefits Management ► eGovernment ► Healthcare ► Defense ► Transportation Biometrics.gov
  • 8. What is needed for the future? ► Identity Management Foundation ► What is “identity management?” ► Gravell: Identity Management HTML analogy ► Ensure Accurate Public Discussions ► “Promoting a scientifically educated and aware public is necessary if we are to make the appropriate decisions about the nation’s R&D investments, guide the adoption and debate the societal implications of new science and technologies, and reap the maximum benefits from our investments. The quality of these efforts underpins the entire US scientific enterprise.” ■ Science for the 21st Century ► Both of these require collaboration and consistency among the government, industry and academic communities Biometrics.gov
  • 9. Foundation Building Blocks ► HSPD-12; PIV ► Multiple groups with varying interests worked together to develop an approach that is generally agreeable ► Significant back-end infrastructure in place to establish a trusted root identity ► Large scale implementation ► Foundation is being leveraged for other public & private sector programs ► Federal Biometric Efforts ► Biometrics are closest real-time association with a core identity possible ► Federal system of systems enables “one person, one identity” when necessary Biometrics.gov
  • 10. NSTC Subcommittee on Biometrics & IdM Co-Chair (Biometrics) Co-Chair (Overall) Co-Chair (Identity Management) Brad Wing, DHS/US-VISIT Duane Blackburn, OSTP Jim Dray, NIST Executive Secretary Michelle Johnson, FBI (SETA) Emeritus Co-Chairs Kevin Hurst, OSTP Chris Miles, DHS S&T Subcommittee Department Leads IdM Task Force?? Interoperability Standards Biometrics RDT&E S&T Assistance Privacy Communications Biometrics.gov
  • 11. Ensure Accurate Public Discussions ► Current discourse is fundamentally flawed ► People are clueless about what the private sector is already doing ► Government not adequately explaining plans and rationale for decisions ► Technical industry focusing on solutions without considering the driving business case ► Technology privacy community is in its infancy ■ learning to stand up, but isn’t walking yet ► Obstructionists are doing what they do best ► The media is loving the conflict ► The public is confused and irritated Biometrics.gov
  • 12. Discussing IdM programs To correctly analyze, and truly understand, an IdM system, one must properly understand several factors: ► Business case ► Enrollment and vetting ► Technology Selection ► Usage (including maintenance and termination) Biometrics.gov
  • 13. Next Steps ► Start to build foundation ► IdM TF ■ What do we need to know? ■ Where do we need to focus? ► What other activities/people do we need to be aware of, collaborate with, etc.? ► Ensure accurate public discussions ► How do we ensure the public, press & Congress have a good understanding? ► ITAA can be a voice of learned reason ■ Only beneficial if done correctly Biometrics.gov
  • 14. Duane Blackburn dblackburn@ostp.eop.gov 202-456-6068 Biometrics.gov