SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Sloane Joie Trugman
February 28, 2017
Mr. Christopher Stone
Open Society Foundation
Dear Mr. Stone:
No matter where you are in the world, modern or not, security and insecurity, oddly are taboo concepts.
This makes something as critical as data security, individual-digital identity, national-digital identity, and
planetary-digital identity really hard conversations to have because it seems so distant and rather
farfetched. And it keeps getting pushed from under one rug to the next. Although the internet has been
declared as a “basic human right” by the UN, I still am finding, globally, that there has yet to be a
conversation around individual security and accountability of the digital identity.
It was late October 2015 and I was in Florida attending one of our nation’s top military and intelligence
communication conferences. I gripped my business cards confidently that read: Secretary of the
Information State while sitting front row before a panel that held the: Section Head at J6 NATO Allied
Command Transformation (ACT)-Norfolk, NEC Project Officer European Defense Agency; Deputy
Director for Command and Control Integration (DD C2I); Directorate for Command, Control,
Communications, and Computers-Joint Staff J6; Principal Scientist-Scientific Lead Deployable CIS
Networking and IT Infrastructure Service Line- Operational CIS Service Area NATO Communications and
Information Agency (NCI Agency); the Vice President-Product Management SafeNet Assured
Technologies; and the Solution Architect DeepSecure Ltd. Literally, some of the top national and
international data and systems people.
Out of the six very distinguished and dignified men before me - that shape not only doctrine, policies,
culture, and the protocol for the advancement and (war) exercises of communication technologies for and
across their constituencies (and allies) and to set national and international precedent of all things cyber-
not one could clearly answer my questions on data security, national-digital identity and public access to
complex information questions that I machine gunned at them following their discussion.
To be fair, these gentlemen were locked within their particular legacy silos, and at the same time, were
responsible for developing national resiliencies and alert systems for major cyber attacks, hacks, and to
field the national identity and even war implications of those…for an entire nation and a global alliance!
But, the OPM breach had already happened earlier that summer and they had nothing to say about a
cyber attack of that scale that not only jeopardized national systems, but that took a federal system that
held sensitive federal and civilian information and liberated it to the internet for the public. So, if
innovations followed history, that meant that the rate of access to high technologies would eventually
parallel the rate of bad habit of enabling a culture that been permitting hacking and identity theft. And that
would become the national identity, which it has become. I believe the way that too much accountable
and real information that was leaked out there is being dealt with is flooding it with just as much false
information. And it just doesn't have to be.
The international media has been all over the relationships of civilian and US government ties to apps
and data: “Why the CIA wanting encryption backdoors is a failure of leadership, not intelligence, Analysis:
The question shouldn't be if encryption should have backdoors, but why intelligence agencies have begun
shifting the blame onto those who push for privacy”;“Big Data: A Tool for Inclusion or Exclusion? …While
the report shows the important role the federal government must play in enforcing civil rights laws online,
the need for robust auditing by companies and external groups remains as critical as ever”; “Big Data Can
Be Used To Violate Civil Rights Laws, and the FTC Agrees”; “Cyber isn’t all that special, says NSA chief”;
“Cyberwar for Sale - After a maker of surveillance software was hacked, its leaked documents shed light
on a shadowy global industry that has turned email theft into a terrifying — and lucrative — political
weapon”; not to mention what has been going on since the recent US Presidential election, and your very
own article in the Guardian, “We Won’t Let Political Led Motivated Hacks Stop Us.”
I suddenly realized that the most sophisticated and knowledgeable people perhaps, in the “recognized”
world (recognized meaning distinguished, internationally respected, and heads of national and
geopolitical nation-states), could not only incompletely answer basic security questions or field civilian
digital-national identity and security related concerns, but they were dealing with hacks, breaches, and
shifts in national and global strategy so far bigger than themselves. So who could answer those human
oriented questions? I mother knows best, my mom sure couldn’t either.
So I turned to the proverbial mother’s of my nation and friend groups. As a January 2016 article points
out, the “FTC is falling short in protecting consumers' data used by businesses,” and it seems that
national-digital identity is something to get on paper and get a laugh out of, as demonstrated with the H.R.
DATA (Data Accountability and Trust Act) Bill.
Could the Electronic Frontier Foundations (EFF), The World Economic Forum, the ACLU, or the Human
Rights Foundation help out? Perhaps, Megan Smith, the CTO of the United States? Maybe even her
colleagues at the OSTP or within the Digital Service? I knew something was up culturally when our
Nation’s highest science and technology office and digital service were not creating campaigns, portals,
communication, or ease to know citizens rights online and what a very decentralized digital self meant on
top of having a national identity.
All of this seemed to me to be a bigger identity unknown that is affecting a global citizenry. A global
citizenry that also hold over 65 million refugees that are beginning to be issued a Blockchain or biometric
data enabled technology to hold their “identity”. This flags me with with fears because at the moment
there is no known accountability for users especially because they trust the companies that build the
products and provide the services and then they trust their governments laws and international treaties
that are supposedly designed with them in mind. Yet, at the same time, there is no formal, easy, or
widespread knowledge base (like brushing your teeth) to discuss pressing digital hygiene of the what,
where, when, why etc. topics of data, digital culture, or identity.
Then the U.N. declared internet access a human right. But if targeted content and trackers were behind
the information that was being produced and consumed, why wasn’t basic digital-identity standards a
thing? New standards need to replace ones that are no longer up to standard, especially in communities
that are getting the newest first versus those that have been living with something for instance to watch
it’s development and progression. There has not been a hygiene or practice standard set for the global
and extraterrestrial proliferation of data and information. And that was a starting point for me. Because
whilst countries were trying to be agile with they image of trust and security to those in their boarders,
techniques, capabilities, and ingenuity was becoming much more colorful, in demand, and quite frankly
fun outside of government service jobs that made innovation, information, and technical capabilities about
national identity and warfare.
Then it dawned on me. I wouldn’t know what values or lessons to impart on my children, when I had
them, as to how to be safe and to survive in this time and age. Machines would be collecting information
and as soon as new industries caught up, they’d be making accountability judgments on those humans.
In January of this year, I visited Thailand and Myanmar and yet again came face-to-face with this
disconnect from digital identity and data management that I had in the United States even though all over,
and even in the countryside, locals protecting 11th century ruins and living a life managed by hard work
for the family and by religious ethics, were data messaging, creating Facebooks accounts, using mobile
banking, and communicating across the web and using apps that they were advertised to use.
Historically speaking, humans have created management systems to live or to go through the greatest
unknown that is our actual present: living. But less often then not, do those that benefit, fall, or rise
through the systems exchange their experience. In product development or law, there are places of audit
or discovery to get an assessment or overall feelings so that something can be created, altered, or
updated. However management has gotten so good that styles are now beginning to be challenged
simply for the fact that there are so many ways to contribute under large organizations or institutional
structure that accountability starts getting lost when there is too much shuffle. This is where I found that
no matter how many programs, innovators, rules, laws, and systems of rights and expression that had
been created, that those that benefitted from these programs were so far from knowing them as
immediate and ready hand knowledge. A time for new standards.
I’ve been witnessing that, unlike with national-religious-village-language-etc identities, We, as a society,
across boarders, across the planet and even as far as in outer space, have no real cultural identity to
what we consume or produce, making what comes from insights off that information hard to understand,
weigh in value, teach our children what is hygienic (choices based), or even invest into x y orz toward
what the future will hold for us with all the info out there.
We’ve already created the many many many ways to be human, but we haven't stepped back for a
second to see what that means when decentralized identities enter our individual, familial, educational,
professional, religious, stately, planetary identity on top.
My intention is to be an Open Society Fellow and develop and local-to-global campaign on digital
identities, a how-to guide for the internet to further it’s justification as a human right, highlight the UN’s 17
sustainability goals and how learning what a basic human right such as the internet can provide as a
learning and access point to contributing actually creating your identity as being part of a much larger
voice on this planet.
My highest regards and I look forward to your contact later this March.
Sloane Joie Trugman

Contenu connexe

Tendances

Library as a Third Place - NYLA 2008
Library as a Third Place - NYLA 2008Library as a Third Place - NYLA 2008
Library as a Third Place - NYLA 2008Terry Kirchner
 
Artificial Intelligence adoption factor in the University libraries of Pakist...
Artificial Intelligence adoption factor in the University libraries of Pakist...Artificial Intelligence adoption factor in the University libraries of Pakist...
Artificial Intelligence adoption factor in the University libraries of Pakist...Muhammad Yousuf Ali
 
OIE listed diseases in fishes
OIE listed diseases in fishesOIE listed diseases in fishes
OIE listed diseases in fishesMr. Jayanta Tiple
 
Encoded Archival Description (EAD)
Encoded Archival Description (EAD) Encoded Archival Description (EAD)
Encoded Archival Description (EAD) Farris Wahbeh
 
Observation of Activities of Marine Fisheries Office to Know How Fishery Regu...
Observation of Activities of Marine Fisheries Office to Know How Fishery Regu...Observation of Activities of Marine Fisheries Office to Know How Fishery Regu...
Observation of Activities of Marine Fisheries Office to Know How Fishery Regu...Muhammad Bin Shahjahan
 
Marine parks and marine protected areas
Marine parks and marine protected areasMarine parks and marine protected areas
Marine parks and marine protected areasshibam saha
 

Tendances (8)

Channa punctata
Channa punctataChanna punctata
Channa punctata
 
Library as a Third Place - NYLA 2008
Library as a Third Place - NYLA 2008Library as a Third Place - NYLA 2008
Library as a Third Place - NYLA 2008
 
Artificial Intelligence adoption factor in the University libraries of Pakist...
Artificial Intelligence adoption factor in the University libraries of Pakist...Artificial Intelligence adoption factor in the University libraries of Pakist...
Artificial Intelligence adoption factor in the University libraries of Pakist...
 
OIE listed diseases in fishes
OIE listed diseases in fishesOIE listed diseases in fishes
OIE listed diseases in fishes
 
Encoded Archival Description (EAD)
Encoded Archival Description (EAD) Encoded Archival Description (EAD)
Encoded Archival Description (EAD)
 
Bycatch
Bycatch Bycatch
Bycatch
 
Observation of Activities of Marine Fisheries Office to Know How Fishery Regu...
Observation of Activities of Marine Fisheries Office to Know How Fishery Regu...Observation of Activities of Marine Fisheries Office to Know How Fishery Regu...
Observation of Activities of Marine Fisheries Office to Know How Fishery Regu...
 
Marine parks and marine protected areas
Marine parks and marine protected areasMarine parks and marine protected areas
Marine parks and marine protected areas
 

En vedette

Selección y reclutamiento 2.0 "Encuéntrate y te encontrarán"
Selección y reclutamiento 2.0 "Encuéntrate y te encontrarán"Selección y reclutamiento 2.0 "Encuéntrate y te encontrarán"
Selección y reclutamiento 2.0 "Encuéntrate y te encontrarán"María José Muñoz
 
Scale up - How to build adaptive data systems in the age of virality
Scale up - How to build adaptive data systems in the age of viralityScale up - How to build adaptive data systems in the age of virality
Scale up - How to build adaptive data systems in the age of viralityJohannes Brandstetter
 
Is 'Made in the USA' Back in Vogue?
Is 'Made in the USA' Back in Vogue?Is 'Made in the USA' Back in Vogue?
Is 'Made in the USA' Back in Vogue?Intelligence Node
 
Key metrics for Inside Sales Teams
Key metrics for Inside Sales TeamsKey metrics for Inside Sales Teams
Key metrics for Inside Sales TeamsAAyuja, Inc.
 
Composite Materials for Magnetic Field Control in EPM
Composite Materials for Magnetic Field Control in EPMComposite Materials for Magnetic Field Control in EPM
Composite Materials for Magnetic Field Control in EPMFluxtrol Inc.
 
R. Villano - Antibioticoresistenza 2 ediz. p.te 6
R. Villano - Antibioticoresistenza  2 ediz. p.te 6R. Villano - Antibioticoresistenza  2 ediz. p.te 6
R. Villano - Antibioticoresistenza 2 ediz. p.te 6Raimondo Villano
 
ResCUE presentation
ResCUE presentationResCUE presentation
ResCUE presentationResCUE
 
ΕΡΕΥΝΑ: «Προκλήσεις & Ευκαιρίες των Ελληνικών Μικρομεσαίων Επιχειρήσεων» Doul...
ΕΡΕΥΝΑ: «Προκλήσεις & Ευκαιρίες των Ελληνικών Μικρομεσαίων Επιχειρήσεων» Doul...ΕΡΕΥΝΑ: «Προκλήσεις & Ευκαιρίες των Ελληνικών Μικρομεσαίων Επιχειρήσεων» Doul...
ΕΡΕΥΝΑ: «Προκλήσεις & Ευκαιρίες των Ελληνικών Μικρομεσαίων Επιχειρήσεων» Doul...Douleutaras.gr
 
Evolution of the Single Page Application
Evolution of the Single Page ApplicationEvolution of the Single Page Application
Evolution of the Single Page ApplicationCaleb Sotelo
 
Violencia Virtual
Violencia VirtualViolencia Virtual
Violencia Virtualguest7f271d
 
Netty from the trenches
Netty from the trenchesNetty from the trenches
Netty from the trenchesJordi Gerona
 
Eni's 2016 Results – 2017-2020 Strategy
Eni's 2016 Results – 2017-2020 StrategyEni's 2016 Results – 2017-2020 Strategy
Eni's 2016 Results – 2017-2020 StrategyEni
 
First Look at AMD Vega GPU Architecture
First Look at AMD Vega GPU ArchitectureFirst Look at AMD Vega GPU Architecture
First Look at AMD Vega GPU Architectureinside-BigData.com
 
Role of social media in heritage tourism
Role of social media in heritage tourismRole of social media in heritage tourism
Role of social media in heritage tourismAmbuj Saxena
 
Knowledge Representation in the Age of Deep Learning, Watson, and the Semanti...
Knowledge Representation in the Age of Deep Learning, Watson, and the Semanti...Knowledge Representation in the Age of Deep Learning, Watson, and the Semanti...
Knowledge Representation in the Age of Deep Learning, Watson, and the Semanti...James Hendler
 

En vedette (20)

Selección y reclutamiento 2.0 "Encuéntrate y te encontrarán"
Selección y reclutamiento 2.0 "Encuéntrate y te encontrarán"Selección y reclutamiento 2.0 "Encuéntrate y te encontrarán"
Selección y reclutamiento 2.0 "Encuéntrate y te encontrarán"
 
OSARE in pratica
OSARE in praticaOSARE in pratica
OSARE in pratica
 
Scale up - How to build adaptive data systems in the age of virality
Scale up - How to build adaptive data systems in the age of viralityScale up - How to build adaptive data systems in the age of virality
Scale up - How to build adaptive data systems in the age of virality
 
Is 'Made in the USA' Back in Vogue?
Is 'Made in the USA' Back in Vogue?Is 'Made in the USA' Back in Vogue?
Is 'Made in the USA' Back in Vogue?
 
Key metrics for Inside Sales Teams
Key metrics for Inside Sales TeamsKey metrics for Inside Sales Teams
Key metrics for Inside Sales Teams
 
Gerontology & Geriatrics: Research
Gerontology & Geriatrics: ResearchGerontology & Geriatrics: Research
Gerontology & Geriatrics: Research
 
Composite Materials for Magnetic Field Control in EPM
Composite Materials for Magnetic Field Control in EPMComposite Materials for Magnetic Field Control in EPM
Composite Materials for Magnetic Field Control in EPM
 
R. Villano - Antibioticoresistenza 2 ediz. p.te 6
R. Villano - Antibioticoresistenza  2 ediz. p.te 6R. Villano - Antibioticoresistenza  2 ediz. p.te 6
R. Villano - Antibioticoresistenza 2 ediz. p.te 6
 
ResCUE presentation
ResCUE presentationResCUE presentation
ResCUE presentation
 
Dossier patrocinio mima
Dossier patrocinio mimaDossier patrocinio mima
Dossier patrocinio mima
 
ΕΡΕΥΝΑ: «Προκλήσεις & Ευκαιρίες των Ελληνικών Μικρομεσαίων Επιχειρήσεων» Doul...
ΕΡΕΥΝΑ: «Προκλήσεις & Ευκαιρίες των Ελληνικών Μικρομεσαίων Επιχειρήσεων» Doul...ΕΡΕΥΝΑ: «Προκλήσεις & Ευκαιρίες των Ελληνικών Μικρομεσαίων Επιχειρήσεων» Doul...
ΕΡΕΥΝΑ: «Προκλήσεις & Ευκαιρίες των Ελληνικών Μικρομεσαίων Επιχειρήσεων» Doul...
 
Problema de economia
Problema de economiaProblema de economia
Problema de economia
 
mix design m30
mix design m30mix design m30
mix design m30
 
Evolution of the Single Page Application
Evolution of the Single Page ApplicationEvolution of the Single Page Application
Evolution of the Single Page Application
 
Violencia Virtual
Violencia VirtualViolencia Virtual
Violencia Virtual
 
Netty from the trenches
Netty from the trenchesNetty from the trenches
Netty from the trenches
 
Eni's 2016 Results – 2017-2020 Strategy
Eni's 2016 Results – 2017-2020 StrategyEni's 2016 Results – 2017-2020 Strategy
Eni's 2016 Results – 2017-2020 Strategy
 
First Look at AMD Vega GPU Architecture
First Look at AMD Vega GPU ArchitectureFirst Look at AMD Vega GPU Architecture
First Look at AMD Vega GPU Architecture
 
Role of social media in heritage tourism
Role of social media in heritage tourismRole of social media in heritage tourism
Role of social media in heritage tourism
 
Knowledge Representation in the Age of Deep Learning, Watson, and the Semanti...
Knowledge Representation in the Age of Deep Learning, Watson, and the Semanti...Knowledge Representation in the Age of Deep Learning, Watson, and the Semanti...
Knowledge Representation in the Age of Deep Learning, Watson, and the Semanti...
 

Similaire à Letter of Intent - Open Society Fellowship

Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984Christy Davis
 
The age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliyaThe age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliyaGmeconline
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.Paolo Cirio
 
Net governance digital natives newsletter
Net governance   digital natives newsletterNet governance   digital natives newsletter
Net governance digital natives newsletterNilofar Ansher
 
Everyday surveillance
Everyday surveillanceEveryday surveillance
Everyday surveillanceYavuz Paksoy
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Tech and Law Center
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsideredBrian Rowe
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
2600 v20 n4 (winter 2003)
2600 v20 n4 (winter 2003)2600 v20 n4 (winter 2003)
2600 v20 n4 (winter 2003)Felipe Prado
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)Felipe Prado
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010DCL2701A
 

Similaire à Letter of Intent - Open Society Fellowship (14)

Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
The age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliyaThe age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliya
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.
 
Net governance digital natives newsletter
Net governance   digital natives newsletterNet governance   digital natives newsletter
Net governance digital natives newsletter
 
Everyday surveillance
Everyday surveillanceEveryday surveillance
Everyday surveillance
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
2600 v20 n4 (winter 2003)
2600 v20 n4 (winter 2003)2600 v20 n4 (winter 2003)
2600 v20 n4 (winter 2003)
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
 
2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)2600 v21 n3 (autumn 2004)
2600 v21 n3 (autumn 2004)
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
 

Dernier

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 

Dernier (20)

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 

Letter of Intent - Open Society Fellowship

  • 1. Sloane Joie Trugman February 28, 2017 Mr. Christopher Stone Open Society Foundation Dear Mr. Stone: No matter where you are in the world, modern or not, security and insecurity, oddly are taboo concepts. This makes something as critical as data security, individual-digital identity, national-digital identity, and planetary-digital identity really hard conversations to have because it seems so distant and rather farfetched. And it keeps getting pushed from under one rug to the next. Although the internet has been declared as a “basic human right” by the UN, I still am finding, globally, that there has yet to be a conversation around individual security and accountability of the digital identity. It was late October 2015 and I was in Florida attending one of our nation’s top military and intelligence communication conferences. I gripped my business cards confidently that read: Secretary of the Information State while sitting front row before a panel that held the: Section Head at J6 NATO Allied Command Transformation (ACT)-Norfolk, NEC Project Officer European Defense Agency; Deputy Director for Command and Control Integration (DD C2I); Directorate for Command, Control, Communications, and Computers-Joint Staff J6; Principal Scientist-Scientific Lead Deployable CIS Networking and IT Infrastructure Service Line- Operational CIS Service Area NATO Communications and Information Agency (NCI Agency); the Vice President-Product Management SafeNet Assured Technologies; and the Solution Architect DeepSecure Ltd. Literally, some of the top national and international data and systems people. Out of the six very distinguished and dignified men before me - that shape not only doctrine, policies, culture, and the protocol for the advancement and (war) exercises of communication technologies for and across their constituencies (and allies) and to set national and international precedent of all things cyber- not one could clearly answer my questions on data security, national-digital identity and public access to complex information questions that I machine gunned at them following their discussion. To be fair, these gentlemen were locked within their particular legacy silos, and at the same time, were responsible for developing national resiliencies and alert systems for major cyber attacks, hacks, and to field the national identity and even war implications of those…for an entire nation and a global alliance! But, the OPM breach had already happened earlier that summer and they had nothing to say about a cyber attack of that scale that not only jeopardized national systems, but that took a federal system that held sensitive federal and civilian information and liberated it to the internet for the public. So, if innovations followed history, that meant that the rate of access to high technologies would eventually parallel the rate of bad habit of enabling a culture that been permitting hacking and identity theft. And that would become the national identity, which it has become. I believe the way that too much accountable and real information that was leaked out there is being dealt with is flooding it with just as much false information. And it just doesn't have to be. The international media has been all over the relationships of civilian and US government ties to apps and data: “Why the CIA wanting encryption backdoors is a failure of leadership, not intelligence, Analysis: The question shouldn't be if encryption should have backdoors, but why intelligence agencies have begun shifting the blame onto those who push for privacy”;“Big Data: A Tool for Inclusion or Exclusion? …While the report shows the important role the federal government must play in enforcing civil rights laws online, the need for robust auditing by companies and external groups remains as critical as ever”; “Big Data Can Be Used To Violate Civil Rights Laws, and the FTC Agrees”; “Cyber isn’t all that special, says NSA chief”; “Cyberwar for Sale - After a maker of surveillance software was hacked, its leaked documents shed light
  • 2. on a shadowy global industry that has turned email theft into a terrifying — and lucrative — political weapon”; not to mention what has been going on since the recent US Presidential election, and your very own article in the Guardian, “We Won’t Let Political Led Motivated Hacks Stop Us.” I suddenly realized that the most sophisticated and knowledgeable people perhaps, in the “recognized” world (recognized meaning distinguished, internationally respected, and heads of national and geopolitical nation-states), could not only incompletely answer basic security questions or field civilian digital-national identity and security related concerns, but they were dealing with hacks, breaches, and shifts in national and global strategy so far bigger than themselves. So who could answer those human oriented questions? I mother knows best, my mom sure couldn’t either. So I turned to the proverbial mother’s of my nation and friend groups. As a January 2016 article points out, the “FTC is falling short in protecting consumers' data used by businesses,” and it seems that national-digital identity is something to get on paper and get a laugh out of, as demonstrated with the H.R. DATA (Data Accountability and Trust Act) Bill. Could the Electronic Frontier Foundations (EFF), The World Economic Forum, the ACLU, or the Human Rights Foundation help out? Perhaps, Megan Smith, the CTO of the United States? Maybe even her colleagues at the OSTP or within the Digital Service? I knew something was up culturally when our Nation’s highest science and technology office and digital service were not creating campaigns, portals, communication, or ease to know citizens rights online and what a very decentralized digital self meant on top of having a national identity. All of this seemed to me to be a bigger identity unknown that is affecting a global citizenry. A global citizenry that also hold over 65 million refugees that are beginning to be issued a Blockchain or biometric data enabled technology to hold their “identity”. This flags me with with fears because at the moment there is no known accountability for users especially because they trust the companies that build the products and provide the services and then they trust their governments laws and international treaties that are supposedly designed with them in mind. Yet, at the same time, there is no formal, easy, or widespread knowledge base (like brushing your teeth) to discuss pressing digital hygiene of the what, where, when, why etc. topics of data, digital culture, or identity. Then the U.N. declared internet access a human right. But if targeted content and trackers were behind the information that was being produced and consumed, why wasn’t basic digital-identity standards a thing? New standards need to replace ones that are no longer up to standard, especially in communities that are getting the newest first versus those that have been living with something for instance to watch it’s development and progression. There has not been a hygiene or practice standard set for the global and extraterrestrial proliferation of data and information. And that was a starting point for me. Because whilst countries were trying to be agile with they image of trust and security to those in their boarders, techniques, capabilities, and ingenuity was becoming much more colorful, in demand, and quite frankly fun outside of government service jobs that made innovation, information, and technical capabilities about national identity and warfare. Then it dawned on me. I wouldn’t know what values or lessons to impart on my children, when I had them, as to how to be safe and to survive in this time and age. Machines would be collecting information and as soon as new industries caught up, they’d be making accountability judgments on those humans. In January of this year, I visited Thailand and Myanmar and yet again came face-to-face with this disconnect from digital identity and data management that I had in the United States even though all over, and even in the countryside, locals protecting 11th century ruins and living a life managed by hard work for the family and by religious ethics, were data messaging, creating Facebooks accounts, using mobile banking, and communicating across the web and using apps that they were advertised to use.
  • 3. Historically speaking, humans have created management systems to live or to go through the greatest unknown that is our actual present: living. But less often then not, do those that benefit, fall, or rise through the systems exchange their experience. In product development or law, there are places of audit or discovery to get an assessment or overall feelings so that something can be created, altered, or updated. However management has gotten so good that styles are now beginning to be challenged simply for the fact that there are so many ways to contribute under large organizations or institutional structure that accountability starts getting lost when there is too much shuffle. This is where I found that no matter how many programs, innovators, rules, laws, and systems of rights and expression that had been created, that those that benefitted from these programs were so far from knowing them as immediate and ready hand knowledge. A time for new standards. I’ve been witnessing that, unlike with national-religious-village-language-etc identities, We, as a society, across boarders, across the planet and even as far as in outer space, have no real cultural identity to what we consume or produce, making what comes from insights off that information hard to understand, weigh in value, teach our children what is hygienic (choices based), or even invest into x y orz toward what the future will hold for us with all the info out there. We’ve already created the many many many ways to be human, but we haven't stepped back for a second to see what that means when decentralized identities enter our individual, familial, educational, professional, religious, stately, planetary identity on top. My intention is to be an Open Society Fellow and develop and local-to-global campaign on digital identities, a how-to guide for the internet to further it’s justification as a human right, highlight the UN’s 17 sustainability goals and how learning what a basic human right such as the internet can provide as a learning and access point to contributing actually creating your identity as being part of a much larger voice on this planet. My highest regards and I look forward to your contact later this March. Sloane Joie Trugman