Diff for /WWW/2007/eGov/IG/Group/docs/note.html between version 1.88 and 1.90

version 1.88, 2009/05/06 16:26:15 version 1.90, 2009/05/06 16:55:19
Line 2645 
Line 2645 
   
 <h5 id="idauth.what.transition">The Transition of Identity from the Physical to  <h5 id="idauth.what.transition">The Transition of Identity from the Physical to
 the Virtual.</h5>  the Virtual.</h5>
   
 <p>Governments and citizens communicate using online methods increasingly and  <p>Governments and citizens communicate using online methods increasingly and
 for many purposes. And in the numerous types of these communications between  for many purposes. And in the numerous types of these communications between
 government and citizens there are varying needs or requirements for both  government and citizens there are varying needs or requirements for both
 parties to identify themselves or authenticate the transaction which include:  parties to identify themselves or authenticate the transaction which include:
 privacy of the identity of the citizen, the transaction and the information  privacy of the identity of the citizen, the transaction and the information
 contained in the communication, the assurance to the citizen of the identity of  contained in the communication, the assurance to the citizen of the identity of
 the government agent or body, the legal requirements that may bind a citizen  the government agent or body, the legal requirements that may bind a citizen
 and government agency to the accuracy or agreement contained in a transaction,  and government agency to the accuracy or agreement contained in a transaction,
 and the reliance on outside parties the tools and implementation of identity  and the reliance on outside parties the tools and implementation of identity
 and authentication.</p>  and authentication.</p>
   
 <p>The main difficulty that must be overcome to advance online identification  <p>A major difficulty that must be overcome to advance online identification
 and authentication is the lack of coherent analogies to the forms and protocols  and authentication is the lack of coherent analogies to the forms and protocols
 that have endured for centuries in which face to face or physical  that have endured for centuries in which face to face or physical
 representations were the main methods of assuring identity and authentication.  representations were the main methods of assuring identity and authentication.
 Complicating the transition is the fear by both the government and the citizen  Another Complicating the transition is the fear by both the government and the
 of losing control of identity which can have more profound and wide ranging  citizen of losing control of identity which can have more profound and wide
 effects than were previously possible. On the other hand, the advantages,  ranging effects than were previously possible. On the other hand, the
 adoption and efficiencies of electronic communication are pushing societies to  advantages, adoption and efficiencies of electronic communication are pushing
 rapidly adapt to this new world.</p>  societies to rapidly adapt to this new world.</p>
   
   <p>The issue of how governments provide assurance of their own identity to the
   citizen is also very different from the physical world. Where postal addresses
   of government buildings are easily verifiable and how civil servants are
   clearly identified by badges, the location of their office and other accepted
   methods, on the Internet those identities are harder to prove and not easily
   transformed from the physical manifestations. And in the age of Internet
   subterfuge and phishing, governments struggle to recreate and synthesize an
   Internet identity.</p>
   
 <h5 id="idauth.what.myth">The Myth versus Reality of Physical Forms of Identity  <h5 id="idauth.what.myth">The Myth versus Reality of Physical Forms of Identity
 and Authentication</h5>  and Authentication</h5>
   
 <p>In creating online analogies to how identity and authentication worked, it  <p>In creating online analogies to how identity and authentication worked, it
 helps to better understand the actual practices of authentication rather than  helps to better understand the actual practices of authentication rather than
 the many myths and assumptions. For example, signatures were not always  the many myths and assumptions. For example, signatures were not always
 analogous to biometric forms of authentication and identity was more assumed  analogous to biometric forms of authentication and identity was more assumed
 than verified with certain exceptions. On the other hand, the physicality of  than verified with certain exceptions. On the other hand, the physicality of
 identity and authentication made mass forgeries and identity theft less  identity and authentication made mass forgeries and identity theft less
 prevalent and less impactful on the persons whose identity was being stolen.  prevalent and less impactful on the persons whose identity was being stolen.
 And in the relative short time of the World Wide Web and mobile phones the  And in the relative short time of the World Wide Web and mobile phones the
 nature and social forms of identity are being created anew in ways that are far  nature and social forms of identity are being created anew in ways that are far
 beyond the understanding and capabilities of the world prior to 1991. And the  beyond the understanding and capabilities of the world prior to 1991. And the
 ability to both verify and falsify the nature of reality creates complications  ability to both verify and falsify the nature of reality creates complications
Line 2704 
Line 2713 
     third party involvement of software, vouching organizations and network      third party involvement of software, vouching organizations and network
     actors.</li>      actors.</li>
 </ul>  </ul>
   
 <p>There are many types of online communication between citizen and government  <p>There are many types of online communication between citizen and government
 that used to depend on a signature placed on a piece of paper in the presence  that used to depend on a signature placed on a piece of paper in the presence
 or not of witnesses. There were many less formal communications in which  or not of witnesses. There were many less formal communications in which
 identity was hidden or not important, because the citizen was only one of many  identity was hidden or not important, because the citizen was only one of many
 people expressing a viewpoint. And in others the physical presence of the  people expressing a viewpoint. And in others the physical presence of the
 citizen was required even if the transaction was anonymous, as in many forms of  citizen was required even if the transaction was anonymous, as in many forms of
 electoral procedures. In transforming those communications from physical to  electoral procedures. In transforming those communications from physical to
 virtual, the purposes behind the need for identity and authentication should be  virtual, the purposes behind the need for identity and authentication should be
 of the highest consideration and the actual physical methods should not, except  of the highest consideration and the actual physical methods should not, except
 where social practices outweigh any of the advantages of technology.</p>  where social practices outweigh any of the advantages of technology.</p>
   
 <p>And, except in accepted in transactions that might have dangerous or  <p>And, except in a small percentage of transactions that might have dangerous
 catastrophic implications at the point of the transaction, the need for  or catastrophic implications at the point of the transaction, authentication
 authentication and identity should be balanced with:</p>  and identity on the public side of a transaction should be enhanced by:</p>
 <ul>  <ul>
   <li>privacy concerns,</li>    <li>providing privacy protection,</li>
   <li>avoiding burdensome requirements or costs,</li>    <li>avoiding burdensome requirements or costs,</li>
   <li>avoiding unnecessary levels of pre-authentication (where the transaction    <li>avoiding unnecessary levels of pre-authentication (where the transaction
     if the first of a series of communications and/or where other off-line      if the first of a series of communications and/or where other off-line
     forms of communications are used for authenticating),</li>      forms of communications are used for authenticating),</li>
   <li>avoiding forcing identity to be divulged when unnecessary or counter to    <li>avoiding forcing identity to be divulged when unnecessary or counter to
     the purpose,</li>      the purpose,</li>
   <li>and avoiding the reliance on outside parties to supply authenticating    <li>and avoiding the reliance on outside parties to supply authenticating
     credentials as the sole means of authentication.</li>      credentials as the sole means of authentication.</li>
 </ul>  </ul>
   
 <p>Personal identity verification is not the only aspect of identity in online  <p>Personal identity verification is not the only aspect of identity in online
 transactions: other characteristics and types of status will be wanted  transactions: other characteristics and types of status will be wanted
 including identification of jurisdiction (either in terms of the location of  including identification of jurisdiction (either in terms of the location of
 the transaction or the residence), the status of residence or citizenship,  the transaction or the residence), the status of residence or citizenship,
 certifications (e.g. medical license), employment status, etc. Also the  certifications (e.g. medical license), employment status, etc. Also the
Line 2752 
Line 2761 
     opportunities and flexibility in transacting business with their      opportunities and flexibility in transacting business with their
   government.</li>    government.</li>
   <li>Saved resources as the cost of transactions can be much less for both the    <li>Saved resources as the cost of transactions can be much less for both the
     citizen and governments.</li>      citizen and governments.</li>
   <li>Enhanced security for transactions when properly implemented.</li>    <li>Enhanced security for transactions when properly implemented.</li>
   <li>Enhanced privacy for citizens when properly implemented.</li>    <li>Enhanced privacy for citizens when properly implemented.</li>
 </ul>  </ul>
   
 <p>Potential Drawbacks:</p>  <p>Potential Drawbacks:</p>
 <ul>  <ul>
   <li>Cheaper and more likely for bad actors to try and interfere with    <li>Cheaper and more likely for bad actors to try and interfere with
     transactions. Phishing attempts flourish as the value of transactions      transactions. Phishing attempts flourish as the value of transactions
     increase.</li>      increase.</li>
   <li>Decreased privacy if poorly implemented.</li>    <li>Decreased privacy if poorly implemented.</li>
   <li>Increased liability for citizens depending on how laws are written    <li>Increased liability for citizens depending on how laws are written
     concerning online transactions.</li>      concerning online transactions, especially as there are third parties
       involved in software or identity/authentication management that are made
       necessary for transactions.</li>
 </ul>  </ul>
   
 <p>Identity and authentication allow for many types of online activities and  <p>Identity and authentication allow for many types of online activities and
 transactions. Identity is often used for gating and/or authorization, as in  transactions. Identity is often used for gating and/or authorization, as in
 only certain identified persons can have access to specific information or  only certain identified persons can have access to specific information or
 software. Identity is also used as a social control method, for example to  software. Identity is also used as a social control method, for example to
 avoid anonymity where the anonymity might lead to inappropriate dialogue.  avoid anonymity where the anonymity might lead to inappropriate dialogue.
 Authentication is a primary means to ascertain the validity of a transaction  Authentication is a primary means to ascertain the validity of a transaction
 and the identity of the parties to the transaction, as in a legal document that  and the identity of the parties to the transaction, as in a legal document that
 must be authenticated in case of a court case. And significantly, tracking the  must be authenticated in case of a court case. And significantly, tracking the
 identity of the sender or recipient of electronic disbursement of money for  identity of the sender or recipient of electronic disbursement of money for
 auditing purposes.</p>  auditing purposes.</p>
   
   <p>The question of the role of third parties in the establishment of identity
   for governments and citizens is a potential hazard. Governments now use third
   parties to prove identity and authentication (the <abbr
   title="Government Printing Office">GPO</abbr> of the US Government uses at the
   time of writing a commercial firm to both provide identity and authentication
   for some of its posted documents). Also, if individuals are pushed to use
   software and identity provided by non-governmental entities, without guaranteed
   protection for the individual against failure of the software or identity,
   systems may lose the trust of the citizens.</p>
   
 <h4 id="idauth.how">How Can the Use of Identification and Authentication  <h4 id="idauth.how">How Can the Use of Identification and Authentication
 Technology be Achieved?</h4>  Technology be Achieved?</h4>
   
 <h5 id="idauth.how.legal">Legal Dependencies</h5>  <h5 id="idauth.how.legal">Legal Dependencies</h5>
   
 <p>Governments may need to pass legislation that allows or provides the legal  <p>Governments may need to pass legislation that allows or provides the legal
 permission for authentication. In the United States, the Government Paperwork  permission for authentication. In the United States, the Government Paperwork
 Elimination Act was enacted to provide the positive law to allow transactions  Elimination Act was enacted to provide the positive law to allow transactions
 that previously only been allowed with paper and pen, especially when  that previously only been allowed with paper and pen, especially when
 identification and authentication were necessary for the transaction. Other  identification and authentication were necessary for the transaction. Other
 government entities have created laws to allow for electronic  government entities have created laws to allow for electronic
 authentication.</p>  authentication.</p>
   
 <h5 id="idauth.how.tech">Technological Methods for Identification and  <h5 id="idauth.how.tech">Technological Methods for Identification and
 Authentication</h5>  Authentication</h5>


Legend:
Removed from v.1.88  
changed lines
  Added in v.1.90