Professional Documents
Culture Documents
1 July-August 2009
Since a year ago, a few new people have joined In closing, here's a haiku I wrote shortly after I
the core of the chapter. I particularly welcome was elected Chair of your chapter:
the new officers: Sean Stickle, who succeeds
me as Secretary, and Mackenzie Morgan, who My mission as chair:
succeeds Rebecca Prather as Member at Large. Increase participation
Even with their involvement, the major In running the group.
committees continue to draw upon the same
core group of people.
DC ACM Officers
I would like to see more people join the major July 2009 – June 2010
committees and help with the chapter's internal
growth. CHAIR Benjamin Schultz
1
UPCOMING EVENT Historical Committee Meetings
DC ACM Happy Hour Efforts are still underway to sort the vast quantities of
Tuesday, July 7th, 5-7pm paper records and other DC ACM property that has
been collected from various former members. It’s not
Fado Irish Pub too late to join the committee. All helping hands are
808 7th Street NW (near the welcome and you might find something interesting in
intersection of H & 7th) the piles of paper! Please see below for information
Metro: Gallery Place/Chinatown on the times and locations of the upcoming meetings.
(red, yellow, and green lines) Contact Isaac Christoffersen (historical@dcacm.org) if
you have any questions or would like to let him know
As you may be aware, lectures and business that you plan to attend.
meetings over the past year have (mostly) been
followed by drinks and socializing at various locations. Date: Saturday, July 18, 2009
This summer, we're skipping straight to the booze and
Time: 1:00 PM to 5:00 PM
camaraderie, and encourage all of our chapter
Location: City of Fairfax Regional Library
members to come out and meet each other in a
relaxed and informal atmosphere. Non-members can Meeting Room A
also attend. Feel free to bring a friend!
Date: Saturday, July 25, 2009
Space will be set aside for our group so please come Time: 1:00 PM to 5:00 PM
in and look for the "DC ACM" signs. Location: Oakton Library
Meeting Room 1
NOTE: Alas, you'll have to pay for your own drinks
and food.
Professional Development Committee
Balance Sheet as of July 7, 2009 New volunteers are always welcome. If you want to
Checking Account $6,354.00 join the PD Committee, now is the perfect time –
Money Market (Savings) $4,664.22 learn how the sausage making machine works! The
Certificates of Deposit $10,273.70 PDC will decide what subjects to offer, make
arrangements with instructors, publicize the seminars,
$10,332.90
assist with the registration process, and handle the
$20,661.32 logistics of the seminars.
Other Assets $688.99
Total Liabilities $0 Next PDC meeting:
NET WORTH $52,975.13 Tuesday, July 21, 2009
7 p.m.
Seeking an Auditor to Review FY08-09
Records Location: George Washington University
School of Engineering and Applied Science Computing
Facility
The DC ACM Bylaws require that the financial records
Tompkins Hall 1st floor Conference Room
be reviewed annually to check for errors or other
725 23rd St. NW (Between G & H Streets),
irregularities. The auditor should be someone who
Washington, DC
was not on the Executive Council that year, If you are
interested in performing this task, please contact
Nearest Metro: The building is 1½ blocks south of
Teresa Hone at treasurer@dcacm.org.
the Foggy Bottom-GWU metro (orange and blue
lines). Street parking and GWU garage parking is also
available.
Membership
If you have any questions, please feel free to contact
As of June 20, 2009, the DC ACM had 139 registered PDC Chair Eric Noriega at pd@dcacm.org.
members. This total number includes 72 Members
and 67 Associate Members.
2
PAST EVENTS
"Lifegraphs for Mobile Mirror Worlds: Linking Supply, Value, and Customer Chains"
June 10, 2009
At right:
Kim Wallace,
DC-SIGGRAPH Chair
Below:
• If you are already on Facebook, please take a moment to add yourself to the new DC ACM group.
As we experiment with these "new" forms of communication please don't hesitate to send any feedback or
suggestions for improvement to Sean Stickle (secretary@dcacm.org) or Cora Dickson (communications@dcacm.org).
3
OPINION date, 40-60% of federal employees have not received
their new identification cards as required by HSPD-12.
Who Goes There?
Identification Technology at the Center of it All
Current technology relies on three “factors” of access
By Ryan Dellolio, ryan@gwu.edu
control: something you know (password, date of
birth, SSN), something you have (passport, key) or
In her contribution to the 9/11 commission report,
something you are (biometrics/fingerprint, iris). No
Janis Kephardt addressed an ailing nation and a
single policy or combination of factors can be applied
changed world: “Sources of identification are the last
to all people at all times. A centralized framework –
opportunity to ensure that people are who they say
a U.S. “Identification System Security Policy” – should
they are and to check whether they are terrorists.
take on the following properties:
For terrorists, travel documents are as important as
weapons.” Deficiencies in U.S. identity management
1. Privacy must be addressed, and data must be
create security vulnerabilities that potentially affect
properly controlled in all data flows from data
livelihood, information and productivity. The time has
collection, all the way to data warehousing.
come for a centralized information technology schema
2. The framework must be flexible enough to
for both intra-national and extra-national affairs that
withstand new technologies and new vulnerabilities.
is verifiably secure and technically sound.
It has been demonstrated that information on RFID
enabled passports can be gathered covertly and
Today’s decentralized, inconsistent and delayed
inexpensively – any framework must take this
adoption of stringent identification technology
changing nature of information systems security
standards by a patchwork of government agencies
into account.
and federal directives poses a security threat to the
3. Any attempt at a centralized framework must be
United States.
rooted in domestic needs, with an international
reach. International understanding and
Identification technology is directly aligned with U.S.
cooperation will ensure interoperability and the
national security goals and leverages critical U.S.
overall mitigation of risk.
defenses as the first line of protection against
4. The risk of falsely identifying someone changes
domestic and international threats. Access control
with the sensitivity of the resource he or she is
and positive identity verification at border crossings,
trying to access, and as well a person’s individual
government buildings and government information
threat level is equally dynamic. The identification
technology gateways form the backbone of domestic
requirements in any given situation must also
and intra-national fortification, and for good reason.
dynamic: and they must be hierarchal and role
Without effective methods of authenticating civilians
based, following a full scale cooperative inter-
and government personnel – regardless of citizenship
agency identification risk analysis to achieve this
– the U.S. is at risk of sabotage and espionage, and
goal, something that has not been done to date.
thus responsibility for fail-safe implementation falls
jointly under Department of Defense, the State
The science and technology that is used to positively
Department, the Department of Commerce, the White
identify individuals through cards, chips, fingerprints,
House, and Congress.
irises and facial recognizance is approached with
caution by laymen and industry experts who point out
Unfortunately, current United States policy regarding
problems with such biological means of identification.
identification technology has been inconsistent in
But is the identification of a person through
application and scope. The Western Hemisphere
biometrics a “biologically invasive” unjust mishandling
Travel Initiative, a State Department initiative, strives
of privacy and power? With the right security policies
to increase the efficiency, ease and security at border
and the aforementioned considerations, it doesn’t
crossings between the U.S., Canada, Mexico and the
have to be. Access control is the sine qua non of any
Caribbean. Identification procedures sometimes
successful enterprise of the twenty-first century, and
require fingerprints, sometimes require iris scans, and
the United States is no exception.
sometimes require neither a biometric nor even a
secure (i.e. “RFID Enabled”) document. The REAL ID
The Obama Administration and lawmakers in
Act of 2005 partially standardizes the PIV process for
Congress should consider the opportunity for
driver licenses. Biometric data collection in that
identification reform as a sobering and realistic policy
program is not mandatory; controversy, on the other
option in light of the careless, insecure policies that
hand, seems to be.
exist as remnants of administrations passed – less
objective and surely less connected. Identity
Not to be forgotten is the GSA’s US ACCESS
verification should no longer be a security bottleneck
identification initiative – the enforcement and
in the United States; the ever-present hazards to U.S.
implementing arm of President Bush’s Homeland
national security certify the impetus for proper
Security Presidential Directive 12 – a well meaning
legislation and timely, ubiquitous policy. There’s
but ill-devised plan to establish a “common identity
more to answering the question: Who goes there?
management infrastructure.” Those mandatory
than meets the eye.
regulations were signed on August 24, 2004, and, to
4
DC ACM CALENDAR AT A GLANCE
July 7 Happy Hour
July 18 & 25 Historical Committee Meetings
July 21 Professional Development Committee Meeting
July 27 & Aug 24 Executive Council Meetings (open to all members)