Kids, National Security, Sex, Learning, Privacy, Disabilities & Laws
Copyright 123RF

Kids, National Security, Sex, Learning, Privacy, Disabilities & Laws

Updated May 18, 2024

4 years ago, I wrote this article about kids and digital identities. Since then LOTS has changed, including a significant threat to national security and kids. I thought it warranted a new article addressing this. So, if I've caught your interest, read on...

Let's Start With National Security

Skim this one pager, “National Security – Reduce Risk By Instantly Determining Entity Friend From Foe”. As malicious AI bots rapidly get smarter, they can conduct fraud like this "Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’".

As millions and then billions of these types of bots enter your jurisdictions, then increasing amounts of havoc will occur, directly affecting citizens, companies, enterprises and different levels of government. Skim this old Homeland Security paper to learn more.

Bottom line? Without an ability to instantly determine friend from foe, we're screwed.

It Will Affect Your Kids Too

Skim "Deepfake explicit imagery is creating risks for children and challenges for law enforcers". My point? As the Evil Inc.'s are able to generate millions or more malicious bots, they'll target all types of citizens, including your kids. They'll likely demand an instant payment to remove the sexual deep-fake of your child.

Sex & Kids

Skim “Kids, Sex, Metaverses & Privacy” It describes the rapidly changing world of sex and kids. My point? As tech emerges at lower and lower price points, it allows people, including kids, to leverage it for sexual experiences. It requires a new legal identity framework protecting citizens and kids as they engage with the tech.

Kids & Learning

Six decades ago, when I was in my first year of school, I was diagnosed as being dyslexic. My parents hired a private teacher to work with me. Luckily, I quickly learnt to scan from left to right. However, this experience in a way seared my soul. I watched how my fellow K-12 and university classmates learnt or didn't learn, with those who didn't learn often falling off the education conveyor belt based on time. I wanted to change this.

8 years ago, I began to work on this. I could see in my mind:

  • Leveraging physical bots to do learning assessments when the learner is a toddler
  • Taking the data and creating a DLT (Digital Learning Twin) for each learner on the planet
  • Which in turn generates an IEP (Individualized Education Plan) for each learner
  • Which is constantly updated by learning assistant bots, teaching assistant bots and rethought human learning specialists
  • Who leverage AI, AR (Augmented Reality), VR (Virtual Reality)
  • And also leverage different workplace learning environments
  • With all the learner's data stored in their LDV (Learner Data Vault) database which every learner manages
  • I also wanted to leave no learner behind on the planet regardless of their learning abilities or where they live on the planet

Fast forward to today. If you skim “Sir Ken Robinson - You Nailed It!” and “Vision: Learning Journey of Two Young Kids in a Remote Village” you can see the vision. To do a deeper dive skim “Learning Vision Flyover”.

AI Agents & Kids

As these explode around the planet, kids will be using them. Skim AI Agents & Kids". To get an idea of what's coming your way re AI agents skim these articles:

Privacy

All the above tech rapidly creates what I call a very non-private world. I realized all the architectures I was going to create MUST be built from the bottom up leveraging a privacy by design framework. It begins with the legal identity architecture. I created for each person, from cradle to grave:

  • SOLICT (Source of Legal Identity & Credential Truth) database each of us controls. It's fed our government issued legal identity data, including our biometrics (and in the not so distant future our neurodata), which we manage
  • LSSI (Legal Self-Sovereign Identity) Devices including smart cards, digital application, physical bracelet biometrically tied to the person and chips inserted into a person. These are all fed by our SOLICT
  • PIAM (Personal Identity Access Management) AI Leveraged Service. This allows us, if we so choose, to automatically refuse of grant release of portions of our legal identity, credentials and learning data

Kids Privacy

Kids are legal minors. Thus, I knew years ago, any new architecture MUST allow for instant abilities to:

  • Prove legal identity relationships e.g. parent/child
  • Allow for a person having legal control of another, to instantly refuse or grant access to portions of their legal identity, credential and learning data

To see an example of how the architecture does this, skim to page 35 of this doc, where you'll see a picture illustrating Jane Doe, her son John Doe, his learning assistant bot "Assist Bot", and a schools LMS (Learning Management System).

To see questions regarding privacy on what's soon going to be walking in the doors of classrooms around the planet skim “The Coming Classroom Revolution – Privacy & Internet of Things In A Classroom”.

To see compliance services your enterprise can use re kids look at Privo.

To do a deeper dive into AI Agents and authorization rights skim “AI Agent Authorization - Identity, Graphs & Architecture”.

Kids Who Are Disabled

As this tech change curve unfolds, it means disabled kids will increasingly be able to access tech at lower price points, allowing them to understand, communicate, learn and work. It's also why I've built in co-design into almost all parts of the architecture to ensure the legal identity, credential and learning architecture works for all people regardless of their abilities or disabilities.

My premise? Disabled people are perfectly positioned to lead the design, deployment and maintenance of the new legal identity, credential and learning architectures. Skim “Why Disabled People Will Lead The Planet Rethinking Legal Identity, AI/Bots, Credentials & Learning" and “National Security, Co-Design & People With Disabilities".

All This Is Good But It's Not Going To Work On It's Own. Why? Laws & Enforcement

As the Evil inc.s increasingly launch successful attacks against companies, enterprises, different levels of government, ourselves and our kids, we'll knee-jerk to this demanding new laws to protect us. I can safely say this mostly won't work well. Why?

Skim this old 2019 World Economic Forum article, "Fighting cybercrime – what happens to the law when the law cannot be enforced?". It describes the current pathetic, paltry success rate of prosecuting cybercrime of 0.05%!!!!!! Why is this? The Evil Inc.s operate out of jurisdictions where they can't be successfully prosecuted.

I don't have a magic wand to wave addressing this. Frankly, it means don't look to your local or national government for comfort, until they give you new tool-kits to defend you and your kids which the architectures deliver.

To see how Jane Doe, using the new legal identity toolkit, detects and defends herself against a malicious deep fake video skim to the section titled "Jane Defends Herself Against a Malicious Deep Fake Video" in “An Identity Day in the Life of Jane Doe”.

We're Entering A Major Paradigm Shift

Where our old ways won't work well anymore. Thus, it requires out of the box thinking for our out of the box times. It applies to our kids as well. That's what the architecture addresses and delivers.

PS To See My Message To Government & Industry Leaders

About Guy Huntington

I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.

I've also done a lot in education as a volunteer over my lifetime. This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.

I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.

I've written LOTS about the change coming. Skim the over 100 LinkedIn articles I've written, or my webpage with lots of papers.

Quotes I REALLY LIKE!!!!!!:

  • We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
  • “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
  • “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy

Reference Links:

An Identity Day in The Life:

My Message To Government & Industry Leaders:

National Security:

Rethinking Legal Identity, Credentials & Learning:

Learning Vision:

Creativity:

AI Agents:

Architecture:

AI/Human Legal Identity/Learning Cost References

AI Leveraged, Smart Digital Identities of Humans:

CISO's:

Companies, C-Suites and Boards:

Legal Identity & TODA:

Enterprise Articles:

Rethinking Enterprise Architecture In The Age of AI:

LLC's & AI:

Challenges With AI:

New Security Model:

DAO:

Kids:

Sex:

Schools:

Biometrics:

Legal Identity:

Identity, Death, Laws & Processes:

Open Source:

Notaries:

Climate Change, Migration & Legal Identity:

"Human Migration, Physical and Digital Legal Identity - A Thought Paper

Fraud/Crime:

Behavioral Marketing:

AI Systems and Bots:

Contract Law:

Insurance:

Health:

AI/AR/VR Metaverse Type Environments:

SOLICT:

EMP/HEMP Data Centre Protection:

Climate:

A 100,000-Foot Level Summary Of Legal Human Identity

  • Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
  • The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth). The person now controls this
  • As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs. So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child. The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
  • The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
  • The person is now able, with their consent, to release legal identity information about themselves. This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc. It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
  • NOTE: All consents granted by the person are stored in their SOLICT
  • Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system. This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
  • It works both locally and globally, physically and digitally anywhere on the planet
  • AI systems/bots are also registered, where risk requires it, in the new age CRVS system
  • Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.

A 100,000-Foot Level Summary Of The Learning Vision:

  • When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities. This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
  • All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth
  • This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
  • The DLT the produces its first IEP “Individualized Education Plan”, for the learner
  • The parents take home with them a learning assistant bot to assist the learner, each day, in learning. The bot updates the DLT, which in turn continually refines the learner’s IEP
  • All learning data from the learner is stored in their LDV “Learner Data Vault”
  • When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
  • With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
  • As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
  • The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
  • From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
  • All learner data collected in the school, is stored in the learner’s LDV
  • If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc. 
  • These specify how the learner will be identified, learning data use, storage, deletion, etc.
  • When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
  • The SOLICT in turn pushes these out to the learner’s LSSI devices
  • The learner is now in control of their learning credentials
  • When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc. This significantly reduces time and costs to train or help the learner learn
  • The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
  • IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT

 




To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics