_______________________________________________Listers,On NIIMS, I believe the intentions are noble but the solution chosen hints at limited cybersecurity awareness in our national security / defense sector - which is a bit worrying.I don't know if the teams involved considered the risks of concentrating that kind of *internationally valuable* data... In our current world, NIIMS will (guaranteed) attract and literally *invite* a deluge of the most sophisticated cyber-attacks from all sorts of places (including: untraceable state sponsored actors, international criminal networks, local corruption networks teaming up with international criminals etc)...The reasoning behind this is the fact that the amount of resources expended towards cyber-crime are directly proportional to the perceived value of the anticipated payoff.Hmm.. Just how valuable is an entire country's biometric ID and GPS linked database? What are the implications for the country if that kind of data falls into the wrong hands (or if the systems are infiltrated by some kind of ransom-ware with the help of insider collusion)?Can NIIMS be protected?No chance. State sponsored intrusion uses low-level attack vectors (e.g. chip-level trojans / backdoors or DBEngine / OS / Driver level backdoors etc introduced at OEM level (sometimes without the OEM company itself being aware); such risks cannot be defended against unless you make - i.e. design and build, not just assemble - your own critical ICT components and have full control of your supply chain.At his time, Kenya does not have, but can develop if it wishes - the indigenous technical capacity, to protect and defend such a super-high-value database.Can the protection be outsourced (e.g. to friendly countries)?Yes, but at what cost? By doing so, Kenya (and any African country that adopts such tech without first developing indigenous capabilities) will technically be relinquishing whatever *national sovereignty* it currently has. This is because the government will have to place 100% reliance and faith on the *benevolent intentions* and *altruistic protection* of a technologically advanced supplier partner state (typically the hardware and OS manufacturer's originating country)... and that is not a problem that can be solved by component diversification (because then its a free for all), we will have little choice but to choose a coloniser to help us "protect" our national data (I think there are only three credible options: US, China or Russia). Looks like a tricky and unwise position for a non-aligned country/region to place itself in. Do we really want to checkmate ourselves geo-politically?I urge our government to consider setting up Holistic Analysis Units in each Ministry (and even at county levels) to examine policies / proposals / ideas across multiple subject domains and identify non-obvious factors such as the risks of unintended consequences (to facilitate more robust decisions and outcomes). Good intentions do not always yield the intended positive outcomes; they can make the problem worse.Will criminals and terrorists sign up to NIIMS? Can the government prevent insider corruption networks from selling or corrupting the data for a fee? Instead of solving identity problems NIIMS could lead to the creation of very complex and sophisticated identity crimes. In fact the original problems might never get solved (yet we will have introduced new problems and costly challenges).Perhaps, at some point in future, an idea like NIIMS could make sense. Right now, I don't think it does.Good day,Patrick.On Thursday, February 14, 2019, 8:46:39 AM GMT+3, Grace Bomu via kictanet <kictanet@lists.kictanet.or.ke> wrote:Listers,Came across this presentation on NIIMS. It seems that the implementation does not envisage privacy. It is all from a traditional security and technology as a solution perspective.Of course there are many other questions such as how this will be integrated with existing and recently collected biometric data such as the voter register, passport and immigration data.Security should also include protection of our society's long term goals. We should have started with the data protection law. And even then, collection of DNA is a really big deal. Should we not discuss how it shall be done, by whom, for what purpose etc before ?RegardsIl giorno mer 13 feb 2019 alle ore 19:11 Eshuchi Richard via kictanet <kictanet@lists.kictanet.or.ke> ha scritto:Misinformation galore.To each his/her own though.On Wed, 13 Feb 2019 at 15:11, Alice Munyua via kictanet <kictanet@lists.kictanet.or.ke> wrote:
https://blog.mozilla.org/netpolicy/2019/02/08/kenya-government-mandates-dna-linked-national-id-without-data-protection-law/
Last month, the Kenya Parliament passed a seriously concerning amendment
to the country’s national ID law, making Kenya home to the most
privacy-invasive national ID system in the world. The rebranded, National
Integrated Identity Management System (NIIMS) now requires all Kenyans,
immigrants, and refugees to turn over their DNA, GPS coordinates of their
residential address, retina scans, iris pattern, voice waves, and earlobe
geometry before being issued critical identification documents. NIIMS will
consolidate information contained in other government agency databases and
generate a unique identification number known as Huduma Namba.
It is hard to see how this system comports with the right to privacy
articulated in Article 31 of the Kenyan Constitution. It is deeply
troubling that these amendments passed without public debate, and were
approved even as a data protection bill which would designate DNA and
biometrics as sensitive data is pending.
Before these amendments, in order to issue the National ID Card (ID), the
government only required name, date and place of birth, place of
residence, and postal address. The ID card is a critical document that
impacts everyday life, without it, an individual cannot vote, purchase
property, access higher education, obtain employment, access credit, or
public health, among other fundamental rights.
Mozilla strongly believes that that no digital ID system should be
implemented without strong privacy and data protection legislation. The
proposed Data Protection Bill of 2018 which Parliament is likely to
consider next month, is a strong and thorough framework that contains
provisions relating to data minimization as well as collection and purpose
limitation. If NIIMS is implemented, it will be in conflict with these
provisions, and more importantly in conflict with Article 31 of the
Constitution, which specifically protects the right to privacy.
Proponents of NIIMS claim that the system provides a number of benefits,
such as accurate delivery of government services. These arguments also
seem to conflate legal and digital identity. Legal ID used to certify
one’s identity through basic data about one’s personhood (such as your
name and the date and place of your birth) is a commendable goal. It is
one of the United Nations Sustainable Development Goals 16.9 that aims “to
provide legal identity for all, including birth registration by 2030”.
However, it is important to remember this objective can be met in several
ways. “Digital ID” systems, and especially those that involve sensitive
biometrics or DNA, are not a necessary means of verifying identity, and in
practice raise significant privacy and security concerns. The choice of
whether to opt for a digital ID let alone a biometric ID therefore should
be closely scrutinized by governments in light of these risks, rather than
uncritically accepted as beneficial.
Security Concerns: The centralized nature of NIIMS creates massive
security vulnerabilities. It could become a honeypot for malicious
actors and identity thieves who can exploit other identifying
information linked to stolen biometric data. The amendment is unclear
on how the government will establish and institute strong security
measures required for the protection of such a sensitive database. If
there’s a breach, it’s not as if your DNA or retina can be reset like
a password or token.
Surveillance Concerns: By centralizing a tremendous amount of
sensitive data in a government database, NIIMS creates an opportunity
for mass surveillance by the State. Not only is the collection of
biometrics incredibly invasive, but gathering this data combined with
transaction logs of where ID is used could substantially reduce
anonymity. This is all the more worrying considering Kenya’s history
of extralegal surveillance and intelligence sharing.
Ethnic Discrimination Concerns: The collection of DNA is particularly
concerning as this information can be used to identify an individual’s
ethnic identity. Given Kenya’s history of politicization of ethnic
identity, collecting this data in a centralized database like NIIMS
could reproduce and exacerbate patterns of discrimination.
The process was not constitutional
Kenya’s constitution requires public input before any new law can be
adopted. No public discussions were conducted for this amendment. It was
offered for parliamentary debate under “Miscellaneous” amendments, which
exempted it from procedures and scrutiny that would have required
introduction as a substantive bill and corresponding public debate. The
Kenyan government must not implement this system without sufficient public
debate and meaningful engagement to determine how such a system should be
implemented if at all.
The proposed law does not provide people with the opportunity to opt in or
out of giving their sensitive and precise data. The Constitution requires
that all Kenyans be granted identification. However, if an individual were
to refuse to turn over their DNA or other sensitive information to the
State, as they should have the right to do, they could risk not being
issued their identity or citizenship documents. Such a denial would
contravene Articles 12, 13, and 14 of the Constitution.
Opting out of this system should not be used to discriminate or exclude
any individual from accessing essential public services and exercising
their fundamental rights.
Individuals must be in full control of their digital identities with the
right to object to processing and use and withdraw consent. These aspects
of control and choice are essential to empowering individuals in the
deployment of their digital identities. Therefore policy and technical
decisions must take into account systems that allow individuals to
identify themselves rather than the system identifying them.
Mozilla urges the government of Kenya to suspend the implementation of
NIIMS and we hope Kenyan members of parliament will act swiftly to pass
the Data Protection Bill of 2018.
_______________________________________________
kictanet mailing list
kictanet@lists.kictanet.or.ke
https://lists.kictanet.or.ke/mailman/listinfo/kictanet
Twitter: http://twitter.com/kictanet
Facebook: https://www.facebook.com/KICTANet/
Unsubscribe or change your options at https://lists.kictanet.or.ke/mailman/options/kictanet/eshuchi.richard%40gmail.com
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.
--_______________________________________________Regards,Eshuchi Richard
kictanet mailing list
kictanet@lists.kictanet.or.ke
https://lists.kictanet.or.ke/mailman/listinfo/kictanet
Twitter: http://twitter.com/kictanet
Facebook: https://www.facebook.com/KICTANet/
Unsubscribe or change your options at https://lists.kictanet.or.ke/mailman/options/kictanet/nmutungu%40gmail.com
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.
--Grace Mutung'u
Skype: gracebomu
@Bomu
PGP ID : 0x33A3450F_______________________________________________
kictanet mailing list
kictanet@lists.kictanet.or.ke
https://lists.kictanet.or.ke/mailman/listinfo/kictanet
Twitter: http://twitter.com/kictanet
Facebook: https://www.facebook.com/KICTANet/
Unsubscribe or change your options at https://lists.kictanet.or.ke/mailman/options/kictanet/pmaina2000%40yahoo.com
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.
kictanet mailing list
kictanet@lists.kictanet.or.ke
https://lists.kictanet.or.ke/mailman/listinfo/kictanet
Twitter: http://twitter.com/kictanet
Facebook: https://www.facebook.com/KICTANet/
Unsubscribe or change your options at https://lists.kictanet.or.ke/mailman/options/kictanet/vkapiyo%40gmail.com
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.