[kictanet] [NIIMS infosec / holistic risks] Kenya Government mandates DNA-linked national ID, without data protection law
Victor Kapiyo
vkapiyo at gmail.com
Fri Feb 15 07:06:44 EAT 2019
Well, the restricted Tender has already been awarded to OT Morpho. With a
weak policy and legal framework for Cybersecurity and privacy, it's
unfortunate that the project is proceeding at full steam ahead.
In other news, it's not surprising that the cost has shot up from the
initial 3 billion to 6 billion. God save Kenya.
https://www.businessdailyafrica.com/economy/IEBC-contractor-gets-Sh6bn-deal-for-fresh-ID-registration/3946234-4961086-1t8nykz/index.html
https://www.google.com/amp/s/www.businessdailyafrica.com/economy/Biometric-IDs-listing-set-for-this-year-after-secret-tender/3946234-4694828-view-asAMP-9aeu0q/index.html
On Thu, 14 Feb 2019, 17:46 Patrick A. M. Maina via kictanet, <
kictanet at lists.kictanet.or.ke> wrote:
> Listers,
>
> On NIIMS, I believe the intentions are noble but the solution chosen hints
> at limited *cybersecurity awareness* in our national security / defense
> sector - which is a bit worrying.
>
> I don't know if the teams involved considered the risks of concentrating
> that kind of *internationally valuable* data... In our current world, NIIMS
> will (guaranteed) *attract *and literally **invite** a deluge of *the
> most sophisticated cyber-attacks* from all sorts of places (including:
> untraceable state sponsored actors, international criminal networks, local
> corruption networks teaming up with international criminals etc)...
>
> The reasoning behind this is the fact that the amount of *resources *expended
> towards cyber-crime are *directly proportional* to the perceived *value
> of the anticipated payoff*.
>
> Hmm.. Just how valuable is an entire country's biometric ID and GPS linked
> database? What are the implications for the country if that kind of data
> falls into the wrong hands (or if the systems are infiltrated by some kind
> of ransom-ware with the help of insider collusion)?
>
>
> *Can NIIMS be protected? *
>
> No chance. *State sponsored intrusion* uses low-level attack vectors
> (e.g. *chip-level trojans* / *backdoors *or *DBEngine */ *OS / Driver
> level* backdoors etc introduced at* OEM level* (sometimes without the OEM
> company itself being aware); such risks cannot be defended against unless
> you make - i.e. design and build, not just assemble - your own critical ICT
> components and have full control of your supply chain.
>
> At his time, Kenya does not have, but can develop if it wishes - the *indigenous
> technical capacity,* to protect and defend such a *super-high-value
> database.*
>
>
> *Can the protection be outsourced (e.g. to friendly countries)? *
>
> Yes, but *at what cost**?* By doing so, Kenya (and any African country
> that adopts such tech without first developing indigenous capabilities)
> will technically be relinquishing whatever **national sovereignty** it
> currently has. This is because the government will have to place *100%
> reliance* and *faith *on the *benevolent intentions* and *altruistic
> protection* of a technologically advanced *supplier partner state*
> (typically the hardware and OS manufacturer's originating country)... and
> that is not a problem that can be solved by component diversification
> (because then its a free for all), we will have little choice but to *choose
> a coloniser* to help us "protect" our national data (I think there are
> only three credible options: US, China or Russia). Looks like a tricky and
> unwise position for a non-aligned country/region to place itself in. Do we
> really want to checkmate ourselves geo-politically?
>
> I urge our government to consider setting up *Holistic Analysis Units* in
> each Ministry (and even at county levels) to examine policies / proposals
> / ideas across *multiple subject domains* and identify *non-obvious
> factors *such as the risks of *unintended consequences* (to facilitate
> more robust decisions and outcomes). Good intentions do not always yield
> the intended positive outcomes; they can make the problem worse.
>
> Will criminals and terrorists sign up to NIIMS? Can the government prevent
> insider corruption networks from selling or corrupting the data for a fee?
> Instead of solving identity problems NIIMS could lead to the creation of
> very complex and sophisticated identity crimes. In fact the original
> problems might never get solved (yet we will have introduced new problems
> and costly challenges).
>
> Perhaps, at some point in future, an idea like NIIMS could make sense.
> Right now, I don't think it does.
>
> Good day,
> Patrick.
>
>
>
>
> On Thursday, February 14, 2019, 8:46:39 AM GMT+3, Grace Bomu via kictanet <
> kictanet at lists.kictanet.or.ke> wrote:
>
>
> Listers,
> Came across this presentation on NIIMS. It seems that the implementation
> does not envisage privacy. It is all from a traditional security and
> technology as a solution perspective.
>
> Of course there are many other questions such as how this will be
> integrated with existing and recently collected biometric data such as the
> voter register, passport and immigration data.
>
> Security should also include protection of our society's long term goals.
> We should have started with the data protection law. And even then,
> collection of DNA is a really big deal. Should we not discuss how it shall
> be done, by whom, for what purpose etc before ?
>
>
> Regards
>
>
> Il giorno mer 13 feb 2019 alle ore 19:11 Eshuchi Richard via kictanet <
> kictanet at lists.kictanet.or.ke> ha scritto:
>
> Misinformation galore.
>
> To each his/her own though.
>
> On Wed, 13 Feb 2019 at 15:11, Alice Munyua via kictanet <
> kictanet at lists.kictanet.or.ke> wrote:
>
>
>
>
> https://blog.mozilla.org/netpolicy/2019/02/08/kenya-government-mandates-dna-linked-national-id-without-data-protection-law/
>
>
> Last month, the Kenya Parliament passed a seriously concerning amendment
> to the country’s national ID law, making Kenya home to the most
> privacy-invasive national ID system in the world. The rebranded, National
> Integrated Identity Management System (NIIMS) now requires all Kenyans,
> immigrants, and refugees to turn over their DNA, GPS coordinates of their
> residential address, retina scans, iris pattern, voice waves, and earlobe
> geometry before being issued critical identification documents. NIIMS will
> consolidate information contained in other government agency databases and
> generate a unique identification number known as Huduma Namba.
>
> It is hard to see how this system comports with the right to privacy
> articulated in Article 31 of the Kenyan Constitution. It is deeply
> troubling that these amendments passed without public debate, and were
> approved even as a data protection bill which would designate DNA and
> biometrics as sensitive data is pending.
>
> Before these amendments, in order to issue the National ID Card (ID), the
> government only required name, date and place of birth, place of
> residence, and postal address. The ID card is a critical document that
> impacts everyday life, without it, an individual cannot vote, purchase
> property, access higher education, obtain employment, access credit, or
> public health, among other fundamental rights.
>
> Mozilla strongly believes that that no digital ID system should be
> implemented without strong privacy and data protection legislation. The
> proposed Data Protection Bill of 2018 which Parliament is likely to
> consider next month, is a strong and thorough framework that contains
> provisions relating to data minimization as well as collection and purpose
> limitation. If NIIMS is implemented, it will be in conflict with these
> provisions, and more importantly in conflict with Article 31 of the
> Constitution, which specifically protects the right to privacy.
>
> Proponents of NIIMS claim that the system provides a number of benefits,
> such as accurate delivery of government services. These arguments also
> seem to conflate legal and digital identity. Legal ID used to certify
> one’s identity through basic data about one’s personhood (such as your
> name and the date and place of your birth) is a commendable goal. It is
> one of the United Nations Sustainable Development Goals 16.9 that aims “to
> provide legal identity for all, including birth registration by 2030”.
> However, it is important to remember this objective can be met in several
> ways. “Digital ID” systems, and especially those that involve sensitive
> biometrics or DNA, are not a necessary means of verifying identity, and in
> practice raise significant privacy and security concerns. The choice of
> whether to opt for a digital ID let alone a biometric ID therefore should
> be closely scrutinized by governments in light of these risks, rather than
> uncritically accepted as beneficial.
>
> Security Concerns: The centralized nature of NIIMS creates massive
> security vulnerabilities. It could become a honeypot for malicious
> actors and identity thieves who can exploit other identifying
> information linked to stolen biometric data. The amendment is unclear
> on how the government will establish and institute strong security
> measures required for the protection of such a sensitive database. If
> there’s a breach, it’s not as if your DNA or retina can be reset like
> a password or token.
> Surveillance Concerns: By centralizing a tremendous amount of
> sensitive data in a government database, NIIMS creates an opportunity
> for mass surveillance by the State. Not only is the collection of
> biometrics incredibly invasive, but gathering this data combined with
> transaction logs of where ID is used could substantially reduce
> anonymity. This is all the more worrying considering Kenya’s history
> of extralegal surveillance and intelligence sharing.
> Ethnic Discrimination Concerns: The collection of DNA is particularly
> concerning as this information can be used to identify an individual’s
> ethnic identity. Given Kenya’s history of politicization of ethnic
> identity, collecting this data in a centralized database like NIIMS
> could reproduce and exacerbate patterns of discrimination.
>
> The process was not constitutional
>
> Kenya’s constitution requires public input before any new law can be
> adopted. No public discussions were conducted for this amendment. It was
> offered for parliamentary debate under “Miscellaneous” amendments, which
> exempted it from procedures and scrutiny that would have required
> introduction as a substantive bill and corresponding public debate. The
> Kenyan government must not implement this system without sufficient public
> debate and meaningful engagement to determine how such a system should be
> implemented if at all.
>
> The proposed law does not provide people with the opportunity to opt in or
> out of giving their sensitive and precise data. The Constitution requires
> that all Kenyans be granted identification. However, if an individual were
> to refuse to turn over their DNA or other sensitive information to the
> State, as they should have the right to do, they could risk not being
> issued their identity or citizenship documents. Such a denial would
> contravene Articles 12, 13, and 14 of the Constitution.
>
> Opting out of this system should not be used to discriminate or exclude
> any individual from accessing essential public services and exercising
> their fundamental rights.
>
> Individuals must be in full control of their digital identities with the
> right to object to processing and use and withdraw consent. These aspects
> of control and choice are essential to empowering individuals in the
> deployment of their digital identities. Therefore policy and technical
> decisions must take into account systems that allow individuals to
> identify themselves rather than the system identifying them.
>
> Mozilla urges the government of Kenya to suspend the implementation of
> NIIMS and we hope Kenyan members of parliament will act swiftly to pass
> the Data Protection Bill of 2018.
>
>
>
>
>
>
>
> _______________________________________________
> kictanet mailing list
> kictanet at lists.kictanet.or.ke
> https://lists.kictanet.or.ke/mailman/listinfo/kictanet
> Twitter: http://twitter.com/kictanet
> Facebook: https://www.facebook.com/KICTANet/
>
> Unsubscribe or change your options at
> https://lists.kictanet.or.ke/mailman/options/kictanet/eshuchi.richard%40gmail.com
>
> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform
> for people and institutions interested and involved in ICT policy and
> regulation. The network aims to act as a catalyst for reform in the ICT
> sector in support of the national aim of ICT enabled growth and development.
>
> KICTANetiquette : Adhere to the same standards of acceptable behaviors
> online that you follow in real life: respect people's times and bandwidth,
> share knowledge, don't flame or abuse or personalize, respect privacy, do
> not spam, do not market your wares or qualifications.
>
>
>
> --
> Regards,
> *Eshuchi Richard*
> _______________________________________________
> kictanet mailing list
> kictanet at lists.kictanet.or.ke
> https://lists.kictanet.or.ke/mailman/listinfo/kictanet
> Twitter: http://twitter.com/kictanet
> Facebook: https://www.facebook.com/KICTANet/
>
> Unsubscribe or change your options at
> https://lists.kictanet.or.ke/mailman/options/kictanet/nmutungu%40gmail.com
>
>
> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform
> for people and institutions interested and involved in ICT policy and
> regulation. The network aims to act as a catalyst for reform in the ICT
> sector in support of the national aim of ICT enabled growth and development.
>
> KICTANetiquette : Adhere to the same standards of acceptable behaviors
> online that you follow in real life: respect people's times and bandwidth,
> share knowledge, don't flame or abuse or personalize, respect privacy, do
> not spam, do not market your wares or qualifications.
>
>
>
> --
> Grace Mutung'u
> Skype: gracebomu
> @Bomu
> PGP ID : 0x33A3450F
>
>
> _______________________________________________
> kictanet mailing list
> kictanet at lists.kictanet.or.ke
> https://lists.kictanet.or.ke/mailman/listinfo/kictanet
> Twitter: http://twitter.com/kictanet
> Facebook: https://www.facebook.com/KICTANet/
>
> Unsubscribe or change your options at
> https://lists.kictanet.or.ke/mailman/options/kictanet/pmaina2000%40yahoo.com
>
> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform
> for people and institutions interested and involved in ICT policy and
> regulation. The network aims to act as a catalyst for reform in the ICT
> sector in support of the national aim of ICT enabled growth and development.
>
> KICTANetiquette : Adhere to the same standards of acceptable behaviors
> online that you follow in real life: respect people's times and bandwidth,
> share knowledge, don't flame or abuse or personalize, respect privacy, do
> not spam, do not market your wares or qualifications.
> _______________________________________________
> kictanet mailing list
> kictanet at lists.kictanet.or.ke
> https://lists.kictanet.or.ke/mailman/listinfo/kictanet
> Twitter: http://twitter.com/kictanet
> Facebook: https://www.facebook.com/KICTANet/
>
> Unsubscribe or change your options at
> https://lists.kictanet.or.ke/mailman/options/kictanet/vkapiyo%40gmail.com
>
> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform
> for people and institutions interested and involved in ICT policy and
> regulation. The network aims to act as a catalyst for reform in the ICT
> sector in support of the national aim of ICT enabled growth and development.
>
> KICTANetiquette : Adhere to the same standards of acceptable behaviors
> online that you follow in real life: respect people's times and bandwidth,
> share knowledge, don't flame or abuse or personalize, respect privacy, do
> not spam, do not market your wares or qualifications.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.kictanet.or.ke/pipermail/kictanet/attachments/20190215/38d550f8/attachment.htm>
More information about the KICTANet
mailing list