<div dir="auto">At a bare minimum this should be implemented in the presence of a strong data protection law. </div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, Apr 11, 2019, 19:11 Patrick A. M. Maina via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div class="m_6224077584273764653yahoo-style-wrap" style="font-family:times new roman,new york,times,serif;font-size:16px"><div id="m_6224077584273764653ydp24700585yiv2916911621"><div class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yahoo-style-wrap" style="font-family:Helvetica Neue,Helvetica,Arial,sans-serif;font-size:16px"><div id="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013"><div class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yahoo-style-wrap" style="font-family:Helvetica Neue,Helvetica,Arial,sans-serif;font-size:16px"><div></div>
<div>Huduma number is a great idea that can unlock many benefits for Kenyans. I would really wish for it to succeed. However I fear that the current state of runaway corruption puts the entire project at risk. <br></div><div><br></div><div>A Single Source of Truth (SST) acts as a citizen whitelist which can help speed up service delivery and make things more efficient (e.g. by removing the need for ID cross-checks). This strength is also a weakness, unfortunately. Anyone with an SST ID (and "valid fingerprint") is presumed to be a bona fide citizen - but such a conclusion can only be sensibly relied on in an environment with negligible/immaterial levels of corruption. </div><div><br></div><div>National scale SST whitelist systems are heavily reliant on human factors (e.g. human integrity, personal values, and patriotism) at their points of highest vulnerability. So hackers will likely target the weakest link i.e. gov employees (e.g. via huge bribes or blackmail or workforce infiltration via recruitment process) in order to get to the system. <br></div><div><br></div><div>Researchers (link below) have shown that fingerprints can be easily stolen by tech-savvy criminals to facilitate illegal access e.g. via affordable 3D printing technology. Fake fingerprints (and fingers) can also be manufactured to create fictitious persons (e.g. ghost workers or organized criminals).</div><div><br></div><div>Case in point is India's Aadhaar... just prior to the attack that almost triggered a war with Pakistan, there had been media reports of terrorists being caught in posession of Aadhaar cards. How did they get the cards? Did the "whitelist effect" of Aaadhaar facilitate their movements or planning? The possibility cannot be discounted. Human flaws are the weakest link in any technology solution.</div><div><br></div><div>What about laws? Surely strict / harsh laws will "protect" the data by deterring illegal activity?</div><div><br></div><div>1. Local laws do not deal with or deter international (or state sponsored) perpetrators with high budgets, sophisticated hacking technology and ability to evade acountability (geopolitical powers).</div><div><br></div><div>2. Attribution challenges (hackers often leave spoofed breadcrumbs (fake trails) to mislead investigators... so innocent people or even countries can be framed for things they did not do, triggering unjust arrests/convictions or costly and potentially destabilising geopolitical hostilities). </div><div><br></div><div>Sometimes backdoors are disguised as innocent acts of user or supplier incompetence (e.g. via deliberate insecure design). Sometimes they are a result of genuinely innocent incompetence or accidental oversight. How will Government know which is which?</div><div><br></div><div>3. Reactive laws (as opposed to strategic or tactical laws which consider the holistic contextualized picture) only increase compliance costs for law abiding citizens but do not guarantee deterrence for criminals who don't care about laws. Cybercrime laws don't stop or deter sophisticated cybercriminals (e.g. due to atrribution & jurisdictional challenges).</div><div><br></div><div>4. Unlike property theft, data can be stolen without the owner's knowledge. By the time the loss is detected (e.g. via numerous incidents of actual unlawful use) it is too late to do anything. It is often impossible to establish the extent by which a honeypot system has been compromised, how the breach happened, who did it and for how long it has been compromised.</div><div><br></div><div>5. Massive resources will have to be expended to perform an impossible task of protecting Kenya's most sensitive (and most valuable) data. As security experts keep reminding us, it is not a question of whether a system, any system, can be hacked, it's a question of when - and what will be the consequences.</div><div><br></div><div><div>6. Once biometric data has been stolen, the loss is permanent and irreversible. You cannot issue new fingerprints. So what happens next?</div></div><div><br></div><div>7. As soon as the credibility of the data is in material doubt, we will have to revert to the old system of manual cross checking and all the envisaged benefits will dissapear (as well as the 6B investment). Whether the perpetrators are caught / jailed or not, does not make a difference. </div><div><br clear="none"></div><div>To help put things in context, consider this: Government has been unable to secure IFMIS (which was supposed to help eliminate corruption - but became an enabler), TIMS (we still have fake number plates and vehicle duty evasion), SIMBA (we still have massive levels of duty evasion at ports), the IEBC Election System (we had to do two costly elections - leading to a massive waste of funds and an increase of perceived political risks, which also hit the economy very hard adding billions in hidden costs).. even eCitizen has reportedly not been spared, going by media reports.</div><div><br clear="none"></div><div>These challenges point to a pattern where we fail to deliberately contextualize solutions and come up with holistic approaches. We put too much trust in silo solutions and reactive laws but we have repeatedly ignored the HUMAN ASPECTS leading to repeated failure to realize envisaged benefits. Any system implemented within a corrupt culture will, more likely than not, end up facilitating (and worsening the cost and scale of) corruption. Guaranteed. This is our reality.</div><div><br></div><div>Can corruption be solved in Kenya in a sustainable way (without risking stability)? Perhaps government can run a global competition for innovative ideas on how to solve corruption in Kenya. The public can watch high profile debates by local and foreign experts, as part of sensitization/education, and then vote on the top five ideas in every major economic sector, which would then be piloted at designated institutions or counties. Prize for the winning idea in every sector (say USD 1Million) can be linked to results, say after 10-15 years, once the idea is fully implemented and proven to have significantly met the ToR targets in an independently verifiable way (and backed by public perceptions).</div><div><br></div><div>Good evening.</div><div><br></div><div>Brgds, </div><div>Patrick.</div><div><br></div><div>Patrick A. M. Maina</div><div>[Cross-domain Innovator | Independent Public Policy Analyst - Indigenous Innovations]</div><div><br></div><div><br></div><div><br clear="none"></div><div><br clear="none"></div>
<div class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yahoo_quoted" id="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yahoo_quoted_5283845667">
<div style="font-family:'Helvetica Neue',Helvetica,Arial,sans-serif;font-size:13px;color:#26282a">
<div class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013yqt7440354062" id="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013yqt99490"><div>
On Thursday, April 11, 2019, 2:25:32 PM GMT+3, Eshuchi Richard via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank" rel="noreferrer">kictanet@lists.kictanet.or.ke</a>> wrote:
</div>
<div><br clear="none"></div>
<div><br clear="none"></div>
<div><div id="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yiv4282221238"><div><div>Just to put CS's <u>full</u> remarks into context and an illustration on why accessing services would be harder in comparison, Ministry of Interior posted the audio through:<div><br clear="none"></div><div><b>Facebook</b>: <a shape="rect" href="https://www.facebook.com/662150267181777/posts/2305403209523133?sfns=mo" rel="nofollow noreferrer" target="_blank">https://www.facebook.com/662150267181777/posts/2305403209523133?sfns=mo</a></div><div><br clear="none"></div><div><b>Twitter</b>: <a shape="rect" href="https://twitter.com/InteriorKE/status/1116221458966044673?s=19" rel="nofollow noreferrer" target="_blank">https://twitter.com/InteriorKE/status/1116221458966044673?s=19</a></div><div><br clear="none"></div></div><br clear="none"><div class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yiv4282221238gmail_quote"><div class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yiv4282221238yqt6632876169" id="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yiv4282221238yqt53424"><div class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yiv4282221238gmail_attr" dir="ltr">On Thu, Apr 11, 2019, 13:10 Wamathai (HapaKenya) via kictanet <<a shape="rect" href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow noreferrer" target="_blank">kictanet@lists.kictanet.or.ke</a>> wrote:<br clear="none"></div><blockquote class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yiv4282221238gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr"><div dir="ltr"><div class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yiv4282221238gmail_default" style="font-family:arial,helvetica,sans-serif;font-size:small"><p>Interior Cabinet Secretary Dr. Fred Matiang’i has said that it will be very hard for those who will not have registered for the Huduma Namba to access Government services.</p><p><a shape="rect" href="https://hapakenya.com/2019/04/11/it-will-hard-to-access-government-services-without-a-huduma-namba-matiangi-says/" rel="nofollow noreferrer" target="_blank">https://hapakenya.com/2019/04/11/it-will-hard-to-access-government-services-without-a-huduma-namba-matiangi-says/</a> <br clear="none"></p></div><div><div class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yiv4282221238m_-7540154908592944102m_1340970017232436713gmail_signature" dir="ltr"><div dir="ltr"><div><div dir="ltr"><div><div style="font-size:12.8px"></div></div></div></div></div></div></div></div></div>
_______________________________________________<br clear="none">
kictanet mailing list<br clear="none">
<a shape="rect" href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow noreferrer" target="_blank">kictanet@lists.kictanet.or.ke</a><br clear="none">
<a shape="rect" href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br clear="none">
Twitter: <a shape="rect" href="http://twitter.com/kictanet" rel="nofollow noreferrer" target="_blank">http://twitter.com/kictanet</a><br clear="none">
Facebook: <a shape="rect" href="https://www.facebook.com/KICTANet/" rel="nofollow noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a><br clear="none">
<br clear="none">
Unsubscribe or change your options at <a shape="rect" href="https://lists.kictanet.or.ke/mailman/options/kictanet/eshuchi.richard%40gmail.com" rel="nofollow noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/eshuchi.richard%40gmail.com</a><br clear="none">
<br clear="none">
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br clear="none">
<br clear="none">
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br clear="none">
</blockquote></div></div></div></div><div class="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yqt6632876169" id="m_6224077584273764653ydp24700585yiv2916911621ydpb7cf6776yiv2558257013ydpc4b2e987yqt16244">_______________________________________________<br clear="none">kictanet mailing list<br clear="none"><a shape="rect" href="mailto:kictanet@lists.kictanet.or.ke" rel="nofollow noreferrer" target="_blank">kictanet@lists.kictanet.or.ke</a><br clear="none"><a shape="rect" href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="nofollow noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br clear="none">Twitter: <a shape="rect" href="http://twitter.com/kictanet" rel="nofollow noreferrer" target="_blank">http://twitter.com/kictanet</a><br clear="none">Facebook: <a shape="rect" href="https://www.facebook.com/KICTANet/" rel="nofollow noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a><br clear="none"><br clear="none">Unsubscribe or change your options at <a shape="rect" href="https://lists.kictanet.or.ke/mailman/options/kictanet/pmaina2000%40yahoo.com" rel="nofollow noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/pmaina2000%40yahoo.com</a><br clear="none"><br clear="none">The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br clear="none"><br clear="none">KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br><br clear="none"></div></div></div>
</div>
</div></div></div></div></div></div></div>_______________________________________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank" rel="noreferrer">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer noreferrer" target="_blank">https://www.facebook.com/KICTANet/</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/w%40hapakenya.com" rel="noreferrer noreferrer" target="_blank">https://lists.kictanet.or.ke/mailman/options/kictanet/w%40hapakenya.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br>
</blockquote></div>