Categories
Archive Blogroll

Indian ID Project is Foundation for Future Economic Progress

By David South, Development Challenges, South-South Solutions

SOUTH-SOUTH CASE STUDY 

India is in the midst of the biggest national identification project in the country’s history. The aim is for every Indian to receive a voluntary electronic identification card containing his or her details and a unique number. Called an Aadhaar, it is a 12-digit unique number registered with the Unique Identification Authority of India (http://uidai.gov.in) (UIDAI). The project joins a growing trend across the global South to map populations in order to better achieve development goals.

About one-third of the world’s urban dwellers live in slums, and the United Nations estimates that number will double by 2030 as a result of rapid urbanization in developing countries. How to improve slum-dwellers’ living conditions and raise their standard of living is the big challenge of the 21st century.

With just four years to go until the 2015 deadline to meet the Millennium Development Goals (http://www.undp.org/mdg), and the current economic downturn reversing some gains, any tool that can make development decisions more precise has to be a benefit.

Innovators are turning to the opportunities afforded by digital technologies to reach slums and poor areas. The approaches vary, from India’s national identification system to new ways of using mobile phones and Internet mapping technologies. With mobile phones now available across much of the global South, and plans underway to expand access to broadband internet even in poorly served Africa, it is becoming possible to develop a digital picture of a slum and poor areas and map population needs.

Put to the right use, this powerful development tool can fast-track the delivery of aid and better connect people to markets and government services. In a country of severe regional disparities and caste (http://en.wikipedia.org/wiki/Caste) divisions, the national identification number has the advantage of not documenting people in a way that would bring prejudice.

India’s Aadhaar is intended to serve a number of goals, from increasing national security to managing citizen identities, facilitating e-governance initiatives and tackling illegal immigration. While critics of ID schemes complain about the civil liberties implications of national identity card projects (www.bigbrotherwatch.org.uk), it is a fact that countries that want to increase the social benefits available to their citizens need to understand who those citizens are, where they live and what their social needs are. India’s problem to date has been a lack of knowledge of its citizens: many millions exist in a limbo world of not being known to local authorities.

The unique number is stored in a database and contains details on the person’s demographics (name, age, etc.) and biometrics (http://en.wikipedia.org/wiki/Biometrics) – a photograph, 10 fingerprints and an iris scan. Residents in an area find out about the Aadhaar through various sources, from local media to local government agencies. An ‘Enrolment Camp’ is established in the area where people go to register, bringing anything they have that can prove their identity. The biometric scanning takes place here. ID cards are issued between 20 and 30 days later.

On January 13, 2011 the project declared it had registered its millionth person, a 15-year-old named Sukrity from North Tripura. The goal is to register 600 million people in the next four years.

One of the immediate advantages to many poor people is gaining access to banking services for the first time, because an Aadhaar number is accepted as sufficient ID to open a bank account. The identification authority says the scheme will be “pivotal in bringing financial services to the millions of unbanked people in the country, who have been excluded so far because of their lack of identification.”

The Times of India reported in 2010 that Khaiver Hussain, a homeless man in an addiction treatment programme, was able to get a bank account after receiving the identification number. He was able to open an account with the Corporation Bank along with 27 other homeless people. Having a bank account has removed the fear he had of being robbed of his meagre savings while he slept.

Another homeless day labourer, Tufail Ahmed from Uttar Pradesh, said “This passbook and the UID card have given people like me a new identity. It has empowered us.” He has been able to use the saved money to rent a room with four other day labourers.

In countries where no national ID card schemes exist, people are turning to other methods to register and map populations in order to improve their living conditions.

In Kenya and Brazil, digital mapping projects are underway using mobile phones to paint a picture of the population living in slum areas and shanty towns. An NGO called Map Kibera (www.mapkibera.org) began work on an ambitious project to digitally map Africa’s largest slum, Kibera in Nairobi, Kenya. The Map Kibera project uses an open-source software programme, OpenStreetMap (www.openstreetmap.org), to allow users to edit and add information as it is gathered.

An NGO called Rede Jovem (www.redejovem.org.br) is deploying youths armed with GPS (global positioning system)-equipped (http://en.wikipedia.org/wiki/Global_Positioning_System)mobile phones to map the favelas of Rio de Janerio.

Powerful tools now exist to aid digital mapping. Google Maps (www.maps.google.com) is one example.

While the project is impressively ambitious – and it remains to be seen if it is completed as planned – the economic and development implications of this vast data collection and national identification are enormous. It will enable very accurate identification of markets and needs and also of development challenges and needs. This should lead to many business innovations in the country in coming years and also draw in more business from outside the country.

Resources

1) Ushahidi is a website that was developed to map reports of violence in Kenya after the post-election fallout at the beginning of 2008. The new Ushahidi Engine has been created to use the lessons learned from Kenya to create a platform that allows anyone around the world to set up their own way to gather reports by mobile phone, email and the web – and map them. It is being built so that it can grow with the changing environment of the web, and to work with other websites and online tools. Website:http://blog.ushahidi.com/

2) Google Android: Get inventing! This software enables anyone to start making applications for mobile phones. And it offers a platform for developers to then sell their applications (apps). Website: www.android.com

“Unique Identity for All”: Biometric identity is being rolled out across the planet. HSB is one of the many players in this fast-growing data collection sector.
Creative Commons License

This work is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License.

By 2014, Southern Innovator had published five issues and become a recognised global innovation brand.

ORCID iD: https://orcid.org/0000-0001-5311-1052.

© David South Consulting 2021

Categories
Blogroll

What is the UN doing with your data?

If you allow another country to gain access to really critical data about your society, over time that will erode your sovereignty, you no longer have control over that data.

MI6 chief Richard Moore to BBC News (30 November 2021).

2011

France24: UN among victims of massive cyber-spying campaign

“Cyber-security experts have unveiled one of the biggest computer hacking campaigns to date, releasing a list of 72 organisations whose networks were attacked over a five-year period. Victims include the UN and several governments.

REUTERS – Security experts have discovered the biggest series of cyber attacks to date, involving the infiltration of the networks of 72 organizations including the United Nations, governments and companies around the world. … 

In the case of the United Nations, the hackers broke into the computer system of its secretariat in Geneva in 2008, hid there for nearly two years, and quietly combed through reams of secret data, according to McAfee.”

2017

June

BBC: Accenture and Microsoft plan digital IDs for millions of refugees

December

UNHCR: ID2020 and UNHCR Host Joint Workshop on Digital Identity

2019

June

Xinhua: China, UN to build big data research institute in Hangzhou

2020

January

The New Humanitarian: EXCLUSIVE: The cyber attack the UN tried to keep under wraps

“If there are no consequences for the [UN] agencies for failures like these … there will be more breaches.”

About this investigation:
While researching cybersecurity last November, we came across a confidential report about the UN. Networks and databases had been severely compromised – and almost no one we spoke to had heard about it. This article about that attack adds to The New Humanitarian’s previous coverage on humanitarian data. We look at how the UN got hacked and how it handled this breach, raising questions about the UN’s responsibilities in data protection and its diplomatic privileges.

https://www.forbes.com/sites/daveywinder/2020/01/30/united-nations-confirms-serious-cyberattack-with-42-core-servers-compromised/?sh=4cb9c05d633d

UN confirms it suffered a ‘serious’ hack, but didn’t inform employees

Approximately 4,000 employees may have had their data compromised.

April

Quartz: The UN is partnering with China’s biggest surveillance software company

Foreign Policy: EXCLUSIVE U.N.: Backs Down on Partnership With Chinese Firm for 75th Anniversary: The decision comes after U.S. officials and human rights advocates complained that Tencent aids Beijing in surveillance.

October

WSJ Opinion: China Uses the U.N. to Expand Its Surveillance Reach | In the name of ‘sustainable development,’ Beijing takes the lead in data collection efforts.

December

United Nations: Inauguration Ceremony Regional Hub for Big Data in China in support of the United Nations Global Platform

“I am very honoured to join you today in this inauguration ceremony of the Regional Hub for Big Data in China, in support of the United Nations Global Platform. The inauguration of this Regional Hub is most important, and timely. 

The demand for data, especially during the COVID-19 pandemic, is greater than ever.  Governments are in need of detailed data on the spread of the virus and its impacts on society. Under these challenging circumstances, statistical institutes have had to respond urgently to the demand for data, and to present innovative solutions. Consequently, in these times of need, the statistical community is now able to effectively use Big Data and advanced technologies. 

For example, census data – together with detailed geospatial information – can help identify the most vulnerable populations during the pandemic. And, real-time data on the position and movement of ships, for example, can estimate the volume of cargo being transported, and thus help produce estimates on the state of the economy. These real-time shipping data are available as a global data set on the United Nations Global Platform, and can be accessed by the whole statistical community.”

2021

January

ITPro: United Nations suffers potential data breach: Hackers could have breached the database long before the UN applied a patch

March

Financial Times: Opinion Technology sector: As digital trade grows, so does western distrust of Beijing: China is moving to the forefront of global innovation but governments fear privacy breaches

April

Nikkei Asia: Comment: Data suspicions threaten to tear China and west apart: Applications by Chinese companies see 200-fold increase since 1999

May

UNHCR: Government of Pakistan delivers first new biometric identity smartcards to Afghan refugees

July

ODI: Although shocking, the Rohingya biometrics scandal is not surprising and could have been prevented

“The data privacy and security of Rohingya refugees in Bangladesh has reportedly been jeopardised by the UN Refugee Agency. In an exposé published on 15 June by Human Rights Watch (HRW), UNHCR stands accused of improperly collecting the Rohingya’s biometric information and later sharing it with the Myanmar government without the Rohingya’s consent. Refugees said they had been told to register to receive aid, but the risks of sharing their biometrics had not been discussed, and the possibility this information would be shared with Myanmar was not mentioned.

The potential harm of sharing information with a regime that has a long history of manipulating registration systems to exclude and marginalise Rohingya populations is obvious. That biometrics are involved makes it worse. Unlike names or other personal information, biometrics are sticky – it’s not something you can change or escape.”

August

Reuters: ANALYSIS-Afghan panic over digital footprints spurs call for data collection rethink

Biometric Update: Concerns over Taliban accessing aid agency biometric data

“People in Afghanistan are fearful of the Taliban accessing personal information captured and stored by aid agencies including biometric data which could be used to identify individuals. Experts have raised concern that approaches used by security firms and United Nations development agencies could prove problematic for refugees and vulnerable groups, reports the Thomson Reuters Foundation, the charitable trust of Thomson Reuters.

The Intercept reported that equipment used by the U.S. army for biometric collection has already been seized by the Taliban. Biometric data on Afghans who assisted the U.S. were widely collected, making anybody identified vulnerable to persecution from the Taliban.

Sources told the Intercept that there was little planning for such an event, while the U.S. Army plans to continue to spend another $11 million on biometrics capture equipment including 95 more devices.

The UNHCR has been using biometrics in the region since 2002 when it tested iris recognition technology on Afghan refugees in the Pakistani city of Peshawar. Aid agencies praise biometric technology’s anti fraud and contactless capabilities.”

September

Bloomberg: Cybersecurity

UN Computer Networks Breached by Hackers Earlier This Year

“Hackers breached the United Nations’ computer networks earlier this year and made off with a trove of data that could be used to target agencies within the intergovernmental organization. 

The hackers’ method for gaining access to the UN network appears to be unsophisticated: They likely got in using the stolen username and password of a UN employee purchased off the dark web.”

“Organizations like the UN are a high-value target for cyber-espionage activity,” Resecurity Chief Executive Officer Gene Yoo said. “The actor conducted the intrusion with the goal of compromising large numbers of users within the UN network for further long-term intelligence gathering.”

CPO Magazine: United Nations Data Breach: Hackers Obtained Employee Login From Dark Web, Are Executing Ongoing Attacks on UN Agencies

“A spokesperson for the United Nations has confirmed that the organization was breached by hackers in early 2021, and that attacks tied to that breach on various branches of the UN are ongoing. The data breach appears to stem from an employee login that was sold on the dark web. The attackers used this entry point to move farther into the UN’s networks and conducted reconnaissance between April and August. Information gleaned from this activity appears to have been put to use in further attacks, with attempts made on at least 53 accounts.”

UN data breach creates long-term havoc for organization

“The UN has a unique need for cutting-edge cybersecurity given that it is one of the world’s prime targets for hackers, and that it fields regular attacks from advanced operators. Many of these go unrecorded, but the organization has weathered some high-profile attacks in recent years.”

“Unique Identity for All”: Biometric identity is being rolled out across the planet. HSB is one of the many players in this fast-growing data collection sector. Companies such as HSB collect data on behalf of international organisations.
This story is from 1992 and is a rare glimpse into Canada’s data sharing agreements with the US and other countries.

Data integrity and cross-border data sharing have been concerns for a very long time. False Data Makes Border Screening Corruptible

Further Reading:

There’s a War Going On But No One Can See It by Huib Modderkolk, Bloomsbury, 02 Sept. 2021

“Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other.”  

The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power by Shoshana Zuboff, Profile Books, 2019

“Surveillance Capitalism: A new phase in economic history in which private companies and governments track your every move with the goal of predicting and controlling your behaviour. Under surveillance capitalism you are not the customer or even the product: you are the raw material.”

BBC News: MI6 boss warns of China ‘debt traps and data traps’

“In a wide-ranging interview ahead of his first major public speech since taking on the role as head of MI6, Mr Moore:

  • warned China has the capability to “harvest data from around the world” and uses money to “get people on the hook” …

“Speaking about the threat posed by China, Mr Moore described its use of “debt traps and data traps”.

He said Beijing is “trying to use influence through its economic policies to try and sometimes, I think, get people on the hook”.

Explaining the “data trap”, he said: “If you allow another country to gain access to really critical data about your society, over time that will erode your sovereignty, you no longer have control over that data.

“That’s something which, I think, in the UK we are very alive to and we’ve taken measures to defend against.”

Creative Commons License

This work is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License.

ORCID iD: https://orcid.org/0000-0001-5311-1052.

© David South Consulting 2021

Categories
Archive Blogroll

False Data Makes Border Screening Corruptible

“Big Brother” system could violate rights of Canada’s visitors

By David South

Now Magazine (Toronto, Canada), May 21-27, 1992

New technology that can spew out a person’s life history in less than six seconds is now available to Canada’s customs and immigration officials.

And while Canada customs and immigration officers say this toy is a boon – replacing the need to memorize names of so-called undesirables – civil rights workers and refugee activists point out that the gizmo could have serious consequences, with little recourse.

The technology is called PALS, or primary automated look out system, and is already in operation at airports in Toronto, Montreal, Calgary, Winnipeg, Ottawa and Vancouver.

PALS’ operation is based on the use of computer-readable passports. Canada is one of several countries that have started including computer strips on passports and identity cards. Officers use PALS by either keying in a special number printed on the passport or identity card or using a scanning machine to read the strip.

The system went into effect at Toronto’s Pearson airport on January 20, after a three-year pilot project in Vancouver, adding Canada to the 11 countries that have machine readers for passports. Under the old system, customs officers combined judgement, questioning and the most-wanted list to decide if a passenger required further interrogation and search.

During a demonstration of the system, customs officials at Pearson airport boast about the system’s role in apprehending a drug smuggler in PALS’ first week of operation.

Sinister sign

But to civil libertarians with experience of such systems in other countries, PALS hasa sinister implication. Many say that PALS spews out what is fed into it. And depending on the country involved, what is fed into it may not necessarily be true.

While customs emphasizes PALS’ role in apprehending popular targets like drug smugglers, terrorists and child kidnappers, its reach also includes people who have smuggled in too many cigarettes or bottles of alcohol, convicted criminals who have finished serving their time, immigrants, refugees and a range of petty offenders.

All of these face a second interrogation and detention based on what their governments have decided to incorporate into the computer strip. And it is this that worries civil libertarians and refugee workers.

Consider the case of a legally sponsored Portuguese immigrant who arrived at Pearson just after PALS had been introduced. He was detained based on information stored in PALS. His immigration lawyer Ali Mohideen recalls how the man was held because of a cheque that he bounced in his native Portugal about eight years ago.

Ed Lam, director of research for the Canadian Ethnocultural Council, feels customs and immigration already have “too many powers.” He regularly receives complaints from visible minorities and immigrants who feel they are singled out for harassment at the airport.

“This is big brother. Legal protection is not enough,” he argues. “It leads to costly court battles with the government. I would like to see an ombudsperson or complaints bureau set up. As for refugees turned back at the border, we will never hear from them.”

False data

Other critics, especially those in the US, where a PALS-type system has been in operation for more than a decade, worry that the system will simply accept information given by tyrannical governments.

“It is hard to trace false information to a foreign government,” says Jeanne Woods, legislative counsel to the American Civil Liberties Union, which monitors abuse under the United States system.

“People have been accused of being communists or terrorists who have denied it. The El Salvadoran government is one example of a regime which has called prominent human rights activists and lawyers terrorists.”

She would like the Canadian Parliament to pass a law similar to one passed last November in the US requiring the state department to report to Congress when somebody is denied access because they have been called a terrorist, so that the origin of the information can be tracked.

“People have been accused of being communists or terrorists who have denied it. The El Salvadoran government is one example of a regime which has called prominent human rights activists and lawyers terrorists.”

The Canadian database draws its information from several sources, according to customs spokesperson Suzanne Bray. The sources include immigration records and the Police Information Retrieval System, which is a database shared between customs and the RCMP.

Bray refuses to divulge any other sources, citing security, but both RCMP and customs operate their own intelligence services, sharing information with their counterparts all over the world, especially the US. Information is also drawn from the Canadian Security Intelligence Service (CSIS) and its sister organizations such as the CIA. However, CSIS spokesperson Ray Boisvert says they have adequate safeguards against false information provided by countries known to be human rights abusers.

“CSIS does look at bias in intelligence reports,” he says.

The US equivalent of PALS has been criticized after several cases of abuse were detected. Gara LaMarche, executive director of the Fund for Free Expression, a project of US-based Human Rights Watch, has documented abuse on political and ideological grounds.

“The US public has a right to hear dissenting views under the first amendment of the Constitution,” he says. “I don’t think improving the technology of border control violates civil liberties, but keeping a massive database of information which includes people’s political associations is bad.”

Similar concerns are expressed by John Tackaberry of Amnesty International in Ottawa, which is only now beginning its own analysis of PALS. “We have concerns over data input, who controls information and basic civil liberties.”

Even as Canadian civil rights activists take stock of PALS, Canada customs is planning to use it to check cross-border shopping by expanding the system to all land entry points.

As for those visitors who feel wronged by PALS, they may have a problem seeking redress from such organizations as the Canadian Human Rights Commission. A spokesperson says the CHRC can only help those who have been admitted to Canada. And visitors turned back at the border are not considered admitted.

Sherry Gerstl, a customs superintendent responsible for the implementation of PALS at Pearson, says that people can also appeal to the Privacy Act to see information that is kept on them. But two fact sheets explaining how this can be done are located in a corner, pretty much out of public view.

Bray acknowledges that “honest” passengers could face the prospect of a search with PALS, but given its positive attributes, she says, passengers involved in such delays should simply “grin and bear it.”

This work is licensed under a Creative Commons Attribution 4.0 International License.

ORCID iD: https://orcid.org/0000-0001-5311-1052.

© David South Consulting 2021

Categories
Archive Blogroll

Data Surge across Global South Promises to Re-shape the Internet

By David South, Development Challenges, South-South Solutions

SOUTH-SOUTH CASE STUDY 

The deluge of data gathered by the digital revolution underway in the global South continues to offer a significant economic opportunity. How this data is harvested will forge the successful Internet business models of the future.

As the Internet spreads its way further across the global South, many are forecasting this new surge in web users and the data they generate will radically reshape the way people engage with and use the Internet. Unlike previous generations of web users, most of these new users will be accessing the Internet primarily with mobile phones and other devices, rather than computers. Many will not be native English speakers.

Argentinian philosopher and digital publisher Octavio Kulesz says “the digital experiences undertaken in the South suggest that new technologies represent a great opportunity for developing countries … but on the condition that local entrepreneurs seek out original models adapted to the concrete needs of their communities.”

In a report for the International Alliance of Independent Publishers, Kulesz said we “must ask ourselves how useful it would be to reproduce the prototypes from the North in the South.”

According to the Cisco Visual Networking Index Forecast (2010-2015), by 2015, there will be 3 billion Internet users in the world: 40 percent of the global population. Internet Protocol (IP) traffic is growing fastest in Latin America, where it is forecast to grow by 50 percent from 2010 to 2015. Next are the Middle East and Africa.

There are already as many networked devices – tablets, mobile phones, connected appliances and smart machines – on the planet as people. By 2015 – the year of the Millennium Development Goals (http://www.un.org/millenniumgoals) – they’ll outnumber people by two to one.

The potential of the Internet revolution is especially compelling in Africa, a continent neglected for so long in the global communications revolution. The 10,000 kilometre-long East African Submarine Cable System (EASSy), connecting sub-Saharan Africa with Europe and Asia, has joined other cables from the continent. Gradually, the infrastructure is coming in to place to connect Africa properly to the world.

The first batch of Internet users came from the United States, home of the Internet which grew out of the US military’s Arpanet system (http://en.wikipedia.org/wiki/ARPANET). This first wave of the Internet’s history was very much an American phenomenon. The priorities and content of the web were driven by the cultural and economic concerns of its American users. And the big brands of today’s web reflect this: Google, Facebook, eBay, Twitter, Yahoo, WordPress, to name a few.

As the web expanded across wealthy, developed nations in Europe, users mostly mimicked the priorities of the American approach, using the web to express themselves, be entertained, share files, access government services and sell and market products and services.

But the spread of the Internet across the global South is already showing itself to have a different character and set of priorities. One change is in the way people are accessing the web: through mobile phones and other devices, rather than through laptops and personal computers.

In the future, the trend is towards a global mobile world, in which the communications medium will favour video and audio over text, according to Fast Company magazine (http://www.fastcompany.com). Information is being shared across boundaries on a vast scale for the first time. People around the world are gaining access to data and information never available before, and all of it is nearly instantaneous.

Kulesz said countries of the South face a profound and difficult decision: follow the lead taken by the technology pioneers of the South, or try and replicate what was done in the North?

“Sooner or later, these countries will have to ask themselves what kind of digital publishing highways they must build,” his report said, “and they will be faced with two very different options: a) financing the installation of platforms designed in the North; b) investing according to the concrete needs, expectations and potentialities of local authors, readers and entrepreneurs. Whatever the decision of each country may be, the long-term impact will be immense.”

The costs of trying to replicate the technological infrastructure of the North makes little sense, when it is technologically possible to bypass this costly infrastructure with even newer work-arounds.

“Of course, it would be extraordinary to obtain 80 percent Internet penetration in Africa or make huge investments in infrastructure throughout the developing regions,” continues Kulesz, “but that may never happen. And in the event that it does occur some day, by then the industrialized countries will no doubt have made another technological leap, meaning that the disparity in infrastructure would still persist. So the most effective option is to start working right now, with what is available.”

New global magazine Southern Innovator (http://www.scribd.com/doc/57980406/Southern-Innovator-Issue-1), published by UNDP’s Special Unit for South-South Cooperation, captures how this process is happening, as the people of the global South re-shape the Internet to be their own and to meet their needs.

Resources

1) Southern Innovator: New global magazine first issue gives a snapshot of the big changes across the global South in mobile phones and information technology. Website:http://www.scribd.com/doc/57980406/Southern-Innovator-Issue-1

2) Cisco Visual Networking Index Forecast (2010-2015): The annual Cisco VNI Forecast was developed to estimate global Internet Protocol traffic growth and trends. Widely used by service providers, regulators, and industry influencers alike, the Cisco VNI Forecast is based on in-depth analysis and modelling of traffic, usage and device data from independent analyst forecasts. Website:http://newsroom.cisco.com/press-release-content?type=webcontent&articleId=324003

3) Digital Publishing in Developing Countries: A report by the International Alliance of Independent Publishers. Website: http://alliance-lab.org/etude/archives/date/2010/01?lang=en

Creative Commons License

This work is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License.