Page 104 - The Digital Financial Services (DFS) Ecosystem
P. 104
ITU-T Focus Group Digital Financial Services
Ecosystem
2019 elections. Voters will walk into a voting booth where the e-KTP identity card and the information on it will
be verified on site. The chairman of the Indonesian Agency for the Assessment and Application of Technology
claims that it will enable election results to be tallied quickly, and facilitate election audits (AntaraNews, 2014a).
Key Findings
• We find no evidence indicating major violations of privacy, although concerns are prevalent.
• Identity cards are required for SIM registration in Bangladesh, Ghana, Kenya, Pakistan, and Peru.
• Four national IDs double as “passports” (Kenya, Pakistan, Tanzania, Uganda).
5.5 Surveillance and Security
Figure 13 – Surveillance and Security Connections to ID Programs
In general, developed nations tend to use ID programs for surveillance and security to a greater degree than
developing nations (Clark & Gelb, 2013). Nonetheless, security concerns are also an impetus behind the
creation and application of ID systems in developing nations. Both Kenya and Indonesia cite terrorism as a
motivation behind the development of their ID programs (Kenyatta, 2015; King, 2012).
Our review finds 11 ID programs that are being leveraged for surveillance and security. IDs are purposed
for border management, law enforcement, and SIM registration, and four double as international passports
(Figure 13).
• Border management – The ID program is integrated with immigration or other border management
agencies in order to monitor travel.
• Law enforcement – Registry information is used by police or other enforcement officials for purposes
of confirming identity, or investigation, or reporting.
• SIM Registration – Biometric or other verification is required as part of the registration process to acquire
a new SIM card or mobile phone, and mobile phones remain linked to the ID.
• Passport – The national ID doubles as an accepted international travel document for certain countries.
We do not find much evidence of the precise ways in which countries are deploying ID programs for border
management and law enforcement. Morocco’s ID program has links to border management, and Uganda is
planning border management applications, but details are vague for both countries. The Moroccan identity
card contains security features that are aimed at “control of migration flows” (Rutherford, 2008). Additional
information specifying the card’s capacity to monitor immigration could not be found. Uganda’s National
Security and Information Service states that one of the key services to be integrated with its forthcoming
national ID is “immigration services,” including border crossings (National Security Information System, 2015b).
76