ENGAGING THE POLITICAL SPACE PROF. YEMI OSINBAJO SAN.

Slides:



Advertisements
Similar presentations
Penetration Testing Biometric System
Advertisements

E – Electors P – Photo I - Identity C - Card. EPIC Identity card issued by ERO under rule 28, RER is Permanent document for an elector Used at time of.
Dr. Marc Valliant, VP & CTO
Elections and Boundaries Department Application Elections and Boundaries Database (EBD) is built on an application software called Visual Fox Pro it is.
People involved: - Li Fang (Lecturer) - Maylor Karhang Leung (Assoc Prof) - Kean Fatt Choon (Final Year Project student) Palmprint Classification.
The Industry’s First Multi-Modal, Multi-Factor Biometric Patient Identification System. 1 ©2010 M2SYS Technology. All rights reserved. RightPatient™ Biometrics.
6.2 Voter Qualifications While all states have requirements for voting, most of those used to disenfranchise certain groups have been eliminated over time.
DEVELOPING ACCURATE VOTER LISTS IN TRANSITIONAL DEMOCRATIES HANDBOOK FOR ACEEEO MEMBERS.
ELECTORAL SYSTEM IN INDIA AND U.K ELECTORAL SYSTEM IN INDIA AND U.K.
BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Beach Park Schools Beach Park, Illinois Introduces.
C. L. Wilson Manager, Image Group Biometrics Overview of the PATRIOT Act.
Automated Fingerprint Identification System (AFIS) Modernization Project Department Of Emergency Services and Public Protection Division of State Police.
Managing data Resources: An information system provides users with timely, accurate, and relevant information. The information is stored in computer files.
Copyright and Digital Images May I copy that image?
Data Security and Privacy
Synthetic Data Generation - Darshana Pathak. Synthetic Data A process of creation of realistic data set. Realistic means having characteristics of real.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Presented by: Lao participants.  In Lao PDR ‘registration’ is usually understood as registration in the ‘family book’ and not necessarily possession.
Political Participation Who Votes? And Who Do They Vote For?
Dr. Benito Nacif Electoral Council, IFE Mexico 9 September, 2010 Building Trust through an Independent Electoral Registry: the Mexican Experience.
General Purpose Packages
Elaine Manlove State Election Commissioner Department of Elections.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Health of Canadians 2017 Indicators for belonging and engagement Sandra Zagon.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
Copyright © IBM Corp., All rights reserved; made available under the EPL v1.0 | March 20, 2008 | Short Talk Standards based systems management: An.
1 Biometrics and the Department of Defense February 17, 2003.
Sunshine Center of the N.C. Open Government Coalition Feb. 27, 2015 NORTH CAROLINA SUNSHINE LAWS & GIS.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Photo ID Now Required for Voting in Person January 2013 V1.0
PASSPORT SYSTEM – STANDARD AND E-PASSPORT The Passport includes standard international Security Features such as: Hologram Ultra Violet Print (can be seen.
Verifying and Updating Voters Registries. The day after the list is published it starts to become out of date.
Slide 1 St Andrew’s High School Standard Grade Computing Databases Standard Grade Computing Studies.
1 CHALLENGES IN MANAGEMENT OF ELECTORAL ROLL Jitendra Kumar Sinha District Election Officer, Patna.
Science and Environment Area of Impact.  UK Citizens  Citizens that had exposed their biological data (DNA) with the scientists in one way or another.
POLL WORKER RECRUITMENT Your Be the Judge and. ABOUT US About Us A national hub of voter engagement resources and trainings to help nonprofits integrate.
General Register Office for S C O T L A N D information about Scotland's people BSPS Review of migration methods using health registrations Nick.
Voter qualifications Ch 6 sec 2.
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
1 ESCWA/UNSD Expert Group Meeting on National Accounts May 2009, Cairo, Egypt Gulab Singh UN Statistics Division Exhaustive Measurement of Economy.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Mangai Vetrivelan Snigdha Joshi Avani Atre. Sensor Network Vulnerabilities o Unshielded Sensor Network Nodes vulnerable to be compromised. o Attacks on.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Mass Media and Public Opinion Chapter 8. MEASURING PUBLIC OPINION Section 2.
Chapter 11: The Political System
Costa Rica´s business registry: Directory of institutional units and establishments Contacts: Odilia Bravo:
1 21 th Wiesbaden Group meeting - Paris Presentation to 21 th Meeting of the Wiesbaden Group on Business Registers ” BR Needs and solutions for Statistics.
Improving Civil Registration and Vital Statistics Systems around the World.
Impact of the Media Objective Types of Mass Media Print—newspaper, magazines, newsletters, and books Print—newspaper, magazines, newsletters, and.
Aim: How can American political participation be characterized? Why do you think the U.S. has a low rate of voter turnout? Why does the U.S. have a lower.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
نظام المحاضرات الالكترونينظام المحاضرات الالكتروني System buses.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
BIOMETRIC VOTING SYSTEM ( A novel way to vote ). INTRODUCTION :  It has always been an arduous task for the election commission to conduct free and fair.
Technical External Management Requirements Technology Complexity Interfaces Reliability / Performance Quality Planning Controlling Funding / Resources.
UNHCR‘s Policy on the Protection of Personal Data of Persons of Concern - An introduction (October 2016)
The Biometric Voter Registration system in Africa-”
Engr. Chidi Nwafor, Director, ICT INEC
State Board of Elections Computers
Texas Secretary of State Elections Division
Summary of main points from group discussions
Biometric technology.
Presentation transcript:

ENGAGING THE POLITICAL SPACE PROF. YEMI OSINBAJO SAN

POLITICS FOR POWER OR SERVICE? SERIOUS QUESTION BECAUSE IF IT FOR SERVICE THEN WHAT ARE YOUR SERVICE TO COMMUNITY ANTECEDENTS? WHAT ARE THE ISSUES OF GOVERNANCE YOU HAVE STUDIED OR ARE ACTIVE IN? WHAT WILL YOU DO IF TOMMOROW YOU WERE APPOINTED MINISTER OF EDUCATION?

GETTING INVOLVED SOME FRONT BURNER ISSUES TODAY ARE: HOW TO HOLD CREDIBLE ELECTIONS; VOTERS REGISTRATION CORRUPTION POWER EDUCATION HEALTH BUT LETS TAKE ONE EXAMPLE THE VOTERS REGISTER

REGISTRATION OF VOTERS COMPREHENSIVE AND ACCURATE VOTERS REGISTER IS THE IRREDUCIBLE FOUNDATION OF FREE AND FAIR ELECTION VOTERS REGISTRY IS THE SYSTEM FOR COMPILING THE REGISTER THE REGISTRY MUST BE CAPABLE OF COMPILING INFORMATION ON : VOTER’S BIODATA BIOMETRICS DIGITAL FACIAL PICTURES

INEC’S CURRENT REGISTER SEVERELY DEFECTIVE MISSING REGISTRATION DATA MULTIPLE REGISTRATION GHOST REGISTRATION UNDER AGE REGISTRATION

THREE MAIN AREAS OF TECHNICAL DEFICIENCY THE INDEXING SYSTEM BIOMETRICS REGISTER DATA BASE SECURITY

THE PROBLEM PROPRIETARY SOFTWARE SUPPLIED BY CANADIAN COY WAS ILLEGALLY CLONED/PIRATED BY INEC AND USED IN THE FIELD DATA COLLECTION DEVICES. THE ILLEGAL CLONING WAS UNSUCCESSFUL IN COPYING CERTAIN VITAL SUB-ROUTINES WHICH VENDOR APPARENTLY INSERTED TO PROTECT VITAL LOGIC FOR PROPRIETARY PURPOSES WHEN DATA FROM THE DELIVERED DEVICES(THOSE USING GENUINE SOFTWARE) AND CLONED DEVICES WERE DOWN-LOADED INTO THE SAME SYSTEM THE RESULT IS THE CONFUSION EXPERIENCED.

BESIDES THE CLONED APPLICATIONS LACKED A KEY GENERATOR. THE ALGORITHM FOR GENERATING THE KEY WAS NOT CLONEABLE. SINCE INEC COULD NOT CLONE THE KEY GENERATOR THEY DEVELOPED ONE. THUS TWO METHODS OF KEY GENERATION WERE INTRODUCED INTO THE SYSTEM.

INDEXING PROBLEMS 120,000 POLLING UNITS (PU) IN THE COUNTRY. EACH ONE SHOULD BE UNIQUELY IDENTIFIED. REGISTRATION OFFICIALS DID NOT CHANGE PU NOS IN MANY CASES. SOMETIMES UP TO 50% OF VOTERS IN A STATE REGISTERED WITH THE SAME PU THIS MASSIVE FAILURE OF THE INDEXING SYSTEM CONTRIBUTED SIGNIFICANTLY TO THE DUPLICATIONS, ADDITIONS, AND OTHER FALSE DATA.

BIOMETRICS CAPTURE OF BIOMETRIC DATA FAULTY. THE DIRECT DATA CAPTURE SYSTEM USED BY INEC REQUIRED THAT THE STANDARD QUALITY OF FINGERPRINTS OBTAINED FROM VOTERS BE SET AT 95% TO ELIMINATE MULTIPLE REGISTRATION INEC HAD A PROBLEM COLLECTING FINGERPRINTS AT 95% ON THE SENSORS USED. INEC THEN DROPPED THRESHOLD SO LOW THAT MATCHING IMPOSSIBLE.

WHAT TO DO HAVING UNDERSTOOD THE PROBLEM WE MUST INSIST ON GETTING VOTER REGISTRATION RIGHT. OTHERWISE ANOTHER ELECTION MEANINGLESS

IMPACTING OUR ENVIRONMENT HAMAS TB JOSHUA MORMONS OPUS DEI BRACS