- Those that destroy the goal for which they are sought.
- Or destroy the persons implementing such systems as a direct and fundamental result of trying to achieve such a goal.
To Live is to Love
Friday, September 1, 2023
ChatGPT, the Holy Grail of AI ?
Saturday, August 29, 2020
The Musanze Problem; A journey that cannot be made.
Throughout history, advances in knowledge and technology have made things possible that previously seemed impossible. These advances leave us wondering whether there exists a limit to what can be discovered and known.
This quest for the frontier of knowledge gives birth to two schools of thought. The first school maintains that everything is possible and that humans will achieve unimaginable things. This motivates endeavors such as deep freezing dead people for possible resuscitation in the future. The other school limits what can be achieved. Lord Kelvin for example maintained in 1902 that flying will never be a practical success.
Against such a background, Professor Michel Bezy had us debate the future of artificial intelligence in the class Strategic Use of Digital Information. He wanted to know whether we thought it possible that machines would be more intelligent than human beings.
![]() |
Entrance to CMU Africa campus, Kigali, Rwanda |
This was an issue I had thought about extensively. I had an opinion I considered concrete. It had never occurred to me to define it in a concrete form because I had never imagined I would encounter such an opportunity to express it so soon.
Aware that my argument was subtle; I chose to use an analogy. My argument was that discovering the secret of human intelligence is possible. As a result of that, it would be possible to make intelligent machines. It was possible to discover this secret because the process of discovering it would not destroy the people who are making that discovery or destroy the intelligence that is sought.
In other words, the journey that cannot be made is that journey that either destroys those that undertake it by the mere fact of them undertaking such a journey or destroys the goal for which it is being undertaken. If you want to, you can say, I was deriving a formula for impossible.
So I lifted my hand and luck befell me to speak. I said, “yes I think that computers will be more intelligent than people because making intelligent computers would not destroy people” and to drive my point home I started my analogy.
“So imagine I want to go to Musanze. If every step I take towards Musanze means that I have to lose part of my body. Let's start with hands, and then the next step, my legs, and then maybe my ears and then…”. I can’t remember exactly how I concluded this argument. I only remember that everyone looked at me with questioning eyes. The more I tried to explain, the more people got confused. Eventually, I gave up as I could not put myself together enough to explain my point.
![]() |
Musanze, Northern Rwanda |
And then later out of the class, I just can't forget how it became the #1 source of laughter. It still makes me laugh imagining how my classmates later described my attempts to explain myself.
And now, when you going to Musanze…, and your legs are cut off…
It was a grim reminder for me to improve how I communicate my ideas to people.
I believe that we shall never be able to make computers that can make choices. To make such computers would require us to discover the secret of human freedom. I think that such a discovery will bring an end to that freedom. In my formula of the impossible, this journey destroys the goal which it seeks to achieve.
If such a secret is known, we will wake up to find Taliban fighters murmuring in sweet melodic tones #MakeAmericaGreatAgain #MAGA #MAGA. One passing by a church might hear people chanting Allahu --hh kBar and somewhere in a Mosque some Moslems will be singing Amazing Grace.., I don’t think leaders would hesitate to use such means to "bring peace".
Just as an example, the other category of impossibles, journeys that destroy the persons who seek to accomplish it; would be to visit the sun. You would never succeed as you would burn up before you reached anywhere close. Outside these two categories of problems, I maintain that everything else is up for grabs.
Wednesday, April 26, 2017
Uganda's Sim re-registration with national ID's; a disaster in the pipeline
In the exercise, users register their national id data using USSD codes. Users are prompted first to enter their NIN followed by Names.
There are other ways which might be less reliable, for example for a re-registration, a Telecom company would double check to ensure that the new name of a sim card matches the name of the old identity. This has nuances that can cause mistakes. Its biggest loophole is the fact there not all people registered before and can be cross referenced. This means that all those people who had not registered have a free pass to register with whichever ID they have access to or are targeting (if the companies are using this method). Given this fact of presence of unregistered numbers. I think it is very highly unlikely that the Telecom companies are cross referencing to ensure that someones new names matches the previous names. And it really does not guarantee ownership.
It might also create additional security if people re-registering are asked a question only they can reliable know such as their mother's maiden name. This is not common information and we would expect only the children to know their mothers maiden name. This would prevent random thefts of identity but it would not prevent targeted thefts ( i.e. a person chooses an individual whose identity they want to steal and finds out their mothers maiden name).
It might also be used to fool and defraud your friends. Some people have known of crime stars who create fake profiles on Facebook of famous and important people. Then they use this as a means to obtain money from friends of this famous or important person promising to pay back. I was myself almost once a victim. This new registration exercise opens up the real possibility that someone could create a fake Facebook profile and corroborate it with a Telephone number. The person sending the money would never suspect since they see they are indeed sending the money to that famous person. The possibility of this might be limited by the way mobile money might be handled. But it is a possibility I can only rule out with full knowledge of the protocol of mobile money and the separations of the mobile money system and the regular usage of sim cards.
In a twist, if you are important, it might be used to trick innocent people into committing crimes and or being innocent accomplices in the commission of crimes. For example, someone might ask an innocent victim to do surveillance on a party of interest with the claims the request is coming from a police chief. He would then corroborate that with a mobile money transaction showing clearly the names of the Chief. The things that can be done with a faked identity are endless. I can not list them all here.
- It could be employees of the national ID system who can search in the database for your details.
- It can also be done by hackers who have compromised the national ID system. Yes this is possible; everyone can be hacked including the FBI. It might actually be easier than imagined because of the problem of people who are weak links. Once a malicious person has access to your name and national ID number they can register as you.
- Agents helping people to complete their registration could copy their ID and register as those persons.
- It can also be done by thieves who have stolen National ID cards or who have access to stolen cards.
- It could also be done by Telecom insiders who may have access to the portal.
If the government maintains that people should re-register with their national ID’s it should create a program which stretches over time and which has a mechanism to guarantee ownership of identity such as through a third party. The re-registration should exclude self registration. I also think that the government should do more in evaluating its capacity to handle an intervention in the long run whenever new interventions are being implemented.
Another way of ensuring security given such an insecure process is to do surveillance of all calls that people have so as to detect possible identity theft. There are companies which have this kind of system to detect fraud and theft. An example is VISA, one of the companies that allows users to perform transactions online. Like in the case of our ID; possession of a VISA card is sufficient for a person to perform a purchase.
However unlike the case of the national ID, the company does monitor every transaction. It also has access to both the buyer and seller and could easily void a transaction. VISA uses algorithms which tell it if a card is likely to be stolen and is being used by thieves or not. This is possible because VISA is directly involved in every single transaction that takes place. It knows where you are and what you usually buy. This system is further protected by the fact that every item ordered is sent to a location and an individual which can be tracked. Unlike VISA however our systems are distributed with each Telecom operator having their own information store which they cannot share with other people for purposes of protecting the consumer. Further the Telecom operators are not motivated like VISA to monitor fraud because it does not directly affect them or directly benefit them.
Finally setting such a system of surveillance with such an insecure system would create a weak link. A malicious person can commit crime with impunity by just compromising the surveillance system. It is the reason why security camera’s alone are not sufficient to prevent security incidents, for the simple reason that when such places are robbed, the Camera’s will be conveniently turned off. Or even everything else can appear on the Camera except the face of the person causing the security incident. With our national ID system, it is possible that before a major security incident, power blacks out and the backups are conveniently under repair or get spoiled at that critical time. Such a system does not fail safe and therefore fails catastrophically.
Further, we have a history of interventions which create news, cause pain and some economic activity in the short run but which are eventually abandoned. The examples range from seat belts, speed governors and even previous registration efforts. It is highly possible that this intervention too will be abandoned after a few months. The only difference with this intervention will be that it will have opened up a huge portal for unprecedented levels of identity theft. Exposing many more Ugandans to crime and many more to being victimized by crime rings.
Can I be victimized ?
Saturday, August 1, 2015
If I had sometime with Pope Francis, what would I tell him ...
Contents
Introduction
The painter and the painting
The Object of Goodness.., What do people really want
Relativism in the Church
The problem of communication
The Wisdom of the Pharisee
The Value of the Eternal
The Dilemma of the counselor
Freedom and the Man in Eden ...
The duty of the teacher