Selected Readings on Blockchain and Identity


By Hannah Pierce and Stefaan Verhulst

The Living Library’s Selected Readings series seeks to build a knowledge base on innovative approaches for improving the effectiveness and legitimacy of governance. This curated and annotated collection of recommended works on the topic of blockchain and identity was originally published in 2017.

The potential of blockchain and other distributed ledger technologies to create positive social change has inspired enthusiasm, broad experimentation, and some skepticism. In this edition of the Selected Readings series, we explore and curate the literature on blockchain and how it impacts identity as a means to access services and rights. (In a previous edition we considered the Potential of Blockchain for Transforming Governance).

Introduction

In 2008, an unknown source calling itself Satoshi Nakamoto released a paper named Bitcoin: A Peer-to-Peer Electronic Cash System which introduced Blockchain. Blockchain is a novel technology that uses a distributed ledger to record transactions and ensure compliance. Blockchain and other Distributed Ledger technologies (DLTs) rely on an ability to act as a vast, transparent, and secure public database.

Distributed ledger technologies (DLTs) have disruptive potential beyond innovation in products, services, revenue streams and operating systems within industry. By providing transparency and accountability in new and distributed ways, DLTs have the potential to positively empower underserved populations in myriad ways, including providing a means for establishing a trusted digital identity.

Consider the potential of DLTs for 2.4 billion people worldwide, about 1.5 billion of whom are over the age of 14, who are unable to prove identity to the satisfaction of authorities and other organizations – often excluding them from property ownership, free movement, and social protection as a result. At the same time, transition to a DLT led system of ID management involves various risks, that if not understood and mitigated properly, could harm potential beneficiaries.

Annotated Selected Reading List

Governance

Cuomo, Jerry, Richard Nash, Veena Pureswaran, Alan Thurlow, Dave Zaharchuk. “Building trust in government: Exploring the potential of blockchains.” IBM Institute for Business Value. January 2017.

This paper from the IBM Institute for Business Value culls findings from surveys conducted with over 200 government leaders in 16 countries regarding their experiences and expectations for blockchain technology. The report also identifies “Trailblazers”, or governments that expect to have blockchain technology in place by the end of the year, and details the views and approaches that these early adopters are taking to ensure the success of blockchain in governance. These Trailblazers also believe that there will be high yields from utilizing blockchain in identity management and that citizen services, such as voting, tax collection and land registration, will become increasingly dependent upon decentralized and secure identity management systems. Additionally, some of the Trailblazers are exploring blockchain application in borderless services, like cross-province or state tax collection, because the technology removes the need for intermediaries like notaries or lawyers to verify identities and the authenticity of transactions.

Mattila, Juri. “The Blockchain Phenomenon: The Disruptive Potential of Distributed Consensus Architectures.” Berkeley Roundtable on the International Economy. May 2016.

This working paper gives a clear introduction to blockchain terminology, architecture, challenges, applications (including use cases), and implications for digital trust, disintermediation, democratizing the supply chain, an automated economy, and the reconfiguration of regulatory capacity. As far as identification management is concerned, Mattila argues that blockchain can remove the need to go through a trusted third party (such as a bank) to verify identity online. This could strengthen the security of personal data, as the move from a centralized intermediary to a decentralized network lowers the risk of a mass data security breach. In addition, using blockchain technology for identity verification allows for a more standardized documentation of identity which can be used across platforms and services. In light of these potential capabilities, Mattila addresses the disruptive power of blockchain technology on intermediary businesses and regulating bodies.

Identity Management Applications

Allen, Christopher.  “The Path to Self-Sovereign Identity.” Coindesk. April 27, 2016.

In this Coindesk article, author Christopher Allen lays out the history of digital identities, then explains a concept of a “self-sovereign” identity, where trust is enabled without compromising individual privacy. His ten principles for self-sovereign identity (Existence, Control, Access, Transparency, Persistence, Portability, Interoperability, Consent, Minimization, and Protection) lend themselves to blockchain technology for administration. Although there are actors making moves toward the establishment of self-sovereign identity, there are a few challenges that face the widespread implementation of these tenets, including legal risks, confidentiality issues, immature technology, and a reluctance to change established processes.

Jacobovitz, Ori. “Blockchain for Identity Management.” Department of Computer Science, Ben-Gurion University. December 11, 2016.

This technical report discusses advantages of blockchain technology in managing and authenticating identities online, such as the ability for individuals to create and manage their own online identities, which offers greater control over access to personal data. Using blockchain for identity verification can also afford the potential of “digital watermarks” that could be assigned to each of an individual’s transactions, as well as negating the creation of unique usernames and passwords online. After arguing that this decentralized model will allow individuals to manage data on their own terms, Jacobvitz provides a list of companies, projects, and movements that are using blockchain for identity management.

Mainelli, Michael. “Blockchain Will Help Us Prove Our Identities in a Digital World.” Harvard Business Review. March 16, 2017.

In this Harvard Business Review article, author Michael Mainelli highlights a solution to identity problems for rich and poor alike–mutual distributed ledgers (MDLs), or blockchain technology. These multi-organizational data bases with unalterable ledgers and a “super audit trail” have three parties that deal with digital document exchanges: subjects are individuals or assets, certifiers are are organizations that verify identity, and inquisitors are entities that conducts know-your-customer (KYC) checks on the subject. This system will allow for a low-cost, secure, and global method of proving identity. After outlining some of the other benefits that this technology may have in creating secure and easily auditable digital documents, such as greater tolerance that comes from viewing widely public ledgers, Mainelli questions if these capabilities will turn out to be a boon or a burden to bureaucracy and societal behavior.

Personal Data Security Applications

Banafa, Ahmed. “How to Secure the Internet of Things (IoT) with Blockchain.” Datafloq. August 15, 2016.

This article details the data security risks that are coming up as the Internet of Things continues to expand, and how using blockchain technology can protect the personal data and identity information that is exchanged between devices. Banafa argues that, as the creation and collection of data is central to the functions of Internet of Things devices, there is an increasing need to better secure data that largely confidential and often personally identifiable. Decentralizing IoT networks, then securing their communications with blockchain can allow to remain scalable, private, and reliable. Enabling blockchain’s peer-to-peer, trustless communication may also enable smart devices to initiate personal data exchanges like financial transactions, as centralized authorities or intermediaries will not be necessary.

Shrier, David, Weige Wu and Alex Pentland. “Blockchain & Infrastructure (Identity, Data Security).” Massachusetts Institute of Technology. May 17, 2016.

This paper, the third of a four-part series on potential blockchain applications, covers the potential of blockchains to change the status quo of identity authentication systems, privacy protection, transaction monitoring, ownership rights, and data security. The paper also posits that, as personal data becomes more and more valuable, that we should move towards a “New Deal on Data” which provides individuals data protection–through blockchain technology– and the option to contribute their data to aggregates that work towards the common good. In order to achieve this New Deal on Data, robust regulatory standards and financial incentives must be provided to entice individuals to share their data to benefit society.

Paraguay’s transparency alchemists


Story by the Open Contracting Partnership: “….The “Cocido de oro” scandal is seen as part of a well-organized and well-informed youth movement that has sprung up in Paraguay in recent years. An equally dramatic controversyinvolving alleged corruption and unfair staff appointments at one of the country’s top public universities led to the resignation of the Chancellor and other senior staff in September 2015. Mostly high school and university students, they are no longer willing to tolerate the waste and corruption in public spending — a hangover from 35 years of authoritarian rule. They expect their government to be more open and accountable, and public decision-making processes to be more inclusive and democratic.

Thanks to government initiatives that have sought to give citizens greater access to information about public institutions, these students, along with investigative journalists and other civil society groups, are starting to engage actively in civic affairs. And they are data-savvy, basing recommendations on empirical evidence about government policies and processes, how they are implemented, and whether they are working.

Leading the pack is the country’s public procurement office, which runs a portal that ranks among the most open government data sources in the world. Together with information about budgets, public bodies’ payrolls, and other government data, this is helping Paraguayans to tackle some of the biggest long-standing problems faced by the government, like graft, overpricing, nepotism and influence-peddling….

The government recognizes there’s still a long way to go in their quest to open up public data. Few institutions have opened their databases or publish their data on an open data portal, and use of the data that has been published is still limited, according to a report on the country’s third OGP Action Plan. Priority data sets aren’t accessible in ways that meet the needs of civil society, the report adds.

And yet, the tremors of a tectonic shift in transparency and accountability in Paraguay are already being felt. In a short time, armed with access to information, citizens have started engaging with how public money is and should be spent.

The government is now doubling down on its strategy of fostering public participation, using cutting-edge technology to increase citizens’ access to data about their state institutions. Health, education, and municipal-level government, and procurement spending across these areas are being prioritized….(More).

Is the First Amendment Obsolete?


Essay by Tim Wu: “The First Amendment was a dead letter for much of American history. Unfortunately, there is reason to fear it is entering a new period of political irrelevance. We live in a golden age of efforts by governments and other actors to control speech, discredit and harass the press, and manipulate public debate. Yet as these efforts mount, and the expressive environment deteriorates, the First Amendment has been confined to a narrow and frequently irrelevant role. Hence the question — when it comes to political speech in the twenty-first century, is the First Amendment obsolete?

The most important change in the expressive environment can be boiled down to one idea: it is no longer speech itself that is scarce, but the attention of listeners. Emerging threats to public discourse take advantage of this change. As Zeynep Tufekci puts it, “censorship during the Internet era does not operate under the same logic [as] it did under the heyday of print or even broadcast television.” Instead of targeting speakers directly, it targets listeners or it undermines speakers indirectly. More precisely, emerging techniques of speech control depend on (1) a range of new punishments, like unleashing “troll armies” to abuse the press and other critics, and (2) “flooding” tactics (sometimes called “reverse censorship”) that distort or drown out disfavored speech through the creation and dissemination of fake news, the payment of fake commentators, and the deployment of propaganda robots. As journalist Peter Pomerantsev writes, these techniques employ “information . . . in weaponized terms, as a tool to confuse, blackmail, demoralize, subvert and paralyze.”

The First Amendment first came to life in the early twentieth century, when the main threat to the nation’s political speech environment was state suppression of dissidents. The jurisprudence of the First Amendment was shaped by that era. It presupposes an information-poor world, and it focuses exclusively on the protection of speakers from government, as if they were rare and delicate butterflies threatened by one terrible monster.

But today, speakers are more like moths — their supply is apparently endless. The massive decline in barriers to publishing makes information abundant, especially when speakers congregate on brightly lit matters of public controversy. The low costs of speaking have, paradoxically, made it easier to weaponize speech as a tool of speech control. The unfortunate truth is that cheap speech may be used to attack, harass, and silence as much as it is used to illuminate or debate. And the use of speech as a tool to suppress speech is, by its nature, something very challenging for the First Amendment to deal with. In the face of such challenges, First Amendment doctrine seems at best unprepared. It is a body of law that waits for a pamphleteer to be arrested before it will recognize a problem. Even worse, the doctrine may actually block efforts to deal with some of the problems described here….(More)”

Co-creating an Open Government Data Driven Public Service: The Case of Chicago’s Food Inspection Forecasting Model


Conference paper by Keegan Mcbride et al: “Large amounts of Open Government Data (OGD) have become available and co-created public services have started to emerge, but there is only limited empirical material available on co-created OGD-driven public services. The authors have built a conceptual model around an innovation process based on the ideas of co-production and agile development for co-created OGD-driven public service. An exploratory case study on Chicago’s use of OGD in a predictive analytics model that forecasts critical safety violations at food serving establishments was carried out to expose the intricate process of how co-creation occurs and what factors allow for it to take place. Six factors were identified as playing a key role in allowing the co-creation of an OGD-driven public service to take place: external funding, motivated stakeholders, innovative leaders, proper communication channels, an existing OGD portal, and agile development practices. The conceptual model was generally validated, but further propositions on co-created OGD-driven public services emerged. These propositions state that the availability of OGD and tools for data analytics have the potential to enable the co-creation of OGD-driven public services, governments releasing OGD are acting as a platform and from this platform the co-creation of new and innovative OGD-driven public services may take place, and that the idea of Government as a Platform (GaaP) does appear to be an idea that allows for the topics of co-creation and OGD to be merged together….(More)”.

Blockchain-like ID may mean end of paper birth certificates


Chris Baraniuk at New Scientist: “There’s a new way to prove you are who you say you are – inspired by the tech underpinning bitcoin. Usually, when you need to verify your identity, the process is archaic, insecure and time-consuming. You get a copy of your birth certificate in the post, put it in an envelope and hope it gets to whoever is asking for it. In the digital era, this should take seconds.

But putting something as sensitive as a birth certificate online risks identity theft in the era of hacks and leaks. Now, the US state of Illinois is experimenting with a secure way of putting control of that data into its citizens’ hands, with the help of distributed ledgers, similar to the blockchain used by bitcoin.

Just last month, Illinois announced a pilot project to create “secure ‘self-sovereign’ identity” for Illinois citizens wishing to access their birth certificate. The idea is to use a blockchain-like distributed ledger that allows online access only to the people owning the ID, and any third parties granted their permission.

Illinois is working with software firm Evernym of Herriman, Utah, to create a record of who should be able to access data from the state’s birth register. Once this is done, no central authority should be required, just your say-so.They’re not the only ones. According to a report by Garrick Hileman and Michael Rauchs at the Cambridge Centre for Alternative Finance, UK, governments are increasingly experimenting with it, including the UK and Brazil.

Activists have long called for people to have greater control of their data. Hacks and leaks are making it too risky for authorities to be the central repository of citizens’ most vital information.

With distributed ledgers, all participants within a network can have their own identical copy of data like access permissions – so no one can view cryptographically sealed birth certificate data unless they’re meant to. Blockchains are a type of distributed ledger that gets the whole network to observe and verify transactions – such as when someone sends a bitcoin to their friend….(More)”.

Using Public Data From Different Sources


Chapter byYair Cohen in Maximizing Social Science Research Through Publicly Accessible Data Sets, book edited by S. Marshall Perry: “The United States federal government agencies as well as states agencies are liberating their data through web portals. Web portals like data.gov, census.gov, healthdata.gov, ed.gov and many others on the state level provide great opportunity for researchers of all fields. This chapter shows the challenges and the opportunities that lie by merging data from different pubic sources. The researcher collected and merged data from the following datasets: NYSED school report card, NYSED Fiscal Profile Reporting System, Civil Rights Data Collection, and Census 2010 School District Demographics System. The challenges include data validation, data cleaning, flatting data for easy reporting, and merging datasets based on text fields….(More)”.

 

Disaster recovery’s essential tool: Data


Amy Liu and Allison Plyer at Brookings: “To recover from a disaster on the scale of Harvey and Irma requires a massive coordinated effort. Federal, state and local governments must lead. Philanthropy, nonprofits and the private sector will be key partners. Residents will voice their views, through community planning meetings and other venues, on how best to spend disaster-recovery dollars. With so many stakeholders and rebuilding needs, the process of restoring neighborhoods and economic activity will become emotionally and politically charged. As Brock Long, administrator of the Federal Emergency Management Agency, has already warned in Texas: “This is going to be a frustrating and painful process.”

For public officials to effectively steer a recovery process and for citizens to trust in the effort, reliable, transparent information will be essential. Leaders and the public need a shared understanding of the scale and extent of the damage and which households, businesses and neighborhoods have been affected. This is not a one-time effort. Data must be collected and issued regularly over months and years to match the duration of the rebuilding effort.

Without this information, it will be nearly impossible to estimate the nature of aid required, determine how best to deploy resources, prioritize spending and monitor progress. Rebuilding processes are chaotic, with emotions high over multiple, competing priorities. Credible public information organized in one place can help to neutralize misconceptions, put every need in context and depoliticize decision-making. Most importantly, data on recovery needs also can enable citizen involvement and allow residents to hold public leaders accountable for progress.

We know this first-hand from our experience in New Orleans, where the Brookings Institution and the New Orleans Data Center teamed up to produce what became the New Orleans Index following Hurricane Katrina in 2005. We set out to help the public and decision-makers understand the level of outstanding damage in New Orleans and the region and to monitor the extent to which the city was bouncing back….(More)”.

The Promise of Evidence-Based Policymaking


Final Report by the Commission on Evidence-Based Policymaking: “…There are many barriers to the efective use of government data to generate evidence. Better access to these data holds the potential for substantial gains for society. The Commission’s recommendations recognize that the country’s laws and practices are not currently optimized to support the use of data for evidence building, nor in a manner that best protects privacy. To correct these problems, the Commission makes the following recommendations:

  • Establish a National Secure Data Service to facilitate access to data for evidence building while ensuring privacy and transparency in how those data are used. As a state-of-the-art resource for improving government’s capacity to use the data it already collects, the National Secure Data Service will be able to temporarily link existing data and provide secure access to those data for exclusively statistical purposes in connection with approved projects. The National Secure Data Service will do this without creating a data clearinghouse or warehouse.
  • Require stringent privacy qualifcations for acquiring and combining data for statistical purposes at the National Secure Data Service to ensure that data continue to be efectively protected while improving the government’s ability to understand the impacts of programs on a wider range of outcomes. At the same time, consider additional statutory changes to enable ongoing statistical production that, under the same stringent privacy qualifcations, may make use of combined data.
  • Review and, where needed, revise laws authorizing Federal data collection and use to ensure that limited access to administrative and survey data is possible to return benefts to the public through improved programs and policies, but only under strict privacy controls.
  • Ensure state-collected quarterly earnings data are available for statistical purposes, including to support the many evidence-building activities for which earnings are an important outcome.
  • Make additional state-collected data about Federal programs available for evidence building. Where appropriate, states that administer programs with substantial Federal investment should in return provide the data necessary for evidence building.
  • Develop a uniform process for external researchers to apply and qualify for secure access to confdential government data for evidence-building purposes while protecting privacy by carefully restricting data access to qualifed and approved researchers…(More)”

Who serves the poor ? surveying civil servants in the developing world


Worldbank working paper by Daniel Oliver Rogger: “Who are the civil servants that serve poor people in the developing world? This paper uses direct surveys of civil servants — the professional body of administrators who manage government policy — and their organizations from Ethiopia, Ghana, Indonesia, Nigeria, Pakistan and the Philippines, to highlight key aspects of their characteristics and experience of civil service life. Civil servants in the developing world face myriad challenges to serving the world’s poor, from limited facilities to significant political interference in their work. There are a number of commonalities across service environments, and the paper summarizes these in a series of ‘stylized facts’ of the civil service in the developing world. At the same time, the particular challenges faced by a public official vary substantially across and within countries and regions. For example, measured management practices differ widely across local governments of a single state in Nigeria. Surveys of civil servants allow us to document these differences, build better models of the public sector, and make more informed policy choices….(More)”.

Automation Beyond the Physical: AI in the Public Sector


Ben Miller at Government Technology: “…The technology is, by nature, broadly applicable. If a thing involves data — “data” itself being a nebulous word — then it probably has room for AI. AI can help manage the data, analyze it and find patterns that humans might not have thought of. When it comes to big data, or data sets so big that they become difficult for humans to manually interact with, AI leverages the speedy nature of computing to find relationships that might otherwise be proverbial haystack needles.

One early area of government application is in customer service chatbots. As state and local governments started putting information on websites in the past couple of decades, they found that they could use those portals as a means of answering questions that constituents used to have to call an office to ask.

Ideally that results in a cyclical victory: Government offices didn’t have as many calls to answer, so they could devote more time and resources to other functions. And when somebody did call in, their call might be answered faster.

With chatbots, governments are betting they can answer even more of those questions. When he was the chief technology and innovation officer of North Carolina, Eric Ellis oversaw the setup of a system that did just that for IT help desk calls.

Turned out, more than 80 percent of the help desk’s calls were people who wanted to change their passwords. For something like that, where the process is largely the same each time, a bot can speed up the process with a little help from AI. Then, just like with the government Web portal, workers are freed up to respond to the more complicated calls faster….

Others are using AI to recognize and report objects in photographs and videos — guns, waterfowl, cracked concrete, pedestrians, semi-trucks, everything. Others are using AI to help translate between languages dynamically. Some want to use it to analyze the tone of emails. Some are using it to try to keep up with cybersecurity threats even as they morph and evolve. After all, if AI can learn to beat professional poker players, then why can’t it learn how digital black hats operate?

Castro sees another use for the technology, a more introspective one. The problem is this: The government workforce is a lot older than the private sector, and that can make it hard to create culture change. According to U.S. Census Bureau data, about 27 percent of public-sector workers are millennials, compared with 38 percent in the private sector.

“The traditional view [of government work] is you fill out a lot of forms, there are a lot of boring meetings. There’s a lot of bureaucracy in government,” Castro said. “AI has the opportunity to change a lot of that, things like filling out forms … going to routine meetings and stuff.”

As AI becomes more and more ubiquitous, people who work both inside and with government are coming up with an ever-expanding list of ways to use it. Here’s an inexhaustive list of specific use cases — some of which are already up and running and some of which are still just ideas….(More)”.