Category Archives: Security

ATMs for the Illiterate

Scientific American reports that NCR is developing an ATM for customers who are illiterate and often have no pockets. No pockets? It’s interesting that they call that out as a major consideration.

The pillar ATM’s form and function are the result of considerable socioeconomic research in low- and middle-income countries—including how and when residents in rural areas use money, the utility of ATMs to people whose clothing often lacks pockets and the practicality of delivering modern banking services to a population literally unable to read the fine print. “The invention of this unit was based on our examination of the underbanked in India, particularly in the neighborhoods of Mumbai,” says Lyle Sandler, NCR’s vice president of Design and Consumer Experience. “We’re talking about a community with a high level of illiteracy, so clearly the typical ATM that someone would approach would be impossible to maneuver.”

First I am curious if they considered spending the same money on literacy programs to achieve the same results (banking in rural regions) with greater benefits.

Second it seems to me the illiterate could put on a headset and listen to an ATM, like the blind. It already is deployed in ATMs to comply with ADA — Interactive Voice Response Services (IVRS). Is audio too expensive or fragile for this project?

And then there’s the security of the fingerprint data and the log of who was where and when. If the target population is using these boxes for small denominations on a regular basis then NCR is really building a surveillance box…

Speaking of illiteracy and security, the story claims a receipt is important even to those who can’t read.

NCR researchers also found that the users they queried wouldn’t consider a transaction complete without some form of receipt, “which is how and why NCR built the first cash register, so some things never went away,” Sandler says.

Is this really about illiteracy?

Something didn’t sound (pun not intended) right to me (e.g. illiterate customers with no pockets who want receipts) so I dug through the NCR research papers on ATMs. The key to unlock this story may be in a 2009 report called the “Financial Inclusion Whitepaper“.

NCR points to three steps of “Financial Inclusion”. Self service solutions appear to be the opposite end of banking from “accounts under utilized” as illustrated in their chart:

Financial Inclusion Cycle

The under utilized end of the spectrum is then revealed to be a security concern; traditional methods of banking face risks from robbery and remoteness. Those are the two big inhibitors that NCR hopes to fix with technology.

Currently, the favored delivery channel for microfinance and microcredit is via the business correspondent (BC) model, whereby an agent (who may or may not be a direct employee of the financial institution) personally travels within a wide geographical area to enroll customers, delivers loans, and collects repayments. The ‘doorstep banking’ model has obvious restrictions of scale as well as security. Agents may abscond with their clients’ funds or may themselves be the target of thieves.

Conventional delivery model
Technology can improve conventional delivery channels such as the BC model by adding new levels of security, speeding up enrolment procedures or ensuring accuracy. Used in this way, technology offers conventional models the chance to increase scale, though to a limited degree. A conventional BC model will always be restricted by the amount of ground the agent can physically cover.

The real story is about banks looking for ways to lower their risk when lending in micro-finance environments. Now I see how this fits into literacy. NCR is building technology developed over the past two years meant to reduce cost for banks to offer services in high risk but also high interest areas. They aim to reduce the need to provide the security personnel that would protect lending staff/assets, to reduce the burden of audit, and to reduce the need to hire lending staff at all — all replaced by technology usable by even illiterate customers.

This technology solution is based on an infrastructure path already worn by the postal service. The research they cite provides some great data points for discussion on trust and security in a publicly shared service (cloud) environment. A “Collaborative model to provide postal and telecommunications facilities to [27,000] unserved villages”, for example, has developed “a network of fixed infrastructure that can be shared for delivering various services including banking and microfinance.”

The primary consideration is to create a tamper-proof cash box that will be inexpensive enough to make micro-finance profitable (with its 20-50% interest rate) when operated over long distances with limited (and shared) infrastructure.

NCR’s system will have a tough time competing with the rapid growth of mobile phone tokens used for payment, such as the M-PESA currency transfer and bank account service. Launched by Vodaphone in Eastern and Central Africa, Afghanistan and India, NEC mentions the system in their paper on financial inclusion.

It allows subscribers to deposit and withdraw money via Safaricom’s airtime-sales agents, and send funds to each other by text message (SMS). The service is now used by around a quarter of Safaricom’s 10.5m customers. Casual workers can be paid quickly by phone; taxi drivers can accept payment without having to carry cash around; money can be sent to friends and family in emergencies. More than twice as many people have a mobile phone than have a bank account in Kenya which indicates that mobile phones could act as an important tool for financial inclusion.

Mobiles can beat the no pockets and no literacy requirement but also operate without fingerprints and expensive tamper-proof boxes (surveillance is another story). NCR however believes the two will be complimentary, not competitive (mobiles will need assistance if cash is required). The issue is thus whether requiring a fingerprint to access a strange box without human interaction will help speed the demise of cash instead of making it more inclusive.

Indian Post Box
Perhaps Not the Best Model

The Peace of Wild Things

by Wendell Berry

When despair for the world grows in me
and I wake in the night at the least sound
in fear of what my life and my children’s lives may be
I go and lie down where the wood drake
rests in his beauty on the water, and the great heron feeds.
I come into the peace of wild things
who do not tax their lives with forethought
of grief. I come into the presence of still water.
And I feel above me the day-blind stars
waiting with their light. For a time
I rest in the grace of the world, and am free.

Software Transaction Memory Risks

Output stream has a detailed and entertaining review of handling concurrency with software transaction memory (STM).

Suppose I have a small bank with only two accounts, and all that can happen at this bank is money can be transferred from one account to the other. A “correct” program…[is] when a single thread is performing the transfers, but when multiple threads are performing the transfers, bad things happen.

Imagine standing in a queue in England before WWII. Everyone would fight and pick their way to the teller in order to get service. Any group approaching a crowd in size would get so wildly out of control even the French and Italians complained about barbaric behavior of the English. During the hard times of war, however, the orderly queue was introduced with much propaganda to prevent inefficient riots and fights over scarce resources.

English orderly queuing behavior evolved into a common rule still present today, enforced by others waiting their turn. What happens if people decide to abandon the rule? The old race conditions, incorrect sync, and deadlock would return, as explained in a presentation by Brian Goetz.

STM, instead of trying to enforce concurrency controls offers an isolation boundary for transactions, like moving transactions from an open teller queue into a private office at a bank. Transactions are behind a closed door instead of subject to interruption and blocking.

STM is an alternative to lock-based synchronization. In essence it places a guard around a specified memory location (in our example we’ve placed it around the “accounts” map). The guard is called a Ref. You can only gain access to the memory location by initiating a transaction with an atomic block. Once inside the atomic block, you can gain access to the data in the memory location through the Ref and make modifications. Modifications are isolated, so changes can only be seen within the scope of the atomic block. When the transaction ends, an attempt is made to update the memory location atomically. However, it may be that another thread has committed a transaction before the attempt. If this is the case, the logic inside of an atomic block is retried until an update can be made.

Of course the boundary also has rules to reduce risk for STM. Once inside, bad things can still happen from dependencies, races and interruptions:

  • disallow side-effects
  • disallow changes
  • use independent business logic

Audio Triggers for Surveillance Cameras

I see more and more surveillance camera systems mention that they have an option for multiple microphones. Adding sophisticated ears to the eyes (perhaps smell is next) is an obvious evolution of surveillance. If you accept the argument that a camera helps a security team expand their presence, more data is useful to them to interpret a situation that they see. Parents with baby monitors might be the leading market for this technology. Prison and ship IP-based intercoms also come to mind. Perhaps I should not talk about parents and prison guards in the same paragraph…

Two people standing and yelling at each other on camera could look like just two people standing; yelling is an audio data point so adding audio allows a human responder to capture better detail and pick up on urgency and relevancy. Adding a voice through speakers it also gives the responder a tool to engage remotely more quickly than in person. The trigger mechanism of the audio is also evolving. Systems already attempt to trigger an alert on tones of anger or fear. I haven’t seen a dictionary-based trigger yet, but it’s probably available.

Of course, expanding the amount of data collected raises the question of security management to protect privacy. Use of the trigger/alert system can reduce some concern about privacy by removing the need for the system to record or expose all data. However, that does not mean you can trust that secure procedures will be used, as illustrated in a Zenitel video about an IP-based system. Why is “unsecure” even an option?