In 2009, I became extremely concerned with the concept of Unique Identity for various reasons. Connected with many like minded highly educated people who were all concerned.
On 18th May 2010, I started this Blog to capture anything and everything I came across on the topic. This blog with its million hits is a testament to my concerns about loss of privacy and fear of the ID being misused and possible Criminal activities it could lead to.
In 2017 the Supreme Court of India gave its verdict after one of the longest hearings on any issue. I did my bit and appealed to the Supreme Court Judges too through an On Line Petition.
In 2019 the Aadhaar Legislation has been revised and passed by the two houses of the Parliament of India making it Legal. I am no Legal Eagle so my Opinion carries no weight except with people opposed to the very concept.
In 2019, this Blog now just captures on a Daily Basis list of Articles Published on anything to do with Aadhaar as obtained from Daily Google Searches and nothing more. Cannot burn the midnight candle any longer.
"In Matters of Conscience, the Law of Majority has no place"- Mahatma Gandhi
Ram Krishnaswamy
Sydney, Australia.

Aadhaar

The UIDAI has taken two successive governments in India and the entire world for a ride. It identifies nothing. It is not unique. The entire UID data has never been verified and audited. The UID cannot be used for governance, financial databases or anything. It’s use is the biggest threat to national security since independence. – Anupam Saraph 2018

When I opposed Aadhaar in 2010 , I was called a BJP stooge. In 2016 I am still opposing Aadhaar for the same reasons and I am told I am a Congress die hard. No one wants to see why I oppose Aadhaar as it is too difficult. Plus Aadhaar is FREE so why not get one ? Ram Krishnaswamy

First they ignore you, then they laugh at you, then they fight you, then you win.-Mahatma Gandhi

In matters of conscience, the law of the majority has no place.Mahatma Gandhi

“The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 of the Indian constitution refers to the right to life and liberty -Attorney General Mukul Rohatgi

“There is merit in the complaints. You are unwittingly allowing snooping, harassment and commercial exploitation. The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except as may be directed by a court for the purpose of criminal investigation.”-A three judge bench headed by Justice J Chelameswar said in an interim order.

Legal scholar Usha Ramanathan describes UID as an inverse of sunshine laws like the Right to Information. While the RTI makes the state transparent to the citizen, the UID does the inverse: it makes the citizen transparent to the state, she says.

Good idea gone bad
I have written earlier that UID/Aadhaar was a poorly designed, unreliable and expensive solution to the really good idea of providing national identification for over a billion Indians. My petition contends that UID in its current form violates the right to privacy of a citizen, guaranteed under Article 21 of the Constitution. This is because sensitive biometric and demographic information of citizens are with enrolment agencies, registrars and sub-registrars who have no legal liability for any misuse of this data. This petition has opened up the larger discussion on privacy rights for Indians. The current Article 21 interpretation by the Supreme Court was done decades ago, before the advent of internet and today’s technology and all the new privacy challenges that have arisen as a consequence.

Rajeev Chandrasekhar, MP Rajya Sabha

“What is Aadhaar? There is enormous confusion. That Aadhaar will identify people who are entitled for subsidy. No. Aadhaar doesn’t determine who is eligible and who isn’t,” Jairam Ramesh

But Aadhaar has been mythologised during the previous government by its creators into some technology super force that will transform governance in a miraculous manner. I even read an article recently that compared Aadhaar to some revolution and quoted a 1930s historian, Will Durant.Rajeev Chandrasekhar, Rajya Sabha MP

“I know you will say that it is not mandatory. But, it is compulsorily mandatorily voluntary,” Jairam Ramesh, Rajya Saba April 2017.

August 24, 2017: The nine-judge Constitution Bench rules that right to privacy is “intrinsic to life and liberty”and is inherently protected under the various fundamental freedoms enshrined under Part III of the Indian Constitution

"Never doubt that a small group of thoughtful, committed citizens can change the World; indeed it's the only thing that ever has"

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” -Edward Snowden

In the Supreme Court, Meenakshi Arora, one of the senior counsel in the case, compared it to living under a general, perpetual, nation-wide criminal warrant.

Had never thought of it that way, but living in the Aadhaar universe is like living in a prison. All of us are treated like criminals with barely any rights or recourse and gatekeepers have absolute power on you and your life.

Announcing the launch of the # BreakAadhaarChainscampaign, culminating with events in multiple cities on 12th Jan. This is the last opportunity to make your voice heard before the Supreme Court hearings start on 17th Jan 2018. In collaboration with @no2uidand@rozi_roti.

UIDAI's security seems to be founded on four time tested pillars of security idiocy

1) Denial

2) Issue fiats and point finger

3) Shoot messenger

4) Bury head in sand.

God Save India

Saturday, December 2, 2017

12453 - Unsafe Aadhaar serves cybercrime - Deccan Herald

Kuldeep Singh, Nov 29 2017, 1:28 IST

In August 2017, Abhinav Srivastava, a Bengaluru-based IT professional, was arrested for stealing Aadhaar data. He piggybacked on the e-hospital server of National Informatics Centre to access Aadhaar data.

Earlier, in February, six employees of telecom service provider Reliance Jio acquired fingerprints from the Aadhaar Central Identities Data Repository to activate and sell SIM cards. These incidents clearly show that Aadhaar biometric and demographic data is vulnerable to electronic identity thefts. Clearly, the nation's capability to secure Aadhaar data amounts to an index of its cybersecurity status.

Evidently, Aadhaar data, due to its design, is vulnerable to identity theft and can be hacked. It appears the hackers acquired fingerprints and unique identification numbers from either the central database or database of other organisations and used it to assume identities and carry out fraudulent transactions. Hackers can digitally replay fingerprints for authentication purposes, or to even create a physical fingerprint with the use of a 3D printer.

The Department of Computer Science and Engineering, Michigan State University, US, conducted a study that established that replication of fingerprints was possible for under $500. With fingerprint replication being accessible so easily and at such low costs, making biometrics the universal access key will have severe repercussions, especially a rise in cybercrimes and identity theft.

While the government has made it easy for the common man to access services through Aadhaar, it may be too ambitious in its application. Clearly, Aadhaar lacks a security mechanism to uphold it. New Delhi should have looked at similar systems with unification of identity and authentication that the US follows to foresee cyber threats.

In 2008, the US Federal Regulator for Consumer Protection released a report on the correlation between identity theft and social security numbers which said that over 7% of the adult US population experienced identity theft, but also that it grossed over $100 billion in losses. The Aadhaar and the US social security numbers are different, but it is their dual use as identifier and authenticator that gives rise to the risk of identity theft.

Far from being a hypothetical prediction, the above statistics may well apply to India in the near future. In February, UIDAI filed a report against an employee of Suvidhaa Infoserve. This claim stated that 400 transactions were undertaken through replication of Aadhaar information saved on the Axis Bank gateway, which proves that the affliction of fraudulent transactions has achieved a head start on the legal and technical framework designed to prevent it.

The government launched the Aadhaar project in January 2009 to provide individuals and institutions a unified form of identification to eliminate the need for multiple identity documents. People, especially the underprivileged classes, seek services and benefits such as food coupons, pensions, insurance and apply to check their bank accounts; it is therefore necessary to ensure that only rightful recipients obtain the data associated with the new identification process.
Hot-zone for cyberattacks

Aadhaar is created on a central database that stores biometric information of citizens, called the Central Identities Data Repository - the treasure vault of an identity thief. Therefore, it is a hot-zone for cyberattacks from outside. Also, those who guard the vault have access to it, and have the potential to breach the database to make it susceptible to misuse and theft.
Aadhaar is also a prime target for hackers due to its dual role in identification and authentication of user credentials. Imagine that an individual's name is a password to access his valuables. People need to feed in their unique identification number and biometrics in order to verify their identity, and that identification alone gives them access to services and benefits.

Therefore, the remedial process that makes an excellent initiative also an efficient initiative is two-pronged. India requires the imposition of a legal framework that overcomes its current shortcomings and an improvement in its design to ensure it cannot be breached easily.

The shortcomings in the legal framework include the lack of a notification system that informs when a data breach does occur and a fee imposed upon individuals that request a log of their authentications. Additionally, a mechanism to reimburse losses incurred through identity theft is mandatory. Currently, all that an afflicted individual can access is a grievance centre, after which the law has no accountability to anybody to reimburse losses or process criminal charges.

Other measures to make Aadhaar a universal measure of identification and authentication must include steps to streng ­then the application infrastructure of Aadhaar. Towards this objective, encryption is the first step to secure a database of bio-metric records. It must also create another layer of security which strengthens the process through the use of a confidential element, such as a password or a PIN.

After hackers poach biometrics, it is imperative to acknowledge that this data cannot be reissued and becomes useless. A person's fingerprints in the hands of a hacker are useless to him/her. To store electronic identities in a barrel that can be ferreted out by hackers benefits cybercriminals more than it serves the entitled people.

(The writer is a Bengaluru-based cybersecurity professional and ethical hacker)