<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2821 to 2835.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/kaplan-herald-february-5-2018-aadhaar-safety-is-regularly-evolving"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-january-18-2018-aadhaar-privacy-debate-how-the-12-digit-number-went-from-personal-identifier-to-all-pervasive-transaction-tool"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-january-25-2018-alnoor-peermohamed-aadhaars-new-security-measures-are-good-it-is-still-work-in-progress"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-paypers-march-16-2018-aadhaar-unique-ids-in-india-a-qualified-success"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/asian-age-march-25-2018-aadhaar-safety"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-karan-saini-may-11-2018-aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net">
    <title>Aadhaar: A widening net</title>
    <link>https://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net</link>
    <description>
        &lt;b&gt;As India makes Aadhaar compulsory for a range of services, concerns about potential data breaches remain more than six years after the govt started building the world’s largest biometric identification system.&lt;/b&gt;
        &lt;p&gt;The article by Komal Gupta, Apurva Vishwanath and Suranjana Roy was &lt;a class="external-link" href="http://www.livemint.com/Politics/eTxrtAxzFq738LzFdx7yXK/Aadhaar-A-widening-net.html"&gt;published in Livemint&lt;/a&gt; on April 21, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;img alt="The Aadhaar project, under which a 12-digit identification number is to be allotted to every Indian resident, was originally supposed to be a way of plugging leakages in the delivery of state benefits such as subsidized grains to the poor. Photo: Priyanka Parashar/Mint" class="img-responsive" height="378" src="http://www.livemint.com/rf/Image-621x414/LiveMint/Period2/2017/04/21/Photos/Processed/asia-cover.JPG" title="The Aadhaar project, under which a 12-digit identification number is to be allotted to every Indian resident, was originally supposed to be a way of plugging leakages in the delivery of state benefits such as subsidized grains to the poor. Photo: Priyanka Parashar/Mint" width="582" /&gt;&lt;/p&gt;
&lt;p&gt;On 29 March, a storm broke out on social media after private data  that former Indian cricket captain M.S. Dhoni had furnished to get  enrolled in India’s unique identity system, known as Aadhaar, were  leaked online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The popular cricketer’s wife, Sakshi, flagged the matter on Twitter,  tagging information technology (IT) minister Ravi Shankar Prasad. “Is  there any privacy left? Information of Aadhaar card, including  application, is made public property,” Sakshi fumed on the microblogging  site.&lt;/p&gt;
&lt;p&gt;The minister replied: “Sharing personal information is illegal. Serious action will be taken against this.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It turned out to be the fault of an overenthusiastic common services  centre in Dhoni’s home town of Ranchi licensed to enrol people in  Aadhaar. The centre was promptly blacklisted. “We have ordered further  inquiry on the matter and action will be taken against all those  involved in the leak,” said Ajay Bhushan Pandey, chief executive officer  of the Unique Identification Authority of India (UIDAI), which  administers Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The matter blew over soon enough, but it served to illustrate the lingering concerns about potential data breaches and privacy violations surrounding Aadhaar, which has become the world’s largest biometric identification database with 1.13 billion people enrolled in it in the past six years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The project, under which a 12-digit identification number is to be allotted to every Indian resident, was originally supposed to be a way of plugging leakages in the delivery of state benefits such as subsidized grains to the poor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has now become mandatory for everything ranging from opening a bank account and getting a driver’s licence or a mobile phone connection to filing of income tax returns. Even government school students entitled to a free mid-day meal need an Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/AadhaarMint.jpg" alt="Aadhaar " class="image-inline" title="Aadhaar " /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of Aadhaar has only expanded with the government going on an overdrive to promote cashless transactions and payment systems linked to the biometric ID system after banning old, high-value bank notes in November in a crackdown on unaccounted wealth hidden away from the taxman.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the Aadhaar-Enabled Payment System (AEPS) empowers a bank customer to use Aadhaar as her identity to access her Aadhaar-enabled bank account and perform basic banking transactions like cash deposit or withdrawal through a bank agent or business correspondent.&lt;br /&gt;&lt;br /&gt;The customer can carry out transactions by scanning her fingerprint at any micro ATM or biometric point-of-sale (POS) terminal, and entering the Aadhaar number linked to the bank account. A merchant-led model of AEPS, called Aadhaar Pay, has also been launched.&lt;br /&gt;&lt;br /&gt;Last week, Prime Minister Narendra Modi launched the BHIM-Aadhaar platform—a merchant interface linking the unique identification number to the Bharat Interface for Money (BHIM) mobile application. This will enable merchants to receive payments through fingerprint scans of customers.&lt;br /&gt;&lt;br /&gt;“Any citizen without access to smartphones, Internet, debit or credit cards will be able to transact digitally through the BHIM-Aadhaar platform,” a government statement said.&lt;br /&gt;&lt;br /&gt;Aadhaar’s growing importance in the economy has only served to deepen concerns about potential data breaches. And there are other concerns as well.&lt;br /&gt;&lt;br /&gt;For instance, the Aadhaar biometric authentication failure rate in the rural job guarantee scheme, which assures 100 days of work a year to one member of every rural household, is as high as 36% in the southern state of Telangana, according to data released by the state government.&lt;br /&gt;&lt;br /&gt;“Aadhaar is supposed to be an enabler and it will happen only when it is made voluntary. Biometric authentications might fail due to poor data connectivity and transactions might not happen even though the Aadhaar number of the person is there; so, what’s the benefit,” asked Pranesh Prakash, policy director of the Centre for Internet and Society, a Bengaluru-based think tank.&lt;br /&gt;&lt;br /&gt;Aadhaar was the brainchild of the previous United Progressive Alliance (UPA) government, which lost power in the 2014 general election to the National Democratic Alliance (NDA). The first 10 Aadhaar numbers were handed over to residents of a small village called Tembhli in Maharashtra on 29 September 2010 in the presence of then prime minister Manmohan Singh, Congress party president Sonia Gandhi and Aadhaar’s chief architect Nandan Nilekani, a co-founder of software services giant Infosys Ltd.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After coming to power, the NDA systematically went about making Aadhaar the pivot of government welfare programmes. In March last year, Parliament passed the Aadhaar Bill to make the use of Aadhaar mandatory for availing of government subsidies despite resistance from opposition parties.&lt;br /&gt;&lt;br /&gt;Last month, finance minister Arun Jaitley said the 12-digit number would eventually become a single, monolithic proof of identity for every Indian, replacing every other identity card.&lt;br /&gt;&lt;br /&gt;To be sure, Aadhaar has helped the government better target beneficiaries of its welfare programmes, cutting out middlemen and corruption. For instance, the government claims to have saved about Rs50,000 crore in cooking gas subsidies by linking the Aadhaar number with bank accounts in which the subsidy is directly transferred.&lt;br /&gt;&lt;br /&gt;Yet, Aadhaar has its critics, who have challenged the project on grounds including potential compromise of national security, violation of the right to privacy and exclusion of people from welfare programmes. The Supreme Court has cautioned the government that no citizen can be denied access to welfare programmes for lack of an Aadhaar number.&lt;br /&gt;&lt;br /&gt;Before cricketer Dhoni’s data breach made the headlines, in February, UIDAI filed a complaint against Axis Bank Ltd, business correspondent Suvidhaa Infoserve and e-sign provider eMudhra, alleging they had attempted unauthorized authentication and impersonation by illegally storing Aadhaar biometrics. The breach was noticed after one individual performed 397 biometric transactions between 14 July 2016 and 19 February 2017. All three entities have been temporarily barred from offering Aadhaar-related services until UIDAI makes a final decision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash of the Centre for Internet and Society said rules on the use of Aadhaar data are inadequate.&lt;br /&gt;&lt;br /&gt;“UIDAI is allowed to share the information of a person from its database on its website, after taking proper consent of that person. However, there is no law which states what should be done if any other party does that with the same individual. Such rules must be in place,” Prakash said.&lt;br /&gt;&lt;br /&gt;Four years after the Aadhaar project took off, a retired judge took the government to court. K. Puttaswamy, a former judge of the Karnataka high court, moved the Supreme Court in 2013, arguing that Aadhaar violated his fundamental right to privacy under the constitution. The case opened the gates for legal challenges to Aadhaar. Over the next few years till date, at least a dozen cases had questioned the legality of the project.&lt;br /&gt;&lt;br /&gt;Ramon Magsaysay award winner Aruna Roy brought a case on behalf of manual workers whose faint finger prints, she said, often go undetected. Currently, only 44 million out of the 101 million beneficiaries of India’s rural job entitlement are paid through Aadhaar.&lt;br /&gt;&lt;br /&gt;To be sure, India’s Constitution does not contain a black and white reference to a “fundamental right to privacy”, that the government cannot violate. The list of rights says “no person shall be deprived of his life or personal liberty except according to a procedure established by law”—often interpreted by courts as an all-encompassing right including right to live with dignity, right to speedy justice and even a right to clean air.&lt;br /&gt;&lt;br /&gt;Nilekani, the man behind Aadhaar, has cautioned that privacy is a broader issue involving how people retain their privacy in day-to-day life. “Privacy is an all-encompassing issue because of the rapid rate of digitization the world is seeing. Your smartphone has sensors, GPS and is generating more and more information about everything; voice-activated devices could also be recording your conversations. There’s a profusion of CCTV cameras at malls, restaurants, ATMs recording your movements,” Nilekani said in a recent interview with The Economic Times.&lt;br /&gt;&lt;br /&gt;But this is where a problem arises. Although there is concurrence on the need for a privacy law, there is a great reluctance on the part of the government to come out with one.&lt;br /&gt;&lt;br /&gt;“We don’t have a comprehensive privacy law; all our databases are unlinked. The government is trying to link the databases using Aadhaar for all schemes but a separate privacy law must be there for protecting any piece of information, whether or not linked to Aadhaar,” said Rahul Matthan, a partner at law firm Trilegal and a Mint columnist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Matthan said first a privacy law must be put in place and then there has to be a discussion on what all it must include.&lt;br /&gt;&lt;br /&gt;The government on its part pointed out that India’s apex court itself has been indecisive on a right to privacy.&lt;br /&gt;&lt;br /&gt;“The larger question on privacy needs to be settled by the court. Till then, one cannot comment on secondary concerns,” attorney general Mukul Rohatgi said in an interview.&lt;br /&gt;&lt;br /&gt;In 2015, the Supreme Court decided that a bench of at least seven judges will rule on the privacy issue, while clarifying that the government cannot make Aadhaar a mandatory proof of identity for its welfare schemes. Twenty months after the judicial order, the larger bench is yet to be formed by the apex court. The passing of the Aadhaar Act in Parliament to provide statutory backing to Aadhaar also indicates a departure from the Indian government’s position of not taking a legislative stand while an issue is under the apex court’s consideration.&lt;br /&gt;&lt;br /&gt;For example, one of the reasons the Indian government has shown restraint in repealing a colonial law that criminalizes homosexuality is because the apex court is seized of the issue.&lt;br /&gt;&lt;br /&gt;In the absence of legislation and pending an authoritative ruling by the top court, whether 1.3 billion Indians are entitled to their privacy remains a grey area. Meanwhile, the government is seemingly in the final stretch of its Aadhaar enrolment drive.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net'&gt;https://cis-india.org/internet-governance/news/livemint-april-21-2017-komal-gupta-apurva-vishwanath-suranjana-roy-aadhaar-a-widening-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-22T05:06:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/kaplan-herald-february-5-2018-aadhaar-safety-is-regularly-evolving">
    <title>Aadhaar: ‘Safety is regularly evolving‘</title>
    <link>https://cis-india.org/internet-governance/news/kaplan-herald-february-5-2018-aadhaar-safety-is-regularly-evolving</link>
    <description>
        &lt;b&gt;Experts say the new security features will significantly ensure there is no ‘large-scale theft of people‘s identity‘. Alnoor Peermohamed reports.&lt;/b&gt;
        &lt;p class="rbig" style="text-align: justify; "&gt;The blog post was published in &lt;a class="external-link" href="https://kaplanherald.com/2018/02/05/aadhaar-safety-is-regularly-evolving/"&gt;Kaplan Herald &lt;/a&gt;on February 5, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="rbig" style="text-align: justify; "&gt;While the introduction of new features such as face authentication, virtual ID, and limited know-your-customer (KYC) by the Unique Identification Authority of India are being seen as reactions to mounting public pressure over the security of Aadhaar, experts, who have helped build the citizen identity system, say these have been in the pipeline for a long time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pegged to be fully functional by July 1, the new features will make Aadhaar more secure, but that hasn‘t stopped the UIDAI from drawing flak over the recent issue of rogue agents selling demographic data of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, the agency‘s handling of the issue has not inspired confidence among the public and security researchers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts say for a system of Aadhaar‘s size, security is continually evolving.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lalitesh Katragadda, former head of Google‘s product centre in India and who also helped build Aadhaar, says as a country we need to understand there‘s ‘no such thing as a 100 per cent secure system‘.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While security gaps will always exist, he says it‘s the UIDAI‘s duty to ensure there‘s no ‘large-scale theft of people‘s identity‘.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to him, the new security features will help significantly in this regard.&lt;/p&gt;
&lt;p class="rbig" style="text-align: justify; "&gt;Face authentication will be another biometric Aadhaar will begin offering to combat the reportedly high failure rates of fingerprint authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system will use common Webcams to capture photos of individuals and match them with the existing photo on the UIDAI‘s database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system will not use any high-end hardware backed facial recognition like the recently launched iPhone X, which the company claims is more accurate than its previous fingerprint authentication technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI will work around this issue by clubbing face authentication with other forms of authentication — fingerprint, iris scan or a one-time password sent to a user‘s mobile phone.&lt;/p&gt;
&lt;p class="rbig" style="text-align: justify; "&gt;While it isn‘t known how exactly the feature will be built into apps relying on Aadhaar authentication, Srikanth Nadhamuni, the former chief technology officer of Aadhaar, envisions a scenario where a photo of an individual could be captured and matched when fingerprint authentication fails, in order to improve the probability of a match.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But even this isn‘t a foolproof plan, some believe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Your face is again a biometric, and that comes with the same host of issues that is plaguing the other biometrics that have so far been used,” says Sunil Abraham, executive director at the Bengaluru-based think-tank, Centre for Internet and Society.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/kaplan-herald-february-5-2018-aadhaar-safety-is-regularly-evolving'&gt;https://cis-india.org/internet-governance/news/kaplan-herald-february-5-2018-aadhaar-safety-is-regularly-evolving&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-07T16:44:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-january-18-2018-aadhaar-privacy-debate-how-the-12-digit-number-went-from-personal-identifier-to-all-pervasive-transaction-tool">
    <title>Aadhaar-privacy debate: How the 12-digit number went from personal identifier to all pervasive transaction tool</title>
    <link>https://cis-india.org/internet-governance/news/first-post-january-18-2018-aadhaar-privacy-debate-how-the-12-digit-number-went-from-personal-identifier-to-all-pervasive-transaction-tool</link>
    <description>
        &lt;b&gt;Depending on who you ask, the Aadhaar is either a convenience or a curse. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.firstpost.com/india/aadhaar-privacy-debate-how-the-12-digit-number-went-from-personal-identifier-to-all-pervasive-transaction-tool-4308043.html"&gt;First Post&lt;/a&gt; on January 18, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The ongoing &lt;a href="http://www.firstpost.com/india/aadhaar-a-giant-electronic-leash-distorts-states-relation-with-citizen-petitioner-tells-supreme-court-4307107.html"&gt;hearing in the Supreme Court&lt;/a&gt; is testing the constitutional validity of a scheme that has been around in one shape or another since 2003, ever since the need for an identification project was first felt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By the government's own estimates, the Aadhaar initiative has &lt;a href="http://www.thehindubusinessline.com/economy/policy/aadhaar-covers-98-of-adult-population-says-prasad/article9091254.ece" rel="nofollow" target="_blank"&gt;covered 98 percent of the adult population&lt;/a&gt; in India and, as of 7 September, the Unique Identification Authority of India (UIDAI) has generated cards for 105.11 crore people. So, if you are an Indian adult, chances are that you possess an Aadhaar card by now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar database is one of the largest government databases on the planet, where a 12 digit unique-identity number has been assigned to the majority of the Indian citizens. This database contains both the demographic as well as biometric data of the citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What started as a unique identification number to streamline the distribution of welfare to the needy has now turned into an all-pervasive tool that can arm the government with sensitive data of all Indians. At the heart of this issue is the sheer quantity of data being amassed as part of the scheme and the many privacy and security concerns generated as a result of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar of today, in addition to basic personal information, includes biometric data like your fingerprints, your iris scan and now even your facial scans (albeit introduced as a safety feature). This is designed to address the issue of failed biometric authentication, as an alternative for people having difficulty authenticating, due to factors like worn out fingerprints, or changing biometric data due to old age, hard work conditions, accidents and the like.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what it fails to address is the growing unease among citizens about the scale of the project, its intent, and the actual legality of enabling such an architecture, which could threaten the citizens with the possibility of State surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sheer amount of private and confidential data amassed in one singular database has given rise to concerns over data security and its privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, worst fears about Aadhaar &lt;a href="http://www.firstpost.com/economy/you-should-be-worried-with-aadhaar-you-are-at-govts-mercy-1315823.html" target="_blank"&gt;have come true&lt;/a&gt; after the developments that have happened over the past few weeks. A recent investigation by &lt;a href="http://www.tribuneindia.com/news/nation/rs-500-10-minutes-and-you-have-access-to-billion-aadhaar-details/523361.html" rel="nofollow" target="_blank"&gt;&lt;em&gt;The Tribune&lt;/em&gt;&lt;/a&gt; revealed that the details of any of the billion Aadhaar numbers issued in India were accessible for as little as Rs 500.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since then, the UIDAI and every other government machinery have been in top gear, trying to allay the fears around Aadhaar. It even introduced a flurry of steps to make sure that the database is safe and secure, and that the data is protected. But not everyone is convinced. Critics say, biometrics only make the citizen transparent to the State and that it does not make the State transparent to citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We warned the government six years ago, but they ignored us," Sunil Abraham, executive director of Bengaluru-based research organisation, Centre for Internet and Society, was quoted by &lt;a href="http://www.thehindubusinessline.com/specials/india-file/aadhaar-the-12digit-conundrum/article9582271.ece" rel="nofollow" target="_blank"&gt;&lt;em&gt;The Hindu Business Line&lt;/em&gt;&lt;/a&gt; as saying.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to him, the legislation implementing Aadhaar has almost no data protection guarantees for citizens. He also believes that by opting for biometrics instead of smart cards the government is using surveillance technology instead of e-governance technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, finance minister Arun Jaitley said recently that an Aadhaar card could become the sole identifier for a person in future. "A stage may come that the unique identity will become the only card," Jaitley said. "There are many countries where such a situation exists. There is a social security number in America and in India it (Aadhaar) could be the counterpart."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since its inception, the Aadhaar was always pitched as a scheme integral to the modernisation of social welfare in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, according to a &lt;a href="https://scroll.in/article/825103/aadhaar-shows-indias-governance-is-susceptible-to-poorly-tested-ideas-pushed-by-powerful-people" rel="nofollow" target="_blank"&gt;&lt;em&gt;Scroll&lt;/em&gt;&lt;/a&gt; report, state governments are struggling to use Aadhaar-based fingerprint authentication in ration shops. Whereas, at the same time, a rising number of companies are integrating Aadhaar into their databases for private services that have nothing to do with the welfare delivery system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, why is the scheme failing at the very job it was created for, while proving useful to private endeavours elsewhere? Why did the BJP, a dispensation critical of Aadhaar in 2014, make a complete u-turn and become a champion for a cause backed by the UPA in its time? Are the security, privacy concerns a small price to pay for better delivery of welfare schemes or is it an instrument of surveillance and a potential goldmine for hackers?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate around Aadhaar and the explanations for its need and/or threats are biased, incomplete and solely depend on who you ask. Therefore, it might do well to trace the roots of the Aadhaar mission and retrace its critical moments.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Origins of Aadhaar&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the &lt;em&gt;Scroll&lt;/em&gt; report, India first fiddled with the idea to assign numbers to people in 2003, in the aftermath of the Kargil war.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With rising security concerns, the then BJP government under Atal Bihari Vajpayee wanted every Indian citizen to be accounted for. This desire eventually took the shape of the National Population Register, that aimed to identify citizens amongst the country's residents.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Citizenship Act was amended in 2004 by the incumbent Congress government to make way for the National Population Register (NPR).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second and major push for an identity project was introduced subsequently by the UPA-1 government in late 2008. With welfare spending on the rise, adds the report, bureaucrats in the erstwhile Planning Commission were worried about leakages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, the idea of constituting an authority that would aggregate all databases of social welfare programmes to create a mother database emerged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such a database would "weed out ghosts and duplicates so that a person who gets the LPG subsidy doesn’t also get the kerosene subsidy," &lt;em&gt;Scroll&lt;/em&gt; quoted a former UIDAI official as saying, on conditions of anonymity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Eventually, in 2009, Aadhaar, or UIDAI, surfaced as a 12-digit identification number that served as proof of identity and address — meaning, it applies to all residents whether they are citizens or not, unlike with the NPR. Biometric data was not in the picture at this time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And then, in 2016, the Centre notified the new Aadhaar Act, which gives the unique identity number assigned to each Indian citizen statutory backing. The idea of this Act was to empower Aadhaar with legal backing for the purpose of transferring subsidies and government benefits to beneficiaries through designated bank accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government said in a notification that the Aadhaar (Targeted Delivery of Financial and other Subsidies, benefits and services) Act, 2016 will provide “efficient, transparent, and targeted delivery of subsidies, benefits and services, the expenditure for which is incurred from the Consolidated Fund of India, to individuals residing in India through assigning of unique identity numbers to such individuals."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another interesting aspect of the Aadhaar debate is the politics of it all. The Opposition, BJP back then and UPA now, has shaped much of the debate against the use of Aadhaar. But one thing that stands out in this melee is that many in the current dispensation, who are currently the biggest proponents of the scheme, had once opposed it vehemently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The people who thought of themselves as having given birth to IT in this country refused to listen to a common man like me. Even the SC has demanded answers,” Narendra Modi had famously said when he was the Gujarat chief minister. He had alleged that the Aadhaar programme was a bundle of lies to loot the country’s treasury.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2014, Modi had tweeted: "On Aadhaar, neither the team that I met nor PM could answer my Qs on security threat it can pose. There is no vision, only political gimmick."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, how was it that one of Aadhaar's most vehement opponents became its biggest proponent?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a report in &lt;a href="http://www.thehindubusinessline.com/blink/cover/the-aadhaar-of-all-things/article9609603.ece" rel="nofollow" target="_blank"&gt;&lt;em&gt;The Hindu Business Line&lt;/em&gt;&lt;/a&gt;,  the destiny of the Aadhaar scheme was shaped by two meetings – between Nilekani and Modi with Jaitley, and the second with Vijay Madan, the UIDAI director general and mission director.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the course of these meetings, the &lt;a href="http://www.governancenow.com/news/regular-story/50k-crore-reason-modi-backed-aadhaar" rel="nofollow" target="_blank"&gt;potential savings from plugging subsidy leakages&lt;/a&gt;was put across to Modi, a figure of "up to ₹50,000 crore a year".&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Modi in his keenness to showcase the arrival of &lt;em&gt;"acche din",&lt;/em&gt; the report adds, immediately sought a 100-crore enrolment target at the ‘earliest’, putting paid to speculations that the new government would shelve the UIDAI project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, the current Aadhaar project was born.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inclusion of biometric data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although an extension of UPA's idea, the new Aadhaar act &lt;a href="http://www.firstpost.com/business/upa-vs-nda-check-out-how-aadhaar-act-2016-differs-from-the-2010-bill-2700706.html"&gt;had some crucial differences&lt;/a&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- As per the new Act, "any person who has resided in India for 182 days (in the one year preceding the application for Aadhaar)". The UPA's Bill said any person residing in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Further, the new Act says that the number can be used to verify the identity of any person, for any purpose, by any public or private entity. In the UPA's Bill, no such provision was there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- The new Act stipulated all these identity facets to be maintained: photograph, biometric information (iris scan and fingerprint), demographic information (name, date of birth, address but excludes race, religion, caste, etc.), and Aadhaar number. The authority may specify any other biological and demographic information to be collected.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data security debate&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the last one year, there have been multiple instances of Aadhaar data leaking online through government websites or its mobile app. The most recent case was when an RTI query pushed UIDAI to reveal that about &lt;a href="http://www.firstpost.com/india/uidai-reveals-210-govt-websites-made-aadhaar-details-public-did-not-specify-when-breach-took-place-4217597.html" target="_blank"&gt;210 government websites made&lt;/a&gt; the Aadhaar details of people with Aadhaar, public on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society (CIS) also pointed out that &lt;a href="http://www.firstpost.com/tech/news-analysis/130-mn-aadhaar-numbers-were-not-leaked-they-were-treated-as-publicly-shareable-data-cis-3702187.html" target="_blank"&gt;about 130 million Aadhar numbers&lt;/a&gt; along with other sensitive data were available on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent &lt;em&gt;Tribune&lt;/em&gt; report has only highlighted the deeper, infrastructural fallibility of singular mega-database of sensitive data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per this &lt;a href="http://www.firstpost.com/india/aadhaar-data-breach-uidai-must-address-privacy-concerns-urgently-simply-denying-leak-not-enough-4288825.html"&gt;&lt;em&gt;Firstpost&lt;/em&gt;&lt;/a&gt; piece, the UIDAI's &lt;a href="http://www.firstpost.com/business/aadhaar-data-breach-uidai-refutes-media-reports-says-biometric-information-safe-and-secure-no-leakage-occurred-4287237.html"&gt;response to such an obvious data breach&lt;/a&gt; and violation of privacy is extremely worrying. It is yet another reiteration of the privacy concerns with Aadhaar, and the constant denial of privacy concerns by the UIDAI instead of sitting up and addressing the problem at hand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The large-scale collection of data and the binding of said data with almost all services raises a pertinent question: Is the government capable of safeguarding the massive amounts of data collected as part of the Aadhaar project? The answer, again, depends on who you ask.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Concerns over privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apart from the security concerns, Aadhaar has brought up a question of the citizen's privacy, given that access to such sensitive data empowers the government to keep a close scrutiny of a person's financial, personal information.&lt;/p&gt;
&lt;p class="A5l" style="text-align: justify; "&gt;The Supreme Court had held recently that privacy is a fundamental right under the Constitution with reasonable restrictions. This decision is bound to impact the Aadhaar project in one way or another, as collectively biometric data of citizens can be construed as a violation of said right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court started hearing the crucial cases related to the constitutional validity of Aadhaar on Wednesday. A five-judge bench heard the arguments of the petitioner, maintaining that the government's mandatory biometric identification project is, in essence, seeking to change a people's Constitution into State's Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petitioners made submissions ranging from the Standing Committee's observations, to the precedents as adopted by other nations to pointing out basic moral and administrative defects in amassing biometric data of citizens on such a large scale, perhaps trying to patiently drive the point that the Aadhaar project can never be safely assumed to be leakproof, hence safe, ergo, legal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petitioner also argued that Aadhaar could lead to millions of people being denied access to essential services and benefits in violation of their human rights, as he pointed out that biometric details of almost 6.2 crore people &lt;a href="https://timesofindia.indiatimes.com/city/bhubaneswar/30-lakh-people-from-state-rejected-for-Aadhar-card/articleshow/27812115.cms" rel="nofollow" target="_blank"&gt;have been rejected&lt;/a&gt;, mainly due to calloused hands and fingertips, wherein biometric data could not be recorded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These are not dishonest people or ghosts," he said. Even the &lt;a href="http://www.prsindia.org/uploads/media/UID/uid%20report.pdf" rel="nofollow" target="_blank"&gt;Standing Committee report&lt;/a&gt; on Aadhaar points out: "&lt;em&gt;..it has been proven again and again that in the Indian environment, the failure to enrol with fingerprints is as high as 15 percent due to the prevalence of a huge population dependent on manual labour. These are essentially the poor and marginalised sections of the society. So, while the poor do indeed need identity proofs, Aadhaar is not the right way to do that"&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In December 2017, the court had &lt;a href="http://www.firstpost.com/india/supreme-court-extends-deadline-for-linking-aadhaar-with-various-services-and-schemes-till-31-march-2018-4259711.html" target="_blank"&gt;extended the deadline&lt;/a&gt; for mandatory linking of Aadhaar with various services and welfare schemes till 31 March, 2018. It had also modified its earlier order with regard to linking Aadhaar with mobile services and said the deadline of 6 February, 2018 for this purpose also stood extended till 31 March.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Right to Privacy and its effect on Aadhaar&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In August 2017, the Supreme Court in a unanimous 9:0 judgment had &lt;a href="http://www.firstpost.com/india/in-a-9-0-verdict-supreme-court-says-right-to-privacy-is-a-fundamental-right-highlights-from-judgment-3967839.html" target="_blank"&gt;declared the Right to Privacy&lt;/a&gt; to be a Fundamental Right. It was hailed as a big victory for pro-privacy advocates who could now point to the Constitutional Bench &lt;a href="http://www.firstpost.com/india/privacy-is-your-fundamental-right-says-9-judge-supreme-court-bench-heres-547-page-full-judgment-of-verdict-3968491.html" target="_blank"&gt;judgment&lt;/a&gt; should the right ever be questioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the judgment only &lt;a href="https://twitter.com/alokpi/status/900592316938727424" rel="nofollow" target="_blank"&gt;established&lt;/a&gt; the theoretical Right to Privacy. It removed the earlier hurdles of the cases of MP Sharma and Kharak Singh which had held Right to Privacy not to be a Fundamental Right. However, the actual freedoms protected by the Right had to be enshrined into in separate judgments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far Aadhaar is concerned, the judgment &lt;a href="http://www.ndtv.com/india-news/right-to-privacy-privacy-is-a-fundamental-right-says-supreme-court-10-developments-1741368" rel="nofollow" target="_blank"&gt;did not invalidate it&lt;/a&gt; in any way. However, it did give a boost to anti-Aadhaar arguments which rely on privacy as now the government can no longer say that there is no Right to Privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With 1.08 billion citizens already enrolled, the ‘mandatory vs. voluntary’ debate on Aadhaar is now mostly a thing of the past. What remains to be seen now is how the Supreme Court will rule on the constitutional validity of the Aadhaar and if the government will be willing to reform/modify the current scheme to allay fears over data security and privacy in order to retailer the project to meet its original goal, the timely and secure delivery of welfare to those who need it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;With inputs from agencies&lt;/em&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-january-18-2018-aadhaar-privacy-debate-how-the-12-digit-number-went-from-personal-identifier-to-all-pervasive-transaction-tool'&gt;https://cis-india.org/internet-governance/news/first-post-january-18-2018-aadhaar-privacy-debate-how-the-12-digit-number-went-from-personal-identifier-to-all-pervasive-transaction-tool&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-18T15:01:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer">
    <title>Aadhaar-enabled smartphones will ease money transfer</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer</link>
    <description>
        &lt;b&gt;With its plans to make smartphones Aadhaar-enabled, the government hopes to provide users a means to do self-authentication and let businesses and banks verify the identity of their clients through their smartphones, a move that could potentially lead the way to a cashless society. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi and Gulveen Aulakh was &lt;a class="external-link" href="http://economictimes.indiatimes.com/industry/banking/finance/banking/aadhaar-enabled-smartphones-will-ease-money-transfer/articleshow/53625690.cms"&gt;published in the Economic Times&lt;/a&gt; on August 10, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Iris and fingerprint sensors are now becoming a standard feature in smartphones anyway, and this requirement will only take a minor tweak to the operating system. Once enabled, people will be able to use phones to do self-authentication and KYC (know your customer)," Nandan Nikelani, former chairman of the Unique Identification Authority of India, told ET, welcoming the government's plan to make smartphones Aadhaar-enabled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ET was the first to report that on July 27 a meeting between UIDAI,  which administers Aadhaar, and senior executives of smartphone-makers  discussed ways to allow smartphone handsets let citizens authenticate  their fingerprints and iris on the phone to get services. The most  immediate use for the Aadhaar-enabled smartphones is the Unified Payment  Interface (UPI), the new payment system that allows money transfer  between any two parties using mobile phones and a virtual payment  address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The two-factor authentication in UPI is now being done with mobile phone as one factor, and MPIN as the second factor. But once you have Aadhaar authentication on the phone, then the second factor can be biometric authentication through Aadhaar," said Nilekani. Over time, the idea is to open Aadhaar authentication to third party apps, said another person familiar with the ongoing discussions, who did not wish to be named.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In effect, biometric and iris scan authentication could become one of the permissions a user grants to different third party apps, such as access to camera, contacts, phone book and so on. Handset makers have raised concerns about some security issues on using iris scan for Aadhar authentication. Also, companies such as Apple that have very closed ecosystems, would not be easy to get on board, several people told ET.&lt;br /&gt;&lt;br /&gt; "The primary challenge lies in safe storing of the iris scan between the time it is captured by the camera and then sent to UIDAI server seeking authentication," said an industry insider, who is aware of the discussions, requesting anonymity. The proposal for smartphone makers includes a "hardware secure zone" where biometric data will be encrypted and sent out. It will not leave the electronic secure zone without encryption, and every phone doing Aadhaar authentication will be registered in the UID system.&lt;br /&gt;&lt;br /&gt;"Unfortunately, from the biometric sensor the data goes to the hardware secure zone via the operating system. Therefore, the biometric data can be intercepted by the operating system before it is sent to the hardware secure zone," said Sunil Abraham, executive director at Bengaluru-based research organisation, the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt; "The reluctance to make changes at the vendor level are mainly coming from a desire for control of biometric data for strategic and commercial purposes. Privacy and security are bogus reasons," Nilekani said, adding that both ends - the handset and the Aadhaar database -- will use the highest level of encryption.&lt;br /&gt;&lt;br /&gt; Samsung India, which in May launched the Galaxy Tab Iris, a device that uses Aadhaar authentication, said it has taken care that its user's biometric data does not fall into the wrong hands. "We ensure that biometric data is encrypted as per UIDAI specifications in device itself for Galaxy Tab Iris," Sukesh Jain, vice president, Samsung India Electronics, told ET in an email response.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer'&gt;https://cis-india.org/internet-governance/news/economic-times-august-10-2016-neha-alawadhi-gulveen-aulakh-aadhaar-enabled-smartphones-will-ease-money-transfer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-10T13:33:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design">
    <title>Aadhaar's the largest biometric database globally but it is leaky by design </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design</link>
    <description>
        &lt;b&gt;It the largest biometric database in the world and it is fraught with security issues.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rohith Jyothish was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/aadhaar-database-is-leaky-by-design-but-it-keeps-on-growing-117050500298_1.html"&gt;published in the Business Standard&lt;/a&gt; on May 5, 2017. &lt;span class="p-content"&gt;&lt;i&gt;This article by Rohith Jyothish originally appeared on &lt;a href="https://globalvoices.org/2017/05/02/the-worlds-largest-biometric-database-is-leaking-indian-citizens-data-but-keeps-on-growing/" target="_blank"&gt;Global Voices&lt;/a&gt; on May 2, 2017&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Over the last few months, the Indian twittersphere has been awash with  citizens concerned about government websites leaking millions of  individual &lt;a href="http://www.livemint.com/Politics/bM6xWCw8rt6Si4seV43C2H/Govt-departments-breach-Aadhaar-Act-leak-details-of-benefic.html"&gt;digital ID numbers&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On May 1, the Centre for Internet and Society, a multi-disciplinary think tank in Bangalore, &lt;a href="https://thewire.in/130948/aadhaar-card-details-leaked/"&gt;released&lt;/a&gt; a report indicating that faulty information &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Security" target="_blank"&gt;security &lt;/a&gt;practices  have exposed as many as 135 million ID numbers, leaked from four  government databases. The data leaks originated in the process of  implementing online dashboards that were likely meant for general  transparency and easy administration by the government agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Developed by the Union government of India in 2009, the plan called for  the creation a Unique Identification Authority of India (&lt;a href="https://uidai.gov.in/"&gt;UIDAI&lt;/a&gt;) that would issue Unique Identity numbers (UIDs) to all residents of India. Under this scheme, now known as Aadhaar, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;number  ties together several pieces of a person's demographic and biometric  information, including their photograph, ten fingerprints and an image  of their iris. This information is all stored in a centralized database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scheme has so far &lt;a href="http://www.hindustantimes.com/india-news/over-1-billion-indians-enrol-for-aadhaar-how-the-govt-plans-to-sign-up-the-rest/story-3deSdoRkOMjuBjs5pEiFmJ.html"&gt;enrolled 1.13 billion Indians&lt;/a&gt; and residents of India, making it the largest biometric database in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This has become a point of pride for government agencies involved in  the program. Information Technology Minister Ravishankar Prasad  (@rsprasad) tweeted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_Tweet.jpg" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Expanding programmes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;was  built to be used as an identity authentication mechanism that could  have multiple services being built on top of it. The scheme was run  under an executive order from its inception in 2009 until the &lt;a href="https://en.wikipedia.org/wiki/Aadhaar_%28Targeted_Delivery_of_Financial_and_other_Subsidies,_benefits_and_services%29_Act,_2016"&gt;Aadhaar Act&lt;/a&gt; was passed in 2016. The strategies employed by its supporters generated substantial controversy, and it since has been &lt;a href="http://www.firstpost.com/india/aadhaar-bill-petition-govt-opposes-congress-leader-jairam-rameshs-plea-in-supreme-court-3280688.html"&gt;challenged in the Supreme Court&lt;/a&gt; on budgetary grounds. But thus far, it remains in place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uidai" target="_blank"&gt;UIDAI &lt;/a&gt;has maintained that the scheme is voluntary. Yet the central government has&lt;a href="https://scroll.in/article/747366/student-battles-for-right-to-obtain-voter-card-without-having-to-enrol-for-aadhaar"&gt; pushed state governments&lt;/a&gt; to include &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;for a wide range of essential government services meant to be available to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Independent &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=News" target="_blank"&gt;news &lt;/a&gt;portal &lt;a href="https://scroll.in/"&gt;Scroll&lt;/a&gt; regularly covers issues related to UID’s linkages with various welfare programs through its &lt;a href="https://scroll.in/topic/38792/identity-project"&gt;Identity Project&lt;/a&gt;. In recent years, Scroll has identified multiple examples of public services being denied to individuals who did not have a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="https://scroll.in/article/709399/why-poor-people-in-delhi-are-desperate-to-get-their-babies-uniquely-identified"&gt;Delhi&lt;/a&gt; in 2015, food rations were denied to those without UID numbers. In April 2016 in the &lt;a href="https://scroll.in/article/805909/in-rajasthan-there-is-unrest-at-the-ration-shop-because-of-error-ridden-aadhaar"&gt;Ajmer&lt;/a&gt; district of Rajasthan, UID-enabled food subsidies repeatedly recorded authentication failures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Six months after &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;was introduced in Rajasthan, state officials report that &lt;a href="https://scroll.in/article/809661/six-months-after-rajasthan-introduced-aadhaar-at-ration-shops-only-45-beneficiaries-accessed-food"&gt;10-15% of beneficiaries&lt;/a&gt; who normally received food grains from the government (under the National Food &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Security" target="_blank"&gt;Security &lt;/a&gt;Act)  have been denied some or all of their rations because the system could  not authenticate their UIDs. A local farm laborer told Scroll that his  rations had been drastically reduced since the arrival of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar.&lt;/a&gt; “In some cases, when we put our fingers, the machine reads out 5 kg, 10  kg, or 15 kg as our entitlement. But we are entitled to 35 kg as per  the government norms.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Advocates are quick to note that there is no adequate avenue to remedy  in these situations, leaving citizens with little recourse or ability to  seek that these errors be corrected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In spite of &lt;a href="https://github.com/rethinkaadhaar/docs/tree/master/Court%20Orders"&gt;multiple court orders&lt;/a&gt; making &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;voluntary and limited to selected schemes, the government continues to expand its scope.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Delicate infrastructure and its misuse&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;According to economist Jean Drèze, the new authentication system requires a lot of &lt;a href="https://thewire.in/64756/jharkhand-aadhaar-pds-nfsa/"&gt;fragile technologies&lt;/a&gt; to work at the same time, such as a point of sale machine, internet  connectivity, biometrics, remote servers and mobile networks. He also  maintains that the primary cause of corruption in disbursement of food  subsidies is related to the quantity of rations distributed or &lt;a href="http://ideasforindia.in/article.aspx?article_id=1625"&gt;quantity fraud&lt;/a&gt;, which &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;doesn't address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another economist who has worked extensively on these issues, Reetika  Khera points out that the exclusion of large number of people from  welfare schemes has not been because of lack of an identity, but rather  due to “&lt;a href="http://ideasforindia.in/article.aspx?article_id=250#sthash.S9GVQUE2.dpbs"&gt;measly budgets and exclusion errors.&lt;/a&gt;“&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Contention with the court&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Supreme+Court" target="_blank"&gt;Supreme Court &lt;/a&gt;issued two &lt;a href="https://scroll.in/article/709399/why-poor-people-in-delhi-are-desperate-to-get-their-babies-uniquely-identified"&gt;orders&lt;/a&gt; in September 2013 and March 2014 which stated that “no person shall be  deprived of any service for want of Aadhaar number in case he/she is  otherwise eligible/entitled.” On August 11, 2015, the court &lt;a href="https://scroll.in/article/748127/by-limiting-aadhaar-supreme-court-may-have-given-government-a-way-to-expand-its-reach"&gt;issued yet another order&lt;/a&gt; which limited the use of UID to food, kerosene and cooking gas subsidies. On October 15, it further expanded it to &lt;a href="https://scroll.in/article/763256/fact-check-will-restricting-aadhaar-now-affect-crores-of-welfare-recipients"&gt;four more schemes&lt;/a&gt;: the &lt;a href="https://en.wikipedia.org/wiki/National_Rural_Employment_Guarantee_Act,_2005"&gt;National Rural Employment Guarantee Scheme&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Pradhan_Mantri_Jan_Dhan_Yojana"&gt;Pradhan Mantri Jan Dhan Yojana&lt;/a&gt; (a scheme for financial inclusion), and policies related to pension and  provident funds, after the government argued that it would be difficult  to roll back &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;now that it is the most used national identity system and is linked to service delivery in several major welfare schemes.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;‘Leaky’ by design&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Following the repeated arguments by the state that &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;makes it possible to weed out ‘ghost beneficiaries’ and ‘de-duplicate’ multiple IDs, revelations of &lt;a href="https://scroll.in/article/820536/if-lord-hanuman-can-get-an-aadhaar-number-why-cant-a-pakistani-spy"&gt;fake ‘UID cards’&lt;/a&gt; began to circulate. These &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;cards were reportedly issued under the names of pets, historical figures, one alleged spy and even gods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet1.jpg" alt="Tweet 1" class="image-inline" title="Tweet 1" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet2.jpg" alt="Tweet 2" class="image-inline" title="Tweet 2" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;More recently, the Indian twittersphere has been vocal in pointing to government websites &lt;a href="https://scroll.in/latest/835386/jharkhand-details-of-lakhs-of-aadhaar-cardholders-was-published-on-state-website"&gt;leaking&lt;/a&gt; sensitive information from the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;database. In February, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Security" target="_blank"&gt;security &lt;/a&gt;researcher Srinivas Kodali exposed a parallel database containing &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;numbers and other details of 5-600,000 children. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;&lt;img src="https://cis-india.org/home-images/Tweet3.jpg" alt="Tweet 3" class="image-inline" title="Tweet 3" /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;In another case, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;numbers of scholarship-holders sat on a state government website for over a year. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;&lt;img src="https://cis-india.org/home-images/Tweet4.jpg" alt="Tweet 4" class="image-inline" title="Tweet 4" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;&lt;span class="p-content"&gt;On March 22, 2017, tech worker @St_Hill exposed  the severity of the problem by showing spreadsheets of personal data  that appear with just a single Google search. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was immediately taken down. But new ones continue to appear with other simple Google searches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the hashtag &lt;a href="http://www.medianama.com/2017/04/223-aadhaar-leaks-database/?utm_content=buffere7636&amp;amp;utm_medium=social&amp;amp;utm_source=twitter.com&amp;amp;utm_campaign=buffer"&gt;#AadhaarLeaks&lt;/a&gt;,  Twitter users have reported numerous such cases on various government  websites. The leaks gained popular attention on social media when former  Indian men’s cricket team captain &lt;a href="https://scroll.in/article/826089/it-isnt-just-dhoni-uidai-received-1390-complaints-about-aadhaar-agents-but-took-no-legal-action"&gt;MS Dhoni’s UID&lt;/a&gt; appeared in a tweet sent by a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;enrollment operator.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;The government response&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uidai" target="_blank"&gt;UIDAI &lt;/a&gt;responded to the uproar with a campaign entitled &lt;a href="https://twitter.com/search?f=tweets&amp;amp;vertical=default&amp;amp;q=%23AadhaarStars&amp;amp;src=tyah"&gt;#AadhaarStars&lt;/a&gt;, in which parents of young children were encouraged to post 30-second videos of what &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;meant to them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was rejected by angry twitterati through the hashtag &lt;a href="https://twitter.com/search?f=tweets&amp;amp;q=%23AadhaarFail&amp;amp;src=typd"&gt;#AadhaarFail&lt;/a&gt; which now offers a compendium of tweets about UID-based authentication failures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last couple of months, after the privacy and security-related concerns became louder, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uidai" target="_blank"&gt;UIDAI &lt;/a&gt;has &lt;a href="https://www.thequint.com/technology/2017/02/03/uidai-shuts-down-50-sites-and-apps-for-offering-aadhaar-services-illegally"&gt;shut down&lt;/a&gt; enrollment operators, websites and payment applications for misuse of biometrics data. The central government has even &lt;a href="http://www.moneycontrol.com/video/current-affairs/centre-cautions-states-against-leakaadhaar-dataportals_8831261.html"&gt;warned&lt;/a&gt; state departments against leaking &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Uid" target="_blank"&gt;UID &lt;/a&gt;data on their portals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the uncertainty looms, privacy researcher Amber Sinha and aforementioned &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Security" target="_blank"&gt;security &lt;/a&gt;researcher Srinivas Kodali estimated the size of #AadhaarLeaks.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design'&gt;https://cis-india.org/internet-governance/news/business-standard-rohith-jyothish-may-5-2017-aadhaar-the-largest-biometric-database-globally-but-it-is-leaky-by-design&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-12T15:35:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-january-25-2018-alnoor-peermohamed-aadhaars-new-security-measures-are-good-it-is-still-work-in-progress">
    <title>Aadhaar's new security measures are good, it is still work in progress</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-january-25-2018-alnoor-peermohamed-aadhaars-new-security-measures-are-good-it-is-still-work-in-progress</link>
    <description>
        &lt;b&gt;Here's a rundown of the three new features that the UIDAI will introduce to make Aadhaar seemingly more secure.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alnoor Peermohamed was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/aadhaar-s-new-security-measures-are-good-it-is-still-work-in-progress-118012400982_1.html"&gt;published in Business Standard&lt;/a&gt; on January 25, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While public pressure over the security of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;might have forced the Unique Identification Authority of India (UIDAI) to introduce new features such as face authentication, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=virtual+id" target="_blank"&gt;virtual ID &lt;/a&gt;and limited KYC, experts who have worked on the system say such updates are incremental and need to keep happening.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Be it Google, Facebook or Aadhaar, a digital system serving billions of people needs to remain secure for which it continually has to evolve, sometimes adapting to issues that are found. The three new features will certainly help improve security, but many questions still remain over how the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;will tackle the recently highlighted issue of rogue &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;agents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An article in the Tribune newspaper which claimed that &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;information of individuals was on sale for as little as Rs 500, sparked off the biggest security scare against the digital identity keeper in a while. Even though the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;asserted that its systems had not been breached, proof that &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;details of an individual could be bought had been delivered. The agency has also not inspired confidence among public and security researchers with the way it has responded to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;data that has been put in public domain in violation of privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;"As an economy and an ecosystem, we have to understand that there is no such thing as a 100 percent secure system. When it was on paper it was not secure and now that it is digital, it is not a 100 percent secure. Security gaps may exist, but those should not cause large-scale theft of people's identity or cause significant damage. It's an arms race and this means that &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;&lt;span&gt;has to improve constantly," says Lalitesh Katragadda, former head of Google's product centre in India who has helped build &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Here's a rundown of the three new features that the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;will introduce to make &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;seemingly more secure:&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Face Auth&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=face+authentication" target="_blank"&gt;Face Authentication &lt;/a&gt;or 'Face Auth' is an additional biometric that the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;will roll out in order to cut down on the number of failed attempts which is increasingly being highlighted as an issue. By matching a user's face, captured through a camera at the time of authentication to the image of their face which was taken at the time of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;enrolment, the identity of an individual can be more accurately verified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facial recognition in the consumer landscape has once again been popularised by Apple's latest iPhone X device that uses an array of sensors and infrared light to map a person's face in three dimensions. The company claims this is more accurate than its previous fingerprint-based TouchID technology, but this isn't the case with UIDAI's facial recognition technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;will utilise webcams and low-end hardware to enable Face Auth and therefore the conscious decision to use a person's face in conjunction to another layer of authentication - fingerprint, iris scan or a one-time password sent to the user's registered mobile device was taken.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How exactly applications built on &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;will utilise this new Face Auth feature is not known yet, and neither are the technical specifications. Srikanth Nadhamuni, the former Chief Technology Officer of Aadhaar, envisions a scenario where a farmer using &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;to get his PDS witnesses a failure to authenticate using his fingerprint, prompting the application to capture his photo and check whether it matches with the existing photo on the UIDAI's database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Activists, however, point out that it's far easier to fake facial recognition software, which in some cases get fooled into giving out positives by simply holding photos of the user in front of a camera. "At the end of the day your face is again biometric, and that comes with the same host of issues that are plaguing the other biometrics that has so far been used," says Sunil Abraham, Executive at Bengaluru-based think tank Centre for Internet and Society (CIS).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Virtual ID&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As its name suggests, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=virtual+id" target="_blank"&gt;Virtual ID &lt;/a&gt;gives users a stand-in for their 12-digit &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;number if they're worried that it will be stolen, leaked online or misused in any way. Any &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;user will be able to log into an online portal, visit an &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;enrollment centre or use the mAadhaar app to generate a 16-digit &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=virtual+id" target="_blank"&gt;Virtual ID.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By virtue, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;has built the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=virtual+id" target="_blank"&gt;Virtual ID &lt;/a&gt;to be temporary and a user can ask for any number of Virtual IDs - when a new one is generated, the old one is destroyed and can even be assigned to another user. The key here is that only the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;will be able to make the link to a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=virtual+id" target="_blank"&gt;Virtual ID &lt;/a&gt;and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;number and no-one else.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After years of arguing that leaking of the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;number itself wasn't an issue, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;is finally giving users a tool that allows them to keep their &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;number private. While Abraham agrees that the feature will make &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;safer, he says its effectiveness will only be valid if a user opts in as it has not been made a feature by design.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nadhamuni argues on the contrary, that making &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=virtual+id" target="_blank"&gt;Virtual ID &lt;/a&gt;a mandatory process would hurt more people than it helps. "A lot of people in rural India are using their &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;for authentication of PDS and MNREGA and so on and it's working for them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You don't want to confuse all of them and ask them to create yet another number. You'd have to make a farmer understand the concept of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=virtual+id" target="_blank"&gt;Virtual ID &lt;/a&gt;when he's completely happy with the way things are today," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Limited KYC&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The process of KYC (Know Your Customer) through &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;has all along given public bodies and private companies access to a user's details such as name, age, sex, address and photograph. With limited KYC, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;will categorise a body seeking &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;aadhaar &lt;/a&gt;details into two buckets, ones that get the full information and ones with whom only partial information is shared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Realising that not all bodies or companies need all the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;details, is the biggest change that &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=limited+kyc" target="_blank"&gt;Limited KYC &lt;/a&gt;will bring in. The idea is that the fewer places a person's &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;details are stored, the fewer chances of it leaking. Moreover, by giving only critical services full &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;details the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;is hoping it will eliminate its problem of having to share details with less secure systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=limited+kyc" target="_blank"&gt;Limited KYC &lt;/a&gt;will also bring in a tokenized system for agencies to ensure uniqueness while not storing a user's &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;number on their databases. A 72 digit alphanumeric UID Token will be generated at the time of authentication which only &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=uidai" target="_blank"&gt;UIDAI &lt;/a&gt;will be able to map back to a particular &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;number. However, there isn't clarity on who will be exempt from this as there is word that banks and tax authorities will be allowed to store user &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID Tokens will also be backdated, meaning all previous KYC attempts a user had made with a particular body or company will also be migrated to the new system, ensuring that if two databases leak, the perpetrators are not able to easily use &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;numbers to match users and improve the quality of the data they've stolen. Some details on this are still missing though.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Security: Work in Progress&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts who worked on building &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;say that such features were discussed during the very inception of the national biometric database, but were not rolled out until now to avoid complexity. Katragadda, who has worked on building many large APIs at Google agrees that all large systems avoid complexity during the kickoff and add them based on needs of users later.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like him, both Nadhamuni and even Abraham agree that the new features will make &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;more secure, while the latter had his reservations on how secure it would be which only the fine print would reveal. The experts also agree that the public discourse which &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;security has taken is a good thing, since the digital security of over a billion people is now public discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Security breaches are like earthquakes. It's better to have many tiny tremors than be oblivious to gaps in our system and lose everything with that one massive earthquake. So it's better to have our ears close to the ground, have ethical hacking competitions where we ask people to hack the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;system, find gaps in security. The best APIs in the world do this," says Katragadda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He adds that India should not be scared to build large digital systems for public good in the fear that there will be security breaches. Even the paper based system before &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=aadhaar" target="_blank"&gt;Aadhaar &lt;/a&gt;had several security lapses, but were not visible. "Otherwise we need to have this holy grail of a system which is perfectly automated and we're at least 20 years away from full robotics," he adds.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-january-25-2018-alnoor-peermohamed-aadhaars-new-security-measures-are-good-it-is-still-work-in-progress'&gt;https://cis-india.org/internet-governance/news/business-standard-january-25-2018-alnoor-peermohamed-aadhaars-new-security-measures-are-good-it-is-still-work-in-progress&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-26T01:52:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations">
    <title>Aadhaar verification at airports raises need for stricter data privacy regulations</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations</link>
    <description>
        &lt;b&gt;The absence of legislation is letting companies compile and deploy sensitive personal information without legal oversight.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aman Sethi was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india-news/aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations/story-pNJYBM7mJkhRrFJElYX2RJ.html"&gt;Hindustan Times&lt;/a&gt; on November 27, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When Suvodeep Das, a 42-year-old marketing professional, took a Jet airways flight from Hyderabad to Mumbai in September, he said a software bug in the airline’s website wouldn’t let him check in online without first punching in his Aadhaar number.&lt;br /&gt;&lt;br /&gt;“When I got my boarding pass, it had my Aadhaar number printed on it,” Das told HT, wondering, “Why do you need an Aadhaar number to take a flight, and why display it publicly?”&lt;br /&gt;&lt;br /&gt;In October, another passenger found their Aadhaar number on the boarding pass: this time, it was barcoded.&lt;br /&gt;&lt;br /&gt;HT has reviewed both boarding passes. Publishing Aadhaar numbers is an offence under the Aadhaar Act 2016.&lt;br /&gt;&lt;br /&gt;Jet Airways did not respond to repeated requests for comment. Speaking off the record, airline executives said Jet encoded Aadhaar numbers to test the proposed Aadhaar Enabled Entry and Biometric Boarding System (AEEBBS): a complex Aadhaar-seeding project that aims to replace a passenger’s boarding pass with his/her fingerprint.&lt;br /&gt;&lt;br /&gt;Bangalore International Airport (BIAL), which plans to install AEEBBS, says it will improve passenger security and reduce check-in time at the Kempegowda International, India’s third busiest airport.&lt;br /&gt;&lt;br /&gt;Privacy advocates, however, say the system, which stores passenger biometrics and Aadhaar numbers on the servers of a private corporation, is an example of how the absence of a data protection law in India lets companies compile and deploy sensitive personal information without legal oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Future uses of the AEEBBS, according to the BIAL website, include  integrating the system with passenger blacklists, typically maintained  by the ministry of home affairs, to determine who can and cannot board a  flight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The unregulated proliferation of Aadhaar uses is  compromising the digital identities of citizens and putting them at  risk,” said Usha Ramanathan, a legal theorist who has written  extensively on Aadhaar. ”There is a misconception that data protection  is about data being at risk. It is actually about the rights of people  being at risk.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pilot Project&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January, Bangalore  International Airport Ltd (BIAL), the corporation that runs the  Bengaluru terminal, and Jet Airways integrated their flight and  passenger databases as part of a four-month pilot project to test the  AEEBS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The pilot project incorporated the entire airport journey  from entry right through to the boarding gate and included all security  check points,” a BIAL spokesperson said in an email. “The project  allowed for quicker processing time for a passenger from entry to  security gate while simultaneously enabling fewer points of human  interaction.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participation in the project was voluntary. BIAL  said about 15% of passengers opted to use it. In October, BIAL called  for bids for a full roll-out of the AEEBBS by December 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system, tender documents reveal, works in the following way:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First  passengers enter their Aadhaar numbers when they book their flights.  The airline turns this number into a QR code printed on the flight  ticket. Once at the terminal, passengers bypass the standard practice of  showing their ticket and ID to a security guard, and instead they enter  the terminal by flashing the ticket at a QR code scanner while pressing  their fingers against a biometric reader installed at the entrance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  AEEBBS verifies the passenger’s identity by querying the UIDAI’s  database, and then checks the airport’s flight information system to see  if the passenger is booked to fly that day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thereafter, the  system creates a “passenger dataset” that bundles the passenger’s  biometrics and flight information into a single file unique to each  passenger. This dataset is used to verify the identity of the passenger  at each checkpoint, allowing the airport to track the passenger until  she boards her plane.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tender document states that the  biometric data should be purged immediately after the passenger’s flight  departs. If flights are rescheduled, the biometrics shall persist until  the passenger finally departs.&lt;/p&gt;
&lt;div class="airport_wrap" style="text-align: justify; "&gt;
&lt;div class="airport_padding"&gt;
&lt;div class="airport_headline"&gt;Concerns over Bengaluru airport’s use of Aadhaar&lt;/div&gt;
The  Aadhaar-Enabled Entry and Biometric Boarding System (AEEBBS) aims to  replace boarding cards with a passenger’s fingerprint. Here is how it  works.&lt;/div&gt;
&lt;img src="http://www.hindustantimes.com/static/ht2017/11/bengaluru_airport_aadhaar.jpg" width="100%&amp;quot;/" /&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why Biometrics?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bengaluru isn’t the only airport experimenting with systems like the AEEBBS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  have initiated trials on facial recognition, iris and finger-print  scanning etc., to generate Aadhaar + Biometric enabled passenger  data-sets,” said a spokesperson for the GMR Hyderabad International  Airport. “We hope to complete these trials in the next two months and  deploy them by June 2018 for all domestic passengers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet  biometrics isn’t a fool-proof way of verifying someone’s identity.  Biometric experts have maintained that fingerprints can be copied and  printed onto “fake fingers” — a process known as spoofing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At  Michigan State University, biometric expert Anil Jain and his team have  developed so-called fake fingers using 12 different materials, the most  sophisticated of which mimics the physical properties of human skin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Many  of the commercial systems may not have state-of-the-art spoof detection  facilities,” Jain said, adding that he has advised the UIDAI on  biometrics in the past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jain said it was important that a secured  space like an airport have biometric readers that include “liveness”  detection, a term that refers to a broad set of techniques that use a  combination of advanced hardware and software to avoid spoof attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  it is not mandatory for UIDAI-certified biometric devices to have  liveness detection features. Documents published by Standardisation  Testing and Quality Certification (STQC), the agency tasked with  certifying Aadhaar devices, make clear that “liveness detection” is  “preferable” but not mandatory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some manufacturers of certified  devices say their devices have liveness detection, but STQC does not  include this specific feature in its testing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prof Jain said  biometrics are harder to forge than the identity cards that are  currently needed to gain access to airport terminals, suggesting that  the AEEBBS could increase security only if the data that undergirds the  system is properly secured.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Storage Concerns&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under  regulations framed by the Unique Identification Authority of India  (UIDAI), it is illegal to store biometric data captured for any  Aadhaar-related transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, UIDAI-certified biometric  devices are prohibited from storing biometric data which casts a cloud  over BIAL’s proposal to create passenger datasets to merge passenger  flight data, biometric data and Aadhaar numbers, and store it on a local  BIAL network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While UIDAI did not respond to requests for comment  on if these passenger data sets violated its regulations, BIAL said it  would work around the system by capturing passenger biometric data twice  — once to verify passenger identities in accordance with UIDAI  regulations, and once for the purpose of creating the passenger data  set.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our intent is to capture data and store a separate set of  biometrics records (delinked from Aadhaar) that include  face/iris/fingerprints for the purpose of authentication of passenger at  various check points inside the airport,” the spokesperson said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some experts believe this may not be enough.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The  Aadhaar Act and Regulations are supposed to ensure that our biometric  records are safe, and entities capturing biometrics for Aadhaar-related  purposes cannot store the biometrics,” said Pranesh Prakash, policy  director at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If biometrics  collected doesn’t need to follow the Aadhaar regulations because of a  technicality, how strong are the regulations?” Prakash said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last  year, 22.18 million passengers travelled through Bengaluru airport. Once  the AEEBBS is installed, the airport’s servers shall become a temporary  repository of millions of fingerprints, and a lucrative target for  sophisticated hackers who could capture this data by implanting  malicious software in the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such software has become easier  to access since August 2016, when a group calling itself the “Shadow  Brokers” announced it had stolen some of the world’s most advanced  cyber-weapons from the vaults of the Tailored Access Operations unit of  National Security Agency, which manages the cyber-arsenal of the United  States of America.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Designing the system to minimise the use of  biometrics could alleviate these concerns, according to Rahul Matthan, a  partner at law firm Trilegal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If data minimisation is the  principle that we keep on top of mind, Aadhaar should be used to allow  entry,” Matthan said, “Then the airport must devise other methods and  standards to ensure that security and passenger tracking is achieved.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguarding Aadhaar Numbers&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  AEEBBS also raises questions on the manner in which airlines and  airports will store non-biometric data like passenger Aadhaar numbers.  UIDAI regulations published in July 2017 say companies and government  departments must store Aadhaar numbers in secure, isolated, databases  called ‘Aadhaar Data Vaults’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Aadhaar number in these vaults  must be associated with a “reference key” — which is like a nick-name  for the Aadhaar number. So instead of using a citizen’s Aadhaar number  for a given transaction, businesses must preserve the confidentiality of  the number by using the reference key instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jet Airway’s  decision to print Aadhaar numbers, rather than the reference keys, on  the boarding passes, suggests that the airline is not following UIDAI  guidelines — a problem that is likely to multiply as more airlines start  gathering this information to avail of the AEEBBS facility. Jet Airways  did not respond to requests for comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the AEEBBS is in  place, BIAL also intends to use passenger data, harvested during  check-in and boarding, for commercial purposes, but it is unclear if and  how this data will be anonymised before it is used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We aim to  make meaning of the abundant data that will be collected,” the BIAL  spokesperson said, insisting that the airport would respect traveller  privacy and the data would not be sold to third parties. “In due course —  and with passenger consent — we intend to use business intelligence to  make the journey more impactful.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For lawyer Matthan, the AEEBBS  is an example of why India needs a comprehensive data protection law to  address issues between citizens and private corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There  is a need to ensure that Aadhaar is based on a sound framework of  privacy protection,” he said, noting that the recent Supreme Court  judgment protected citizen privacy against infringement by the  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data protection legislation, he said, would ensure that private corporations are held to the same standard.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aman-sethi-november-27-2017-aadhaar-verification-at-airports-raises-need-for-stricter-data-privacy-regulations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-27T13:34:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-paypers-march-16-2018-aadhaar-unique-ids-in-india-a-qualified-success">
    <title>Aadhaar unique IDs in India: a qualified success?</title>
    <link>https://cis-india.org/internet-governance/news/the-paypers-march-16-2018-aadhaar-unique-ids-in-india-a-qualified-success</link>
    <description>
        &lt;b&gt;Anshuman Jaswal form Kapronasia shares insights into the security and privacy concerns related to Aadhaar, which are often overlooked&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;em&gt;This editorial was first published in our &lt;a href="https://www.thepaypers.com/reports/web-fraud-prevention-and-online-authentication-market-guide-2017-2018/r770429" target="_blank"&gt;Web Fraud Prevention and Online Authentication Market Guide 2017/2018&lt;/a&gt;. The Guide is a complete overview of the fraud management, digital identity verification and authentication ecosystem provided by thought leaders in the industry from leading solution providers (both established and new players) to associations and experts.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Digital India project initiated by the Government of India has made significant headway in the last few years. As part of this project, the Unique Identification Authority of India (UIDAI) has presided over the allotment of unique identification numbers to all Indian residents since 2009. Currently, more than 1.1 billion Indian citizens and residents have Aadhaar IDs, making this the largest exercise of this kind the world has ever seen. There are many potential benefits of such a scheme, but there are also concerns and pitfalls. Besides the advantages, this article also focuses on some of the security and privacy concerns related to Aadhaar, which are often overlooked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Benefits of Aadhaar&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is the second most populous nation on earth, with more than 1.3 billion people. Having a unique identification system in place would be a fillip for the government, as it would allow government schemes for poverty alleviation and improvement in health and educational well-being to be better targeted. For example, if a needy person’s bank account is linked to their Aadhaar biometric ID, then it would be easier for the government to provide funds to the individual without using any intermediary. In a country struggling with corruption throughout the government machinery, being able to reach the target audience directly is a significant benefit. Similarly, if both the bank accounts and the tax IDs of individuals are linked to the Aadhaar ID, then the government can trace the income and expenditure of its citizens, thereby obtaining vital information that would allow it to counter money-laundering and the shadow economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Security challenges are paramount&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Creating a monumental technology infrastructure to meet the requirements of a population of more than 1.3 billion people does not come without its problems. Many people have questioned the wisdom of concentrating so much critical personal information in a government platform that is not known for having a robust security framework. There have been two prominent instances in which the Aadhaar database has been compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://www.ndtv.com/india-news/aadhaar-issuing-authority-uidai-asks-research-firm-cis-to-justify-data-leak-claim-1695574" target="_blank"&gt;In May 2017&lt;/a&gt;, the Bengaluru-based Centre for Internet and Society (CIS) alleged that there had been an illegal breach of the database, and Aadhaar identity numbers of more than 130 million people had been leaked online, along with their dates of birth, addresses, and tax IDs (PAN). It is believed that the revealed information did not include the biometric identification of the people affected, but the breach was significant nonetheless as it exposed millions of people to possible fraud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The response of the UIDAI was also insightful, because it asked the CIS to reveal on which servers the data was stored, and who might have been responsible for the breach. The UIDAI response quoted the relevant laws, namely sections of the Information Technology Act, 2000 and the Aadhaar Act, underlining the liability under law. The aggressive approach of the UIDAI forced the CIS to retract some of its claims, but then the focus of the discussion was shifted from the loss of critical information to the semantics of the claims of CIS. Instead of calling the breach a “leak”, after receiving the letter from UIDAI, CIS stated that it was merely an “illegal disclosure”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second instance of a breach occurred between &lt;a href="https://www.medianama.com/2017/08/223-ola-ekyc-aadhaar-police-bangalore/" target="_blank"&gt;January to July 2017&lt;/a&gt;, when an IT expert hacked into the Aadhaar-enabled e-hospital system created under the Digital India project of the Government of India. His intention was to access the central identities data repository of UIDAI for verification of Aadhaar numbers, to be used for an ‘eKYC Verification’ app created by him. The UIDAI database gave him access considering that it was the e-hospital system that was requesting the Aadhaar identity verification. The hack shows that the security protocols of the UIDAI require significant overhaul before it can be trusted to protect the hundreds of millions of digital identities in its database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Aadhaar and the right to privacy&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian constitution does not mention a right to privacy. This has been raised as a serious concern by the critics of Aadhaar, since there is no related privacy framework that outlines how the government can use the Aadhaar information. However, the Supreme Court of India addressed some of these concerns when it stated, in August 2017, that privacy is a fundamental right under the Constitution with reasonable restrictions. It was a landmark decision in the Indian context, since it could affect the way in which the unique identification data is collected, and especially the means for which it is used. For example, in the past, the government has mandated that Aadhaar data to be linked to citizens’ information from bank accounts, tax filings, medical records and phone numbers. Once this is achieved, the government would have unregulated access to such information. There is currently no statute or legal precedent to guard against abuse or to allow an individual to file a complaint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court decision gives encouragement to citizens and institutions that are concerned about the rights of ordinary individuals, while also laying the groundwork for further work that needs to be done to create a robust legal framework in this field.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read the original blog post published by the &lt;a class="external-link" href="https://www.thepaypers.com/expert-opinion/aadhaar-unique-ids-in-india-a-qualified-success-/772349"&gt;Paypers here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-paypers-march-16-2018-aadhaar-unique-ids-in-india-a-qualified-success'&gt;https://cis-india.org/internet-governance/news/the-paypers-march-16-2018-aadhaar-unique-ids-in-india-a-qualified-success&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-17T12:49:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns">
    <title>Aadhaar seeding: benefits and concerns</title>
    <link>https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns</link>
    <description>
        &lt;b&gt;Products and services such as bank accounts, life insurance policies and phone connections have to be linked with Aadhaar. But is this of any real help? &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shaikh Zoaib Saleem was published by &lt;a class="external-link" href="http://www.livemint.com/Money/Awu9Hz1DmuDzx0VTmQoPvL/Aadhaar-seeding-benefits-and-concerns.html"&gt;Livemint&lt;/a&gt; on November 14, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="A5l" style="text-align: justify; "&gt;The  government has made it mandatory for consumers to link many important  services with Aadhaar. You too may be getting frequent reminders to link  your banks account, mutual fund and mobile number with Aadhaar.  Recently, the Reserve Bank of India also clarified that it is mandatory  to link bank accounts with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest addition to this  list are insurance policies. In a circular, the Insurance Regulatory and  Development Authority of India (Irdai) has stated that linking of  Aadhaar number to insurance policies is mandatory under the Prevention  of Money-laundering (Maintenance of Records) Second Amendment Rules,  2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue is being discussed intensively, with the  Supreme  Court taking a decision in favour of linking Aadhaar biometrics and the  number with a host of services. Several petitions have been filed  challenging not just the linking of these services with Aadhaar but also  the validity of Aadhaar itself. We spoke to people who support and  those who oppose this linking, to understand how either case impacts  consumers.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;The benefits &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;According to the Unique  Identification Authority of India (UIDAI), government schemes are asking  for Aadhaar as it helps to clean out duplications and fakes, and  provides accurate data to enable implementation of direct benefit  programmes. “Use of Aadhaar reduces the cost of identifying persons and  provides increased transparency to the government in implementation of  its schemes,” the Authority states under frequently asked questions on  its website (read more at: &lt;a href="https://uidai.gov.in/your-aadhaar/help/faqs.html"&gt;https://uidai.gov.in/your-aadhaar/help/faqs.html) &lt;/a&gt;So,  when you link your bank account with your Aadhaar, government benefits  such as subsidy on LPG cylinders is credited directly to that  account. The FAQs, however, do not elaborate how such linking helps an  individual who does not get, or does not wish to get, such subsidies. In  a tweet, UIDAI had said that verifying a bank account using Aadhaar  adds an additional layer of security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nakul Saxena, a  former banker who now works on policy advocacy at the software think  tank iSpirt Foundation, said that linking of Aadhaar with these services  will help eradicate fake accounts, fake insurance policies and  unauthorised mobile connections. “It is possible that there are many  accounts in the system that have been opened using such documents and  copied signatures and even the banks may not be aware of it. Some people  may not even be aware that an account exists in their name. These  accounts need to be verified using Aadhaar now,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government claims to have removed millions of fake beneficiaries for government benefits by Aadhaar linking. As reported by &lt;i&gt;Mint&lt;/i&gt; in May 2017, over 23 million fake ration cards have been scrapped,  potentially saving the government Rs14,000 crore in food subsidy every  year. Another &lt;i&gt;Mint&lt;/i&gt; report in August says, three states discovered that about 2,72,000 fake students were availing the mid-day meal (MDM) scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  those who are against linking Aadhaar disagree with these arguments.  “Initially, Aadhaar was about delivery of services. But linking  everybody’s phone number and bank account is not about that anymore. The  real question is, what purpose this linking serves. If the intention is  to update the databases, then there can be other means to update  those,” said Rahul Narayan, a Supreme Court advocate who is among the  lawyers representing petitioners who have challenged Aadhaar linking in  court.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;The concerns &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The fundamental objection to  this linking of services is that all information on an individual will  be available at a single place, which could make surveillance easier and  also increase the risks if this information is hacked. “As of now, your  bank knows something about you, your insurance company knows something  and your mobile phone company knows something about you. Each of these  are different silos of information. When these converge, which is then  accessible to a single person, that person knows almost everything about  you,” said Narayan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, a user’s Aadhaar number  and fingerprint are permanent identifiers, and at least the Aadhaar  number has been compromised for over 130 million citizens, as per  a study by Centre for Internet &amp;amp; Society, said Nikhil Pahwa,  co-founder of the SaveTheInternet.in (&lt;a href="https://internetfreedom.in"&gt;https://internetfreedom.in) &lt;/a&gt;campaign  for net neutrality in India. “This leaves the users vulnerable to  social hacks, some of which we have already been reading about in the  news. To forcefully and mandatorily link Aadhaar to bank accounts means  that their finances are at risk,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saxena said the data  leaks that have been highlighted have been typically about demographic  details such as name, date of birth and address “which have been  commonly available so far.” However, given the heightened sensitivities  in this digital age, customers must ask their service providers to not  publish such details, nor provide this information freely, he added.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Grievance redressal and data privacy &lt;br /&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Another  major concern is the absence of a clear redressal mechanisms for  consumers in case of a data leak, misuse or hack. “When things go wrong,  consumers need to have access to a proper complaints mechanism. In the  case of Aadhaar, such access is to be provided through the establishment  of ‘contact centres’ under the Regulation 32 of the UIDAI Enrolment and  Update Regulations. To the best of our knowledge, not much beyond  Regulation 32 has yet been specified by the UIDAI,” said Renuka Sane,  associate professor at the National Institute of Public Finance and  Policy, who has worked on data privacy and security issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart  from this, Section 47 of the Aadhaar Act stipulates that only UIDAI or  its authorised officers can file a criminal complaint for violations of  the Act, she added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The UIDAI has been given complete discretion  in determining if and when to file a criminal complaint for violations  of the Act, and an individual aggrieved by actions of a third person is  left to rely upon the bonafide actions of the UIDAI,” Sane added. The  government is also working towards a data privacy legislation, that is  needed to give citizens protection against misuse of their data, and  them having some control over who gets their data, how it is used, and  where it can be shared. “However, a data privacy legislation and  mechanism will not ensure that data remains secure and protected, and  that processes are followed. The Act disallowing people from sharing  Aadhaar numbers did not prevent government departments from publishing  details online,” said Pahwa. He also said that systems can get hacked,  which could include the Aadhaar database, the parallel Aadhaar databases  with state governments, or eKYC databases held with banks and telecom  operators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saxena said the UIDAI has clarified that biometric  information is not stored with user agencies, and stored biometrics  can't be used for Aadhaar authentication or eKYC. “Hence, customers can  be assured when using Aadhaar and biometrics with authorized entities,”  he said. “The data privacy law will address data privacy and protection  in all digital systems, not just Aadhaar. It will equally apply to  social media and mobile apps. It should also go into the aspect of  ‘right to be forgotten’,” said Saxena.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pahwa, however, insists  that the least that should be done is to give citizens the right to not  link their Aadhaar and use other IDs for authentication, plus the  ability to change their ID number if the system gets compromised.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;What you should do &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;For  now, the deadlines for linking bank accounts with Aadhaar is 31  December 2017, and for mobile phones it is 7 February 2018. In its  latest hearing on the matter, the Supreme Court has directed service  providers to mention these deadlines in their reminders. “Right now,  regardless of what they say, nobody is going to shut down your bank  account or disconnect your mobile connection, at least till the  deadline. There are several petitions being heard in the Supreme Court.  The matter is supposed to be taken up by the Supreme Court in the last  week of November. The final word from the court is yet to come and it is  quite possible that at least the deadlines gets extended,” said  Narayan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If you have already linked these services with Aadhaar,  you are in no trouble. But if you are having second thoughts, the  linking cannot be undone. If you are concerned about safety or other  aspects, you can wait to get more clarity from the Supreme Court.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns'&gt;https://cis-india.org/internet-governance/news/shaikh-zoaib-saleem-livemint-november-14-2017-aadhaar-seeding-benefits-and-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-23T02:02:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected">
    <title>Aadhaar security: Here's how your private information can be protected</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected</link>
    <description>
        &lt;b&gt;Lock Aadhaar, and notify UIDAI if you get a one-time-password for a transaction you did not initiate&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/aadhaar-security-here-s-how-your-private-information-can-be-protected-117051000611_1.html"&gt;Business Standard&lt;/a&gt; on May 11, 2017. Udbhav Tiwari was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;The linking of Aadhaar — the 12-digit unique  identification number for Indian residents — across various benefits is  going through a roller-coaster ride. On one hand, the government, keen  to make it mandatory, is linking it with filing of income-tax returns  and benefits. But, on the other, many are uncomfortable with it because  of privacy issues and leakages that have been reported recently. The  Supreme Court, on Tuesday, referred another fresh plea challenging the  Aadhaar Act and its mandatory use in government schemes to a larger  Constitution bench. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;There has been several reports that say that Aadhaar numbers and other  personal data are being leaked. Bengaluru-based Centre for Internet and  Society (CIS) has published a report (titled Information security  practices of Aadhaar, or lack thereof) where it lists four government  departments that have posted Aadhaar numbers and other personal  information of people. According to the report, an estimated 130-135  million Aadhaar numbers and 100 million bank account numbers were posted  on the four portals that the CIS researchers checked. Normally such  data should be kept on the government’s intranet, where only authorised  people can access it. However, a few government departments have  uploaded this data on their websites. In many cases, the data was in  excel format, making it all the more easy for people to download and  misuse it. The worst part: If your data is stolen, you cannot file even a  First Information Report with the police. Only the nodal body, the  Unique Identification Authority of India (UIDAI), can file a police  complaint.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Your data can be misused:&lt;/b&gt; Experts say that leakage  of Aadhaar numbers and other personal information into the public domain  violates peoples’ privacy. “Your name, phone number, address, bank  account number and Aadhaar number are personal information. Only you  have the right to decide whether to release such information to others.  Such data shouldn’t be complied in excel sheets in large numbers and be  freely accessible on the internet to everyone," says Udbhav Tiwari,  policy officer at the Centre for Internet and Society, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tele-marketers  and advertisers will have access to the personal information of all  those people. More serious problems such as identity theft can occur.  Says Smitha Krishna Prasad, project manager, Centre for Communication  Governance at National Law University, Delhi: “The more sensitive  information a person has about you, the easier it becomes to impersonate  you when that person is speaking to, say, a bank." The impersonator  could open a bank account or even take a loan in your name.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suppose  a hacker gets your email ID. “He will use the ‘password reset or forgot  password’ feature to change your password and get access to your  account. This feature poses questions based on personal info about you.  Any such data collected about you comes useful here. Such hackers mine a  lot of data about potential victims from all possible sources," says  Shomiron Das Gupta of NetMonastery, a threat management provider. In the  email, he could find info about your bank account, credit card account,  etc, and cause financial losses to you.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Serious risks can  also arise if someone manages to breach the biometric authentication or  one-time password (OTP) required for using the Aadhaar system. “It is  possible to copy an individual’s fingerprints, and replicate them using  very commonly available resins. It is also possible for hackers to  capture the data being communicated between a telephone tower and a  mobile phone, especially if it is poorly encrypted. This will allow the  hacker to see the OTP. Admittedly, this does require expertise and a  targeted effort vis-a-vis an individual," says Tiwari. Now that the  Aadhaar numbers of so many people have been divulged, someone could  utilise their identities to steal their government-granted benefits, or  obtain a SIM card, which could then be misused. Raman Jit Singh Chima,  policy director, Access Now, says at many places where the Aadhaar  number is required today, no biometric authentication is done. So just  the number can be used to impersonate you.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lock your biometrics:&lt;/b&gt; If your Aadhaar number and  other personal information have been leaked, here are a few steps you  can take to safeguard yourself. One, be wary of any calls you receive  asking for additional details, which may not have been leaked already.  Be equally wary if you receive a call wherein someone rattles off your  personal data and asks you to verify it. The caller could pretend to be  calling from your bank. It is best not to reveal or confirm any  information over the phone at all. Two, you have the option to lock your  biometric data online. Even if someone manages to steal your  fingerprint, he will not be able to use it if you have locked your  biometric data (see table). Also, if you get an OTP on your phone for an  Aadhaar utilisation that you did not initiate, notify the UIDAI, and  thus ensure that no transaction is carried out using your Aadhaar  account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a privacy law: &lt;/b&gt;To  prevent data leaks in the future, the government needs to sensitise  state government officials who work with Aadhaar data about the need to  protect the its privacy. More importantly, India needs a comprehensive  data protection law. At present, there is limited provision in the  Information Technology Act of 2008 under which you can file a civil case  against a corporate that has leaked your personal information. “The  person affected by data leakage has to show that he has suffered  wrongful loss, or somebody else has enjoyed a wrongful gain, and then  claim compensation," says Prasad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the Radia tapes  incident, the government had said it would pass a comprehensive privacy  law. “This law would lead to the creation of a data protection authority  with enforcement powers, which would be able to penalise both companies  and government bodies violating privacy principles. Despite the process  beginning in 2012-13, and multiple drafts being leaked into the public  domain, there has not been much progress on this count," says Chima. He  adds that when the privacy law becomes a reality, any part of the  Aadhaar Act that is contrary to it should also be amended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How to lock your biometric data online&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Go  to the UIDAI web site: https://uidai.gov.inGo to Aadhaar services, then  Lock/Unlock Biometrics Enter Aadhaar number Enter security code that  appears below the Aadhaar numberYou will receive an OTP on your  registered mobile number. Enter it Click ‘Verify’Click box against  ‘Enable biometric lock’Click on Submit buttonSame procedure can be  repeated to disable biometric lock.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected'&gt;https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T10:05:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/asian-age-march-25-2018-aadhaar-safety">
    <title>Aadhaar safety</title>
    <link>https://cis-india.org/internet-governance/news/asian-age-march-25-2018-aadhaar-safety</link>
    <description>
        &lt;b&gt;We get experts to give their take on a current issue each week and lend their perspective to a much-discussed topic.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.asianage.com/life/more-features/250318/aadhaar-safety.html"&gt;Asian Age&lt;/a&gt; on March 25, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Attorney General K. K. Venugopal claiming before a five-judge constitutional Bench of the Supreme Court that Aadhaar data remains safe and secure behind a  complex with 13-ft high and 5-ft thick walls has resulted in a series of trolls and hilarious responses. We ask tech experts if this is the proper way to ensure safety of digital data and their opinions on alternatives, if any, to keep public data safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;‘Safety claims are bogus’&lt;br /&gt;&lt;em&gt;Hrishikesh Bhaskaran, Privacy Activist&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;Aadhaar safety claims are bogus. It is vulnerable and its vulnerabilities were pointed out by many information security experts in the past. If someone says that a 13-ft high 5-ft thick wall complex is protecting your digital data (which is well connected to the outside network) be sure that a village is missing its idiot. Digital data leak almost always happens through the network. Multiple cases were reported about the Aadhaar data leak (The Tribune report for example). Many government sites are leaking Aadhaar details of citizens and are available publicly through a simple Google search. (Read as the data are already in public without anyone hacking into it).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system is defective by design and is maintained by mediocre talents and technology. I feel that their claims about the huge walled protection are a tactic to divert discussion on the human rights angle because otherwise, the government will have no choice but to scrap the whole Aadhaar idea. The only way to protect the personal data of citizens is to start afresh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;‘Multi-level security assumes added significance’&lt;br /&gt;&lt;em&gt;Jaideep Mehta, CEO of VCCircle.com&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;Physical security is an important component in the overall security architecture. In addition there is a need to protect the data with multiple levels of cyber security including data encryption, bio-metric driven access, protection against malware and so on. Multi-dimensional security assumes added significance as this is a nationally important database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;‘Tightening system, or line of human command more important’&lt;br /&gt;&lt;em&gt;Ershad Kaleebullah, Technology Editor&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;There are right ways to secure digital data. I know of solutions at the individual user level. But for something of Aadhaar’s size the security of digital data will obviously happen at a much, much larger scale. All the resident data and raw biometrics are stored in UIDAI’s datacentre and even fortifying it with the world’s thickest and tallest wall is not going to protect them. I’m really not sure of any foolproof data security systems in the world at that scale. Tightening the system or the line of human command is more important. If Snowden can walk out of NSA with highly confidential information on a lowly thumb drive, Aadhaar data can be easily hacked. If I have to be blunt here, Indians can’t keep a secret to save their lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;‘Your data security is in your hands, always be cautious’&lt;br /&gt;&lt;em&gt;Viraj Kumar Pratapwant, Senior Software Design Engineer&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;First off, no hacker is going to run into a data center and rob data disks. The idea to construct high and thick walls will make anyone chuckle. Speaking about alternatives, let's talk about data. Basically there are two types of data: Data in Motion and Data at Rest. With the right set of firewalls guarding these two kinds will ensure some amount of security. Sensitive and vital information should always be encrypted and kept out of reach for any external source to access this data. Having multiple steps of verification could help the user safeguard his authenticity. Your data and privacy are the most important factor, they should only be shared with trusted sources and with your consent. A lot of data are going digital and soon our lives will completely rely on digital data. The government should enforce strict vigilance to public data. They should make sure that the consumers should follow all the security guidelines and must prove that the data will be saved responsibly. Any compromise caused by any sources should be penalised by law. Lastly, your data security is in your hands, always be cautious about who and where you are giving the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;em&gt;&lt;strong&gt;Sunil Abraham, Executive Director at Centre for Internet and Society&lt;/strong&gt;&lt;/em&gt;&lt;br /&gt;Encryption, regardless of the key length, is only useful when citizens have absolute control of the private key. If the UIDAI had gone with smart cards my private key would have only been stored on my smart card. Even though the data in encrypted in the CIDR - the deduplication software needs to compare the bio metric of the person getting enrolled with the unencrypted bio metric of others already in the database. This means that the engineer who controls the software has access to the whole bio metric database. If a foreign state installs a Trojan on the engineer's system it can get into the CIDR. The deduplication software is a proprietary black box software which is owned by a foreign corporation. We don't know what hidden capabilities are there in this software.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/asian-age-march-25-2018-aadhaar-safety'&gt;https://cis-india.org/internet-governance/news/asian-age-march-25-2018-aadhaar-safety&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-03-26T17:09:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-karan-saini-may-11-2018-aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians">
    <title>Aadhaar Remains an Unending Security Nightmare for a Billion Indians</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-karan-saini-may-11-2018-aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians</link>
    <description>
        &lt;b&gt;Yesterday was the 38th and last day of hearings in the Supreme Court case challenging the constitutional validity of India’s biometric authentication programme. After weeks of arguments from both sides, the Supreme Court has now reserved the matter for judgement.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Karan Saini was published in the &lt;a class="external-link" href="https://thewire.in/government/aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians"&gt;Wire&lt;/a&gt; on May 11, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Since its inception, the Aadhaar project has lurched from controversy to scandal. In the last two years, the debate has heavily centred around issues of data security, privacy and government overreach. This debate, unfortunately, like with most things Aadhaar, has been obfuscated in no small part due to the manner in which the Unique Identification Authority of India (UIDAI) reacts to critical public discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As India waits for the apex court’s judgement, this is as good time as any to take stock of the security and privacy flaws underpinning the Aadhaar ecosystem.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Poor security standards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Let’s start with the lackadaisical attitude towards information security. As has become evident in the &lt;a href="https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof/view" target="_blank"&gt;past&lt;/a&gt;, harvesting and collecting Aadhaar numbers – or acquiring scans and prints of valid Aadhaar cards – has become a trivial matter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several government websites which implement Aadhaar authentication while at the same time lack in basic security practices such as the use of SSL to encrypt user traffic and/or the use of captchas to protect against brute-force or scraping attacks. This includes the biometric attendance website of the &lt;a href="http://dgftbct.attendance.gov.in/register/myemp" rel="noopener" target="_blank"&gt;Director General of Foreign Trade&lt;/a&gt;, the website for the &lt;a href="http://nfsm.gov.in/dbt/aadhaarverification.aspx" rel="noopener" target="_blank"&gt;National Food Security Mission&lt;/a&gt; and the &lt;a href="http://medleaprhry.gov.in/PvtAddRecord.aspx" rel="noopener" target="_blank"&gt;Medleapr website&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With numerous government websites being susceptible, problematic issues such as the use of open directories to store sensitive data gives us a look into how even the bare minimum – when it comes to adhering to security best practices – isn’t enforced across the gamut of websites which interface with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should not be acceptable practice to have government websites with open web directories containing PDF scans of dozens of Aadhaar cards available for just about anyone to view and/or download. Yet, over the past year and even before, many government websites have been found to either inadvertently or knowingly publish this information without much regard for the potential consequences it could have.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has repeatedly shown an attitude of hostility and dismissiveness when it comes to fixing security and privacy issues which are present in the Aadhaar ecosystem. It has also shown no signs of how it plans to tackle this problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In my personal experience as a security researcher, I have found and reported a cache of more than 40,000 scanned Aadhaar cards being available through an unsecured database managed by a private company, which relied on those scans for the purposes of verifying and maintaining records of their customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s worse is that the media reports regarding Aadhaar information being exposed may only be scratching the surface of the issue as more data may actually be susceptible to access and theft, and simply yet to be found and publicly reported. For example, data could be leaking through publicly available data stores of third-party companies interfacing with Aadhaar, or through inadequately secured API and sensitive portals without proper access controls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not all security incidents become a matter of public knowledge, so what we know at any given point about the illegal exposure of Aadhaar information may just be a glimpse of what is actually out there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be acknowledged that the possession of these 12-digit numbers and their corresponding demographic information can open up room for potential fraud –  or at the very least make it easier for criminals to carry out identity theft and SIM and banking fraud.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="https://thewire.in/economy/aadhaar-fraud-uidai" target="_blank"&gt;detailed analysis&lt;/a&gt; of all publicly-reported Aadhaar-related or Aadhaar-enabled fraud over the last few years shows that the problem is not only real but deserves far more attention than what it has received so far.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Threat level infinity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Taking a step back, it’s clear that the Aadhaar project snowballed into an ecosystem that it now struggles to control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, demographic information – as is stated in the draft for the &lt;a href="https://www.uidai.gov.in/images/the_aadhaar_act_2016.pdf" rel="noopener" target="_blank"&gt;Aadhaar Act&lt;/a&gt; (NIDAI Bill 2010) – was originally considered confidential information, meaning no entity could request your demographic information such as name, address, phone number etc. for purposes of eKYC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, as the ecosystem has progressed, the implementation and usage of eKYC have also changed and grown significantly with companies like PayTM utilising eKYC for the purposes of requesting and verifying customer information. It should be considered that data which has been collected by any of these companies through Aadhaar can be accessed by them in the future for an indefinite period of time depending on their own policies regarding storage and retention of the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If there ever is a breach of the CIDR or a mirrored silo containing a significant amount of Aadhaar-related data, it would directly affect more than one billion people. To put this in perspective, it would easily be the single largest breach of data in terms of the sheer number of people affected &lt;i&gt;and&lt;/i&gt; it would have far-reaching consequences for everyone affected which might be very hard to offset.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On a comparatively smaller scale – although just as serious, if not more in terms of potential implications – would be a breach of any given state’s resident data hub (SRDH) repository. In some cases, SRDHs &lt;a href="https://www.thenewsminute.com/article/13-lakh-aadhaar-numbers-leaked-andhra-govt-website-linked-personal-details-80178" rel="noopener" target="_blank"&gt;have been known to integrate data&lt;/a&gt; acquired from other sources containing information regarding parameters such as caste, banking details, religion, employment status, salaries, and &lt;a href="https://webcache.googleusercontent.com/search?q=cache:-HMXusc-Nm4J:https://mpsrdh.gov.in/aboutUsCitizen.html+&amp;amp;cd=2&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=in&amp;amp;client=firefox-b-ab" rel="noopener" target="_blank"&gt;then linking the same&lt;/a&gt; to residents’ corresponding Aadhaar data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Damage control would be costly and painstaking due to the number of people enrolled. What adds to the disastrous consequences is that one cannot just deactivate their Aadhaar or opt-out of the programme the way they would with say a compromised Facebook or Twitter account. You can always deactivate Facebook. You cannot deactivate your Aadhaar. It should be noted that even with biometrics set to ‘disabled’, Aadhaar verification transactions can be verified through OTP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the Aadhaar ecosystem is such that information about individuals can be accessed not just from UIDAI servers but also from other third-party databases where Aadhaar numbers are linked with their own respective datasets. Due to this aspect – multiple points of failure are introduced for possible compromise of data, especially because third-party databases are almost certainly not as secure as the CIDR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, after taking a closer look at the ecosystem of websites which incorporate the use of Aadhaar based authentication, I &lt;a href="https://www.karansaini.com/extracting-aadhaar-linked-phone-numbers/" rel="noopener" target="_blank"&gt;discovered that it was possible&lt;/a&gt; to extract the phone number linked to any given Aadhaar through the use of websites which poorly implemented Aadhaar text-based (OTP) authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This process worked by first retrieving the last four digits of the phone number linked to an Aadhaar using any website which reveals this information (this includes DigiLocker, NFSM.gov.in and seems to be standard practice which seems to be enforced by UIDAI) and then performing an enumeration attack on the first six digits using websites which allow the user to provide both their Aadhaar number and the verified phone number linked to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This again highlights that while secure practices might be followed by the UIDAI, the errors in implementation and other flaws are introduced neverthelessby third parties who interface with Aadhaar, posing a risk to the privacy and security of its data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The bank mapper rabbit hole&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As of February 24, 2017, it &lt;a href="https://thewire.in/government/india-inc-needs-to-fix-numerous-basic-%20information-security-flaws-quickly)" target="_blank"&gt;was possible&lt;/a&gt; to retrieve bank linking status information directly from UIDAI’s website without any prior verification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, after this information was reported, the ‘&lt;a href="https://uidai.gov.in/" rel="noopener" target="_blank"&gt;uidai.gov.in&lt;/a&gt;’ website was updated to first require requesters to prove their identity before retrieving Aadhaar bank-linking data from the endpoint on their website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A year later – when business technology news site &lt;i&gt;ZDNet &lt;/i&gt;published their report regarding a flawed API on the website of a state-owned utility company (later revealed to be Indane) – part of the data revealed included bank linking status information which was identical to what was previously revealed on UIDAI’s website without proper authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This suggests that both the Indane API and UIDAI website utilised the National Payments Corporation of India (NPCI) to retrieve bank-linking data – but as of now, this remains conjecture since Indane never put out a statement or gave a public comment regarding the flawed API on their website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More importantly, what this also suggests is that the NPCI never placed any controls or security mechanisms (such as request throttling or access controls) on the lookup requests it processed for the UIDAI (and seemingly for Indane as well).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This means that while the UIDAI may have fixed their website to not reveal bank linking data without proper verification – the issue was not rectified at its core by the NPCI – allowing the same to happen a year later in Indane’s case. This practice also classifies as a case of security through obscurity, &lt;a href="http://users.softlab.ntua.gr/~taver/security/secur3.html" rel="noopener" target="_blank"&gt;which&lt;/a&gt; “is the belief that a system of any sort can be secure so long as nobody outside of its implementation group is allowed to find out anything about its internal mechanisms”.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Who is on the hook?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There is a lack of needed accountability when it comes to data breaches. Have any of the organisations against whom allegations of data breach been made been investigated and acted on? Have fines been imposed on those responsible for allowing access/theft of user data? Have there been reports published by any of the affected organisations in which they investigate any alleged breaches to either provide insight regarding the breach and its impact, the scale of data accessed, logs of access and other crucial evidence or dismiss the allegations by proving that there was no intrusion which took place?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of the times, organisations do not even accept that a breach has taken place, let alone take responsibility for the same and strive to better protect user data in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Switching to ‘PR spin mode’ should never be the answer when dealing with the data of billion-plus Indian citizens and residents. This can be observed in almost all cases where a breach or security lapse was alleged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has also acquired the dubious reputation of sending legal notices and slapping cases on journalists and security researchers who seek to highlight the security and privacy problems ailing the Aadhaar infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In March 2017, a case against Sameer Kochhar – chairman of the Skoch Group – was filed on the basis of a complaint from Yashwant Kumar of the UIDAI allegedly for “spreading rumours on the internet about vulnerability of the Aadhaar system”. Kochhar had written an article in February 2017 titled “Is a Deep State at Work to Steal Digital India?” in which a request replay attack on biometric Aadhaar authentication was demonstrated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two months later, The Centre for Internet and Society published a report regarding several government websites which were inadvertently leaking millions of Aadhaar card numbers. A few days after this report was published, the UIDAI &lt;a href="https://in.reuters.com/article/india-aadhaar-breach/critics-of-aadhaar-project-say-they-have-%20been-harassed-put-under-surveillance-idINKCN1FX1SS" rel="noopener" target="_blank"&gt;sent a legal notice to the organisation&lt;/a&gt;, stating that the people involved with the report had to be “brought to justice”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January 2018, an investigative story was published by Rachna Khaira of &lt;em&gt;The Tribune&lt;/em&gt; newspaper – in which she reported that access to an Aadhaar portal was being sold by “agents” for as cheap as Rs 500. In response to this story – the UIDAI first sought to discredit the investigative work by calling it a ‘case of misreporting’ – after which they attempted to downplay the magnitude of the report by citing that biometrics were safe and had not been breached.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this, the Delhi crime branch registered an FIR against the reporter and others named in the article on the basis of a complaint by a UIDAI official, with charges ranging from forgery, cheating by impersonation and unauthorised access of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In March 2018, &lt;em&gt;ZDNet&lt;/em&gt; published a report about Aadhaar-related data leaking from an unsecured API on a utility provider’s website. This was the result of days of testing to first confirm the existence issue and its scope. It was preempted by more than a month of attempted communication through several channels of communication – email, phone, even direct messages via Twitter – with both Indane and the UIDAI (and even the Indian Consulate in New York).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But still, when the report was published after a lack of acknowledgement/response from affected parties, the UIDAI was quick to deny the report as well as any possibility of such a thing occurring. The Aadhaar agency then released a statement in which they said they were ‘contemplating legal action’ against the publication of their report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data security and privacy laws won’t do much to affect the dismissive and hostile attitude the UIDAI seems to have regarding the people that investigate and report on security and privacy issues relating to Aadhaar.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Hide and seek&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In general, when it comes to reports of security breaches and security incidents, many authorities in India prefer playing the blame-game. This was seen latest in response to an internal letter (ironically marked as ‘SECRET’) that was circulated on social media – which mentioned that data was stolen from the Aadhaar Seeding portal of the EPFO by hackers exploiting a known vulnerability in the Apache Struts framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this – the EPFO &lt;a href="https://economictimes.indiatimes.com/wealth/personal-finance-news/epfo-slams-aadhaar-data-theft-reports-on-social-media/articleshow/63999631.cms?utm_source=WAPusers&amp;amp;utm_medium=whatsappshare&amp;amp;utm_campaign=socialsharebutton&amp;amp;from=mdr" rel="noopener" target="_blank"&gt;quickly switched to PR mode&lt;/a&gt; and publicly issued a statement through their official Twitter account (@socialepfo) denying the breach – saying that “There is no leak from EPFO database. We have already shut down the alleged Aadhaar seeding site run by Common Service Centres on 22.03.2018.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every time reports of a potential breach or leak of data circulate, Indian government agencies are quick to come out and announce that no breach has taken place. However, this is always to be taken just on the basis of their saying so, as opposed to the reports which they’re meant to be arguing (in some cases) contain verifiable evidence which is the result of arduous investigative work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regardless, passing around the blame and in cases completely denying security incidents is not something authorities should be doing when it concerns the data of more than a billion people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response to a recent story by &lt;em&gt;Asia Times&lt;/em&gt; &lt;a href="https://www.thewire.in/government/cracked-aadhaar-enrolment-software-being-sold" rel="noopener" target="_blank"&gt;regarding Aadhaar enrolment software being cracked and sold&lt;/a&gt;, the UIDAI sought to discredit and discount the report through messages shared on their social media profiles – where they stated that the report was “baseless, false, misleading and irresponsible”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI should have an interest in protecting any and all data which stems from or relates to Aadhaar as it has to do with a project they are ultimately responsible for. It should not matter whether the leak occurred from a portal on EPFO’s website, an API without proper access controls on Indane’s website, a website of the Andhra Pradesh state government, through biometric request replay attacks, through sold access to admin portals and cracked software, or however else. It should ultimately be the UIDAI’s responsibility to not only be reactive about these issues when they’re brought to light but to do so in such a way which does not hinder reporters from continuing their work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, if the UIDAI wishes to keep its systems as secure as they could be – they should proactively seek such reports about flaws or vulnerabilities in critical infrastructure pertaining to their project.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The way forward&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In April 2018, the head of the Indian Computer Emergency Response Team (CERT-IN), &lt;a href="https://factordaily.com/vulnerability-reported-cert/" rel="noopener" target="_blank"&gt;rather defensively noted&lt;/a&gt; that “not a single person had reported any incident” to the organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CERT-In, a part of the IT ministry, is the central agency responsible for dealing with security issues and incidents. To put it bluntly, it has not done a very great job of outreach when it comes to the people it ultimately relies on: security researchers and hackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, there is an abundance of skills and talent when it comes to IT security and this could be of immense help to organisations responsible for managing critical infrastructure – but only if they cared enough to utilise it to the fullest extent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay Bhushan Pandey, the CEO of UIDAI,  promised a secure and legal bug reporting environment for the Aadhaar ecosystem sometime in 2017. However, almost a year later, there are no tangible signs of any steps being taken to ensure the same. In fact, the UIDAI would already be straying from their usual course of action if they stopped harassing people reporting on issues of security and privacy with regard to Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been suggested that the UIDAI employ a bug bounty programme – which involves rewarding hackers with monetary compensation or through means such as an addition to a ‘Security Hall of Fame’ as an incentive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I personally believe that there is no need for a bug bounty programme in its traditional sense – meaning that UIDAI should not have to provide material incentives to attract hackers to report valid issues to them. Simply acknowledging the work of those that discover and report valid issues should more than likely be incentive enough to get talent on-board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US Department of Defense (DoD) employs a similar approach &lt;a href="https://www.hackerone.com/sites/default/files/2018-03/Distributed%20Defense-How%20Governments%20Deploy%20Hacker-Powered%20Security.pdf" rel="noopener" target="_blank"&gt;where they invite hackers from the world&lt;/a&gt; over to test their systems for security vulnerabilities/bugs and then report them in a responsible manner. What the hackers get in return is the acknowledgement of their skill and devotion to ensuring the security of DoD’s platform. Something similar needs to be set up with regard to critical information infrastructures in India so that issues can be reported by anyone who wishes to do so – without hassle and/or fear of persecution hanging over the heads of hackers.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-karan-saini-may-11-2018-aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians'&gt;https://cis-india.org/internet-governance/news/the-wire-karan-saini-may-11-2018-aadhaar-remains-an-unending-security-nightmare-for-a-billion-indians&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-05-13T16:28:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind">
    <title>Aadhaar privacy: Key issues that all Aadhaar card holders should bear in mind</title>
    <link>https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind</link>
    <description>
        &lt;b&gt;As the Supreme Court hears petitions whether the right to privacy is a fundamental right, there are some key aspects that Aadhar Card holders should bear in mind, especially, because the government has made Aadhaar mandatory for a number of schemes and official purposes, including the filing of income tax returns.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.businesstoday.in/current/economy-politics/aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind/story/256723.html"&gt;published by Business Today&lt;/a&gt; on July 19, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Linking of PAN with Aadhaar: What it means&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government claims that by linking the Aadhaar with PAN, authorities will  be able to crack down on people with multiple PAN cards, and those who  are escaping the tax net. The government has also made it clear that all  bank accounts will have to be linked to Aadhar by the end of this year.  This, essentially, implies that the government will be able track  financial transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amit  Maheshwari, Partner, Ashok Maheshwary &amp;amp; Associates LLP, says, "As  the bank accounts of the person would already have PAN as his/her KYC  requirement, once Aadhaar is linked with PAN, it will certainly lead to  automatic link with the bank accounts as well."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Since Aadhaar is  based on biometrics, the chances of duplication are much less as  compared to PAN, which is not based on biometrics," Maheshwari adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to the latest data, there are more than 24.37 crore PANs registered in  the country, while Aadhaar card has been issued to 113 crore people.  Against this, only 2.87 crore individuals filed income tax returns (in  the assessment year 2012-2013), out of which 1.62 crore did not pay any  tax - leaving the number of taxpayers at just one per cent of the  country's total population. Given the abysmally low number of tax payers  in the country, the government intends to keep a close watch on tax  evaders with this move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the judgment is awaited, here's a low-down on how to link your PAN card with Aadhaar:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Register on the e-Filing portal of the Income Tax Department, www.incometaxindiaefiling.gov.in&lt;/li&gt;
&lt;li&gt;Enter log-in ID, password and date of birth&lt;/li&gt;
&lt;li&gt;After  logging in, go to your profile setting which has the option of linking  your Aadhaar Card. Generally, a pop-up window appears, prompting you to  link your PAN card with Aadhaar card.&lt;/li&gt;
&lt;li&gt;Check if the details such as name, date of birth and gender appearing on screen match with those on your Aadhaar card.&lt;/li&gt;
&lt;li&gt;Enter  your Aadhaar card number and click on the 'link now' button. If details  on both the cards match, your card will be linked instantly.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;b&gt;Aadhaar prone to financial frauds&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many  civil rights activists have raised concerns about privacy and security  of data under Aadhar. Bangalore-based civil society group, The Centre  for Internet and Society (CIS), has expressed concerns over the lack of  security features associated with Aadhaar-linked financial transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Authored  by Amber Sinha and Srinivas Kodali, the CIS report pointed out that  unless sufficient security features are added, the system is prone to  financial frauds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The availability of large datasets of Aadhaar  numbers along with bank account numbers and phone numbers on the  Internet increases the risk of financial fraud," the report said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to the authors, social engineering is often used to find out bank  account details, credit card numbers and passwords to steal money from  people's accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"One of the prime examples is individuals  receiving phone calls from someone claiming to be from the bank. Aadhaar  data makes this process much easier for fraud and increases the risk  around transactions. In the US, the ease of getting Social Security  Numbers from public databases has resulted in numerous cases of identity  theft. These risks increase multifold in India due the proliferation of  Aadhaar numbers and other related data available," the report pointed  out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How secure is Aadhar Pay?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In May, when malicious  ransomware (in which the attacker locks down your computer and demands  money to unlock it) infected hundreds of computers in different  countries, questions were raised on how safe are we from cyber attacks,  especially when digital transactions are increasing by leaps and bounds?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government launched Aadhaar Pay, a platform that allows you to make  payments using Aadhaar number-linked bank accounts. It is a merchant  version of Aadhaar-enabled payment system which lets you make payments  without a smartphone. One just requires the fingerprint of the payer for  authentication; there is no need for a POS machine to swipe the card.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  when passwords are fallible, how reliable can biometric authentication  from Aadhaar Pay be, particularly when there have been cases of leakage  of Aadhaar data? According to some experts, Aadhaar authentication is  pretty strong because you cannot connect to the Aadhaar database except  through secured APIs.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind'&gt;https://cis-india.org/internet-governance/news/business-today-july-19-2017-aadhaar-privacy-key-issues-that-all-aadhaar-card-holders-should-bear-in-mind&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-20T14:18:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report">
    <title>Aadhaar numbers of 135 mn may have leaked, claims CIS report</title>
    <link>https://cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report</link>
    <description>
        &lt;b&gt;Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals due to lack of IT security practices, the Centre for Internet and Society has claimed. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published by &lt;a class="external-link" href="http://www.dnaindia.com/india/report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report-2425384"&gt;DNA&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Based on the numbers available on the websites looked at, estimated  number of Aadhaar numbers leaked through these four portals could be  around 130-135 million," the report by CIS said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, as many as 100 million bank account numbers could have been "leaked" from the four portals, it added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The portals where the purported leaks happened were those of  National Social Assistance Programme, National Rural Employment  Guarantee Scheme, as well as two websites of the Andhra Pradesh  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Over 23 crore beneficiaries have been brought under Aadhaar  programme for DBT (Direct Benefit Transfer), and if a significant number  of schemes have mishandled data in a similar way, we could be looking  at a data leak closer to that number," it cautioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disclosure came as part of a CIS report titled 'Information  Security Practices of Aadhaar (or lack thereof): A Documentation of  Public Availability of Aadhaar Numbers with Sensitive Personal Financial  Information'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When contaced, a senior official of the Unique Identification  Authority of India (UIDAI) said that there was no breach in its own  database. The UIDAI issues Aadhaar to citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS report claimed that the absence of "proper controls" in  populating the databases could have disastrous results as it may divulge  sensitive information about individuals, including details about  address, photographs and financial data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The lack of consistency of data masking and de- identification  standard is an issue of great concern...the masking of Aadhaar numbers  does not follow a consistent pattern," the report added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report'&gt;https://cis-india.org/internet-governance/news/dna-may-2-2017-report-aadhaar-numbers-of-135-mn-may-have-leaked-claims-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T11:10:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report">
    <title>Aadhaar numbers of 135 mn may have leaked, claims CIS report</title>
    <link>https://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report</link>
    <description>
        &lt;b&gt;Aadhaar numbers and personal information of as many as 135 million Indians could have been leaked from four government portals due to lack of IT security practices, the Centre for Internet and Society has claimed.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The news was published by the &lt;a class="external-link" href="http://www.ptinews.com/news/8665876_Aadhaar-numbers-of-135-mn-may-have-leaked--claims-CIS-report.html"&gt;Press Trust of India &lt;/a&gt;on May 2, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"Based on the numbers available on the websites looked at, estimated number of Aadhaar numbers leaked through these four portals could be around 130-135 million," the report by CIS said.&lt;br /&gt;&lt;br /&gt; Further, as many as 100 million bank account numbers could have been "leaked" from the four portals, it added.&lt;br /&gt;&lt;br /&gt;The portals where the purported leaks happened were those of National Social Assistance Programme, National Rural Employment Guarantee Scheme, as well as two websites of the Andhra Pradesh government.&lt;br /&gt;&lt;br /&gt;"Over 23 crore beneficiaries have been brought under Aadhaar programme for DBT (Direct Benefit Transfer), and if a significant number of schemes have mishandled data in a similar way, we could be looking at a data leak closer to that number," it cautioned.&lt;br /&gt;&lt;br /&gt;The disclosure came as part of a CIS report titled 'Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information'.&lt;br /&gt;&lt;br /&gt;When contaced, a senior official of the Unique Identification Authority of India (UIDAI) said that there was no breach in its own database. The UIDAI issues Aadhaar to citizens.&lt;br /&gt;&lt;br /&gt;The CIS report claimed that the absence of "proper controls" in populating the databases could have disastrous results as it may divulge sensitive information about individuals, including details about address, photographs and financial data.&lt;br /&gt;&lt;br /&gt;"The lack of consistency of data masking and de- identification standard is an issue of great concern...the masking of Aadhaar numbers does not follow a consistent pattern," the report added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report'&gt;https://cis-india.org/internet-governance/news/pti-news-may-2-2017-aadhaar-numbers-of-135mn-may-have-leaked-claims-cis-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T10:42:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
