<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 321 to 335.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-may-6-2017-experts-stress-on-need-for-enhanced-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-indian-express-may-11-2017-aadhaar-data-leak-take-precautions-while-sharing-info-on-websites-meity-tells-all-depts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/revisiting-aadhaar-law-tech-and-beyond"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders">
    <title>Aadhaar Card: One Identity, Multiple Disorders</title>
    <link>https://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders</link>
    <description>
        &lt;b&gt;It is still hazy to see the desperation of the union government to imposing the Aadhaar Card mandatory when matters related to Aadhaar Card are already sub judice. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was blog post by Gaurav Raj was &lt;a class="external-link" href="http://theindiasaga.com/politics-governance/aadhaar-card-one-identity-multiple-disorders"&gt;published by India Saga&lt;/a&gt; on May 25, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The constitutionality of Aadhaar is yet to be decided by the Supreme Court, however, the enrolment of Aadhaar has reached the mark of more than one billion. Recently, the government declared Aadhaar mandatory to file Income Tax Return (ITR) while the Supreme Court is opined not to treat Aadhaar mandatory, but voluntarily. Now it is imperative of the government to confide the citizens that the Aadhaar information- demography and biometrics-are in safe hands, a debate which has been heating up, and the contempt of the court’s decision by the government is for greater good. But the uproar against the speculation of identity revelation threat and possible misuse of Aadhaar details by the government-corporate nexus, plausible reasons to doubt the security of privacy, which is a fundamental right of Indian citizen. Ironically, after the Finance Minister Arun Jaitley defended the ‘Aadhaar Money Bill controversy’ filed by former congress MP Jairam Ramesh in the court, the Supreme Court is in dilemma and yet to decide whether ‘Right to Privacy' is a fundamental right or not.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why Aadhaar Card Mandatory?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nandan Nilekani, the co-founder of Infosys and the ideologue of Aadhaar, said that Aadhaar will change the PDS system in India since it ensures no ghost or fake beneficiaries to avail unentitled benefits of the various welfare schemes and subsidies. Nilekani also says that there might be margin of error up to 5 per cent in distributing the subsidies or benefits of various welfare schemes to the masses. The top-honcho technocrat has also defended Aadhaar that any breach of privacy of citizens is not possible as the Unique Identification Authority of India (UIDAI) is efficient to secure the public data under CIDR.&lt;br /&gt;&lt;br /&gt;The government claims that the corruption-mounted Public Distribution System (PDS) in India is reformed due to the introduction of the 12 digit unique identification number. More than 40000 crore have been saved in the form of exchequer due to curb of fake and ghost beneficiaries in the PDS system. Now if we believe Nilekani claim of 5% error, then more than 5 crore beneficiaries would be losing their benefits due the error in the biometric identification. The Infosys co-founder later said that if there is a margin of error then ‘One Time Password’ (OTP) comes in. However, he didn’t define what if there is a congestion of network in the remotest Indian villages where phone signals are rare? Standing on the PDS shop waiting for food grains and network, is certainly not an ideal way to avail the benefits of the government welfare schemes. In 2011, activist and writer Ruchika Gupta said in an interview to Tahalka, “The UID cannot address the bulk of delivery problems in the two of the biggest social sectors programmes like MGNREGA and PDS. Linking UID with social sector legislation is completely baseless.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;PAN Card Linked with Aadhaar Card?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The government has directed the Reserve Bank of India to make Aadhaar mandatory for Income Tax Return filing. Currently, there are approximately 24.37 crores PAN holders in India, however 3.8 crore people file income tax return every year. There have been cases of people owned not more than one but 100 PAN Cards with them. PAN cards in India are mostly used by the citizens as a proof of identity. The government believes that PAN card linking with Aadhaar will curb the tax evasion.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How Safe Is Your Data In This Panopticon Model Of Mass Surveillance?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the late 18th century, the well-known English social reformer and jurist Jeremy Bentham wanted to build a ‘panoptican’ for a mass surveillance of the prisoners in England. He advocated designing an institutional building be used to keep an eye on all the jail inmates by a single watchman. Very similarly, India is witnessing the biggest surveillance program ever under the name of single identity and availing benefits of governments’ schemes. Another logic behind enrolment of Aadhaar is the ‘national security’. National security? How can any government ensure national security backing Aadhaar, when international companies have been hired in consortium to collect residents’ biometric and demography details? In 2010, Accenture, Mahindra-Satyam Morpho and L1 identity solutions were pooled in by UIDAI for leveraging de-duplication exercise of Aadhaar and data collection.  L1 Identity Solutions’ top brasses are the former Director CIA George Tenet and former Homeland Security deputy secretary Adm James. With its headquarters in Connecticut, this company is one of the biggest defence contractors specialised in facial recognition and biometrics. L1 Identity Solutions and Accenture work in a close affinity to US intelligence agencies. This is an age of information. Corporate houses and big telecom players are dying to get details of consumers. Obvious are the concerns about the safety and security of the people’s data. It is feared that the database can be used for various marketing and business purposes.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;CIDR, A Single Database Of People’s Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Central Identities Data Repository (CIDR) is a data management and storing agency in India which is initiated for the Aadhaar project. It is regulated by the statutory body of Unique Identification Authority of India (UIDAI). This centralised database is probably one of the biggest repositories on this planet.&lt;br /&gt;&lt;br /&gt;In 2010, experts had claimed that more than a thousand government sites and portals were attacked more than 4000 times by China alone in one year. In April 2011, 77 million Sony Playstations and digital media delivery service Qriocity were hacked which resulted into a shutdown of the network for a week. The London School of Economics also reported that a central database of vulnerable to hacking and other terrorist and cyber crime activities. Recently Wannacry Ransomware virus hits the globe. More than 99 countries were affected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building one single repository for billions of Aadhaar Card data seems to be a big risk in the most vulnerable country where dat breach is at most.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Leak Crisis&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;UIDAI has so far spent approximately 5982.62 crores for more than a billion enrolments of Aadhaar Cards. 1615.34 crores have been spent between the financial year 2015-2016. Centre for Internet and Society, Bengaluru-based organization (CIS) has learned that data of more than 130 million Aadhaar card holders has been leaked from four government websites. They are National Social Assistance Programme, National Rural Employment Guarantee Scheme, Chandranna Bima Scheme and Daily Online Payments Reports of NREGA. It also includes Bank details and other confidential details of millions of residents.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What is Next?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Lok Sabha has passed the Aadhaar Bill as Money Bill. Mukul Rohatgi said in the Supreme Court that according to Article 110 of the constitution, there is use of consolidated funds of India so the bill is a Money bill. Chief Justice Khehar said, “Your object might be good but whether it is a ‘Money Bill’ or not is the question.” Justice Ramana referred to a 2014 judgment passed by the Apex court that courts had no jurisdiction over procedurals matters of legislative.” In response P. Chidambram, the counsel for Jairam Ramesh said, “This petition is not about a procedural matter. There has been substantive infraction.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders'&gt;https://cis-india.org/internet-governance/news/the-indiasaga-may-25-2017-aadhaar-card-one-identity-multiple-disorders&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-26T00:01:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager">
    <title>Zomato hack: You need to enhance online security with a password manager</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager</link>
    <description>
        &lt;b&gt;Hacking incident at Zomato underlines need to employ different passwords for different accounts.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/companies/zomato-hack-you-need-to-enhance-online-security-with-a-password-manager-117052201261_1.html"&gt;Business Standard&lt;/a&gt; on May 23, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, food-tech company &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;suffered  a security breach where 17 million user records were stolen, including  email addresses and passwords. Such hacking incidents can have wider  consequences, including, in the gravest of scenarios, financial losses.  They emphasise the need for people to adopt newer protection mechanisms,  such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Zomato's case, the passwords are said to be hashed, which means they  were converted into unintelligible characters. However, experts say  that depending on the hashing protocol used, hashes can be re-engineered  to generate the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="float: left; "&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The hacking of one account can have wider ramifications. "By hacking one account, hackers get access to your email ID and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt; To save themselves the bother of remembering many passwords, users often use the same &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;in all their accounts. So, the hackers get access to your email and other accounts. Sometimes, they use your email account to reset the passwords in your other accounts," explains Shomiron Das Gupta of NetMonastery, a threat management provider. He adds that people often store sensitive information, including their net banking and credit card numbers and passwords within their email accounts. Also, on a website like Amazon, you can only view the last four digits of your credit card number. Other websites may not blur this information, in which case hackers would get access to this and other sensitive information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts recommend you create complex passwords and use different ones  for different accounts. Since generating complex passwords and  remembering them all is difficult, you should use a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager. Some of the good ones are LastPass, 1Password, Dashlane and TrueKey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;Password &lt;/a&gt;managers  can generate long and complex passwords that are difficult to  replicate. They also remember on your behalf the passwords on all the  sites and apps you use. Also, hackers sometimes steal passwords by  inserting a malware that copies keystrokes. Since a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager  inputs the password, you don't have to type them in, thereby doing away  with the risk of your keystrokes being captured and stolen.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="p-content"&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;div style="float: left; "&gt;&lt;img align="left" alt="graph" class="imgCont" height="352" src="http://bsmedia.business-standard.com/_media/bs/img/article/2017-05/22/full/1495477165-3235.jpg" style="float: left; " title="graph" width="220" /&gt;&lt;/div&gt;
A &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager is a secure vault that stores all your passwords. You get access to the vault with a master &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt; Instead of remembering many passwords, you have to remember just one.&lt;/div&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Browsers like &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google+Chrome" target="_blank"&gt;Google Chrome &lt;/a&gt;and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mozilla+Firefox" target="_blank"&gt;Mozilla Firefox &lt;/a&gt;also offer &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers. However, if you wish to use your &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager across browsers and apps, use a third-party one like those mentioned above. And while a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager  that is stored locally is safer, one that is cloud-based is more  convenient, since you can use it across devices having internet  connection. &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;Password &lt;/a&gt;managers also offer two-factor authentication. They either send a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;to your phone or generate it on your device. Unless your device also gets stolen, the &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager is difficult to break into.&lt;/p&gt;
&lt;p&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for whether &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers  are themselves safe, experts concede they are a prime target for  hackers who know that the information stored within will be valuable.  "The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;manager is safe provided you set a strong master &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password.&lt;/a&gt; Your &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;should  have at least 13 characters of which two should be small, two should be  in capital, two should be random numbers, and two should be special  characters. Using a word that is not there in the dictionary will  enhance its strength. Keep changing your master &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;every  three-six months," says Udbhav Tiwari, policy officer at the Centre for  Internet and Society, Bengaluru. Since their primary job is to provide  security, most &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers do have strong security practices, he adds.&lt;/p&gt;
&lt;p&gt;&lt;span class="p-content"&gt;Most &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Password" target="_blank"&gt;password &lt;/a&gt;managers offer a free account but you have to pay to use their advanced security features.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager'&gt;https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-may-23-2017-zomato-hack-you-need-to-enhance-online-security-with-a-password-manager&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-23T15:54:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack">
    <title>Chinese state media says U.S. should take some blame for cyber attack</title>
    <link>https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack</link>
    <description>
        &lt;b&gt;"WannaCry is far and away the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over". Since the global attack was launched on Friday, several thousand more computers were discovered to be infected, particularly in Asia as the work day began on Monday. "We've seen that the slowdown of the infection rate over Friday night, after a temporary fix around it, has now been overcome by a second variation the criminals have released".&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ellis Neal was published in the &lt;a class="external-link" href="http://thevillagessuntimes.com/2017/05/21/chinese-state-media-says-u-s-should-take-some-blame-for/"&gt;Villages Suntimes&lt;/a&gt; on May 21, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Microsoft called the incident a "wake-up" call for governments and customers to take security seriously, but in a letter to the Times Sir David Omand, GCHQ director from 1996 to 1997, pins the blame squarely on the technology firm for failing to maintain support for its ageing Windows XP platform. If they wanted their files decrypted, the program said all they had to do was pay $300 worth of Bitcoin to the specified address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, a cyber security expert working with the Centre for Internet  and Society, Udbhav Tiwari working on vulnerabilities such as these,  said as most ATMs in the country especially of the public-sector banks  run on outdated operating systems, or are not updated regularly, they  can be easily compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When Microsoft sells its operating  system software it does so through a licence agreement that states the  company is not liable for any security breaches, thus shielding it from  any legal complaints, &lt;a href="https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/" target="_blank"&gt;points out&lt;/a&gt; Michael Scott, a professor at Southwestern Law School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft  has blamed the U.S. government for creating the software code that was  used by hackers to launch the cyber-attacks. USA and European officials  did not rule out North Korea as a possible suspect in the cyberattack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/"&gt;In a blog post&lt;/a&gt;,  Microsoft admonished governments around the world for keeping software  vulnerabilities to themselves, instead of reporting them to the  developers. EternalBlue and DoublePulsar, two tools the NSA used to  infiltrate computer networks, were stolen from the agency and &lt;a href="https://techcrunch.com/2017/04/14/the-shadow-brokers-april-exploits-swift-windows/"&gt;leaked online in April as part of a massive data dump by the Shadow Brokers hacker group&lt;/a&gt;. An investigation is on-going regarding how the codes got out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  cyber experts have warned of a huge risk in near future as most  institutions and individuals in Bangladesh use pirated software. We can  not expect criminal hackers to be held accountable for their actions,  but we should hold our government agencies accountable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since  China and Russian Federation are two of the countries where a major  share of computers are running pirated Windows, these are also the  countries with the biggest rate of &lt;b&gt;WannaCry&lt;/b&gt; infections, as stated by F-Secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Malware  cases have been spreading in recent years as the malicious software  trend has been gaining ground, with new forms of ransomware hitting the  scene.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack'&gt;https://cis-india.org/internet-governance/news/villages-suntimes-may-21-2017-ellis-neal-chinese-state-media-says-us-should-take-some-blame-for-cyber-attack&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T01:12:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack">
    <title> Noida cyber cell gives tips on preventing WannaCry attack </title>
    <link>https://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack</link>
    <description>
        &lt;b&gt;The attackers targeted a weakness found in older versions of Microsoft Windows.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Juana McKenzie was published in the &lt;a class="external-link" href="http://theworldnewsjournal.com/2017/05/20/noida-cyber-cell-gives-tips-on-preventing-wannacry-attack/"&gt;World News Journal&lt;/a&gt; on May 20, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Since late last week, the WannaCry cyber scourge has blocked  customers the world over from accessing their data - unless they paid a  ransom using Bitcoin. Here's what you should do to protect yourself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third,  and perhaps more important: like the emperor's new clothes, even this  new-fangled ransomware isn't as sophisticated as it's cracked up to be.  If you're unsure about the legitimacy of something, delete it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When  Microsoft sells software it does so through a licensing agreement that  states the company is not liable for any security breaches, said Michael  Scott, a professor at Southwestern Law School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It pays to know the proper file extensions that are available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If  you happen to come across files such as worklog.doc.exe, or  financial_statement.xls.scr, do not open them as the files are most  likely malicious.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;'And this most recent attack represents a  completely unintended but disconcerting link between the two most  serious forms of cyber security threats in the world today -  nation-state action and organised criminal action'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then there's the USA government, whose Windows hacking tools were &lt;a href="https://www.theguardian.com/media/2017/mar/07/wikileaks-publishes-biggest-ever-leak-of-secret-cia-documents-hacking-surveillance"&gt;leaked&lt;/a&gt; to the internet and got into the hands of cybercriminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  a cyber security expert working with the Centre for Internet and  Society, Udbhav Tiwari working on vulnerabilities such as these, said as  most ATMs in the country especially of the public-sector banks run on  outdated operating systems, or are not updated regularly, they can be  easily compromised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No. This strain of ransomware was &lt;a href="http://www.reuters.com/article/us-cyber-attack-puzzle-idUSKCN18C12S" target="_blank"&gt;spread&lt;/a&gt; from device to device by taking advantage of an old security hole in some versions of Microsoft's Windows operating system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft &lt;a href="https://technet.microsoft.com/en-us/library/security/ms17-010.aspx"&gt;released a patch for this vulnerability&lt;/a&gt; in March and, on the heels of the attack Friday, even took the unusual  step of releasing fixes for older versions of Windows that are no longer  supported, such as Windows XP, Windows Server 2013, and Windows 8. This  included the &lt;a href="https://arstechnica.com/security/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/" target="_blank"&gt;release&lt;/a&gt; of the patch in March and an update on Friday to &lt;a href="https://www.microsoft.com/en-us/windows/windows-defender"&gt;Windows Defender&lt;/a&gt; to detect the WannaCrypt attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As there are different types of ransomware, there is no single, easy solution to restore your computer if it has been &lt;a href="http://www.bbc.com/news/technology-39920141"&gt;infected&lt;/a&gt;.  Enterprises need to test patches before installing them to ensure that  they don't have compatibility issues with existing applications and  break existing workflows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security experts have hailed Microsoft's  decision to publicly call out the U.S. government and the NSA's  decision to stockpile cyberweapons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As software has become ever  more complex, interdependent and interconnected, our reputation as a  company has in turn become more vulnerable", Gates &lt;a href="https://blogs.microsoft.com/on-the-issues/2017/05/14/need-urgent-collective-action-keep-people-safe-online-lessons-last-weeks-cyberattack/" target="_blank"&gt;wrote&lt;/a&gt; in an email to employees identifying trustworthy computing as  Microsoft's top priority. Such software will act as the first line of  defence by blocking auto downloads and actively scan for suspected  threats on the PC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The culprit was "ransomware" known as WanaCryptOr 2.0, or &lt;b&gt;WannaCry&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Europol  said a special task force at its European Cybercrime Centre was  "specially created to assist in such investigations and will play an  important role in supporting the investigation".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kaspersky said it  was seeking to develop a decryption tool "as soon as possible". If the  ransomware has locked your entire PC, as &lt;b&gt;WannaCry&lt;/b&gt; has done, combating it is more hard. Backups often are also out of date and missing critical information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cloud  storage services such as Google Drive, Microsoft OneDrive, Dropbox and  Box offer large amount of storage space for a monthly or yearly  subscription fee.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack'&gt;https://cis-india.org/internet-governance/news/world-news-journal-juana-mckenzie-may-20-2017-noida-cyber-cell-gives-tips-on-preventing-wannacry-attack&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T01:18:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call">
    <title>Microsoft says WannaCry ransomware must be a wake-up call for governments </title>
    <link>https://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call</link>
    <description>
        &lt;b&gt;Computer security experts said the current attack could have been much worse but for the quick action of a young researcher in Britain who discovered a vulnerability in the ransomware itself, known as WanaCryptor 2.0. It has, however, retweeted a blog post by Brad Smith, president and chief legal officer at Microsoft, who directs much of the blame toward the USA government, arguing that it should have alerted the $524 billion tech titan about the problem.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://journaldumaghreb.com/2017/05/20/microsoft-says-wannacry-ransomware-must-be-a-wake-up-call/"&gt;Journaldu Maghreb&lt;/a&gt; on May 20, 2017&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;"This is an emerging pattern in 2017", he continued. "We have seen vulnerabilities stored by the Central Intelligence Agency show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world", wrote Smith in a blog post on Sunday. Then there's the US government, whose Windows hacking tools were leaked to the internet and got into the hands of cybercriminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen", Mr Smith wrote. Brad Smith, Microsoft's top lawyer, criticized US intelligence agencies for "stockpiling" software code that can be used by hackers. In February, Smith first called for the creation of what he has dubbed a Geneva Convention for cyberspace, which would outlaw nation-state cyberattacks on critical infrastructure and tech companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber-security firm HumanFirewall said that on account of high use of pirated Windows operating system in India, it was more susceptible to the attack. Microsoft has connected previous exploits of its products released by the mysterious Shadow Brokers group to tools which were stolen from NSA cyber warfare operations. "All our systems are updated as required". This sophisticated, self-propagating malware was created to spread to all other computers on the same network after infecting one machine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Estimates by law enforcement agency Europol estimated yesterday that more than 200,000 computers in 150 countries were infected, but with the worm continuing to spread to vulnerable Windows machines, that number will surely rise. When 22 year olds are the heroes of the anti-cyber attack fight, rather than the agencies tasked to defend countries against these types of threats, it is perhaps time to question what these organisations have been doing all this time? NHS staff shared screenshots of the WannaCry programme, which demanded a payment of $300 (£230) in virtual currency Bitcoin to unlock the files for each computer. That dump included a vulnerability codenamed EternalBlue, which preys on a flaw in Microsoft Word to transmit malicious software from one Windows Computer to another. Usually used by cyber criminals, ransomware is a popular means of making illicit money from victims who have to pay the criminals in order to have their data decrypted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today is likely to be painful for many organizations all over the world that took the weekend off and are returning to the work-week to find hundreds or thousands of computers on their networks encrypted by WannaCry ransomware, which surfaced Friday and has been propagating ever since. It was a stress-filled weekend for many IT workers this past weekend as the WannaCry ransomware attack spread, crippling Windows systems worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security firm BinaryEdge, which specializes in internet-wide scans, has detected more than 1 million Windows systems that have the SMB service exposed to the internet. "Otherwise they're literally fighting the problems of the present with tools from the past", he said. However, a cyber security expert working with the Centre for Internet and Society, Udbhav Tiwari working on vulnerabilities such as these, said as most ATMs in the country especially of the public-sector banks run on outdated operating systems, or are not updated regularly, they can be easily compromised. This allowed users of the older systems to secure their computers without requiring an upgrade to the latest operating software.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call'&gt;https://cis-india.org/internet-governance/news/journaldu-maghreb-may-20-2017-microsoft-says-wannacry-ransomware-must-be-a-wake-up-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T00:55:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes">
    <title>Will Aadhaar leaks be used as an excuse to shut out scrutiny of welfare schemes?</title>
    <link>https://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes</link>
    <description>
        &lt;b&gt;Aadhaar data of all 23 crore beneficiaries of Direct Benefit Transfer schemes could be publicly available, says a report by Centre for Internet and Society. &lt;/b&gt;
        &lt;div class="article-body" style="text-align: justify; "&gt;
&lt;p&gt;The blog post by Anumeha Yadav was &lt;a class="external-link" href="https://scroll.in/article/837717/will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes"&gt;published on Scroll &lt;/a&gt;on May 20, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In the past three months, there have been several &lt;a href="https://scroll.in/article/835546/the-centres-casual-response-to-aadhaar-data-breaches-spells-trouble"&gt;reports&lt;/a&gt; about caches of Aadhaar data being publicly displayed on government websites across the country.&lt;/p&gt;
&lt;p&gt;Personal  information associated with the biometric-based 12-digit unique  identification number, which the government wants every Indian resident  to have, is mandated to be confidential under the Aadhaar Act, 2016.&lt;/p&gt;
&lt;p&gt;But exactly how much Aadhaar data has been compromised by negligent government departments?&lt;/p&gt;
&lt;p&gt;On  May 2, researchers at the non-profit Centre for Internet and Society  released a comprehensive report on the extent of the data breaches. They  documented four government portals using Aadhaar for making payments  and found that sensitive personal and financial information of nearly 13  crore people was being displayed on them, including details of about 10  crore bank accounts.&lt;/p&gt;
&lt;p&gt;Two of the portals, for the Mahatma Gandhi  National Rural Employment Guarantee Act and the National Social  Assistance Programme, belong to the Union rural development ministry.  The others are run by the Andhra Pradesh government for the workers’  insurance scheme Chandranna Bima and for filing Daily Online Payment  Reports of MNREGA.&lt;/p&gt;
&lt;p&gt;The researchers estimated that Aadhaar data of  all 23 crore beneficiaries of the central government’s various Direct  Benefit Transfer schemes could be publicly available. This means nearly a  fifth of India’s population is potentially exposed to irreversible  privacy harm, and financial and &lt;a href="https://scroll.in/article/833230/explainer-aadhaar-is-vulnerable-to-identity-theft-because-of-its-design-and-the-way-it-is-used"&gt;identity fraud&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The Unique Identification Authority of India, the agency which manages the Aadhaar database, however, and had earlier &lt;a class="link-external" href="http://timesofindia.indiatimes.com/india/no-leak-biometric-data-safe-says-uidai/articleshow/58486390.cms" rel="nofollow" target="_blank"&gt;denied any breach&lt;/a&gt; of confidential data, has now reportedly said that such a data leak could only be the result of a potentially &lt;a class="link-external" href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms?from=mdr" rel="nofollow" target="_blank"&gt;illegal hack attack&lt;/a&gt; and asked CIS to provide details of the persons involved in the data theft.&lt;/p&gt;
&lt;p&gt;The  rural development ministry, on its part, has changed how its MNREGA  database is accessed, redacting Aadhaar numbers and bank account details  of the beneficiaries. Senior officials of the ministry, however, denied  making systemic changes in the wake of the Centre for Internet and  Society report.&lt;/p&gt;
&lt;p&gt;“The researchers claimed that financial  information of over 10 crore individuals was available publicly, on  pension and MNREGA portals,” said Nagesh Singh, additional secretary in  the ministry, “but bank account details were displayed only on two state  department websites of Andhra Pradesh and Telangana as these states are  far advanced in transparency practices.”&lt;/p&gt;
&lt;p&gt;“For all other states,”  Singh added, “financial information and Aadhaar numbers were removed or  masked last year. For pension schemes we masked the data in June 2016,  and for MNREGA this data was removed in December. Even if any data was  showing, it would only be for the particular block the resident is in,  not for any other state workers.”&lt;/p&gt;
&lt;p&gt;All this was done, he said,  “because the UIDAI communicated to us that this information is sensitive  and should not be displayed and the Aadhaar regulations prohibit  display of Aadhaar numbers”. The Aadhaar (Sharing of Information)  Regulations were introduced last September.&lt;/p&gt;
&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="https://d1u4oo4rb13yy8.cloudfront.net/grvhfkothd-1494862823.png" /&gt;&lt;/figure&gt;
&lt;p&gt;Contrary  to Singh’s claims, social activists outside Andhra Pradesh and  Telangana confirmed they could access bank account details of MNREGA  workers until May 3. Only on May 4, two days after the Centre for  Internet and Society report was released, did the details stop showing  on the Management Information System.&lt;/p&gt;
&lt;p&gt;“We could no longer access  the electronic muster roll, and it started returning error messages,”  said Ashish Ranjan of Jan Jagran Shakti Sangathan, a registered union of  unorganised workers in Araria, Bihar. But until early May, he added,  the Management Information System allowed anyone in any state to access  the personal information of workers, even from other states.&lt;/p&gt;
&lt;p&gt;Activists  and beneficiaries relied on this system for two things. “Several of the  new bank accounts have errors, and accessing this information directly  helped get the discrepancies corrected without going to block level  officials,” Ranjan explained. “It also helped track where the wages of  workers were stuck.”&lt;/p&gt;
&lt;p&gt;When activists asked why the data was no  longer accessible, Ranjan said, rural development department officials  said the Management Information System was changed “on the directions of  the Supreme Court and the Union cabinet secretary.”&lt;/p&gt;
&lt;p&gt;“This has  been the pattern with the MNREGA MIS for long,” Ranjan said, referring  to the information system. “Senior officials change access to a feature  as they wish without clear processes or explanations.”&lt;/p&gt;
&lt;p&gt;James  Herenj, an activist with NREGA Watch, a non-profit which monitors the  implementation of MNREGA in Jharkhand, had the same experience. “Bank  account details were removed from the website last week,” he said, “this  is a problem as we can no longer help MNREGA workers get data entry  errors corrected.”&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society researchers  too contested the rural development ministry’s claim that Aadhaar  numbers and bank account details were displayed only on Andhra Pradesh  and Telangana government websites. They released a video clip showing  them accessing bank account details and Aadhaar numbers of 801 MNREGA  workers of Agara panchayat in Bengaluru through an internet search on  March 25.&lt;/p&gt;
&lt;figure class="has-subtext cms-block-image cms-block"&gt;&lt;img alt="Screenshot of a Chandigarh Union Territory website displaying Aadhaar information." src="https://scroll-img-process.s3.amazonaws.com/original/ogghbkwxim-1493054055.png" title="Screenshot of a Chandigarh Union Territory website displaying Aadhaar information." /&gt;Screenshot of a Chandigarh Union Territory website displaying Aadhaar information.&lt;/figure&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Consent, please?&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;The &lt;a class="link-external" href="https://uidai.gov.in/images/the_aadhaar_act_2016.pdf" rel="nofollow" target="_blank"&gt;Aadhaar Act&lt;/a&gt;,  2016 requires both government and private agencies to take informed  consent before using a person’s Aadhaar for authentication, but there is  little evidence that consent is sought before Aadhaar is seeded with  personal and financial information.&lt;/p&gt;
&lt;p&gt;Indeed, when the Supreme Court  first permitted the voluntary use of Aadhaar for MNREGA in October  2015, Aadhaar numbers of 2.36 crore workers had already been seeded to  their bank accounts, without the consent of over 99% of them.&lt;/p&gt;
&lt;p&gt;The rural development ministry’s &lt;a class="link-external" href="http://nrega.nic.in/Netnrega/WriteReaddata/Circulars/1669D.O._letter_MGNREGA_dtd_10.06.2016.pdf" rel="nofollow" target="_blank"&gt;data&lt;/a&gt; shows that until June 2016, only about 4,10,000, or less than 1% of the  10.7 crore MNREGA workers, had agreed to Aadhaar-based payments. The  ministry worked around this by organising “consent camps” to  retrospectively collect proof of consent.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Poor standards&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Writing in &lt;i&gt;The Economic Times&lt;/i&gt;,  Ram Sewak Sharma, chairperson of the Telecom Regulatory Authority of  India and former director general of the Unique Identification Authority  of India, &lt;a class="link-external" href="http://blogs.economictimes.indiatimes.com/et-commentary/there-has-been-no-aadhaar-data-leak/" rel="nofollow" target="_blank"&gt;argued&lt;/a&gt; that the reports about “Aadhaar leaks” on government websites failed to  account for provisions of the Right to Information Act, 2005. Section 4  of this law provides for proactive disclosure of government decisions  while Section 8 mandates public authorities to publish all information  on welfare schemes, including details of beneficiaries.&lt;/p&gt;
&lt;p&gt;This has  created a situation, Sharma pointed out, where the transparency law may  require even Aadhaar numbers of beneficiaries to be made public even  though the Aadhaar Act mandates them to be confidential.&lt;/p&gt;
&lt;p&gt;Right  to Information activists, however, said the authorities were anything  but devoted to the transparency law. Crucial information they seek on  the &lt;a href="https://scroll.in/article/833060/how-efficient-is-aadhaar-theres-no-way-to-know-as-the-government-wont-tell"&gt;efficacy of Aadhaar&lt;/a&gt; in welfare schemes is routinely denied.&lt;/p&gt;
&lt;p&gt;“The  government is willfully manipulating information systems to subvert  details of biometric failures,” said Amrita Johri, a member of the  National Campaign for People’s Right to Information and an activist with  the Right to Food campaign, which has petitioned the Delhi High Court  against Aadhaar being mandatory for food rations. “We have come across  instances of ration cardholders being turned back because of  fingerprints being falsely rejected, or network failure, but on the  Delhi government’s website, this is shown as the beneficiaries not  having come to the ration shop at all.”&lt;/p&gt;
&lt;p&gt;“Similarly, the government  claims it has removed bogus ration cards through Aadhaar,” Johri added,  “but they do not show any administrative action if such bogus cards  were really found through Aadhaar even though Section 4 of the RTI Act  requires disclosure of such decisions.”&lt;/p&gt;
&lt;figure class="has-subtext cms-block-image cms-block"&gt;&lt;img alt="Jharkhand Directorate of Social Security displayed Aadhaar numbers, bank accounts numbers and transaction details of over 15 lakh pensioners." src="https://d1u4oo4rb13yy8.cloudfront.net/rzxkohofbe-1493106358.jpg" title="Jharkhand Directorate of Social Security displayed Aadhaar numbers, bank accounts numbers and transaction details of over 15 lakh pensioners." /&gt;Jharkhand  Directorate of Social Security displayed Aadhaar numbers, bank accounts  numbers and transaction details of over 15 lakh pensioners.&lt;/figure&gt;
&lt;p&gt;Johri  is concerned that the “Aadhaar leaks” could become an excuse to deny  people “other useful information”. “When we requested officials to  display how many biometric transaction were not successful, they told us  that in a few days, they will remove the entire MIS as there had  received orders from the food ministry to not display demographic data  associated with Aadhaar,” she said. “But we pointed out that it was the  creation of a single identification number that is the problem. Why  should information on all other government schemes be removed?”&lt;/p&gt;
&lt;p&gt;The  Centre for Internet and Society report points out that while the law  now makes Aadhaar numbers confidential, the government has failed to  specify data masking standards. Section 6 of the Aadhaar Regulations  lays down that no government or private agency should publish Aadhaar  numbers unless they are redacted or blacked out “through appropriate  means”.&lt;/p&gt;
&lt;p&gt;But this is too vague, the report points out. “In some  instances, the first four digits are masked while in others the middle  digits are masked,” Srinivas Kodali, one of the authors of the report,  explained, “which means someone with access to different databases can  use tools for aggregation to reconstruct information hidden or masked in  a particular database.”&lt;/p&gt;
&lt;p&gt;Kodali said that for information other  than Aadhaar numbers, each ministry and department is required to  classify the data that is sensitive, restricted or open, which they have  failed to do. “The National Data Sharing and Accessibility Policy, 2012  requires securing information of sensitive and restricted data but it  does not recommend the ways to do it,” he said. “The standards around  information disclosure and control do not exist, and the Ministry of  Statistics expert committee on this was &lt;a class="link-external" href="http://www.mospi.gov.in/sites/default/files/publication_reports/SDC_Report_30mar17.pdf?download=1" rel="nofollow" target="_blank"&gt;unable to suggest&lt;/a&gt; one last month.”&lt;/p&gt;
&lt;p&gt;“Even  for MNREGA data,” Kodali continued, “the Ministry of Rural  Development’s chief data officer should have classified the financial  information as restricted or open when the database was first created.  But did they do this.”&lt;/p&gt;
&lt;p&gt;Nagesh Singh, the additional secretary,  however said his ministry “does not have a chief data officer to do  this”. “The ministry’s economic advisor is the official responsible for  categorising data and advises us on this,” he added.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes'&gt;https://cis-india.org/internet-governance/news/scroll-may-20-2017-anumeha-yadav-will-aadhaar-leaks-be-used-as-an-excuse-to-shut-out-scrutiny-of-welfare-schemes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anumeha Yadav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T07:09:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns">
    <title>Aadhaar assurances fail to assuage privacy concerns</title>
    <link>https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns</link>
    <description>
        &lt;b&gt;While Aadhaar may be secure from external attacks, a failsafe system hasn’t been developed to protect it from Edward Snowden-style leakages and hacks.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anirban Sen was &lt;a class="external-link" href="http://www.livemint.com/Politics/clV1RHlNttIVTJNkQt8WqM/Aadhaar-assurances-fail-to-assuage-privacy-concerns.html"&gt;published by Livemint &lt;/a&gt;on May 5, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As calls for a privacy and data protection law grow louder with each passing day amid reports of a central government ministry having made up to 130 million Aadhaar numbers public on its website, widespread concerns continue to emerge over loopholes in the security of the unique identification programme, though the man who created the system continues to defend the security and integrity of the system.&lt;br /&gt;&lt;br /&gt;Most worryingly, a consensus is emerging among security and privacy experts, who have argued that while the Aadhaar system may be secure from external attacks, a failsafe system has not been developed to protect it from Edward Snowden-style internal leaks or hacks.&lt;br /&gt;&lt;br /&gt;“(What has been suggested by the Unique Identification Authority of India and Nandan Nilekani) is that there will never be a data breach like what we saw in the US with the National Security Agency, Central Intelligence Agency, or Office of Personnel and Management breaches (data of federal government personnel, including more than 5.6 fingerprints, was leaked), or in Mexico or Turkey, or even in India when the department of defence was breached for cyber-espionage for multiple years without detection,” said Pranesh Prakash, policy director at the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;“While the system may be secure from external attacks, there is no failsafe system to make it invulnerable to Snowden-style breaches,” he added.&lt;br /&gt;&lt;br /&gt;In an interview, former UIDAI chairman and Infosys Ltd co-founder Nandan Nilekani continued to defend the security of the system and said steps are being taken everyday to enhance the failsafe processes surrounding the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I think the Aadhaar system is extremely well-designed. It’s not an online system that is exposed to the Internet. When enrolment happens, the packet is encrypted at source and sent, so that there can’t be a man-in-the-middle attack. And when the authentication happens, that is also encrypted—not compared to the original data, but to a digital minutiae. The point is that the system is very, very secure. So, if the objection is to centralization, then you should not have clouds. Clouds are also centralized,” said Nilekani. He added that Aadhaar was also safe from internal breaches, an assumption that is being challenged by security experts all across.&lt;br /&gt;&lt;br /&gt;“Within seven years of its launch, the Aadhaar system has made a remarkable leap in terms of its security and privacy and it will keep improving things. Technology does not come through immaculate conception, where one morning some perfect technology is born. It has to evolve. It’s called learning by doing,” added Nilekani. He added that improving the security of the system is an ongoing process and conceded that a data protection and privacy law needs to be in place to supplement the current Aadhaar law.&lt;br /&gt;&lt;br /&gt;“I know the government has sent a notice to everyone. If somebody has done it; they ought not to have done it—there’s a law for that,” said Nilekani when asked about recent instances of Aadhaar numbers being made public by government departments.&lt;br /&gt;&lt;br /&gt;“We should have a data protection and privacy law which is an umbrella law, which looks at all these phenomena and certainly Aadhaar should be part of that. That’s perfectly fine—but people are behaving as if Aadhaar is the only reason why we should have a privacy law,” added Nilekani.&lt;br /&gt;&lt;br /&gt;The last few weeks and months have witnessed a steady stream of negative news surrounding Aadhaar and three main cases are currently being fought in the Supreme Court, including one challenging the government’s decision to make the 12-digit ID mandatory for filing income tax returns as well as for obtaining and retaining a PAN Card.&lt;br /&gt;&lt;br /&gt;Meanwhile, as Mint reported in April, questions are being raised on the Aadhaar biometric authentication failure rate in the rural job guarantee scheme in areas such as Telangana.&lt;br /&gt;&lt;br /&gt;The report of Aadhaar numbers being listed on the government ministry website has caused widespread uproar, although a lawyer pointed out that it is not due to a breach in the Aadhaar system.&lt;br /&gt;&lt;br /&gt;“It’s a misnomer to say this a leak because this was voluntarily, very actively put up there. A leak is when some information being kept securely gets breached somehow and comes out. Now, why is this information up on government websites? This is the problem of our government’s perception of transparency...The fact that the Aadhaar numbers are on the government website is not a flaw of the Aadhaar system, but it is a flaw of the understanding of what needs to be done to demonstrate transparency,” said Rahul Matthan, partner at Trilegal.&lt;br /&gt;&lt;br /&gt;In a column in Mint, Matthan had also pointed out that while Aadhaar has been a transformative project, there remains enough scope of misusing the database.&lt;br /&gt;&lt;br /&gt;“There is a legitimate fear that this identity technology will open us all up to discrimination, prejudice and the risk of identity theft,” Matthan wrote. “Aadhaar has given us the tools to harness data in large volumes. If used wisely, this technology can transform the nation. If not, it can cause us untold harm. We need to be prepared for the impending flood of data—we need to build dams, sluice gates and canals in its path so that we can guide its flow to our benefit.”&lt;br /&gt;&lt;br /&gt;Even as both sides debate the issue of Aadhaar’s security, calls are getting louder to revamp the unique identification database.&lt;br /&gt;&lt;br /&gt;“The point is that the UIDAI knows the device ID of the machine with which the biometric transaction took place along with the time and date, which means that by just using basic data analytics, any one with access to the transaction logs from the UIDAI (which have to be kept for a period of 5 years and 6 months) can have a complete view of a person’s Aadhaar-based interactions that are increasing day by day.”&lt;br /&gt;&lt;br /&gt;“Further, the UIDAI has built up a biometric profile of the entire country. This means that courts can order UIDAI to provide law enforcement agencies the biometrics for an entire state (as the Bombay high court did) to check if they match against the fingerprints recovered from a crime scene. This too is surveillance, since it collects biometrics of all residents in advance rather than just that of criminal suspects,” said Prakash of CIS.&lt;br /&gt;&lt;br /&gt;“The UIDAI could have chosen to derive unique 16 digit numbers from your Aadhaar number and provide a different one to each requesting entity. That would have prevented much of these fears. But the UIDAI did not opt for that more privacy-friendly design,” he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns'&gt;https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T06:23:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar">
    <title>UIDAI goes after org that disclosed government departments were releasing Aadhaar data</title>
    <link>https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar</link>
    <description>
        &lt;b&gt;If there was ever a case of shoot the messenger, it is this. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nikhil Pahwa was published by &lt;a class="external-link" href="http://www.medianama.com/2017/05/223-uidai-cis-india-aadhaar/"&gt;Medianama&lt;/a&gt; on May 19, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI, the body which runs the Aadhaar project in India, has written to the Centre for Internet &amp;amp; Society suggesting that &lt;a href="http://www.medianama.com/2017/05/223-aadhaar-numbers-data-leak/"&gt;their disclosure of the fact that the data of 130 million Aadhaar users is being publicly disclosed on the Internet&lt;/a&gt; is owed to a hack-attack, &lt;a href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms?from=mdr" rel="noopener noreferrer"&gt;reports the Times of India&lt;/a&gt;.  On being contacted by MediaNama, Pranesh Prakash, Policy Director at  CIS told MediaNama that “We are waiting for an official copy of the  letter, and once we receive it we will decide on our future course of  action.” The UIDAI told MediaNama that they’ll get back to us, and  declined to share a copy of the letter with MediaNama.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.medianama.com/2017/05/223-uidai-cis-india-aadhaar/"&gt;Read the full story on Medianama&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar'&gt;https://cis-india.org/internet-governance/news/medianama-nikhil-pahwa-may-19-2017-uidai-cis-india-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nikhil Pahwa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T10:46:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web">
    <title>Hacker steals 17 million Zomato users’ data, briefly puts it on dark web</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web</link>
    <description>
        &lt;b&gt;Records of 17 million users were stolen from online restaurant search platform Zomato, the company said in a blog post on Thursday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kim Arora and Digbijay Mishra with inputs from Ranjani Ayyar in Chenna was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web/articleshow/58742129.cms"&gt;published in the Times of India&lt;/a&gt; on May 19, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;According to information security blog and news website &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/HackRead"&gt;HackRead&lt;/a&gt;,  the data was being peddled online on the "dark web" for about $1,000.  The company, also a food delivery platform, advised users to change  passwords. However, late on Thursday night, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Zomato"&gt;Zomato&lt;/a&gt; claimed it had contacted the hacker and persuaded him/her to not only  destroy all copies of the data, but also to take the database off the  dark web marketplace. The company said it will post an update on how the  breach happened once they "close the loopholes".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an official blog updated with this information, Zomato said, "The hacker has been very cooperative with us. He/she wanted us to acknowledge security vulnerabilities in our system and work with the ethical hacker community to plug the gaps. His/her key request was that we run a healthy bug bounty program for security researchers." Bug bounties are a standard program among tech companies, where they reward outsiders to highlight bugs and flaws in their software systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The number of user accounts compromised was pegged at 17 million earlier in the day. In the late night update, Zomato said password hashes (passwords in a scrambled, encrypted form) of 6.6 million users was compromised. It wasn't immediately clear whether this 6.6 million was part of the 17 million records stolen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zomato tried assuring users that payment information was safe. "Please note that only 5 data points were exposed - user IDs, names, usernames, email addresses, and password hashes with salt- that is, passwords that were encrypted and would be unintelligible. No other information was exposed to anyone (we have a copy of the 'leaked' database with us). Your payment information is absolutely safe, and there's no need to panic," said the late night update.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the information security community raised concerns over the technique used for "hashing" or encrypting the passwords. A screenshot of the vendor's sale page for stolen data posted on HackRead identifies the hashing algorithm as "MD5", which experts say is "outdated" and "insecure". The research team at infySEC -- a cyber security company from Chennai -- tried to access user information in Zomato's database, as part of its bug bounty program. "We were able to access user names, email IDs, addresses and history of transactions. We highlighted this to Zomato but we have not heard from them," said Karthick Vigneshwar, director, infySEC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zomato joins a long list of tech-enabled businesses that have recently had user data stolen. Such data can ostensibly be used by malicious actors to send phishing mails, or even by hackers to carry out cyber attacks. In February 2017, content delivery network CloudFlare's customer data was leaked. The data leaked had not just password hashes, but even customers' IP addresses and private messages. In June 2015, online password management service LastPass was hacked and had its data leaked online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We hash passwords with a one-way hashing algorithm, with multiple hashing iterations and individual salt per password. This means your password cannot be easily converted back to plain text. We, however, strongly advise you to change your password for any other services where you are using the same password," Zomato's chief technology officer Gunjan Patidar said in the blog which was updated twice through the day. Affected users have been logged out of the website and the app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Password "hashing" is an encryption technique usually used for large online user databases. The strength of the encryption depends on the algorithm employed to do the same. "Salting" is the addition of a string of characters to the passwords when stored on such a database, which adds another layer of difficulty in cracking them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an email to TOI, a company spokesperson said, "Over the next couple of days, we'll be actively working to improve our security systems — we'll be further enhancing security measures for all user information stored within our database, and will also add a layer of authorisation for internal teams having access to this data to avoid any human breach."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HackRead, a security blog and news website, found the stolen Zomato database of 17 million users for sale on what is called the "dark web". This can be described as a portion of the content available on the World Wide Web, away from the public internet. This content is not indexed on search engines like Google, and can only be accessed using software that can route around the public internet to get there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the screenshots of the sale posted on HackRead, the Zomato database used a hashing technique called "MD5", which security experts say is inappropriate for encrypting passwords. "If MD5 was used, it shows bad security practices were in place. It isn't industry standard to use this algorithm for password hashing. Algorithms like bcrypt, scrypt, are more secure," says Pranesh Prakash, policy director at Bengaluru's Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What if a user does not use an exclusive Zomato account to sign into the service, but signs in through a Google or Facebook account? "In that case, just to be safe, you can delink your Zomato from the account you use to sign in, although your password will not be at risk," says Prakash. Zomato says, 60% of its users use such third party authorisation, and they are at "zero risk."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Would Zomato be liable to compensate end users for loss of sensitive data? Supreme Court advocate Pavan Duggal says, "Such players, referred to as intermediaries under the IT Act hold sensitive data and are expected to have reasonable security protocols in place. Should an end user face any loss/damage due to a data breach, they can sue Zomato and seek compensation." While most players have end user agreements and disclaimers in place, Duggal adds that the IT Act will prevail over any other law or contract to the extent it is inconsistent.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Hacking</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T05:57:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling">
    <title>Debate over #Aadhaar Turns Nasty as Critics Accuse Supporters of Online Trolling</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling</link>
    <description>
        &lt;b&gt;Internet Freedom Foundation’s Kiran Jonnalagadda has alleged that iSPIRT and its co-founder Sharad Sharma set up fake Twitter profiles to harass, intimidate Aadhaar critics.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ajoy Ashirwad Mahaprahasta was published in the &lt;a class="external-link" href="https://thewire.in/137371/aadhaar-ispirt-trolling-sharad-sharma/"&gt;Wire&lt;/a&gt; on May 19, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As bizarre as this may sound, one of  the founders of the Indian Software Products Industry Round Table  (iSPIRT) – an influential think-tank closely associated with the Unique Identification Authority of India (UIDAI) – Sharad Sharma, is battling allegations of trolling anti-Aadhar campaigners through fake Twitter profiles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kiran Jonnalagadda, one of the  founders of Internet Freedom Foundation (IFF), has alleged that a number  of fake profiles started to troll him online earlier this month in  response to his criticism of Aadhar on Twitter. Surprisingly, he said,  one of the profiles  –&lt;a href="https://twitter.com/Confident_India" rel="external nofollow" target="_blank" title="@confident_India"&gt;@confident_India&lt;/a&gt; – which trolled him was apparently operated by Sharma, considered highly influential within the IT and start-up industry and a governing council member of iSPIRT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is iSPIRT?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2013, a group of volunteers working with NASSCOM founded iSPIRT to represent the software products industry independently. It  is widely known that many of these same volunteers also helped the  UIDAI develop much of the initial Aadhaar infrastructure and ecosystem. &lt;a href="http://www.forbesindia.com/article/special/is-ispirt-an-alternative-to-nasscom/34763/1" rel="external nofollow" target="_blank" title="According to Forbes India"&gt;According to Forbes India&lt;/a&gt;, iSPIRT helps Indian software product companies “draft  and take policy proposals to government officials; create reusable  ‘playbooks’ from successful companies that can be applied by others; and  create ‘self-help communities’.” &lt;a href="http://www.ispirt.in/Our-Industry/SPI" rel="external nofollow" target="_blank" title="It aims to facilitate"&gt;It aims to facilitate&lt;/a&gt; Indian software product companies, which build affordable and  innovative technologies, get a footprint in sectors like health,  education, infrastructure and create conditions so that they get an  equal platform to compete with big multinationals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this mission, iSPIRT believes that  Aadhaar-based technologies, which Indian software product companies may  create, could help the Indian software product industry gain an  advantage over multinationals, which may be skeptical about using  Aadhaar. In other words, iSPIRT, one of the biggest advocates of  Aadhaar, sees a commercial advantage to the increasing use of Aadhaar  for many of the entrepreneurs associated with the Round Table. To this  end, iSPIRT runs two initiatives – ProductNation and IndiaStack, a  collection of open APIs for technology infrastructure projects like UPI  and Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the mission may sound fine,  many of the Aadhaar advocates within iSPIRT have had to face questions  from civil society, most of which have to do with the suspicion that  Aadhaar could compromise online privacy. This, over the past few months, has led to heated social media battles between iSPIRT and anti-Aadhaar campaigners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  the debate took a darker  turn when Jonnalagadda uploaded a video showing that the  @Confident_India Twitter handle could be traced back to Sharma’s  personal mobile phone number on Twitter. Sharma, has since then,  apparently changed his number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It was only when I started to grow  suspicious of the handle that I thought of using Sharma’s phone number  to verify the account,” Jonnalagadda tells &lt;i&gt;The Wire. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="https://medium.com/@jackerhack/inside-the-mind-of-indias-chief-tech-stack-evangelist-ca01e7a507a9" rel="external nofollow" target="_blank" title="an article  – “Inside the mind of India’s chief tech stack evangelist” – where he narrates the events"&gt;an article  – “Inside the mind of India’s chief tech stack evangelist” – where he narrates the events&lt;/a&gt;, he says “a flurry of newly created Twitter trolls accounts began heckling me about Aadhaar”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around 10 such handles started making  unprovoked attacks on Jonnalagadda and another founder of IFF, Nikhil  Pahwa, accusing them of being guided by “greed, profit, and deceit” for  being in the “#AntiAadhaar brigade.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the argument continued, @confident_India called Jonnalgadda “pretentious” mouthing “highfalutin stuff” and “techno-babble”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“All these did not perturb me as it was a part of routine arguments,” says Jonnalagadda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in what he calls a  “lightbulb moment”, he had the first inkling that Sharma could be  operating the account of @confident_India through this thread:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="https://i0.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-1.png?ssl=1" class="shrinkToFit" height="659" src="https://i0.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-1.png?ssl=1" width="520" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://i0.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-1.png?ssl=1"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;“&lt;/b&gt;Sharad Sharma’s original  account doesn’t follow any of these people on the thread. The  conversation would not have shown on his timeline. Yet both  @confident_India and Sharad Sharma made the same argument,” says  Jonnalagadda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then, he says, Sharma gave it out. A question addressed to Sharad Sharma ended up being answered by @confident_India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-2.png?ssl=1" class="shrinkToFit" height="659" src="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-2.png?ssl=1" width="393" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;@Confident_India also went on a tirade  against the IFF fellows and called them “JNUtype”, “ISISstooge” or  belonging to Lutyens Delhi, insinuating that the IFF fellows are  terrorists or largely belong to a certain social elite category of  people. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img alt="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-3.png?ssl=1" class="shrinkToFit" height="659" src="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Thread-3.png?ssl=1" width="514" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;When this prompted Jonnalagadda to  verify the account with Sharma’s number, it matched. He later posted the  video on his account. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;An email from &lt;i&gt;The Wire&lt;/i&gt; to Sharad Sharma remained unanswered at the time of writing. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, soon after this alleged  expose kicked off a Twitter war between the two groups, Sharad responded  with a reply to Nikhil Pahwa’s tweet. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img alt="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Screen123.png?ssl=1" src="https://i1.wp.com/thewire.in/wp-content/uploads/2017/05/Screen123.png?ssl=1" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;iSPIRT also responded in various online forums. &lt;/span&gt;&lt;span&gt;“Sharad  Sharma, co-founder of iSPIRT, named in these allegations is in the US  for a medical emergency in his family. As of this morning, Eastern  Standard Time, Sharad has categorically denied these allegations. We  will further investigate the confusion around the alleged link of mobile  number and clarify all outstanding questions. For the moment, we are  prioritising the well-being of Sharad and his family,” &lt;/span&gt;&lt;a href="https://medium.com/@mtrajan/ispirt-response-to-kiran-jonnalagadda-3f977fb91df4" rel="external nofollow" target="_blank" title="says the organisation’s response"&gt;&lt;span&gt;says the organisation’s response&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“We want to categorically state that  the allegations against iSPIRT coordinating and/or promoting any troll  campaign are false and the evidence presented is a deliberate misreading  of our intent to engage with those speaking against India Stack” it  added. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Interestingly, however, what has  emerged out of the controversy is another allegation by the IFF that  iSPIRT had made trolling part of its policy to counter  Aadhaar’s “detractors.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;At a fellows meeting earlier this  year in February, iSPIRT charted out a “Detractors Matrix” in which they  categorised the anti-Aadhar campaigners into four categories, namely  “misinformed, fearful, and engaging”, “informed, fearful and engaging”,  “misinformed and trolling” and lastly, “informed yet trolling”. &lt;/span&gt;&lt;span&gt;In an internal iSPIRT presentation, &lt;a href="https://thewire.in/author/reetika-khera/" rel="noopener noreferrer" target="_blank" title="Reetika Khera"&gt;Reetika Khera&lt;/a&gt;,  IIT professor and a renowned economist, and Nikhil Pahwa, IFF’s  co-founder were shown as belonging to the last two categories. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To counter Aadhaar critics on online  platforms, iSPIRT volunteers intended to group themselves into “archers”  and “swordsmen” who would challenge their theories on Twitter and  elsewhere.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img alt="https://i2.wp.com/thewire.in/wp-content/uploads/2017/05/unnamed.png?ssl=1" src="https://i2.wp.com/thewire.in/wp-content/uploads/2017/05/unnamed.png?ssl=1" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;iSPIRT has acknowledged discussing  the “detractor matrix” in its reply to the allegation but dismissed it  being equivalent to trolling, as Jonnalagadda alleges. &lt;/span&gt;&lt;span&gt;Co-founder  of iSPIRT, ThiyagaRajan Maruthavanan, while responding to allegations  said that there was no official involvement on behalf of iSPIRT.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CIS allegations&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many of the pro-Aadhaar Twitter trolls, most noticeably  Confident_India, have also lashed out at other Internet rights  organisations. This includes the Bangalore-based Centre for Internet and  Society (CIS) which last month released &lt;a href="https://thewire.in/130948/aadhaar-card-details-leaked/" rel="noopener noreferrer" target="_blank" title="a report that claimed"&gt;a report that claimed&lt;/a&gt; that over 100 million Aadhaar numbers were publicly exposed by four  government websites. The Confident_India Twitter handle has &lt;a href="https://twitter.com/Confident_India/status/860461256393621506" rel="external nofollow" target="_blank" title="alleged"&gt;alleged&lt;/a&gt; that CIS has violated foreign funding regulations (under the Foreign  Contributions Regulations Act), that they are likely “funded by ISI” and  that because of their “advocacy efforts”, the organisation should be  shut down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that the Unique Identification Authority of India has also sent a sharp letter to CIS over its report and has suggested that some of the Aadhaar data that the report documented could not have been gotten through legal means.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling'&gt;https://cis-india.org/internet-governance/news/the-wire-may-19-2017-ajoy-ashirwad-mahaprahasta-debate-over-aadhaar-turns-nasty-as-critics-accuse-supporters-of-online-trolling&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T13:09:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-may-6-2017-experts-stress-on-need-for-enhanced-security">
    <title>Experts stress on need for enhanced security</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-may-6-2017-experts-stress-on-need-for-enhanced-security</link>
    <description>
        &lt;b&gt;With more and more people falling prey to phishing scams, experts believe that lack of adequate security features in online payment systems will only increase the number of such cases in the coming days. While admitting that the rise in such crimes would be hard to stop or control, cyber security consultants also blame the lack of preparedness before taking the digital economy route as a cause for such problems.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.newindianexpress.com/cities/bengaluru/2017/may/06/experts-stress-on-need-for-enhanced-security-1601631.html"&gt;published in the New Indian Express&lt;/a&gt; on May 6, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Speaking to Express, Dr A Nagarathna of  the Advanced Centre on Cyber Law and Forensics, National Law School of  India University, said that apart from the push for digital payment  solutions, the merger of various State Bank entities also provided  chances for criminals to exploit gullible people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“People tend to give away critical information since cyber criminals  seem so convincing. But they should remember that banks never collect  such information over phone,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cyber security features of banks and e-wallets are also  questionable. Banks and e-wallet service providers should be held  accountable for such crimes, so that they make an effort to ensure  necessary safety measures, she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director at the Centre for Internet and Society,  noted that there were security concerns with e-wallets. “Many e-wallet  apps compromise on security in favour of convenience, but, at the same  time, have terms of service that hold customers liable for financial  losses.  There have been many reports of criminals working with rogue  telecom company employees to clone SIM cards and steal money via UPI and  BHIM,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also criticised the use of biometrics as the only factor for  authorising payments to merchants using Aadhaar Pay.  He noted, “Your  fingerprints cannot be changed, unlike a PIN. So, if a merchant clones  your fingerprint, you cannot revoke it or replace it the way you can  with a debit card and a PIN.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another activist said the recommendations of Watal Committee, which  looked into digital payments, should be implemented. “As of now, the law  does not focus on the need for consumer protection in digital payments.  The Payment and Settlement Systems Act, 2007, needs to be updated,” he  said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-may-6-2017-experts-stress-on-need-for-enhanced-security'&gt;https://cis-india.org/internet-governance/news/new-indian-express-may-6-2017-experts-stress-on-need-for-enhanced-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T06:13:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-indian-express-may-11-2017-aadhaar-data-leak-take-precautions-while-sharing-info-on-websites-meity-tells-all-depts">
    <title>Aadhaar data leak: Take precautions while sharing info on websites, MEITy tells all depts</title>
    <link>https://cis-india.org/internet-governance/news/the-indian-express-may-11-2017-aadhaar-data-leak-take-precautions-while-sharing-info-on-websites-meity-tells-all-depts</link>
    <description>
        &lt;b&gt;‘Publishing identity info is in clear contravention of the provisions of the Aadhaar Act, 2016’&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/business/economy/aadhaar-data-leak-take-precautions-while-sharing-info-on-websites-meity-tells-all-depts-4650295/"&gt;published in the Indian Express&lt;/a&gt; on May 11, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In light of various Central and state government departments making  public Aadhaar information of several users on their websites, the  Ministry of Electronics and Information Technology (MEITy) has written  to secretaries of all government departments asking them to sensitise  the officials and take precautions while publishing or sharing data on  their websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It has come to notice that there have been instances wherein  personal identity or information of residents, alongwith Aadhaar numbers  and demographic information and other sensitive personal data such as  bank details collected by ministries/departments, state departments for  administration of welfare schemes etc. have been&lt;br /&gt; published online,” IT secretary Aruna Sundararajan wrote in the letter dated April 24.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Publishing identity information i.e. Aadhaar number along with  demographic information is in clear contravention of the provisions of  the Aadhaar Act, 2016 and constitutes an offence punishable with  imprisonment up to three years. Further, publishing of financial  information including bank details, being sensitive personal data, is  also in contravention of provision under IT Act, 2000 with violations  liable to pay damages by way of compensation to persons affected,” she  noted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to media reports, Aadhaar numbers of hundreds of thousands  of pension beneficiaries were published on a state government website,  and was followed by Chandigarh’s Food and Civil Supplies Department  revealing the Aadhaar information of beneficiaries of public  distribution system. Following Sundararajan’s letter, various central  government ministries have issued advisories to sensitise the officials  and the web information managers to comply with the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this month, a report by non-profit organisation The Centre  for Internet and Society noted that up to 13.5 crore Aadhaar numbers  were exposed and were publicly available on government websites, with  about 10 crore of these being linked to bank account details. The  27-paged report — Information Security Practices of Aadhaar (or lack  thereof): A documentation of public availability of Aadhaar Numbers with  sensitive personal financial information — has collected Aadhaar data  from four government portals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two of these are national portals: National Social Assistance Programme and &lt;a href="http://indianexpress.com/about/mahatma-gandhi"&gt;Mahatma Gandhi&lt;/a&gt; National Rural Employment Guarantee Act, both under the rural  development ministry. The other two studied by the report’s authors,  Srinivas Kodali and Amber Sinha, are run by the AP government: a daily  online payments report under MGNREGA by the state government, and  Chandranna Bima Scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Based on the numbers available on the websites looked at, the  estimated number of Aadhaar numbers leaked through these 4 portals could  be around 130-135 million (13-13.5 crore) and the number of bank  accounts numbers leaked at around 100 million (10 crore) from the  specific portals we looked at,” the report stated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The letter&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It has come to notice that there have been instances  wherein…information of residents, alongwith Aadhaar numbers and  demographic information…have been published online,” IT secretary Aruna  Sundararajan wrote in the letter dated April 24&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-indian-express-may-11-2017-aadhaar-data-leak-take-precautions-while-sharing-info-on-websites-meity-tells-all-depts'&gt;https://cis-india.org/internet-governance/news/the-indian-express-may-11-2017-aadhaar-data-leak-take-precautions-while-sharing-info-on-websites-meity-tells-all-depts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T14:59:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar">
    <title>Taking Cognisance of the Deeply Flawed System That Is Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar</link>
    <description>
        &lt;b&gt;Aadhaar and its many connotations have grown to be among the most burning issues on the Indian fore today, that every citizen aware of their rights should be taking note of.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shreyashi Roy was &lt;a class="external-link" href="https://thewire.in/133916/taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar/"&gt;published in the Wire&lt;/a&gt; on May 10, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;With the &lt;a href="https://thewire.in/130948/aadhaar-card-details-leaked/" rel="noopener noreferrer" target="_blank" title="leak of 130 million Aadhaar numbers"&gt;leak of 130 million Aadhaar numbers&lt;/a&gt; recently coming to light, several activists, lawyers and ordinary  citizens are up in arms about what is increasingly being viewed as a  government surveillance system. Keeping this in mind, on Tuesday, May 9,  Software Freedom Law Centre India (SFLC) hosted an event that brought  together a panel to clearly articulate the dangers of Aadhaar and to  discuss whether the biometric identification system is capable of being  reformed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;SFLC is a donor-supported legal services organisation that calls itself a protector of civil liberties in the digital age.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Titled ‘Revisiting Aadhaar: Law, Tech and Beyond’, the discussion, with several eminent personalities who have in-depth knowledge of Aadhaar and its working, threw light on the various problems that have cropped up with regard to India’s unique identification system. The discussion was moderated by Saikat Datta, policy director at Centre for Internet and Society, which published the report that studied the third-party leaks of Aadhaar numbers and other personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The leaks&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion took off from the point of the leaks, with Srinivas  Kodali, a panelist and one of the authors of the report, explaining his  methodology for the study that proved that the Aadhaar database lacked  the security required when dealing with private information of people.  He highlighted the fact that during the course of his research, he had  noticed several leaks from government websites and notified the Unique  Identification Authority of India (UIDAI) about the same. Yet, at every  step, UIDAI continued to deny and reject the possibility of this  happening. Kodali says, however, that he had noticed that the websites  that were unknowingly leaking data were, in fact, fixing the leaks after  being notified without acknowledging that the leak had happened in the  first place. Kodali reiterated at the discussion, as in his report, that  a simple tweaking of URL query parameters of the National Social  Assistance Programme website could unmask and display private  information. Unfortunately, UIDAI cannot be brought to task for  unknowingly leaking information because there is no such provision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also addressed the question of the conflict of interest that  existed in the entire system of building Aadhaar, which was created by  developers who later left the UIDAI and built their own private  companies, monetising the mine of private information that they were  sitting on. Kodali blames UIDAI for this even being allowed, since the  developers, though clearly lacking ethics, were in fact, merely  volunteers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The system&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the glaring issues with the technology behind Aadhaar is that  the software is not open source. Anivar Aravind, a panelist, called it  “defected by design” and “bound to fail” because not only is the  technology completely untested but there are very obvious leaks that are  taking place. Moreover, UIDAI does not allow any third-party audits or  any other persons to look at the technology. Datta pointed to the fact  that this is unheard of in other nations, where software is routinely  subjected to penetration testing and hacking experts are called upon to  check how secure a database is.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anupam Saraph, another panelist and future designer, illuminated  the creation of the Aadhaar database, pointing out that this is a system  less about identification and more about verification. All of the  verification, moreover, has been done by private parties, making the  database itself suspect and leaving everyone’s private information loose  at the time of enrolment. In addition, Aadhaar was meant for all  residents and not just citizens. But now there is a mix of  both, creating confusion in many aspects. Saraph also brought up how one  rogue agency with access to all this information could pose an actual  national security threat, unlike all the requests for information on  breaches that the government keeps pointing fingers at. Referring to  Nandan Nilekani’s statement about Aadhaar not being like AIDS, Saraph  pointed out that it was exactly like it because much like the body,  which cannot distinguish between an invasion and itself, the Aadhaar  system is not being able to distinguish between aliens and citizens and  has begun denying the latter benefits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court has declared time and again that Aadhaar cannot be  made mandatory, but the government continues to – in complete disregard  of the apex court’s judgment – insist on Aadhaar for a multitude of  schemes. More and more schemes are being made unavailable without the  existence of an Aadhaar number as the government continues to function  in a complete lack of cognisance of the fact that the poor are losing  out on something as basic as their food because of a number. Prasanna  S., an advocate and a panelist, called it a “voluntary but mandatory”  system that is becoming an evidence collection mechanism. Moreover,  everything is connected through this one number, making many options  like financial fraud, selective treatment of citizens and other horrors  possible. The collection of all this information is not dangerous,  screams the government. Maybe not in the hands of this one. But what of  the next? What of rogues?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The legal aspect&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the panelists was Shyam Divan, a senior advocate of the  Supreme Court, who has represented petitioners fighting against Aadhaar.  Divan spoke about how along with a group of advocates he has been  trying to get the apex court to rule on the issue but has been met with  long queues before a ruling can be procured. He addressed the right to  privacy aspect of the system and the recent declaration that the citizen  does not have the absolute right to the body. He emphasised that the  government cannot own the body and that for a free and democratic  society, a limited government, instead of an all-knowing and all-seeing  government, is essential. Unfortunately for India, there is no express  right to privacy in the constitution, but that does not mean that rights  can be taken away in exchange for a fingerprint. It is the government’s  duty to respect privacy. For him, Aadhaar has become an instrument of  oppression and exclusion, a point that Prasanna also agreed with,  calling it a “systematic attack on consent”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is complete agreement that there has been a railroading of  consent in this entire matter if Aadhaar being passed forcibly through  the Lok Sabha as a money bill is anything to go by. If parliament’s  consent can be disregarded in that fashion, what is an ordinary citizen  to do in the face of this complete imbalance of power in the state’s  hand?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Usha Ramanathan, a legal researcher and a long-time critic of  Aadhaar, spoke about how India has turned into a state where there are  more restrictions than fundamental rights, rather than the other way  around. She related how there was no clarity at the beginning of Aadhaar  of how it would be a card or a number and was never a government  project in the first place. This is a private sector ambition that the  government has jumped on board with, without considering that the  private sector does not concern itself with civil liberties. As other  panelists also pointed out, the private sector cannot and will not  protect public interest. This is the job of the government, especially  in an age of digitisation. But Aadhaar compromises the ability of the  state to stand up for its citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With June 30 approaching fast, many of those who have so far  abstained from enrolling in the system are considering giving up their  rebellion and going like sheep to get themselves registered in the  database. In the words of Divan, they will have to “volunteer  compulsorily for an Aadhaar”. The government is probably counting on  this. Turning to the Supreme Court has been of no help, although a  verdict can be hoped for in a couple of weeks. But what can we do if  they rule for the government?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the panelists are on board with the idea of a civil  disobedience movement, a kind of a rebellion against Aadhaar. Some  suggested thinking of out-of-the-box ways to register one’s protest and  dissent against what is clearly becoming the architecture of a  surveillance state. Saraph was particularly vehement about the need to  completely destroy the Aadhaar database – “shred it”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What all the panelists emphasised repeatedly was that there can be no  improvements to a system that is so deeply flawed and that has had so  many “teething problems” that are making millions suffer. The main  takeaway from the discussion was that Aadhaar must see a speedy demise  because it cannot be saved and cannot persist in its current state.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar'&gt;https://cis-india.org/internet-governance/news/the-wire-may-10-2017-shreyashi-roy-taking-cognisance-of-the-deeply-flawed-system-that-is-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T14:52:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/revisiting-aadhaar-law-tech-and-beyond">
    <title>Revisiting Aadhaar: Law, Tech and Beyond</title>
    <link>https://cis-india.org/internet-governance/news/revisiting-aadhaar-law-tech-and-beyond</link>
    <description>
        &lt;b&gt;Udbhav Tiwari attended a panel on "Revisiting Aadhaar: Law, Tech and Beyond" held at the India International Centre Annexe on May 9, 2017 in New Delhi, organised by the Software Freedom Law Centre (SFLC.in) in collaboration with Digital Empowerment Foundation and IT for Change.&lt;/b&gt;
        &lt;div style="text-align: justify; "&gt;The panel consisted of:&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;Saikat Datta; Policy Director, Centre for Internet and Society (Moderator) &lt;/li&gt;
&lt;li&gt;Anivar Aravind; Founder/Director at Indic Project &lt;/li&gt;
&lt;li&gt;Anupam Saraph; Professor and Future Designer &lt;/li&gt;
&lt;li&gt;Prasanna S; Advocate &lt;/li&gt;
&lt;li&gt;Shyam Divan; Senior Advocate, Supreme Court &lt;/li&gt;
&lt;li&gt;Srinivas Kodali; Co-founder at Open Stats &lt;/li&gt;
&lt;li&gt;Osama Manzar; Founder and Director, Digital Empowerment Foundation &lt;/li&gt;
&lt;li&gt;Usha Ramanathan; Legal Researcher&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The  panel was quite enlightening (and Saikat was a stellar moderator), with  Mr. Divan's elucidation on the arguments made in the court for the  Aadhaar case in particular being a great learning experience. Benjamin  and Sheetal (both interns in the Delhi office) along with Sumandro also  attended the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other learning was that  for people who have attended multiple such panels/seminars and meetings  on Aadhaar, they can have a lot of repeated content. I passed on the  feedback to SFLC about how they could possibly include a small 10 to 15  minute session in future such panels on developments since the previous  such event on the Aadhaar and include practical aspects about what  people can do about minimising the harms that we are all slowly being co  opted into facing with the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More info about the event &lt;a class="external-link" href="http://sflc.in/panel-discussion-revisiting-aadhaar-law-tech-and-beyond-may-9-2017-new-delhi/"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/revisiting-aadhaar-law-tech-and-beyond'&gt;https://cis-india.org/internet-governance/news/revisiting-aadhaar-law-tech-and-beyond&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T14:47:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected">
    <title>Aadhaar security: Here's how your private information can be protected</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected</link>
    <description>
        &lt;b&gt;Lock Aadhaar, and notify UIDAI if you get a one-time-password for a transaction you did not initiate&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/aadhaar-security-here-s-how-your-private-information-can-be-protected-117051000611_1.html"&gt;Business Standard&lt;/a&gt; on May 11, 2017. Udbhav Tiwari was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;The linking of Aadhaar — the 12-digit unique  identification number for Indian residents — across various benefits is  going through a roller-coaster ride. On one hand, the government, keen  to make it mandatory, is linking it with filing of income-tax returns  and benefits. But, on the other, many are uncomfortable with it because  of privacy issues and leakages that have been reported recently. The  Supreme Court, on Tuesday, referred another fresh plea challenging the  Aadhaar Act and its mandatory use in government schemes to a larger  Constitution bench. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;There has been several reports that say that Aadhaar numbers and other  personal data are being leaked. Bengaluru-based Centre for Internet and  Society (CIS) has published a report (titled Information security  practices of Aadhaar, or lack thereof) where it lists four government  departments that have posted Aadhaar numbers and other personal  information of people. According to the report, an estimated 130-135  million Aadhaar numbers and 100 million bank account numbers were posted  on the four portals that the CIS researchers checked. Normally such  data should be kept on the government’s intranet, where only authorised  people can access it. However, a few government departments have  uploaded this data on their websites. In many cases, the data was in  excel format, making it all the more easy for people to download and  misuse it. The worst part: If your data is stolen, you cannot file even a  First Information Report with the police. Only the nodal body, the  Unique Identification Authority of India (UIDAI), can file a police  complaint.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Your data can be misused:&lt;/b&gt; Experts say that leakage  of Aadhaar numbers and other personal information into the public domain  violates peoples’ privacy. “Your name, phone number, address, bank  account number and Aadhaar number are personal information. Only you  have the right to decide whether to release such information to others.  Such data shouldn’t be complied in excel sheets in large numbers and be  freely accessible on the internet to everyone," says Udbhav Tiwari,  policy officer at the Centre for Internet and Society, Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tele-marketers  and advertisers will have access to the personal information of all  those people. More serious problems such as identity theft can occur.  Says Smitha Krishna Prasad, project manager, Centre for Communication  Governance at National Law University, Delhi: “The more sensitive  information a person has about you, the easier it becomes to impersonate  you when that person is speaking to, say, a bank." The impersonator  could open a bank account or even take a loan in your name.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suppose  a hacker gets your email ID. “He will use the ‘password reset or forgot  password’ feature to change your password and get access to your  account. This feature poses questions based on personal info about you.  Any such data collected about you comes useful here. Such hackers mine a  lot of data about potential victims from all possible sources," says  Shomiron Das Gupta of NetMonastery, a threat management provider. In the  email, he could find info about your bank account, credit card account,  etc, and cause financial losses to you.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Serious risks can  also arise if someone manages to breach the biometric authentication or  one-time password (OTP) required for using the Aadhaar system. “It is  possible to copy an individual’s fingerprints, and replicate them using  very commonly available resins. It is also possible for hackers to  capture the data being communicated between a telephone tower and a  mobile phone, especially if it is poorly encrypted. This will allow the  hacker to see the OTP. Admittedly, this does require expertise and a  targeted effort vis-a-vis an individual," says Tiwari. Now that the  Aadhaar numbers of so many people have been divulged, someone could  utilise their identities to steal their government-granted benefits, or  obtain a SIM card, which could then be misused. Raman Jit Singh Chima,  policy director, Access Now, says at many places where the Aadhaar  number is required today, no biometric authentication is done. So just  the number can be used to impersonate you.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lock your biometrics:&lt;/b&gt; If your Aadhaar number and  other personal information have been leaked, here are a few steps you  can take to safeguard yourself. One, be wary of any calls you receive  asking for additional details, which may not have been leaked already.  Be equally wary if you receive a call wherein someone rattles off your  personal data and asks you to verify it. The caller could pretend to be  calling from your bank. It is best not to reveal or confirm any  information over the phone at all. Two, you have the option to lock your  biometric data online. Even if someone manages to steal your  fingerprint, he will not be able to use it if you have locked your  biometric data (see table). Also, if you get an OTP on your phone for an  Aadhaar utilisation that you did not initiate, notify the UIDAI, and  thus ensure that no transaction is carried out using your Aadhaar  account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a privacy law: &lt;/b&gt;To  prevent data leaks in the future, the government needs to sensitise  state government officials who work with Aadhaar data about the need to  protect the its privacy. More importantly, India needs a comprehensive  data protection law. At present, there is limited provision in the  Information Technology Act of 2008 under which you can file a civil case  against a corporate that has leaked your personal information. “The  person affected by data leakage has to show that he has suffered  wrongful loss, or somebody else has enjoyed a wrongful gain, and then  claim compensation," says Prasad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the Radia tapes  incident, the government had said it would pass a comprehensive privacy  law. “This law would lead to the creation of a data protection authority  with enforcement powers, which would be able to penalise both companies  and government bodies violating privacy principles. Despite the process  beginning in 2012-13, and multiple drafts being leaked into the public  domain, there has not been much progress on this count," says Chima. He  adds that when the privacy law becomes a reality, any part of the  Aadhaar Act that is contrary to it should also be amended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How to lock your biometric data online&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Go  to the UIDAI web site: https://uidai.gov.inGo to Aadhaar services, then  Lock/Unlock Biometrics Enter Aadhaar number Enter security code that  appears below the Aadhaar numberYou will receive an OTP on your  registered mobile number. Enter it Click ‘Verify’Click box against  ‘Enable biometric lock’Click on Submit buttonSame procedure can be  repeated to disable biometric lock.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected'&gt;https://cis-india.org/internet-governance/news/business-standard-sanjay-kumar-singh-aadhaar-security-here-is-how-your-private-information-can-be-protected&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T10:05:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
