The UIDAI has taken two successive governments in India and the entire world for a ride. It identifies nothing. It is not unique. The entire UID data has never been verified and audited. The UID cannot be used for governance, financial databases or anything. It’s use is the biggest threat to national security since independence. – Anupam Saraph 2018

When I opposed Aadhaar in 2010 , I was called a BJP stooge. In 2016 I am still opposing Aadhaar for the same reasons and I am told I am a Congress die hard. No one wants to see why I oppose Aadhaar as it is too difficult. Plus Aadhaar is FREE so why not get one ? Ram Krishnaswamy

First they ignore you, then they laugh at you, then they fight you, then you win.-Mahatma Gandhi

In matters of conscience, the law of the majority has no place.Mahatma Gandhi

“The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 of the Indian constitution refers to the right to life and liberty -Attorney General Mukul Rohatgi

“There is merit in the complaints. You are unwittingly allowing snooping, harassment and commercial exploitation. The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except as may be directed by a court for the purpose of criminal investigation.”-A three judge bench headed by Justice J Chelameswar said in an interim order.

Legal scholarUsha Ramanathandescribes UID as an inverse of sunshine laws like the Right to Information. While the RTI makes the state transparent to the citizen, the UID does the inverse: it makes the citizen transparent to the state, she says.

Good idea gone bad
I have written earlier that UID/Aadhaar was a poorly designed, unreliable and expensive solution to the really good idea of providing national identification for over a billion Indians. My petition contends that UID in its current form violates the right to privacy of a citizen, guaranteed under Article 21 of the Constitution. This is because sensitive biometric and demographic information of citizens are with enrolment agencies, registrars and sub-registrars who have no legal liability for any misuse of this data. This petition has opened up the larger discussion on privacy rights for Indians. The current Article 21 interpretation by the Supreme Court was done decades ago, before the advent of internet and today’s technology and all the new privacy challenges that have arisen as a consequence.Rajeev Chandrasekhar, MP Rajya Sabha

“What is Aadhaar? There is enormous confusion. That Aadhaar will identify people who are entitled for subsidy. No. Aadhaar doesn’t determine who is eligible and who isn’t,” Jairam Ramesh

But Aadhaar has been mythologised during the previous government by its creators into some technology super force that will transform governance in a miraculous manner. I even read an article recently that compared Aadhaar to some revolution and quoted a 1930s historian, Will Durant.Rajeev Chandrasekhar, Rajya Sabha MP

“I know you will say that it is not mandatory. But, it is compulsorily mandatorily voluntary,” Jairam Ramesh, Rajya Saba April 2017.

August 24, 2017: The nine-judge Constitution Bench rules that right to privacy is “intrinsic to life and liberty”and is inherently protected under the various fundamental freedoms enshrined under Part III of the Indian Constitution

"Never doubt that a small group of thoughtful, committed citizens can change the World; indeed it's the only thing that ever has"

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” -Edward Snowden

In the Supreme Court, Meenakshi Arora, one of the senior counsel in the case, compared it to living under a general, perpetual, nation-wide criminal warrant.

Had never thought of it that way, but living in the Aadhaar universe is like living in a prison. All of us are treated like criminals with barely any rights or recourse and gatekeepers have absolute power on you and your life.

Announcing the launch of the#BreakAadhaarChainscampaign, culminating with events in multiple cities on 12th Jan. This is the last opportunity to make your voice heard before the Supreme Court hearings start on 17th Jan 2018. In collaboration with @no2uidand@rozi_roti.

UIDAI's security seems to be founded on four time tested pillars of security idiocy

1) Denial

2) Issue fiats and point finger

3) Shoot messenger

4) Bury head in sand.

God Save India

Wednesday, September 30, 2015

8778 - Total digitisation is the answer to privacy woes - Governance Now

A transformation, driven by cloudification and automation, of all Aadhaar enrollment, data storage and access processes is a key need today
Deepak Kumar | September 29, 2015

- See more at: http://www.governancenow.com/views/columns/tal-digitisation-the-answer-privacy-woes#sthash.Iap5xXwJ.dpuf

(Illustration: Ashish Asthana)

In this digital and social media age, the din about privacy is seemingly a big paradox. How come a generation that is so comfortable sharing the minutest details about their whereabouts, families and friends, and so candid about voicing their political, social and ideological views on open platforms like Facebook and Twitter, be bothered about a potential risk to privacy in a secure network like Aadhaar?

As attorney general Mukul Rohatgi has argued before a supreme court bench, “privacy” has been a vague concept and an earlier judgment had held it was not a “guaranteed right” under the constitution. As such, citing privacy concerns can indeed not be a basis to petition against the implementation of the Aadhaar scheme.

However, there also lies a counter argument: how come a vague concept be used as a basis to implement a scheme that potentially infringes upon privacy of citizens?

The debate around privacy, due to the vagueness surrounding it, can be a double-edged sword, which could be used to further either sets of arguments.

Why not do away with the vagueness?

Logically, defining the boundaries by which a government agency must adhere to when using the Aadhaar linked information of individuals should help settle the debate. For example, while it is certainly important to mandate use of Aadhaar numbers (at most in a phased manner), it is equally important that not every recorded activity be discretely passed on to various departments.

As a broad analogy, think of the call data records (CDRs) in the telecom billing systems. CDR information is shared with the government law enforcement agencies only in instances when a person is wanted or suspected in an illegal or anti-national activity, as an example. All Aadhaar-linked data should also be provisioned to lie dormant as long as the activities of individuals follow a normal pattern. Only when an aberration or breach is officially reported by a concerned agency should the information be shared.

In fact, by making use of sophisticated analytics, it would be very much possible to even define the aberrations in Aadhaar-linked activities of individuals that should raise a trigger, which in turn could draw the attention of a concerned official for any follow-up action. The analytics engine could continually be refined by being fed with new definitions of aberrations and trigger points as and when those are discovered.

Transparency is the key

The processes defining the trigger points should be well documented and made available for audit, say, to an independent panel of experts comprising a mix of technology, legal and constitutional experts, among other relevant members, if any.

Of course, individuals with criminal or terrorist records could be included in a threat list at the very outset, so as to ensure that their movements are duly captured and monitored in a more discrete manner. At the same time, the list may also be shared with the panel to ensure that no innocent citizen, whether by design or by error, gets labelled as a criminal in the records.

Also, it is important to ensure that certain types of data, like the health records, should constitute a privacy core with very stringent access parameters, and should be shared with other agencies only in the rarest of rare circumstances.

Implementation challenges

The biggest challenge, perhaps, would lie in the fact that different government departments and processes are at varying stages of digitisation, something that would make a uniform implementation of Aadhaar analytics difficult to begin with.

Moreover, defining the aberrations, triggers and exceptions in a vast set of Aadhaar-linked data can be a complex and time consuming process, and as such could be potentially frustrating for the implementing agencies.

Moreover, unlike PAN cards, which due to a linkage with income taxes tend to cover only a part of the population, Aadhaar cards are aimed at the entire population universe and hence also pose greater challenges of scale. Also, the bottom-of-pyramid socioeconomic segments would need to be incentivised to become part of the Aadhaar fold. This, in turn, poses its own set of challenges.

These, and other, challenges are reflected in the fact that the target of achieving 100 crore Aadhaar enrolments by June 2015 has turned out to be elusive.

App-ification of Aadhaar registration

It may be a good idea to leverage an already large — and growing — base of smartphone wielding mobile service subscribers in the country. One conceptually simple way would be to make it possible for people to register using an Aadhaar app. Further, if these mobile subscribers are also provisioned to do Aadhaar registrations for their family members using the same app, maybe subject to a physical verification to be carried out later, the whole process may be greatly speeded up. (Of course, other existing Aadhaar registration systems may continue to work in parallel).

Since mobile subscribers have already been verified through know your customer (KYC) processes in the past, the mobile numbers could actually serve as the first points of authentication. Also, it is not hard to conceive telcos as potential partners in this whole Aadhaar registration process. Their newfound capabilities in video-based solutions could be particularly helpful.

Leverage cloud to better privacy?

Counterintuitive though it may sound, cloudification of the registration process as well as access to all Aadhaar data could actually help address a large body of privacy-related concerns.

As of now, various private-sector implementation agencies have been contracted to speed up the Aadhaar registration process, which makes the data being captured vulnerable to unauthorised access. Moreover, there is a lot of manual intervention in the data capturing process and the data is also often stored locally, which further increases the risks of privacy breaches. For example, data such as fingerprint and iris scan are highly sensitive and any misuse of that could pose serious threats to the concerned individuals.

By digitising the entire enrolment process and making all data storage and access cloud based, it is quite possible to insulate personal data in a way that it is not subject to any manual intervention, even if the existing agencies and enrolment centres continue to serve as facilitators.

However, a valid concern remains that all citizen data that has hitherto been captured lies exposed. While destroying all localised records could mitigate the risks to a large extent, other safeguards would also need to be taken. This can be taken up as a separate activity by the concerned authorities. 
- See more at: http://www.governancenow.com/views/columns/tal-digitisation-the-answer-privacy-woes#sthash.Iap5xXwJ.dpuf