In 2009, I became extremely concerned with the concept of Unique Identity for various reasons. Connected with many like minded highly educated people who were all concerned.
On 18th May 2010, I started this Blog to capture anything and everything I came across on the topic. This blog with its million hits is a testament to my concerns about loss of privacy and fear of the ID being misused and possible Criminal activities it could lead to.
In 2017 the Supreme Court of India gave its verdict after one of the longest hearings on any issue. I did my bit and appealed to the Supreme Court Judges too through an On Line Petition.
In 2019 the Aadhaar Legislation has been revised and passed by the two houses of the Parliament of India making it Legal. I am no Legal Eagle so my Opinion carries no weight except with people opposed to the very concept.
In 2019, this Blog now just captures on a Daily Basis list of Articles Published on anything to do with Aadhaar as obtained from Daily Google Searches and nothing more. Cannot burn the midnight candle any longer.
"In Matters of Conscience, the Law of Majority has no place"- Mahatma Gandhi
Ram Krishnaswamy
Sydney, Australia.

Aadhaar

The UIDAI has taken two successive governments in India and the entire world for a ride. It identifies nothing. It is not unique. The entire UID data has never been verified and audited. The UID cannot be used for governance, financial databases or anything. It’s use is the biggest threat to national security since independence. – Anupam Saraph 2018

When I opposed Aadhaar in 2010 , I was called a BJP stooge. In 2016 I am still opposing Aadhaar for the same reasons and I am told I am a Congress die hard. No one wants to see why I oppose Aadhaar as it is too difficult. Plus Aadhaar is FREE so why not get one ? Ram Krishnaswamy

First they ignore you, then they laugh at you, then they fight you, then you win.-Mahatma Gandhi

In matters of conscience, the law of the majority has no place.Mahatma Gandhi

“The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 of the Indian constitution refers to the right to life and liberty -Attorney General Mukul Rohatgi

“There is merit in the complaints. You are unwittingly allowing snooping, harassment and commercial exploitation. The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except as may be directed by a court for the purpose of criminal investigation.”-A three judge bench headed by Justice J Chelameswar said in an interim order.

Legal scholar Usha Ramanathan describes UID as an inverse of sunshine laws like the Right to Information. While the RTI makes the state transparent to the citizen, the UID does the inverse: it makes the citizen transparent to the state, she says.

Good idea gone bad
I have written earlier that UID/Aadhaar was a poorly designed, unreliable and expensive solution to the really good idea of providing national identification for over a billion Indians. My petition contends that UID in its current form violates the right to privacy of a citizen, guaranteed under Article 21 of the Constitution. This is because sensitive biometric and demographic information of citizens are with enrolment agencies, registrars and sub-registrars who have no legal liability for any misuse of this data. This petition has opened up the larger discussion on privacy rights for Indians. The current Article 21 interpretation by the Supreme Court was done decades ago, before the advent of internet and today’s technology and all the new privacy challenges that have arisen as a consequence.

Rajeev Chandrasekhar, MP Rajya Sabha

“What is Aadhaar? There is enormous confusion. That Aadhaar will identify people who are entitled for subsidy. No. Aadhaar doesn’t determine who is eligible and who isn’t,” Jairam Ramesh

But Aadhaar has been mythologised during the previous government by its creators into some technology super force that will transform governance in a miraculous manner. I even read an article recently that compared Aadhaar to some revolution and quoted a 1930s historian, Will Durant.Rajeev Chandrasekhar, Rajya Sabha MP

“I know you will say that it is not mandatory. But, it is compulsorily mandatorily voluntary,” Jairam Ramesh, Rajya Saba April 2017.

August 24, 2017: The nine-judge Constitution Bench rules that right to privacy is “intrinsic to life and liberty”and is inherently protected under the various fundamental freedoms enshrined under Part III of the Indian Constitution

"Never doubt that a small group of thoughtful, committed citizens can change the World; indeed it's the only thing that ever has"

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” -Edward Snowden

In the Supreme Court, Meenakshi Arora, one of the senior counsel in the case, compared it to living under a general, perpetual, nation-wide criminal warrant.

Had never thought of it that way, but living in the Aadhaar universe is like living in a prison. All of us are treated like criminals with barely any rights or recourse and gatekeepers have absolute power on you and your life.

Announcing the launch of the # BreakAadhaarChainscampaign, culminating with events in multiple cities on 12th Jan. This is the last opportunity to make your voice heard before the Supreme Court hearings start on 17th Jan 2018. In collaboration with @no2uidand@rozi_roti.

UIDAI's security seems to be founded on four time tested pillars of security idiocy

1) Denial

2) Issue fiats and point finger

3) Shoot messenger

4) Bury head in sand.

God Save India

Friday, December 9, 2016

10569 - Cyber strikes expose weaknesses in India’s Banking system - Sunday Guardian

By Siddharth Tiwari | NEW DELHI | 30 October, 2016

Experts believe incidents of ATM fraud should be a wake-up call to upgrade the security of our systems.



Attacks on ATMs have emerged as a significant roadblock to the “Digital India” dream of Prime Minister Narendra Modi, with 30 lakh debit cards being reportedly compromised in recent cases of ATM frauds, a development that also points at the pregnable security measures being adopted by banks.
The “ATM attack” episode that came to light after State Bank of India (SBI) announced reissuing of as many as 600,00 lakh ATM cards is considered to be the financial sector’s biggest data breach so far. Apart from SBI, 19 other banks including, Axis, HDFC, ICCI and Yes were made a part of the entire episode in which customers were duped of over Rs 1.3 crore. 
Consequently, the banks took evasive measures like directing debit card users to change their PIN, blocking payments at international locations, reducing the withdrawal limit and issuing cards with magnetic chips instead of magnetic strips on RBI’s directions.
“State Bank Group (SBG) is very sensitive to customers’ interests and accordingly, has proactively taken measures to ensure full security of all Cards which had even the remotest possibility of being at risk. We have already issued about 4 crore EMV Debit Chip Cards,” said an official response from the SBI in reply to this newspaper’s query.
Banking experts believe that frequent exposure of the banking sector to such cyber threats indicate a negligence of the banks in safekeeping the consumers’ money, such as weak cyber security framework, lack of legal framework to cover the victims and outdated standards of communication.

WEAK CYBER SECURITY FRAMEWORK

INTRUSION DETECTION: Thanks to the lapses in the banks’ security measures, these days it is very easy for a hacker to breach the data through simple tricks like spearphishing email with malicious attachment, vishing, smishing, etc.
The current security framework used by banks in India lacks the ability to detect intrusive activity until very late (not until the consumer resisters the complaint).
“You try to open your Gmail account from different locations and immediately you get a mail informing you about the suspected activity. However, in case of banks even if your card is used from a foreign location, the bank fails to detect and subsequently communicate the same to the consumer. This is negligence on the banks’ parts,” Rakshit Tandon, cyber expert and consultant, told The Sunday Guardian.
THIRD PARTY REGULATION: Outsourcing of key ATM operations to third party vendors is very common these days. These third party vendors such as Hitachi payment services use SWITCH software to route data to respective banks and post confirmation from the bank, processes the dispensing of money. While an investigation is on to ascertain the modus operandi, it is reported that this system was bugged, which, in turn, compromised the data. According to the investigation, a malware was detected in certain ATMs that were operated by the third party—Hitachi. This raises a question on the banks’ mechanisms to ensure whether the software used by these third party vendors was bugged or not.
“RBI has also come across instances of fraudulent messages confirming documentary credits being transmitted using SWIFT infrastructure. In another incident involving the shared mobile wallet of a bank, vulnerabilities were observed in the application itself, which led to exploitation by the attackers,” RBI’s Deputy Governor, S.S. Mundra pointed out in his recent lecture.
“The bank was not performing any real time reconciliation and noticed it only when there was a spike in transactions which led to detection during reconciliation,” he added.
PAYMENT SYSTEMS: A few industry experts hold the opinion that the reported compromise of data was possibly due to data breach from the online payment systems.
“The common thing among the 19 banks, whose data were compromised, is the payment system. The report of ATM breach is misdirecting and leading everyone up the wrong tree,” Anupam Saraph, advisor in governance, informatics and strategic planning, told The Sunday Guardian.
Saraph added that all the 19 affected banks were part of the NPCI’s RuPay payment system and Unified Payment Interface (UPI).
“UPI converts your phone into virtual ATM or the Point of Sale and if somebody hacks into this system then the transactions can be made from anywhere in the world. So, in absence of that data from the banks and the circumstantial evidences it was the hacking of the payment system that led to such large scale of data breach,” Saraph added. 
Saraph also highlighted the vulnerabilities involved in using Aadhaar based payment and called for abolishing Aadhaar as the KYC. 
“Several cases of multiple Aadhaar cards created for the same individual are floating around. Therefore, the linking of the Aadhaar card with the banking and financial system exposes customer data hacking. The use of Aadhaar as KYC should be totally scrapped, as else, it can bring down the entire digital financial system of the country” Saraph suggested.
QUESTIONABLE SECURITY AT ATM KIOSKS: Most ATM kiosks are either unattended or poorly attended by security guards. This gives fraudsters a free hand to install cameras, enable key-jammers and planting skimming devices in the ATMs. Even the security cameras installed are easily tricked and more often than never such incidences go unnoticed by the banks. 
“Security at the ATM kiosks is very weak. In majority of the cases, these kiosks are vacant and unattended. Banks must upgrade their security measures by including biometrics and ensuring better surveillance,” said Tandon.
Additionally, a recent research by Kaspersky Lab has highlighted that ATM machines in India use outdated communication standards that expose them to cyber attacks. The international software security group further revealed that widespread use of outdated and insecure software, mistakes in network configuration and a lack of physical security for critical parts of the ATM, make the ATM machine vulnerable to illegal access and jackpotting.
“Many ATMs studied by Kaspersky were running Windows XP, which is no longer supported by Microsoft. This means their security isn’t up to date and malicious malware can be installed without too much effort,” Altaf Halde, Managing Director (South Asia) Kaspersky Lab India, told this correspondent over e-mail.
LACK OF PROPER LEGAL AND SECURITY FRAMEWORK
Unlike in the United States, the victims of cyber breach in India often remain in the dark. In such cases of cyber fraud, the banks make very few details available to the consumers and mostly look for cover ups to avoid any negative sentiments in the market. While this propensity to hide details is understandable, experts assert that keeping the consumer in the dark narrows the scope of improvement.
While banks in countries like the US go through annual forensic auditing, which audits the mechanisms adopted by the banks in mitigating cyber attacks, no such mechanisms are followed in India.
As per industry reports, 80% of organisations including banks, invest all or majority of their investments in mitigating attacks by buying the best of solutions and making their perimetre secure. However, these measures come as a risk management level, which according to industry experts is not enough to ensure strong cyber protection of the consumers.
Talking to The Sunday Guardian about how banks can upgrade their security mechanisms, Altaf Halde pointed out the need of a 360 degree approach to address all security requirements. A four-point approach highlighted by Halde includes, (i) preventing the penetration of malware inside the perimeter, identify and remediate it at an early stage; (ii) detecting the breach incident when penetration attempt is successful; (iii) reacting properly post-breach with a minimal impact on resources and mitigate the aftermath effects; and (iv) empowering customers to predict forthcoming incidents by analysing the evolution of threats and breach tactics.
Halde further called for increasing the scope for covering multiple industry verticals to address the ever increasing cyber crimes/ATM frauds/ data breach.
“The need of the hour is a strong public private partnership to fight the increasing cyber crime situation. As per media sources, RBI has strong compliance modalities for banks, but the scope needs to be increased by other regulatory bodies for covering other industry verticals as well. All the affected parties need to understand that this does not have to be only a ‘tick mark’ activity, but it has to done keeping in mind the need to protect all stakeholders,” said Halde.
WAKE-UP CALL
After several media reports and cyber experts brought attention towards the existing lapses in our digital financial ecosystem, India’s central banking institution, Reserve Bank of India, issued strict directives such as asking banks to resolve all complaints within 90 days. It also ordered a forensic probe into the matter, reports of which are expected to be out by next month.
The Ministry of Finance too has intervened and has asked for detailed reports from the banks and the regulatory bodies. 
While the National Payments Corporation of India (NPCI) and RBI have stated in their respective official statements that there is no need to panic and remedial actions have already taken, cyber experts believe that this incident should be seen as wake-up call to upgrade the security framework of our financial systems.
“Effective public-private partnerships are absolutely essential in the fight against cybercrime to maintain global security. As we are seeing more and more sophisticated attacks—many of which have a global impact—partnerships and information exchange between cyber security companies and the private sector are becoming increasingly valuable,” said Altaf.
Meanwhile, the NPCI has urged debit card users to exercise caution such as changing ATM PINs periodically, keeping bank details confidential and in case of any suspected activity informing the bank immediately, among others.

There is 1 Comment

Submitted by Chinmoy Das (not verified) on Mon, 2016-10-31 10:36
@Anupam Saraph: UPI allows debit based on a secured credential that can be authenticated only by the account holder from his mobile at present. So, a debit cannot happen through UPI without the online intervention of the account holder. Also, the PIN that is used the transaction is encrypted using multiple layer of encryption using multiple algorithms. Even if a PIN is intercepted it cannot be replayed as some unique device validation is done before the debit is processed.