In 2009, I became extremely concerned with the concept of Unique Identity for various reasons. Connected with many like minded highly educated people who were all concerned.
On 18th May 2010, I started this Blog to capture anything and everything I came across on the topic. This blog with its million hits is a testament to my concerns about loss of privacy and fear of the ID being misused and possible Criminal activities it could lead to.
In 2017 the Supreme Court of India gave its verdict after one of the longest hearings on any issue. I did my bit and appealed to the Supreme Court Judges too through an On Line Petition.
In 2019 the Aadhaar Legislation has been revised and passed by the two houses of the Parliament of India making it Legal. I am no Legal Eagle so my Opinion carries no weight except with people opposed to the very concept.
In 2019, this Blog now just captures on a Daily Basis list of Articles Published on anything to do with Aadhaar as obtained from Daily Google Searches and nothing more. Cannot burn the midnight candle any longer.
"In Matters of Conscience, the Law of Majority has no place"- Mahatma Gandhi
Ram Krishnaswamy
Sydney, Australia.

Aadhaar

The UIDAI has taken two successive governments in India and the entire world for a ride. It identifies nothing. It is not unique. The entire UID data has never been verified and audited. The UID cannot be used for governance, financial databases or anything. It’s use is the biggest threat to national security since independence. – Anupam Saraph 2018

When I opposed Aadhaar in 2010 , I was called a BJP stooge. In 2016 I am still opposing Aadhaar for the same reasons and I am told I am a Congress die hard. No one wants to see why I oppose Aadhaar as it is too difficult. Plus Aadhaar is FREE so why not get one ? Ram Krishnaswamy

First they ignore you, then they laugh at you, then they fight you, then you win.-Mahatma Gandhi

In matters of conscience, the law of the majority has no place.Mahatma Gandhi

“The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 of the Indian constitution refers to the right to life and liberty -Attorney General Mukul Rohatgi

“There is merit in the complaints. You are unwittingly allowing snooping, harassment and commercial exploitation. The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except as may be directed by a court for the purpose of criminal investigation.”-A three judge bench headed by Justice J Chelameswar said in an interim order.

Legal scholar Usha Ramanathan describes UID as an inverse of sunshine laws like the Right to Information. While the RTI makes the state transparent to the citizen, the UID does the inverse: it makes the citizen transparent to the state, she says.

Good idea gone bad
I have written earlier that UID/Aadhaar was a poorly designed, unreliable and expensive solution to the really good idea of providing national identification for over a billion Indians. My petition contends that UID in its current form violates the right to privacy of a citizen, guaranteed under Article 21 of the Constitution. This is because sensitive biometric and demographic information of citizens are with enrolment agencies, registrars and sub-registrars who have no legal liability for any misuse of this data. This petition has opened up the larger discussion on privacy rights for Indians. The current Article 21 interpretation by the Supreme Court was done decades ago, before the advent of internet and today’s technology and all the new privacy challenges that have arisen as a consequence.

Rajeev Chandrasekhar, MP Rajya Sabha

“What is Aadhaar? There is enormous confusion. That Aadhaar will identify people who are entitled for subsidy. No. Aadhaar doesn’t determine who is eligible and who isn’t,” Jairam Ramesh

But Aadhaar has been mythologised during the previous government by its creators into some technology super force that will transform governance in a miraculous manner. I even read an article recently that compared Aadhaar to some revolution and quoted a 1930s historian, Will Durant.Rajeev Chandrasekhar, Rajya Sabha MP

“I know you will say that it is not mandatory. But, it is compulsorily mandatorily voluntary,” Jairam Ramesh, Rajya Saba April 2017.

August 24, 2017: The nine-judge Constitution Bench rules that right to privacy is “intrinsic to life and liberty”and is inherently protected under the various fundamental freedoms enshrined under Part III of the Indian Constitution

"Never doubt that a small group of thoughtful, committed citizens can change the World; indeed it's the only thing that ever has"

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” -Edward Snowden

In the Supreme Court, Meenakshi Arora, one of the senior counsel in the case, compared it to living under a general, perpetual, nation-wide criminal warrant.

Had never thought of it that way, but living in the Aadhaar universe is like living in a prison. All of us are treated like criminals with barely any rights or recourse and gatekeepers have absolute power on you and your life.

Announcing the launch of the # BreakAadhaarChainscampaign, culminating with events in multiple cities on 12th Jan. This is the last opportunity to make your voice heard before the Supreme Court hearings start on 17th Jan 2018. In collaboration with @no2uidand@rozi_roti.

UIDAI's security seems to be founded on four time tested pillars of security idiocy

1) Denial

2) Issue fiats and point finger

3) Shoot messenger

4) Bury head in sand.

God Save India

Thursday, February 15, 2018

12804 - Panel of Experts Describes Steps to Secure Aadhaar Data

ISMG Exclusive: Analysis of Essential Action Items

Geetha Nandikotkur (AsiaSecEditor) • February 13, 2018     


Panelists (from left): K.K. Mookhey, Naavi Vijayashankar and C.N. Shashidhar

The recent Aadhaar data security conundrum, resulting in identity theft and data breaches, was due to poor implementation of security, monitoring and authentication mechanisms, according to a panel of security experts assembled by Information Security Media Group.

Unique Identification Authority of India's efforts to protect its Aadhaar data repository with information on 1.2 billion Indians lacks an effective data protection framework, the panel concludes in an exclusive, in-depth audio report (see link below image).

Aadhaar Data Compromise
"There have been many instances of Aadhaar data compromise. It is a challenge to ascertain where the compromise has occurred - at the Central Identities Data Repository or at the user agency system level; there is little information about whether the data has been secured," says Bengaluru-based Naavi Vijayashankar, a cyber dispute risk management consultant and cyber law expert.

Bengaluru-based C. N. Shashidhar, CEO at SecureIT, a security consulting firm, notes during the panel: "Aadhaar is a very good instrument for data governance, but its security is poorly implemented; its present policy is opaque - we call it 'security by obscurity' - with very little information on security measures for protecting such huge data.

"UIDAI must do a better job of sharing its program on protecting citizens' data, as its generalized disclosure on the best practice of encrypting the data does not explain its security posture," Shashidhar says. "And this parlance is valid for a limited period before the zero-day attacks occur."
Mumbai-based K. K. Mookhey, CEO at NII Consulting, a security service provider, argues: "Any assumption by UIDAI that citizens' biometric data has not been compromised or breached might be proven wrong when big breaches such as Equifax, JP Morgan, OPM, have not been spared despite huge security investments. Any central repository of personal or private demographic data is sure to be a lucrative target."
Mapping Risk
The key issue, according to the three experts who participated in the panel discussion, is mapping the risks associated with storing such a huge amount of data and enabling access by third parties.
"Any user or agency accessing UIDAI's data and requesting hundreds of details has been provided these," Naavi says. "This is a misuse of data; the system needs to send an alert."
Shashidhar contends that UIDAI failed to map the risk. He charges that the Aadhaar mobile app failed the basic security test of writing simple security code.
"The approach is immature, with inadequate controls while providing access to third parties," he says.
Resilient Data Protection Framework
UIDAI has added new security layers for Aadhaar via Virtual ID - a temporary, 16-digit Virtual ID number that can be used by Aadhaar holders for authentication purposes - and a UID token - a 72-character alphanumeric string all entities can use to ensure customer uniqueness. The panelists, however, call this a Band-Aid approach because the key functionalities for protecting data are not well articulated (see: Aadhaar Getting Additional Security Layer).
Although the three panelists commended UIDAI's efforts to build a framework to protect data, they urged benchmarking Aadhaar against PCI DSS, NIST and other compliance and security frameworks to spot weak areas.
The panelists also questioned how useful VID and UID tokens would prove to be.
Mookhey says, in theory, VID and UID tokens would help authenticate transactions. "But the fundamental question remains: Is my Aadhaar private or not, as UIDAI clearly says the Aadhaar number is not an authentication mechanism? Then why do I need a virtual ID when it cannot be used for authentication purposes or if no service provider will validate transactions based on this number?"
Critical steps UIDAI needs to take in building a resilient data protection framework for Aadhaar, according to the panelists, are:
  • Collaborate with security professionals on the effort;
  • Use better authentication methods while sharing data with third parties;
  • Clearly articulate the security functions of VID and UID tokens and the technical implementation in protecting customer credentials;
  • Deploy role-based controls to restrict abuse of data by super-users;
  • Adopt device based encryption;
  • Deploy technologies for better monitoring and detection of user behavior.
Vijayashankar, an information assurance consultant, is a pioneer in cyber law in India and founder of www.naavi.org. He pioneered "Total Information Assurance," an approach to information security going beyond confidentiality, integrity and availability to authentication and nonrepudiation.
Mookhey, CEO at NII Consulting, is well-versed with the security challenges of various industry verticals, and international standards. The author of books on Linux security and on the metasploit framework, he's also written numerous articles on information security.
Shashidhar, CEO at SecureIT, is a certified expert in information security, governance, risk and compliance with 28 years of experience. He has managed security and control transitions for acquisitions and created control and governance frameworks. With experience in several business sectors, he's currently focused on information security training and consulting. He previously was a global information security adviser at IBM India for 20 years.

(Editor's Note: Recording this panel from multiple locations resulted in some minor audio quality issues. Editors Suparna Goswami and Varun Haran also participated in this project.)