In 2009, I became extremely concerned with the concept of Unique Identity for various reasons. Connected with many like minded highly educated people who were all concerned.
On 18th May 2010, I started this Blog to capture anything and everything I came across on the topic. This blog with its million hits is a testament to my concerns about loss of privacy and fear of the ID being misused and possible Criminal activities it could lead to.
In 2017 the Supreme Court of India gave its verdict after one of the longest hearings on any issue. I did my bit and appealed to the Supreme Court Judges too through an On Line Petition.
In 2019 the Aadhaar Legislation has been revised and passed by the two houses of the Parliament of India making it Legal. I am no Legal Eagle so my Opinion carries no weight except with people opposed to the very concept.
In 2019, this Blog now just captures on a Daily Basis list of Articles Published on anything to do with Aadhaar as obtained from Daily Google Searches and nothing more. Cannot burn the midnight candle any longer.
"In Matters of Conscience, the Law of Majority has no place"- Mahatma Gandhi
Ram Krishnaswamy
Sydney, Australia.

Aadhaar

The UIDAI has taken two successive governments in India and the entire world for a ride. It identifies nothing. It is not unique. The entire UID data has never been verified and audited. The UID cannot be used for governance, financial databases or anything. It’s use is the biggest threat to national security since independence. – Anupam Saraph 2018

When I opposed Aadhaar in 2010 , I was called a BJP stooge. In 2016 I am still opposing Aadhaar for the same reasons and I am told I am a Congress die hard. No one wants to see why I oppose Aadhaar as it is too difficult. Plus Aadhaar is FREE so why not get one ? Ram Krishnaswamy

First they ignore you, then they laugh at you, then they fight you, then you win.-Mahatma Gandhi

In matters of conscience, the law of the majority has no place.Mahatma Gandhi

“The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 of the Indian constitution refers to the right to life and liberty -Attorney General Mukul Rohatgi

“There is merit in the complaints. You are unwittingly allowing snooping, harassment and commercial exploitation. The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except as may be directed by a court for the purpose of criminal investigation.”-A three judge bench headed by Justice J Chelameswar said in an interim order.

Legal scholar Usha Ramanathan describes UID as an inverse of sunshine laws like the Right to Information. While the RTI makes the state transparent to the citizen, the UID does the inverse: it makes the citizen transparent to the state, she says.

Good idea gone bad
I have written earlier that UID/Aadhaar was a poorly designed, unreliable and expensive solution to the really good idea of providing national identification for over a billion Indians. My petition contends that UID in its current form violates the right to privacy of a citizen, guaranteed under Article 21 of the Constitution. This is because sensitive biometric and demographic information of citizens are with enrolment agencies, registrars and sub-registrars who have no legal liability for any misuse of this data. This petition has opened up the larger discussion on privacy rights for Indians. The current Article 21 interpretation by the Supreme Court was done decades ago, before the advent of internet and today’s technology and all the new privacy challenges that have arisen as a consequence.

Rajeev Chandrasekhar, MP Rajya Sabha

“What is Aadhaar? There is enormous confusion. That Aadhaar will identify people who are entitled for subsidy. No. Aadhaar doesn’t determine who is eligible and who isn’t,” Jairam Ramesh

But Aadhaar has been mythologised during the previous government by its creators into some technology super force that will transform governance in a miraculous manner. I even read an article recently that compared Aadhaar to some revolution and quoted a 1930s historian, Will Durant.Rajeev Chandrasekhar, Rajya Sabha MP

“I know you will say that it is not mandatory. But, it is compulsorily mandatorily voluntary,” Jairam Ramesh, Rajya Saba April 2017.

August 24, 2017: The nine-judge Constitution Bench rules that right to privacy is “intrinsic to life and liberty”and is inherently protected under the various fundamental freedoms enshrined under Part III of the Indian Constitution

"Never doubt that a small group of thoughtful, committed citizens can change the World; indeed it's the only thing that ever has"

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” -Edward Snowden

In the Supreme Court, Meenakshi Arora, one of the senior counsel in the case, compared it to living under a general, perpetual, nation-wide criminal warrant.

Had never thought of it that way, but living in the Aadhaar universe is like living in a prison. All of us are treated like criminals with barely any rights or recourse and gatekeepers have absolute power on you and your life.

Announcing the launch of the # BreakAadhaarChainscampaign, culminating with events in multiple cities on 12th Jan. This is the last opportunity to make your voice heard before the Supreme Court hearings start on 17th Jan 2018. In collaboration with @no2uidand@rozi_roti.

UIDAI's security seems to be founded on four time tested pillars of security idiocy

1) Denial

2) Issue fiats and point finger

3) Shoot messenger

4) Bury head in sand.

God Save India

Tuesday, July 9, 2013

4401 - Big Brother is Watching - EPW


What was suspected for long stands confirmed; states are monitoring their citizens' conversations.

The suspicion among internet democracy and civil liberty activists that the behemoth databases and servers of Google, Facebook, Microsoft, Apple and Skype have for long been used by intelligence agencies in the United States (US) now stands confirmed. Edward Snowden, a contractor for the secretive US National Security Agency (NSA), bravely leaked confidential and classified documents to The Guardian in early June which confirmed the existence of an electronic surveillance programme code-named PRISM. Launched in 2007, PRISM enabled the NSA to perform in-depth surveillance on electronic communications and data by accessing servers of several “participating technology companies”.

Since the revelations the companies have denied active participation beyond what is legally permissible under US law – specifically the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 (FISA) – but the leaked documents suggest that they have gone out of their way to enable the NSA to collect data. The documents point out that the NSA is collecting 200 billion pieces of intelligence every month. The leaks also pointed to other related data mining programmes such as “Boundless Informant” that analysed metadata information captured by PRISM, colour coding data retrieved from around the world based on intensity of surveillance – Iran was where the highest amount of data was gathered and India was fifth in the leaked list. Such metadata are enough to construct behavioural and interest patterns among internet users, so claims that the metadata does not carry much informational value unless it pertained to specific suspects are spurious.

It goes without saying that this surveillance programme run by the US military industrial complex – for want of a better definition a term for the collaboration between the US military establishment and the biggest internet and communication companies in the world – is a massive attack on the right to privacy of billions of users of internet and communication services. US government officials, senators and intelligence spokespersons have defended the programme arguing that it has served the purpose of national security and have added that the programme has been used only for surveillance of foreign subjects. This is doubly unacceptable for it makes a mockery of the trust shown by consumers across the world who sign up for services offered by the internet companies (which claim to operate on the basis of elaborate privacy policies) and shows scant regard for the sovereignty of foreign nations. The world’s super power has been engaged in mass spying of citizens and governments of foreign nations. There is no other way of describing the NSA’s activities.
States today realise that the technology that enables surveillance of the internet and electronic communications is a useful tool to identify and curb voices of dissent. Globally, public attention has been fixated on “authoritarian” China and its use of extensive surveillance and firewall operations to monitor and restrict internet communications domestically for “national security purposes”. As the NSA programmes have shown, the so-called liberal democratic states follow similar methods, on perhaps a much larger scale.

In the US, the so-called “war against terror”, which enabled legislations such as the Patriot Act of 2001 and the FISA amendments, has given the intelligence bodies enormous powers to conduct mass surveillance. These institutions have utilised data in ways that have arguably further fuelled and exacerbated terrorism. For example, surveillance data have enabled intelligence agencies to conduct illegal operations such as drone attacks which have killed thousands of innocents in countries such as Pakistan and Afghanistan.

Alarmingly, the Indian state, which itself has been spied upon by the US, has sought to emulate its western counterparts in enacting legislation that would enable similar forms of mass electronic surveillance. The Information Technology Amendment Act of 2008 enables e-surveillance. Government agencies such as the Telecom Enforcement, Resource and Monitoring (TREM) and the Centre for Development of Telematics (C-DOT) in collaboration with the Intelligence Bureau have reportedly prepared what is called a Central Monitoring System (CMS) that facilitates collection of call data records and data mining for intelligence purposes. The CMS has been in operation since April 2013, and when combined with the flawed Unique Identification project that seeks to link all databases across government services, it is apparent that the infrastructure for a massive surveillance apparatus is being constructed.

It remains to be seen as to how the US judicial system will react to the submissions by civil rights groups opposing the surveillance programmes of the US state. Will India’s governing authorities realise the dangers of emulating such dystopian surveillance systems? Will India’s civil society and political representatives rise to the occasion to prevent these attacks on our fundamental rights? It is a battle which cannot be evaded.