In 2009, I became extremely concerned with the concept of Unique Identity for various reasons. Connected with many like minded highly educated people who were all concerned.
On 18th May 2010, I started this Blog to capture anything and everything I came across on the topic. This blog with its million hits is a testament to my concerns about loss of privacy and fear of the ID being misused and possible Criminal activities it could lead to.
In 2017 the Supreme Court of India gave its verdict after one of the longest hearings on any issue. I did my bit and appealed to the Supreme Court Judges too through an On Line Petition.
In 2019 the Aadhaar Legislation has been revised and passed by the two houses of the Parliament of India making it Legal. I am no Legal Eagle so my Opinion carries no weight except with people opposed to the very concept.
In 2019, this Blog now just captures on a Daily Basis list of Articles Published on anything to do with Aadhaar as obtained from Daily Google Searches and nothing more. Cannot burn the midnight candle any longer.
"In Matters of Conscience, the Law of Majority has no place"- Mahatma Gandhi
Ram Krishnaswamy
Sydney, Australia.

Aadhaar

The UIDAI has taken two successive governments in India and the entire world for a ride. It identifies nothing. It is not unique. The entire UID data has never been verified and audited. The UID cannot be used for governance, financial databases or anything. It’s use is the biggest threat to national security since independence. – Anupam Saraph 2018

When I opposed Aadhaar in 2010 , I was called a BJP stooge. In 2016 I am still opposing Aadhaar for the same reasons and I am told I am a Congress die hard. No one wants to see why I oppose Aadhaar as it is too difficult. Plus Aadhaar is FREE so why not get one ? Ram Krishnaswamy

First they ignore you, then they laugh at you, then they fight you, then you win.-Mahatma Gandhi

In matters of conscience, the law of the majority has no place.Mahatma Gandhi

“The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 of the Indian constitution refers to the right to life and liberty -Attorney General Mukul Rohatgi

“There is merit in the complaints. You are unwittingly allowing snooping, harassment and commercial exploitation. The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except as may be directed by a court for the purpose of criminal investigation.”-A three judge bench headed by Justice J Chelameswar said in an interim order.

Legal scholar Usha Ramanathan describes UID as an inverse of sunshine laws like the Right to Information. While the RTI makes the state transparent to the citizen, the UID does the inverse: it makes the citizen transparent to the state, she says.

Good idea gone bad
I have written earlier that UID/Aadhaar was a poorly designed, unreliable and expensive solution to the really good idea of providing national identification for over a billion Indians. My petition contends that UID in its current form violates the right to privacy of a citizen, guaranteed under Article 21 of the Constitution. This is because sensitive biometric and demographic information of citizens are with enrolment agencies, registrars and sub-registrars who have no legal liability for any misuse of this data. This petition has opened up the larger discussion on privacy rights for Indians. The current Article 21 interpretation by the Supreme Court was done decades ago, before the advent of internet and today’s technology and all the new privacy challenges that have arisen as a consequence.

Rajeev Chandrasekhar, MP Rajya Sabha

“What is Aadhaar? There is enormous confusion. That Aadhaar will identify people who are entitled for subsidy. No. Aadhaar doesn’t determine who is eligible and who isn’t,” Jairam Ramesh

But Aadhaar has been mythologised during the previous government by its creators into some technology super force that will transform governance in a miraculous manner. I even read an article recently that compared Aadhaar to some revolution and quoted a 1930s historian, Will Durant.Rajeev Chandrasekhar, Rajya Sabha MP

“I know you will say that it is not mandatory. But, it is compulsorily mandatorily voluntary,” Jairam Ramesh, Rajya Saba April 2017.

August 24, 2017: The nine-judge Constitution Bench rules that right to privacy is “intrinsic to life and liberty”and is inherently protected under the various fundamental freedoms enshrined under Part III of the Indian Constitution

"Never doubt that a small group of thoughtful, committed citizens can change the World; indeed it's the only thing that ever has"

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” -Edward Snowden

In the Supreme Court, Meenakshi Arora, one of the senior counsel in the case, compared it to living under a general, perpetual, nation-wide criminal warrant.

Had never thought of it that way, but living in the Aadhaar universe is like living in a prison. All of us are treated like criminals with barely any rights or recourse and gatekeepers have absolute power on you and your life.

Announcing the launch of the # BreakAadhaarChainscampaign, culminating with events in multiple cities on 12th Jan. This is the last opportunity to make your voice heard before the Supreme Court hearings start on 17th Jan 2018. In collaboration with @no2uidand@rozi_roti.

UIDAI's security seems to be founded on four time tested pillars of security idiocy

1) Denial

2) Issue fiats and point finger

3) Shoot messenger

4) Bury head in sand.

God Save India

Monday, June 29, 2015

8197 - The battle between surveillance, security and the right to privacy - Irish Times

The bargain you make, again and again, with various companies is surveillance in exchange for free service



Bruce Schneier: “We’re all open books to both governments and corporations; their ability to peer into our collective personal lives is greater than it has ever been before”

First published:
Thu, Jun 18, 2015, 01:55

A decade ago, the Irish Council for Civil Liberties cautioned that the mobile phone was in essence, the equivalent of a personal tracking device, recording data on every user’s movements every few moments, throughout the day and night.

Thanks to whistleblower Edward Snowden, we now know that such data has been gathered in bulk, secretly, by agencies like Government Communications Headquarters(GCHQ) in the UK and the National Security Agency (NSA) in the US. Only last week, Sky News revealed that police and surveillance agencies in the UK are using fake phone masts and spying technologies known as IMSI catchers and Stingrays to track people without their knowledge or use of a warrant.

Security expert, cryptologist and author Bruce Schneier has long believed this is unacceptable. People not only have a right to privacy, he argues, but such untargeted, mass surveillance does not and never has achieved the security goals used to justify it. Business data-gathering is equally compromising and egregious.

In this excerpt from his new book Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, he argues that commonplace technologies such as the phone give governments and corporations unprecedented opportunities for mass surveillance.

BOOK EXTRACT

If you need to be convinced that you’re living in a science-fiction world, look at your cell phone. This cute, sleek, incredibly powerful tool has become so central to our lives that we take it for granted. It seems perfectly normal to pull this device out of your pocket, no matter where you are on the planet, and use it to talk to someone else, no matter where the person is on the planet.

Yet every morning when you put your cell phone in your pocket, you’re making an implicit bargain with the carrier: “I want to make and receive mobile calls; in exchange, I allow this company to know where I am at all times.”

The bargain isn’t specified in any contract, but it’s inherent in how the service works. You probably hadn’t thought about it, but now that I’ve pointed it out, you might well think it’s a pretty good bargain. Cell phones really are great and they can’t work unless the cell phone companies know where you are, which means they keep you under their surveillance.

This is a very intimate form of surveillance. Your cell phone tracks where you live and where you work. It tracks where you like to spend your weekends and evenings. It tracks how often you go to church (and which church), how much time you spend in a bar and whether you speed when you drive. It tracks – since it knows about all the other phones in your area – whom you spend your days with, whom you meet for lunch and whom you sleep with.

The accumulated data can probably paint a better picture of how you spend your time than you can, because it doesn’t have to rely on human memory. In 2012, researchers were able to use this data to predict where people would be 24 hours later, to within 20 metres.

Before cell phones, if someone wanted to know all of this, he would have had to hire a private investigator to follow you around taking notes. Now that job is obsolete; the cell phone in your pocket does all of this automatically. It might be that no one retrieves that information, but it is there for the taking.
Your location information is valuable and everyone wants access to it. The police want it. Cell phone location analysis is useful in criminal investigations in several different ways. The police can “ping” a particular phone to determine where it is, use historical data to determine where it has been and collect all the cell phone location data from a specific area to figure out who was there and when. More and more, police are using this data for exactly these purposes.

Governments also use this same data for intimidation and social control. In 2014, the government of Ukraine sent this positively Orwellian text message to people in Kiev whose phones were at a certain place during a certain time period: “Dear subscriber, you have been registered as a participant in a mass disturbance.” Don’t think this behaviour is limited to totalitarian countries; in 2010, Michigan police sought information about every cell phone in service near an expected labour protest. They didn’t bother getting a warrant first.

There’s a whole industry devoted to tracking you in real time. Companies use your phone to track you in stores to learn how you shop, track you on the road to determine how close you might be to a particular store and deliver advertising to your phone based on where you are right now.

Your location data is so valuable that cell phone companies are now selling it to data brokers, who in turn resell it to anyone willing to pay for it. Companies like Sense Networks specialise in using this data to build personal profiles of each of us.

Phone companies are not the only source of cell phone data. The US company Verintsells cell phone tracking systems to both corporations and governments worldwide. The company’s website says that it’s “a global leader in Actionable Intelligence solutions for customer engagement optimisation, security intelligence, and fraud, risk and compliance,” with clients in “more than 10,000 organisations in over 180 countries .
The UK company Cobham sells a system that allows someone to send a “blind” call to a phone – one that doesn’t ring and isn’t detectable. The blind call forces the phone to transmit on a certain frequency, allowing the sender to track that phone to within one meter. The company boasts government customers in AlgeriaBruneiGhanaPakistan,Saudi ArabiaSingapore and the United States.
Defentek, a company mysteriously registered in Panama, sells a system that can “locate and track any phone number in the world . . . undetected and unknown by the network, carrier or the target.” It’s not an idle boast; telecommunications researcher Tobias Engel demonstrated the same thing at a hacker conference in 2008. Criminals do the same today.
All this location tracking is based on the cellular system. There’s another entirely different and more accurate location system built into your smartphone: GPS. This is what provides location data to the various apps running on your phone. Some apps use location data to deliver service – Google Maps, UberYelp. Others, like Angry Birds, just want to be able to collect and sell it.

You can do this, too. HelloSpy is an app that you can surreptitiously install on someone else’s smartphone to track him or her. Perfect for an anxious mother wanting to spy on her teenager or an abusive man wanting to spy on his wife or girlfriend. Employers have used apps like this to spy on their employees.

The US National Security Agency (NSA) and its UK counterpart, Government Communications Headquarters (GCHQ), use location data to track people. The NSA collects cell phone location data from a variety of sources: the cell towers that phones connect to, the location of wifi networks that phones log on to and GPS location data from internet apps. Two of the NSA’s internal databases, code-named HAPPYFOOT and FASCIA, contain comprehensive location information of devices worldwide. The NSA uses the databases to track people’s movements, identify people who associate with people of interest and target drone strikes.

The NSA can allegedly track cell phones even when they are turned off.

I’ve just been talking about location information from one source – your cell phone – but the issue is far larger than this. The computers you interact with are constantly producing intimate personal data about you. It includes what you read, watch and listen to. It includes whom you talk to and what you say. Ultimately, it covers what you’re thinking about, at least to the extent that your thoughts lead you to the internet and search engines. We are living in the golden age of surveillance.
Sun Microsystems’ chief executive Scott McNealy said it plainly way back in 1999: “You have zero privacy anyway. Get over it.” He’s wrong about how we should react to surveillance, of course, but he’s right that it’s becoming harder and harder to avoid surveillance and maintain privacy.

Surveillance is a politically and emotionally loaded term, but I use it deliberately. The US military defines surveillance as “systematic observation”. As I’ll explain, modern-day electronic surveillance is exactly that. We’re all open books to both governments and corporations; their ability to peer into our collective personal lives is greater than it has ever been before.
The bargain you make, again and again, with various companies is surveillance in exchange for free service. Google’s chairman Eric Schmidt and its director of ideasJared Cohen laid it out in their 2013 book, The New Digital Age. Here I’m paraphrasing their message: if you let us have all your data, we will show you advertisements you want to see and we’ll throw in free web search, email and all sorts of other services. It’s convenience, basically. We are social animals and there’s nothing more powerful or rewarding than communicating with other people.

Digital means have become the easiest and quickest way to communicate. And why do we allow governments access? Because we fear the terrorists, fear the strangers abducting our children, fear the drug dealers, fear whatever bad guy is in vogue at the moment. That’s the NSA’s justification for its mass-surveillance programs; if you let us have all of your data, we’ll relieve your fear.

The problem is that these aren’t good or fair bargains, at least as they’re structured today. We’ve been accepting them too easily and without really understanding the terms.

Here is what’s true. Today’s technology gives governments and corporations robust capabilities for mass surveillance. Mass surveillance is dangerous. It enables discrimination based on almost any criteria: race, religion, class, political beliefs. It is being used to control what we see, what we can do and, ultimately, what we say.

It is being done without offering citizens recourse or any real ability to opt out and without any meaningful checks and balances. It makes us less safe. It makes us less free. The rules we had established to protect us from these dangers under earlier technological regimes are now woefully insufficient; they are not working. We need to fix that and we need to do it very soon.


Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier is published by WW Norton & Co and available in hardback at £17.99