In 2009, I became extremely concerned with the concept of Unique Identity for various reasons. Connected with many like minded highly educated people who were all concerned.
On 18th May 2010, I started this Blog to capture anything and everything I came across on the topic. This blog with its million hits is a testament to my concerns about loss of privacy and fear of the ID being misused and possible Criminal activities it could lead to.
In 2017 the Supreme Court of India gave its verdict after one of the longest hearings on any issue. I did my bit and appealed to the Supreme Court Judges too through an On Line Petition.
In 2019 the Aadhaar Legislation has been revised and passed by the two houses of the Parliament of India making it Legal. I am no Legal Eagle so my Opinion carries no weight except with people opposed to the very concept.
In 2019, this Blog now just captures on a Daily Basis list of Articles Published on anything to do with Aadhaar as obtained from Daily Google Searches and nothing more. Cannot burn the midnight candle any longer.
"In Matters of Conscience, the Law of Majority has no place"- Mahatma Gandhi
Ram Krishnaswamy
Sydney, Australia.

Aadhaar

The UIDAI has taken two successive governments in India and the entire world for a ride. It identifies nothing. It is not unique. The entire UID data has never been verified and audited. The UID cannot be used for governance, financial databases or anything. It’s use is the biggest threat to national security since independence. – Anupam Saraph 2018

When I opposed Aadhaar in 2010 , I was called a BJP stooge. In 2016 I am still opposing Aadhaar for the same reasons and I am told I am a Congress die hard. No one wants to see why I oppose Aadhaar as it is too difficult. Plus Aadhaar is FREE so why not get one ? Ram Krishnaswamy

First they ignore you, then they laugh at you, then they fight you, then you win.-Mahatma Gandhi

In matters of conscience, the law of the majority has no place.Mahatma Gandhi

“The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 of the Indian constitution refers to the right to life and liberty -Attorney General Mukul Rohatgi

“There is merit in the complaints. You are unwittingly allowing snooping, harassment and commercial exploitation. The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except as may be directed by a court for the purpose of criminal investigation.”-A three judge bench headed by Justice J Chelameswar said in an interim order.

Legal scholar Usha Ramanathan describes UID as an inverse of sunshine laws like the Right to Information. While the RTI makes the state transparent to the citizen, the UID does the inverse: it makes the citizen transparent to the state, she says.

Good idea gone bad
I have written earlier that UID/Aadhaar was a poorly designed, unreliable and expensive solution to the really good idea of providing national identification for over a billion Indians. My petition contends that UID in its current form violates the right to privacy of a citizen, guaranteed under Article 21 of the Constitution. This is because sensitive biometric and demographic information of citizens are with enrolment agencies, registrars and sub-registrars who have no legal liability for any misuse of this data. This petition has opened up the larger discussion on privacy rights for Indians. The current Article 21 interpretation by the Supreme Court was done decades ago, before the advent of internet and today’s technology and all the new privacy challenges that have arisen as a consequence.

Rajeev Chandrasekhar, MP Rajya Sabha

“What is Aadhaar? There is enormous confusion. That Aadhaar will identify people who are entitled for subsidy. No. Aadhaar doesn’t determine who is eligible and who isn’t,” Jairam Ramesh

But Aadhaar has been mythologised during the previous government by its creators into some technology super force that will transform governance in a miraculous manner. I even read an article recently that compared Aadhaar to some revolution and quoted a 1930s historian, Will Durant.Rajeev Chandrasekhar, Rajya Sabha MP

“I know you will say that it is not mandatory. But, it is compulsorily mandatorily voluntary,” Jairam Ramesh, Rajya Saba April 2017.

August 24, 2017: The nine-judge Constitution Bench rules that right to privacy is “intrinsic to life and liberty”and is inherently protected under the various fundamental freedoms enshrined under Part III of the Indian Constitution

"Never doubt that a small group of thoughtful, committed citizens can change the World; indeed it's the only thing that ever has"

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” -Edward Snowden

In the Supreme Court, Meenakshi Arora, one of the senior counsel in the case, compared it to living under a general, perpetual, nation-wide criminal warrant.

Had never thought of it that way, but living in the Aadhaar universe is like living in a prison. All of us are treated like criminals with barely any rights or recourse and gatekeepers have absolute power on you and your life.

Announcing the launch of the # BreakAadhaarChainscampaign, culminating with events in multiple cities on 12th Jan. This is the last opportunity to make your voice heard before the Supreme Court hearings start on 17th Jan 2018. In collaboration with @no2uidand@rozi_roti.

UIDAI's security seems to be founded on four time tested pillars of security idiocy

1) Denial

2) Issue fiats and point finger

3) Shoot messenger

4) Bury head in sand.

God Save India

Thursday, September 21, 2017

12087 - Can we have security and privacy in an age of mass surveillance?



August 29, 2017   Media contact: Gillian Kiley   401-863-7287

The intelligence community’s first deputy for civil liberties, now a senior fellow at Brown, describes how we can reform mass surveillance to protect privacy and human rights.

PROVIDENCE, R.I. [Brown University] — Before serving as an intelligence official in the Bush and Obama administrations, Timothy H. Edgar — a senior fellow at Brown University’s Watson Institute for International and Public Affairs — defended privacy rights as an American Civil Liberties Union lawyer.

A cybersecurity expert and leader in establishing Brown’s executive master in cybersecurity program, Edgar this week published a new book, “Beyond Snowden: Privacy, Mass Surveillance and the Struggle to Reform the NSA,” in which he describes his efforts to implement reforms from within America’s growing surveillance state.

The title refers to Edward Snowden, the former Central Intelligence Agency employee and National Security Agency (NSA) contractor who in 2013 leaked the existence of several mass surveillance programs, including the bulk collection of American telephone records, and revealed details of web surveillance programs. Congress is debating this year whether to renew the legal authority for these programs.

Here, Edgar shares specific recommendations for reforms and his thoughts on why America should become a leader in surveillance reform.

Q: Do you think most Americans understand what Snowden brought to light and what is at stake with the NSA’s mass surveillance programs?
I think on a broad level that people do, because they understand that their privacy is at risk in the digital age, but they are perplexed about how mass surveillance works. The U.S. has built a mass surveillance state that threatens the privacy of everyone in the world, but our surveillance laws are out of date. Long before Snowden came along, we were debating these issues inside the government. A major reason I wrote this book was to make that debate more accessible to the general public.

Q: What rules and laws guide intelligence agencies on communications and privacy? What makes them out of date?
Edgar said he wrote the book to make issues like transnational surveillance and metadata vs. content understandable to a non-expert audience.
The first and most important rule is the Constitutionmainly the Fourth Amendment, which protects us against unreasonable searches and seizures. Second are federal laws, like the Foreign Intelligence Surveillance Act, which are designed to implement those rights. And third are executive branch oversight rules that apply to NSA personnel.

The problem is that all these laws were originally based on analog technology and on a world before globalization. They provide little protection for metadata — when a call was made, to whom and how long it was, or the routing information that applies to digital communications like e-mail — as opposed to the content of calls or messages — what was said. They make it easy to scoop up the communications of foreigners outside the U.S. because the law is based on a faulty and outdated assumption that Americans’ privacy isn’t affected very much by “foreign” surveillance.

These kinds of distinctions really are relics from the 1970s. Today the world is both digital and transnational.  Drawing lines between different kinds of personal data and between Americans and foreigners is both more difficult and more arbitrary than it was 40 years ago.

Q: How does digital technology complicate distinguishing between domestic and foreign surveillance?
To talk about spying on foreigners or spying on Americans is too simplistic in the 21st century, when data may be in one country while the target of surveillance is in another. In the book, I describe this phenomenon as transnational surveillance. In these programs, the NSA uses a secret court order to compel communications providers inside the U.S. to get communications that it believes belong to foreigners outside the U.S.
I argue that those are not really foreign surveillance programs because the NSA is collecting data within the U.S., many communications of Americans are being swept in, and other agencies can query that database to find out about Americans. But these programs are not quite domestic surveillance either, because they are nothing like an FBI wiretap of somebody inside the country. Transnational surveillance looks at targets outside the country, but whose communications are flowing over the internet inside the U.S., or are being stored by American technology companies.

What I did in the government was to help design a new system of oversight for transnational surveillance. A big part of what I’m trying to figure out in the book is: How did we do? And the answer is very much still being debated. This year, Congress will consider renewing the legal authority for transnational surveillance of the content of communications.

Q: Do you think the objectives of civil liberties advocates and the national security establishment can be reconciled? 
As a civil liberties activist who went into the intelligence community and tried to reform the NSA’s mass surveillance programs and came out again, I would say the two groups have more in common than they sometimes realize. Civil liberties advocates and the intelligence community want to achieve the same broad goal: gather intelligence with safeguards and protections for privacy and civil liberties. But it’s difficult to have a real conversation about mass surveillance without the transparency we’ve had in the last few years.

Q: In the book, you credit President Barack Obama’s administration for launching a transparency drive. What did the administration do?
A lot of people don’t realize that the public learned as much if not more about NSA surveillance from the government’s own efforts than it did from Snowden. Under Obama, the intelligence community put a huge number of declassified documents on the public record, including thousands of pages of Foreign Intelligence Surveillance Court opinions, plus new details about surveillance in an annual transparency report and through its website, IC on the Record.

The transparency drive the Obama administration launched to defend itself is in many ways more important than the unauthorized transparency of the original Snowden leaks.

Q: In the book, you describe reforms to mass surveillance made by Obama and President George W. Bush. Are there specific reforms you’d like to see enacted?
I’d like to strengthen the Foreign Intelligence Surveillance Court. This secret court has done a pretty good job at what it was set up to do in 1978 — review wiretaps — but it isn’t well-equipped to review transnational surveillance and big programs of metadata collection. We should give individual federal judges technologists, magistrates and personnel with technological expertise that can help them oversee the complicated programs that they’re being asked to approve.
Also, technology can be used in partnership with the law to protect our privacy. The law punishes misuse of data, but cryptography can offer guarantees against misuse in the first place. We can require the NSA to use available, scalable encrypted search methods so it can extract from bulk databases just the particular pieces of information it can lawfully obtain, leaving everything else protected. Major advances in just the last few years makes this possible, but the public must demand that the NSA use them to achieve our broader goal.

Q: What is that broader goal?
The U.S. needs to go from being a leader in surveillance to a leader in surveillance reform. We have a strong tradition of protecting privacy through our institutions and founding documents, though right now our laws are too weak to protect our privacy in a digital, transnational age. A leadership role would help ensure a stronger and more robust intelligence capability across the democratic allies that the U.S. depends on. Because of Snowden, we now know about mass surveillance. The question is: What we going to do about it?  

“Beyond Snowden” is one attempt to answer that question.

Click here to hear Tim Edgar discuss these issues further with the Watson Institute's Sarah Baldwin for the"Trending Globally" series.