In the last few weeks, several disturbing incidents centred around the Aadhaar database have established the scope for widespread data leakage. First, a technology start-up that calls itself an Aadhaar-enabled “trust bureau” seemed to demonstrate that it could identify faces singled out from closed-circuit television footage of a crowded street — Aadhaar data was superimposed on photos (with specific fields blanked). This firm is one of the many that offer services such as identity checks, PAN verification, police record checks and employment history generation by linking an individual’s data to his 12-digit Aadhaar number. Another website filtered, compiled and published Aadhaar data to create a database listing of over 500,000 minors. This website has since been shut down by the Unique Identification Authority of India (UIDAI), but not before several telecom salesmen, who used to sell Aadhaar data, were arrested. It remains to be seen how this data was acquired and if copies of this database exist elsewhere or if it can be recreated. What all this points to is that it seems feasible to build parallel databases, which duplicate sensitive data. Indeed, it is difficult to rule out the existence of such parallel databases.

