Misuse of Aadhaar data

Concerns of identity theft have become real

Image
Business Standard Editorial Comment New Delhi
Last Updated : Feb 23 2017 | 10:45 PM IST
In the last few weeks, several disturbing incidents centred around the Aadhaar database have established the scope for widespread data leakage. First, a technology start-up that calls itself an Aadhaar-enabled “trust bureau” seemed to demonstrate that it could identify faces singled out from closed-circuit television footage of a crowded street — Aadhaar data was superimposed on photos (with specific fields blanked). This firm is one of the many that offer services such as identity checks, PAN verification, police record checks and employment history generation by linking an individual’s data to his 12-digit Aadhaar number. Another website filtered, compiled and published Aadhaar data to create a database listing of over 500,000 minors. This website has since been shut down by the Unique Identification Authority of India (UIDAI), but not before several telecom salesmen, who used to sell Aadhaar data, were arrested. It remains to be seen how this data was acquired and if copies of this database exist elsewhere or if it can be recreated. What all this points to is that it seems feasible to build parallel databases, which duplicate sensitive data. Indeed, it is difficult to rule out the existence of such parallel databases.

It is also difficult to argue that such incidents involving egregious misuse of Aadhaar data are unlikely to multiply. The biometric identification system is being used extensively for e-KYC (know your customer) processes for multiple purposes. There is little to prevent such data being collected, stored and re-used for illegal purposes. Indeed, as member of Parliament and technology entrepreneur Rajeev Chandrasekhar has pointed out, no regulation even makes such data storage illegal in theory. At present, anybody can enrol as an agent to verify e-KYC. The application programming interface (API) for the Aadhaar e-KYC service is publicly available from the UIDAI. Agent enrolment is a simple, quick process; the basic equipment is an inexpensive biometric fingerprint scanner connected to a smartphone. KYC user agencies and service agencies access Aadhaar data after taking the individual’s consent. The individual must input a one-time password – delivered to a registered mobile number – to agree to authentication. The UIDAI only verifies queries with a binary “yes/no”. But the agency conducting the e-KYC and verification can collect and store data at its end. Indeed, white-hat hackers have demonstrated how iris scans can even be generated from high-resolution passport photographs.

Mobile service providers and banks have used private agencies to generate e-KYC data for hundreds of millions of people. It is, therefore, quite possible that many parallel databases tied to Aadhaar already exist, and these Aadhaar numbers, in turn, are tied to other sensitive data. The aggressive rollout also means that new databases continue to proliferate. What makes matters worse is that there is no specific privacy law or data-privacy law to stop such data being stored or traded. These security breaches suggest that any future privacy legislation, or judgments by the judiciary, might only manage to close the stable door long after the proverbial horse has bolted. This also means that the eventual remedy will have to be drastic and implemented at an express speed.

One subscription. Two world-class reads.

Already subscribed? Log in

Subscribe to read the full story →
*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

Next Story