Identity Project

Explainer: Aadhaar is vulnerable to identity theft because of its design and the way it is used

A centralised database, dual use as identifier and authenticator, and lack of sound legal framework are its main weaknesses.

Recent reports of the misuse of Aadhaar – the 12-digit unique identification number that the Indian government is pressuring all residents to obtain – have brought back concerns about the privacy and security of the project. In February, six employees of telecom service provider Reliance Jio were arrested for the fraudulent use of fingerprints to activate and sell SIM cards. There were also reports that month about Axis Bank and other entities storing and using biometric data without authorisation. Another report indicates that personal information, including Aadhaar numbers, can be freely obtained through a simple online search. In a society where Aadhaar is rapidly becoming the key for citizens to access every service, claims about its security merit more rigorous analysis.

Any robust identification mechanism must be able to prevent or adequately remedy identity theft. Identity theft occurs when someone’s identity is wrongfully appropriated, usually to commit crimes. In the case of Aadhaar, its design and application are likely to make identity theft easier. Unfortunately, even the legal framework seems inadequate to address these risks.

Flawed design

Aadhaar’s design is based on a centralised database called the Central Identities Data Repository that stores every individual’s demographic and biometric information. The aggregation of personal information in one centralised database makes it vulnerable to exploitation, making it a valuable target for hackers, states and identity thieves. Additionally, research suggests that in addition to external threats, centralised databases are also vulnerable to errors and misuse by custodians of the database themselves.

In 2005, researchers came out with a report examining a proposal for a unique, biometric ID in the United Kingdom. In the context of identity theft, the report stated that it was impossible to guarantee the security of such a vast database, which is likely to be accessed millions of times daily and be involved in the exchange of a large amount of valuable information. In 2010, the government there passed a legislation to repeal the project.

Problematic application

Besides structural vulnerabilities, the use of the Aadhaar number as a ubiquitous, universal identifier further heightens the risk of identity theft. The scheme of the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, suggests that the number is only to be used to authenticate one’s identity – that is, to prove if a person is who she claims to be. However, an essential feature of the Aadhaar framework is seeding. Seeding allows organisations to feed Aadhaar numbers into their own databases, allowing them to uniquely identify beneficiaries or customers. The presence of one unique number for every individual across multiple public and private databases makes the convergence of this information easier. The legal framework does not prohibit this, and the safeguards for the security of these parallel databases are scant.

The dual use of Aadhaar as an identifier as well as an authenticator increases the probability of identity theft. An authenticator works well if it is confidential (for example, a password or PIN). Conversely, an identifier’s efficacy depends on it being openly available and widely used (for example, one’s name). In 2008, the United States federal regulator for consumer protection came out with a report on the correlation between the social security number and identity theft. Identity theft affects more than 7% of the adult American population, and has resulted in losses over $100 billion.

While there are several differences between the social security number and Aadhaar, the former has become the most common way for organisations in the United States to match individuals with their information. The report attributed the high rate of identity theft in America to the twin use of the social security number as an identifier as well as an authenticator. It stated that the social security number was not suitable for authentication because it was commonly used and easily accessible. Even in Australia, the extensive use of the tax file number has had a similar impact on identity theft.

Proponents of Aadhaar would argue that this comparison is unfair as neither of these identifiers use biometrics for authentication. However, it is well established that biometrics, too, are fallible. From creating gummy fingers – artificial fingers made of gelatin – to capturing fingerprints from photographs, biometric technology has been compromised even without sophisticated tools or methods. On the contrary, the use of biometrics raises the additional concern that in the event they are compromised, they cannot be re-issued like ordinary passwords or PINs. When biometrics are combined with a universal identifier like Aadhaar and subsequently compromised, an identity thief can instantly gain access to multiple services, while simultaneously preventing the individual from obtaining legitimate benefits she might be entitled to.

Inadequate legal framework

These design and application vulnerabilities are exacerbated in the absence of strong legal protections. The Aadhaar Act and its corresponding regulations reveal several weaknesses at multiple stages – at the time of enrolment itself, in detecting identity theft, and with respect to legal remedies after the crime has been detected.

The law allows an individual to enrol for Aadhaar without any document as proof of identity, through an introducer. An introducer can be any individual who vouches for the identity of the person in question, so long as she has an Aadhaar number herself. This makes it easy for individuals to enrol with a false or fraudulent identity. Reports indicate that a bank account can now be opened using Aadhaar, enabling individuals to take part in financial transactions with fraudulent credentials.

Further, if and when identity theft is committed, individuals may never come to know as the law does not require the Unique Identification Authority of India – the agency responsible for issuing Aadhaar numbers and managing the database – to inform citizens about a data breach.

Other impediments to discovering identity theft include the fact that the law imposes a fee for individuals to inspect their own authentication logs and this, too, is limited to a period of six months. The United States experience with identity theft suggests the crime can go undetected for years.

Even if an individual were to surpass these obstacles and discover such fraud, the law provides limited avenues for relief. While identity theft is a punishable offence under the Aadhaar Act, an individual has no power to initiate proceedings even if the crime has been detected. The Act only allows the Authority to initiate criminal proceedings. The individual’s only remedy is to register a complaint with the Authority’s grievance redressal centre, which has no accountability under the law. Most importantly, identity theft has been known to result in large financial losses or emotional distress. However, the provisions under the Aadhaar Act are criminal in nature, leaving individuals without an adequate remedy for compensation.

The poor drafting of the legislation only exacerbates the architectural vulnerabilities of Aadhaar. The law lacks effective checks to prevent identity theft and provide adequate redressal to victims of the crime. In the United States, proposals to combat identity theft have repeatedly emphasised on restricting the use of the social security number, especially by private companies. In light of the recent security breaches related to Aadhaar, the government must introspect on its use as a universal identifier.

Kritika Bhardwaj works as Programme Officer with the Centre for Communication Governance at the National Law University Delhi.

We welcome your comments at letters@scroll.in.
Sponsored Content BY 

Virat Kohli and Ola come together to improve Delhi's air quality

The onus of curbing air-pollution is on citizens as well

A recent study by The Lancet Journal revealed that outdoor pollution was responsible for 6% of the total disease burden in India in 2016. As a thick smog hangs low over Delhi, leaving its residents gasping for air, the pressure is on the government to implement SOS measures to curb the issue as well as introduce long-term measures to improve the air quality of the state. Other major cities like Mumbai, Pune and Kolkata should also acknowledge the gravitas of the situation.

The urgency of the air-pollution crisis in the country’s capital is being reflected on social media as well. A recent tweet by Virat Kohli, Captain of the Indian Cricket Team, urged his fans to do their bit in helping the city fight pollution. Along with the tweet, Kohli shared a video in which he emphasized that curbing pollution is everyone’s responsibility. Apart from advocating collective effort, Virat Kohli’s tweet also urged people to use buses, metros and Ola share to help reduce the number of vehicles on the road.

In the spirit of sharing the responsibility, ride sharing app Ola responded with the following tweet.

To demonstrate its commitment to fight the problem of vehicular pollution and congestion, Ola is launching #ShareWednesdays : For every ​new user who switches to #OlaShare in Delhi, their ride will be free. The offer by Ola that encourages people to share resources serves as an example of mobility solutions that can reduce the damage done by vehicular pollution. This is the fourth leg of Ola’s year-long campaign, #FarakPadtaHai, to raise awareness for congestion and pollution issues and encourage the uptake of shared mobility.

In 2016, WHO disclosed 10 Indian cities that made it on the list of worlds’ most polluted. The situation necessitates us to draw from experiences and best practices around the world to keep a check on air-pollution. For instance, a system of congestion fees which drivers have to pay when entering central urban areas was introduced in Singapore, Oslo and London and has been effective in reducing vehicular-pollution. The concept of “high occupancy vehicle” or car-pool lane, implemented extensively across the US, functions on the principle of moving more people in fewer cars, thereby reducing congestion. The use of public transport to reduce air-pollution is another widely accepted solution resulting in fewer vehicles on the road. Many communities across the world are embracing a culture of sustainable transportation by investing in bike lanes and maintenance of public transport. Even large corporations are doing their bit to reduce vehicular pollution. For instance, as a participant of the Voluntary Traffic Demand Management project in Beijing, Lenovo encourages its employees to adopt green commuting like biking, carpooling or even working from home. 18 companies in Sao Paulo executed a pilot program aimed at reducing congestion by helping people explore options such as staggering their hours, telecommuting or carpooling. After the pilot, drive-alone rates dropped from 45-51% to 27-35%.

It’s the government’s responsibility to ensure that the growth of a country doesn’t compromise the natural environment that sustains it, however, a substantial amount of responsibility also lies on each citizen to lead an environment-friendly lifestyle. Simple lifestyle changes such as being cautious about usage of electricity, using public transport, or choosing locally sourced food can help reduce your carbon footprint, the collective impact of which is great for the environment.

Ola is committed to reducing the impact of vehicular pollution on the environment by enabling and encouraging shared rides and greener mobility. They have also created flat fare zones across Delhi-NCR on Ola Share to make more environment friendly shared rides also more pocket-friendly. To ensure a larger impact, the company also took up initiatives with City Traffic Police departments, colleges, corporate parks and metro rail stations.

Join the fight against air-pollution by using the hashtag #FarakPadtaHai and download Ola to share your next ride.

This article was produced by the Scroll marketing team on behalf of Ola and not by the Scroll editorial team.