The UIDAI publishes figures on how many characters are getting added to its database daily, and one of my less technologically challenged friends has worked out how to review those figures (on Twitter: @uidstatus). It makes for interesting reading, watching how many times that ‘mission-critical’ database link goes down, how days go by when it adds nobody (not counting fake IDs, about which the agency hasn’t a clue, apparently, putting it on par with all the other clueless adnumbering exercises that have plagued this country for years), and even the days the actual count goes down, as though people are vanishing like smoke.
Category Archives: Security
The other day, on a list to which I subscribe, I found this light-hearted observation about a very serious subject – hape.
Hape is not, as the Quick Reader may imagine, the last of the items (the others, like hape, were also evil) to emerge from Pandora’s box, in the Greek myth.
All round the world, business content and business processes are being digitised and made available to stakeholders, often in a highly restricted manner, ie on some kind of subscription basis. Subscribers do so, often paying money, in the faith that they get, in return, some sort of exclusive or protected access.
Quite often, in order to do so, they also voluntarily make available some kind of personal information (it varies, of course, depending on the need). Continue reading →
March began interestingly for me this year, with two big meetings back-to-back, in Panglao, a tiny island in the Philippines. The first was with Privacy International, the London-based public service organisation. It has worked tirelessly for over two decades to keep public awareness of personal privacy rights.
Surprisingly, for most people who hardly ever need to think twice about such an obvious attribute of free people, this right is fast vanishing around the world, and most dismayingly, in democratic countries. Continue reading →
At the very tag-end of 2008, an extraordinary event took place. India’s Parliament met for a stormy Winter Session, during which little of note was discussed, and little value was added to the fabric of society. And then, as the Session was drawing to a close, a number of Bills were brought up for voting, and within a few minutes, with little or no words exchanged, they were passed in toto.
The utter disregard of the country and its people implicit in this kind of facile performance is stunning and salutary, especially in light of the public agitation that has spread across northern Africa and parts of Asia, with citizens of many countries taking to the streets to express their disgust at the way that they have been taken for granted, by governments and leaders that claim to have their best interests at heart. Some of the perpetrators of such callousness now find themselves scrabbling to escape, together with untold amounts of wealth stolen from their hapless countries.
That the Indian public has so far been a little more forgiving of such small degradations is a current feature, not a guarantee.
Today, February 28, 2011, I am trying to be equally forgiving. Continue reading →
The UIDAI project is arguably one of the biggest initiatives, in both scope and cost, undertaken in independent India, without any of the expected norms of prudence (oversight) and democratic consensus. Variously estimated to cost anywhere between Rs 40,000 and Rs 150,000 cr (INR), which is roughly equivalent to about USD 1 bn to USD 15bn, it has been kicked off with a Cabinet-sanctioned budget of Rs 1,900 cr (ie about USD 50mn) this fiscal (Apr10-Mar11). The budget is believed to be somewhat of a smokescreen, as it does not appear to include moneys taken from other agencies. However, the lack of clarity about money is not the only issue, as the project has been cleverly positioned within the Planning Commission, an arm’s-length agency charged with perspective planning for the country, which is independent of the usual line of command. As a result, the project has neither Parliamentary sanction nor even a (temporary) Ordinance.
The UID project is in many ways a global watershed, expecting to assign a unique number to every resident of the country, well over 1.2 bn people, a staggering concept, the scale of which has itself been used to justify taking on the project (by equating the immensity of the challenge to its worth). Considering my association with Privacy International, my concern is well-founded on grounds of potential destruction of personal privacy, but this is a very difficult viewpoint to defend in India, which does not have a specific privacy law, and for which the existing Constitutional protections (alluded to, not spelt out) have not always been strongly defended by Indian courts.
An international project, studying Privacy in Asia, seeks to ameliorate this situation, by getting to grips with comprehending Indian attitudes (ie, within the ambit of Asian attitudes). However, given that the UID project is gathering steam and proceeding willy-nilly, it is imperative to make every effort to bring it to a halt, at least a temporary halt, until sufficient information is available. Continue reading →
Not long ago, the nation of India decided it was mature enough to allow people to communicate with each other, even poor people (of which there are, as it happens, still a few). Not just talking, which is more or less a habit, but using high quality electronic telecommunications, of which the very cheapest is FM (frequency modulated radio broadcasting, using the medium wave band). Continue reading →
“One could make this argument [with TRAI]”, says my friend Dr Arun Mehta, “that the people who need it most are being denied mobile phone value added services.” We have been discussing, on the India-GII mail list, the enabling of money transfers through mobile devices.
But TRAI cannot act in this matter, unfortunately, and that’s to do with the implementation of the capital system (not political, I mean the nuts and bolts of the system). This blogpost looks at why, but (since it is difficult to shut me up once I have got started) it goes further, to chalking out a scenario where virtual cash rules.
Continue reading →