A retina scanner is used for a young boy's unique identification card, or 'Aadhaar' in New Delhi. Aadhaar, the world’s largest biometric identity programme has enrolled more than a billion Indians, promising to streamline delivery of welfare benefits and to ease the need for identity verification with other agencies. Rajat Gupta / EPA
A retina scanner is used for a young boy's unique identification card, or 'Aadhaar' in New Delhi. Aadhaar, the world’s largest biometric identity programme has enrolled more than a billion Indians, promising to streamline delivery of welfare benefits and to ease the need for identity verification with other agencies. Rajat Gupta / EPA
A retina scanner is used for a young boy's unique identification card, or 'Aadhaar' in New Delhi. Aadhaar, the world’s largest biometric identity programme has enrolled more than a billion Indians, promising to streamline delivery of welfare benefits and to ease the need for identity verification with other agencies. Rajat Gupta / EPA
A retina scanner is used for a young boy's unique identification card, or 'Aadhaar' in New Delhi. Aadhaar, the world’s largest biometric identity programme has enrolled more than a billion Indians, pr

India struggles to control information distribution from its own identity scheme


  • English
  • Arabic

India has warned Facebook to protect the data of its citizens, but its government is struggling to control the leakage and distribution of information from its own universal identity scheme.

On Thursday, Ravi Shankar Prasad, India’s information technology minister, said that Facebook was welcome in the country but that as far as its data security was concerned, “there shall be no compromise.”

Two days later, ZDNet, an American technology web site, published details of how a state-owned cooking-gas provider’s web site permits anyone to extract information about citizens from the government’s Aadhaar database.

Aadhaar, the world’s largest biometric identity programme has enrolled more than a billion Indians, promising to streamline delivery of welfare benefits and to ease the need for identity verification with other agencies.

Apart from welfare agencies, other arms of the government — such as Indane, the cooking-gas utility exposed by ZDNet — as well as companies such as mobile service providers routinely ask for Aadhaar numbers to verify people’s identities against the state-created database.

Privacy activists are embroiled in a lawsuit against the government, in the Supreme Court, arguing that Aadhaar can unlock various aspects of a person’s identity and violate fundamental rights to privacy.

Among other contentions, the activists have made the case that Aadhaar information is insufficiently protected, leaving the database vulnerable to hackers or to misuse by the government.

Karan Saini, a cyber-security consultant in New Delhi, discovered exactly how weak the protection was when he tested the Indane web site. Since the web site itself is linked to the Aadhaar database to verify customers, Mr Saini could tap into the database, run cycles of random 12-digit numbers, and hit upon valid Aadhaar numbers.

When the Aadhaar numbers came up, Mr Saini told ZDNet, they brought with them, from the database, the names and addresses of their holders. He was also able to see details of other services, such as bank accounts, to which the Aadhaar number were linked.

Mr Saini’s revelations are only the latest in a long line of problems with the management of Aadhaar data.

_______________

Read more:

Amid Facebook data mishandling crisis, Apple's Tim Cook calls for more regulations

Whistleblower Christopher Wylie reveals Cambridge Analytica’s dark arts

_______________

On Twitter, over a matter of weeks, an anonymous IT security researcher — claiming to be based in France and calling himself Elliot Alderson, after the hacker in the TV show “Mr Robot” - has been calling attention to similar security flaws.

In numerous apps and web sites that use or process Aadhaar data, Alderson found breaches through which he could pull Aadhaar information.

In January, an investigation by the online Tribune newspaper claimed that a reporter was able to buy a log-in and password for just 500 rupees (Dh28). With those credentials, he could enter any Aadhaar number into the official Aadhaar portal and pull up all associated information.

The government has responded to these revelations by denying that these breaches are dangerous. “Aadhaar remains safe and secure,” a statement from the government authority administering Aadhaar said on Saturday.

But Indane also took its link to the Aadhaar database offline after ZDNet published its report, just as other government agencies did after Alderson’s exposures on Twitter.

Other diversions of Aadhaar data appear to be deliberate. Amit Goel, a senior executive at an IT company in Bengaluru, signed up for his Aadhaar a year and a half ago. He told The National that over the past six months, as concerns about data have built, he took to logging into his Aadhaar portal and browsing through the list of agencies that vet his identity — a service available to every user.

On Friday, Mr Goel found that a company named Experian had been able to validate his Aadhaar credentials. Experian, he knew, processes consumer information to generate credit ratings; the firm was founded in the United States and is now based in Ireland.

“Aadhaar should not be allowing this,” Mr Goel said. “By checking my Aadhaar, they now know that my information — my address, my phone number — is accurate. They can then sell this on to other companies. It becomes a gold mine for them.”

Yet anyone living in India has no choice but to submit to the Aadhaar system. Although the scheme is technically not mandatory, the government as well as several companies have made it impossible to access their services without providing Aadhaar details.

This “coerced” linking of Aadhaar “to all public services is designed to cause civil death,” Gopal Krishna, a member of the Citizens Forum for Civil Liberties, said. “Civil death is [a person’s] loss of all or almost all civil rights.”

“People are being compelled to share their personal and [biometric] information,” he said.

Banned items
Dubai Police has also issued a list of banned items at the ground on Sunday. These include:
  • Drones
  • Animals
  • Fireworks/ flares
  • Radios or power banks
  • Laser pointers
  • Glass
  • Selfie sticks/ umbrellas
  • Sharp objects
  • Political flags or banners
  • Bikes, skateboards or scooters
UAE currency: the story behind the money in your pockets

Hotel Silence
Auður Ava Ólafsdóttir
Pushkin Press

Leap of Faith

Michael J Mazarr

Public Affairs

Dh67
 

EA Sports FC 26

Publisher: EA Sports

Consoles: PC, PlayStation 4/5, Xbox Series X/S

Rating: 3/5

Mumbai Indians 213/6 (20 ov)

Royal Challengers Bangalore 167/8 (20 ov)

The specs
 
Engine: 3.0-litre six-cylinder turbo
Power: 398hp from 5,250rpm
Torque: 580Nm at 1,900-4,800rpm
Transmission: Eight-speed auto
Fuel economy, combined: 6.5L/100km
On sale: December
Price: From Dh330,000 (estimate)
ANDROID%20VERSION%20NAMES%2C%20IN%20ORDER
%3Cp%3EAndroid%20Alpha%3C%2Fp%3E%0A%3Cp%3EAndroid%20Beta%3C%2Fp%3E%0A%3Cp%3EAndroid%20Cupcake%3C%2Fp%3E%0A%3Cp%3EAndroid%20Donut%3C%2Fp%3E%0A%3Cp%3EAndroid%20Eclair%3C%2Fp%3E%0A%3Cp%3EAndroid%20Froyo%3C%2Fp%3E%0A%3Cp%3EAndroid%20Gingerbread%3C%2Fp%3E%0A%3Cp%3EAndroid%20Honeycomb%3C%2Fp%3E%0A%3Cp%3EAndroid%20Ice%20Cream%20Sandwich%3C%2Fp%3E%0A%3Cp%3EAndroid%20Jelly%20Bean%3C%2Fp%3E%0A%3Cp%3EAndroid%20KitKat%3C%2Fp%3E%0A%3Cp%3EAndroid%20Lollipop%3C%2Fp%3E%0A%3Cp%3EAndroid%20Marshmallow%3C%2Fp%3E%0A%3Cp%3EAndroid%20Nougat%3C%2Fp%3E%0A%3Cp%3EAndroid%20Oreo%3C%2Fp%3E%0A%3Cp%3EAndroid%20Pie%3C%2Fp%3E%0A%3Cp%3EAndroid%2010%20(Quince%20Tart*)%3C%2Fp%3E%0A%3Cp%3EAndroid%2011%20(Red%20Velvet%20Cake*)%3C%2Fp%3E%0A%3Cp%3EAndroid%2012%20(Snow%20Cone*)%3C%2Fp%3E%0A%3Cp%3EAndroid%2013%20(Tiramisu*)%3C%2Fp%3E%0A%3Cp%3EAndroid%2014%20(Upside%20Down%20Cake*)%3C%2Fp%3E%0A%3Cp%3EAndroid%2015%20(Vanilla%20Ice%20Cream*)%3C%2Fp%3E%0A%3Cp%3E%3Cem%3E*%20internal%20codenames%3C%2Fem%3E%3C%2Fp%3E%0A
Bio

Born in Dibba, Sharjah in 1972.
He is the eldest among 11 brothers and sisters.
He was educated in Sharjah schools and is a graduate of UAE University in Al Ain.
He has written poetry for 30 years and has had work published in local newspapers.
He likes all kinds of adventure movies that relate to his work.
His dream is a safe and preserved environment for all humankind. 
His favourite book is The Quran, and 'Maze of Innovation and Creativity', written by his brother.

War

Director: Siddharth Anand

Cast: Hrithik Roshan, Tiger Shroff, Ashutosh Rana, Vaani Kapoor

Rating: Two out of five stars 

COMPANY PROFILE

Name: Xpanceo

Started: 2018

Founders: Roman Axelrod, Valentyn Volkov

Based: Dubai, UAE

Industry: Smart contact lenses, augmented/virtual reality

Funding: $40 million

Investor: Opportunity Venture (Asia)

Pakistanis%20at%20the%20ILT20%20
%3Cp%3EThe%20new%20UAE%20league%20has%20been%20boosted%20this%20season%20by%20the%20arrival%20of%20five%20Pakistanis%2C%20who%20were%20not%20released%20to%20play%20last%20year.%20%0D%3Cbr%3E%0D%0D%0D%3Cbr%3E%3Cstrong%3EShaheen%20Afridi%20(Desert%20Vipers)%20%3C%2Fstrong%3E%0D%3Cbr%3ESet%20for%20at%20least%20four%20matches%2C%20having%20arrived%20from%20New%20Zealand%20where%20he%20captained%20Pakistan%20in%20a%20series%20loss.%20%0D%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EShadab%20Khan%20(Desert%20Vipers)%20%3C%2Fstrong%3E%0D%3Cbr%3E%0DThe%20leg-spin%20bowling%20allrounder%20missed%20the%20tour%20of%20New%20Zealand%20after%20injuring%20an%20ankle%20when%20stepping%20on%20a%20ball.%20%0D%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EAzam%20Khan%20(Desert%20Vipers)%20%3C%2Fstrong%3E%0D%3Cbr%3EPowerhouse%20wicketkeeper%20played%20three%20games%20for%20Pakistan%20on%20tour%20in%20New%20Zealand.%20He%20was%20the%20first%20Pakistani%20recruited%20to%20the%20ILT20.%20%0D%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EMohammed%20Amir%20(Desert%20Vipers)%20%3C%2Fstrong%3E%0D%3Cbr%3EHas%20made%20himself%20unavailable%20for%20national%20duty%2C%20meaning%20he%20will%20be%20available%20for%20the%20entire%20ILT20%20campaign.%20%0D%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EImad%20Wasim%20(Abu%20Dhabi%20Knight%20Riders)%20%3C%2Fstrong%3E%0D%3Cbr%3EThe%20left-handed%20allrounder%2C%2035%2C%20retired%20from%20international%20cricket%20in%20November%20and%20was%20subsequently%20recruited%20by%20the%20Knight%20Riders.%26nbsp%3B%3C%2Fp%3E%0A
SPEC%20SHEET
%3Cp%3E%3Cstrong%3EProcessor%3A%3C%2Fstrong%3E%20Apple%20M2%2C%208-core%20CPU%2C%20up%20to%2010-core%20CPU%2C%2016-core%20Neural%20Engine%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EDisplay%3A%3C%2Fstrong%3E%2013.6-inch%20Liquid%20Retina%2C%202560%20x%201664%2C%20224ppi%2C%20500%20nits%2C%20True%20Tone%2C%20wide%20colour%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EMemory%3A%3C%2Fstrong%3E%208%2F16%2F24GB%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStorage%3A%3C%2Fstrong%3E%20256%2F512GB%20%2F%201%2F2TB%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EI%2FO%3A%3C%2Fstrong%3E%20Thunderbolt%203%20(2)%2C%203.5mm%20audio%2C%20Touch%20ID%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EConnectivity%3A%3C%2Fstrong%3E%20Wi-Fi%206%2C%20Bluetooth%205.0%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EBattery%3A%3C%2Fstrong%3E%2052.6Wh%20lithium-polymer%2C%20up%20to%2018%20hours%2C%20MagSafe%20charging%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ECamera%3A%3C%2Fstrong%3E%201080p%20FaceTime%20HD%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EVideo%3A%3C%2Fstrong%3E%20Support%20for%20Apple%20ProRes%2C%20HDR%20with%20Dolby%20Vision%2C%20HDR10%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EAudio%3A%3C%2Fstrong%3E%204-speaker%20system%2C%20wide%20stereo%2C%20support%20for%20Dolby%20Atmos%2C%20Spatial%20Audio%20and%20dynamic%20head%20tracking%20(with%20AirPods)%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EColours%3A%3C%2Fstrong%3E%20Silver%2C%20space%20grey%2C%20starlight%2C%20midnight%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EIn%20the%20box%3A%3C%2Fstrong%3E%20MacBook%20Air%2C%2030W%20or%2035W%20dual-port%20power%20adapter%2C%20USB-C-to-MagSafe%20cable%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EPrice%3A%3C%2Fstrong%3E%20From%20Dh4%2C999%3C%2Fp%3E%0A
Types of bank fraud

1) Phishing

Fraudsters send an unsolicited email that appears to be from a financial institution or online retailer. The hoax email requests that you provide sensitive information, often by clicking on to a link leading to a fake website.

2) Smishing

The SMS equivalent of phishing. Fraudsters falsify the telephone number through “text spoofing,” so that it appears to be a genuine text from the bank.

3) Vishing

The telephone equivalent of phishing and smishing. Fraudsters may pose as bank staff, police or government officials. They may persuade the consumer to transfer money or divulge personal information.

4) SIM swap

Fraudsters duplicate the SIM of your mobile number without your knowledge or authorisation, allowing them to conduct financial transactions with your bank.

5) Identity theft

Someone illegally obtains your confidential information, through various ways, such as theft of your wallet, bank and utility bill statements, computer intrusion and social networks.

6) Prize scams

Fraudsters claiming to be authorised representatives from well-known organisations (such as Etisalat, du, Dubai Shopping Festival, Expo2020, Lulu Hypermarket etc) contact victims to tell them they have won a cash prize and request them to share confidential banking details to transfer the prize money.

Law%2041.9.4%20of%20men%E2%80%99s%20T20I%20playing%20conditions
%3Cp%3EThe%20fielding%20side%20shall%20be%20ready%20to%20start%20each%20over%20within%2060%20seconds%20of%20the%20previous%20over%20being%20completed.%0D%3Cbr%3EAn%20electronic%20clock%20will%20be%20displayed%20at%20the%20ground%20that%20counts%20down%20seconds%20from%2060%20to%20zero.%0D%3Cbr%3EThe%20clock%20is%20not%20required%20or%2C%20if%20already%20started%2C%20can%20be%20cancelled%20if%3A%0D%3Cbr%3E%E2%80%A2%09A%20new%20batter%20comes%20to%20the%20wicket%20between%20overs.%0D%3Cbr%3E%E2%80%A2%09An%20official%20drinks%20interval%20has%20been%20called.%0D%3Cbr%3E%E2%80%A2%09The%20umpires%20have%20approved%20the%20on%20field%20treatment%20of%20an%20injury%20to%20a%20batter%20or%20fielder.%0D%3Cbr%3E%E2%80%A2%09The%20time%20lost%20is%20for%20any%20circumstances%20beyond%20the%20control%20of%20the%20fielding%20side.%0D%3Cbr%3E%E2%80%A2%09The%20third%20umpire%20starts%20the%20clock%20either%20when%20the%20ball%20has%20become%20dead%20at%20the%20end%20of%20the%20previous%20over%2C%20or%20a%20review%20has%20been%20completed.%0D%3Cbr%3E%E2%80%A2%09The%20team%20gets%20two%20warnings%20if%20they%20are%20not%20ready%20to%20start%20overs%20after%20the%20clock%20reaches%20zero.%0D%3Cbr%3E%E2%80%A2%09On%20the%20third%20and%20any%20subsequent%20occasion%20in%20an%20innings%2C%20the%20bowler%E2%80%99s%20end%20umpire%20awards%20five%20runs.%0D%3Cbr%3E%3C%2Fp%3E%0A
COMPANY%20PROFILE%3A
%3Cp%3E%3Cstrong%3EName%3A%3C%2Fstrong%3E%20Envision%3Cbr%3E%3Cstrong%3EStarted%3A%20%3C%2Fstrong%3E2017%3Cbr%3E%3Cstrong%3EFounders%3A%20%3C%2Fstrong%3EKarthik%20Mahadevan%20and%20Karthik%20Kannan%3Cbr%3E%3Cstrong%3EBased%3A%3C%2Fstrong%3E%20The%20Netherlands%3Cbr%3E%3Cstrong%3ESector%3A%3C%2Fstrong%3E%20Technology%2FAssistive%20Technology%3Cbr%3E%3Cstrong%3EInitial%20investment%3A%3C%2Fstrong%3E%20%241.5%20million%3Cbr%3E%3Cstrong%3ECurrent%20number%20of%20staff%3A%3C%2Fstrong%3E%2020%3Cbr%3E%3Cstrong%3EInvestment%20stage%3A%3C%2Fstrong%3E%20Seed%3Cbr%3E%3Cstrong%3EInvestors%3A%3C%2Fstrong%3E%204impact%2C%20ABN%20Amro%2C%20Impact%20Ventures%20and%20group%20of%20angels%3C%2Fp%3E%0A