Home Security Police probe sought after India biometric data leak reported

Police probe sought after India biometric data leak reported

Police probe sought after India biometric data leak reported Featured

Indian authorities have asked the police to investigate The Tribune newspaper and one of its reporters after the publication of a report that claimed personal details of Indian citizens, submitted to the country's Aadhaar authority, were being sold cheaply online.

Aadhaar, which means "foundation", is a 12-digit unique ID number issued to all Indian residents based on their biometric and demographic data. It is an ambitious attempt to create a digital resource for controlling what a resident can, and cannot do. It has more than 1.19 billion enrolled members as of 30 November 2017.

The investigation was sought by the so-called Unique Identification Authority of India into the report written by journalist Rachna Khaira and three individuals — Anil Kumar, Sunil Kumar and Raj — who were named by Khaira as sources for her story.

New Delhi police confirmed to the Indian Express newspaper that a first investigation report or FIR had been registered and an investigation had been launched. The FIR is a written document prepared by police when they receive information about the commission of a cognisable offence.

Khaira's story, published on 3 January, said that the newspaper had subscribed to a service on the messaging app WhatsApp which offered unrestricted access to any of the one billion-plus Aadhaar numbers created for Indian citizens.

The story said that for the payment of Rs500 (approximately $10 at today's rates) which was paid through the Paytm payment service, Khaira was provided a login and password in just 10 minutes to access details of any Aadhaar number.

A day after the story appeared, the UIDAI issued an official release, claiming that all Aadhaar data was "fully safe". The FIR was filed the same day.

The story also said that for the payment of another Rs300 ($6), the payee was provided software that facilitated the printing of the Aadhaar card.

Khaira wrote that she had contacted UIDAI officials in Chandigarh in the state of Punjab who had expressed shock at being told that complete details of individuals was accessible. At the time, they are said to have admitted that it appeared to be a major security breach.

UIDAI's deputy director B.M. Patnaik, who works with the organisation's logistics and grievance redressal department, said in the FIR: "An input has been received through The Tribune dated January 3, 2018, that the ‘The Tribune purchased’ a service being offered by anonymous sellers over WhatsApp that provided unrestricted access to details for any of the more than 1 billion Aadhaar numbers created in India thus far.”

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications