Calling Attention of Dr Ponnuswamy Venugopal- AIADMK MP- on Proposed Amendment to Indian Registration Act 1908

I call for the Attention of our honourable member of Parliament, Dr P.Venugopal, a Loksabha member of AIADMK from Thiruvalluvar Constitutency. 

Dr Venugopal is the Chairman of the “Standing Committee” which gave recommendations on the amendments to Indian Registration Act 1908 through Registration (Amendment) Bill 2013. This amendment is pending in the Parliament. The proposed Bill is set to make many radical suggestions which some in the media have hailed as helpful to the land owners in rural areas.

However, some how the possibility of the Bill creating huge problems and creating un surmountable Cyber Crime issues that would hurt both rural and urban masses has not been properly identified and flagged. Hence the need for this article, a copy of which is also sent to the officials mentioned in the report and some other MPs so that corrective action can be taken.


One of the key aspects of the proposed Amendment to Indian Registration Act Bill of 2013 is the proposed amendment to Section 32 of the Indian Registration Act 1908 (IRA 1908). The apparent reason of the amendment is to ensure that the executant of the document need not be physically present with the Registrar at the time of registration and his presence can be by “Electronic Means”.

According to the proposed amendment, the section 32 as is present now is set to be replaced with the following text:

Section 32: Persons to present documents for registration:

Except in the cases mentioned in sections 31, 88 and 89, or when the document is presented by electronic means, every document to be registered under this Act, whether such registration be compulsory or optional, shall be presented at the proper registration office, in the manner as may be prescribed,––

(a) by the person executing or claiming under the same, or, in the case of a copy of a decree or order, by a person claiming under the decree or order; or
(b) by the representative or assignee of such person; or
(c) by the agent of such person, representative or assignee, duly authorized by the power of attorney executed and authenticated in the manner hereinafter mentioned.”

The essence of the section as it is present now is that for registration of any document it is necessary for the executant to be personally present before the Registrar. However, the amendment proposes to exempt this need for personal physical presence by making it possible for presentation of a document by “Electronic means”.

It also means that when an “Agent” of the executant duly authorized by a Power of Attorney is executing the documents on behalf of the principal, can also present an “Electronic Power of Attorney”. (If the main document itself can  be executed with “Electronic Presence” it could automatically mean that the Power of Attorney Document may also be registered through “Electronic Means”.)

These provisions might have been introduced as a measure of upgrading the e-Governance features of document registration. However there are several legal and practical issues which require this amendment to be scrapped.

According to Information Technology Act 2000, (amended in 2008),  Section 1(4) read with the Schedule I, ITA 2000 does not apply to any document or transaction such as  “Any contract for the sale or conveyance of immovable property or any interest in such property” . Therefore, Section 4 and Section 5 which apply to recognition of electronic documents as equivalent to paper and electronic signatures as equivalent to written signature does not apply to documents that are presented to the Registrar for transfer of immovable property. Similarly a power of attorney document or a Will in electronic document is also not recognized in law.

If therefore Section 32 of Indian Registration Act 1908 is amended, it would only mean that the executant can show his face on a video conference but the actual documents of transfer of property or power of attorney has to be in paper form only.

Under the amended Act, (Section 32A) a photograph has to be affixed and thumb impression has to be obtained. naturally in the case of “Electronic Presence”, only  an electronic copy of the photograph and a thumb impression captured by a biometric device under the control of and at the location of the executant has to be used. Such biometric data is required to be received across the open network of the Internet by the registrar’s systems.

Also under Section 32A, a “Proof” of the fact that the executant of the Power Of Attorney is alive has to be produced. Since the person is not physically present, perhaps the Registrar has to view the video and decide if the person is “Alive” and “is not insane” and  “is mentally in a condition as to take logical decisions”.

He should also verify that the video he is seeing is current and the person is online in real time. He should also check that the biometric data he receives is not a “Stored Biometric” that has been earlier collected by some body and transmitted now as that of the executant.

Will the  “Registrar” be aware of these risks and the consequences of impersonation of the “Electronic Presence”?…

I would like the Standing Committee of the Parliament which gave its report on this amendment to conduct a survey of about 100 Registrars and get the information on whether it is feasible for the Registrar to confirm the identity of a person and the genuineness of the biometric from the binary data that flows through an open insecure network from the computer of the executant sitting in a remote place to the registrar’s office.

Also, the moment you open a communication link to the registrar’s system to be accessed through internet, hackers from all over the globe would jump in to look into what is inside the registration system and how they can use or misuse the information. Since the registrations are supposed to be done from “Anywhere”, the registration offices will be linked on a network and hence any intelligent hacker getting entry to one registration office will be able to plant a virus and a back door to play havoc with the system.

This will lead to a risk worse than what we are envisaging in the hacking of Aadhar network.

When these provisions were suggested by the Karnataka Government, (Refer articles below), we stopped at calling this an “Ultra Vires” act since ITA 2000 cannot be amended by the State.

But now the proposal is coming from our Parliament itself and our IT Minister past and present will be part of the crowd which will say “Aai” when the amendment is called out without thinking much on the consequences of saying Aai” to such a sef defeating monster of a proposal which is fit to be called a “Bhasmasura Proposal” since it will soon come to haunt the creator himself.

The standing committee recorded the following comments on this particular amendment:

“The Committee observe that the Bill proposes to substitute Section 32 whereby a provision is made for presentation of documents by electronic means for registration.

The Committee note that the proposed provision would facilitate the increased use of electronic means for registration which in turn would reduce corruption and ensure transparency in the procedure.

The Committee, however, observe that the identity and genuineness of the executants in case of electronic registration can be ascertained and proved only through biometric identification and other similar mechanism without which the possibility of fraudulent registrations cannot be ruled out.

The Committee, therefore, recommend the Department of Land Resources to impress upon the States to allow electronic registration only when all Sub-Registrar Offices are well-equipped with the facilities of not only for online registration but also for fool-proof identification of genuineness of executants.”

The Committee or the Amendment has not however thought of what procedures are to be followed when the “Electronic Presence” is used instead of physical presence and how Section 65B certification would be used for recording the presence etc.

The Committee also is still thinking of “Documents” to be presented electronically where as what is feasible is only the “Presence” through electronic means since documents will fall under Section 1(4) of ITA 2000/8.

The Committee members also seem to have not heard the term “Electronic Signature” and hence have not used it in their report. They seem to think that the “Thumb Impression” which is captured by the devices they must have seen being used as “Attendance Registers” are as good as the physical thumb impressions.

Since the Bill has reached this level, it is clear that so far all persons including the officials have not taken note of the problems highlighted here. They also might not have consulted the MeitY in this regard. If not checked, the Bill will therefore go through the Parliament without any further thought.

I therefore request Dr Venugopal to immediately take steps to withdraw this proposal to amend the Section 32 of Indian Registration Act 1908.

I also request all those who read this and can reach out to the decision makers may bring it to their notice so that the possibility of a catastrophic legislation being passed is prevented.

Such other members who are in the committee and the executives who are associated who can also initiate corrective action if they are sensitive to the points raised here, are as follows:

Honourable Members of Loksabha: Shri Harish Chandra Chavan, Shri Jugal Kishore, Shri Manshankar Ninama, Shrimati Mausam Noor, Shri Prahlad Singh Patel, Shri Gokaraju Ganga Raju, Dr. Yashwant Singh, Shri Ladu Kishore Swain, Shri Ajay Misra Teni, Adv. Chintaman Navasha Wanaga, Shri Vijay Kumar Hansdak

Honourable Members of Rajya Sabha:Shri Ram Narain Dudi, Shri Mahendra Singh Mahra, Shri Ranvijay Singh Judev, Dr. Vijaylaxmi Sadho, Shri A. K. Selvaraj, Shrimati Kanak Lata Singh

Members of the Secretariat: Shri Abhijit Kumar – Joint Secretary, Shri R. C. Tiwari – Director, Smt. B. Visala – Additional Director, Smt. Meenakshi Sharma – Deputy Secretary.

Naavi

Copy of the Bill as presented in the Parliament.

Copy of the Standing Committee Report

The amendments proposed by Karnataka Government in 2015

Article in naavi.org on the proposed Karnataka legislation:

Has Karnataka Legislature passed a faulty legislation and set to create a new Telgi?

Karnataka Government’s Mistake may embarass the President of India

Posted in Cyber Law | Tagged , , | Leave a comment

Banks are silent on Zero Liability on Frauds.. What is RBI doing?

On July 6th 2017, RBI after 10 months of thinking, released the official confirmation of the “Zero Liability Circular”. 

Naavi.org had urged the banks to go for a “Competitive Compliance Drive” and initiate measures to implement the provisions of the circular.

While no Bank seems to have taken specific measures such as the new Policy on how to handle liabilities when frauds are reported after the first 7 days etc, an interesting internal message in State Bank of India has been reported.

This is said to be a message sent as an internal circular to the staff of SBI and in the end includes a sentence that this can be shared with customers.

The message runs as follows:

SBI CARD FRAUD ALERT

For the information of all officers and staff

Due to a recent incidence of a fraudulent credit card/debit card transaction of Rs. 57000 in the account of an officer of one of the branch of our bank. It is our duty to inform all of you to disable international access/usage for your credit/debit card as international transaction do not require an OTP and are Vulnerable to huge frauds by culprits who are difficult to trace out.

MODUS OPERANDI

1. while our officer was busy with customers in peak time at his branch, he has received multiple messages for multiple fraudulent transactions amounting to Rs. 57000/-.
2. Our officer thought that his 4 in 1 in hrms is being credited by the bank.
3. He realised the fraud only after business hours after checking his account.
4. By that time Rs. 57000 was stolen by fraudster.
5. If he could have realised with in 3-4 hours of the fraudulent transaction, that amount could have been reversed by taking immediate steps. However a complaint has been lodged with the concerned department.
6. our officer felt that he has not received an OTP and so there is no possibility of a fraudulent debit but for international transactions otp is not required.
7. Just by knowing the card number and expiry date and CVV, a fraudster can do any no. of transactions.

In this connection, we advise all of you to kindly disable international access/usage for your credit/debit card by following these steps,

FOR DEBIT CARDS

1. We have to download SBI QUICK app from play store in which there is an option as ATM CUM DEBIT CARD.
2. In that we will find ATM CARD SWITCH ON/OFF option.
3. In that screen we have to enter last four digits of our ATM card No. and we have to select OFF for international usage. we can also select the OFF Option for e-commerce transactions(FOR THOSE WHO DNT DO ONLINE PURCHASES ON E-COMMERCE SITES).
4. Immediately we would receieve a confirmation message for the same. however, In the same menu and in same way, we can also activate whenever we required.
we can also de-activate the international usage just by sending a message as SWOFF INTL XXXX( last four digits of card no.) to 9223966666 from registered mobile no.

FOR CREDIT CARDS

1. We need to logon to WWW.SBICARD.COM site.
2. Left side of menu where you will find REQUESTS, in that an option as ACTIVATE INTERNATIONAL USAGE.
3. After clicking on it we will find two options as activate & deactivate, there we have to select de-activate, then immediately a service request no. will be generated&you will see a message as
Congratulations! You have successfully de-activated international usage on your SBI card ending with XXXX.

Please share to all your customers and colleagues.
Customer education customer delight

It is ironic that SBI seems to have woken up because one of its Staff members have lost the money. There are hundreds of such customers who are also busy and become victims to such frauds.

Obviously, SBI would refund the money to its staff member without asking any question on how did it happen and whether he had revealed his password to some body else  etc. I wish some body puts an RTI application to find out how they resolved this case and why they donot adopt automatic refund process for customers and prefer to drag customers to Court.

Anyway this is a “Cognizable Offence” and Police have right to investigate since the information is now available. I wish Mumbai Police investigate how the fraud happened and record whether the Bank admits that even without the customers giving out their passwords in phishing attacks they can lose money. This is important since the same Bank will stand before a Court and swear that their security is perfect and there can be no unauthorized access except by the customer’s negligence. This myth will be shattered.

If the staff member is guilty of giving out the password, then it will prove that whatever education that the Bank has been providing to its customers has not even gone to its own staff.

Either way, SBI should now automatically own all such frauds as their inefficiency and provide immediate refunds. …which is the essence of the Zero Liability circular anyway.

However, the facility to activate and deactivate international usage is some thing every Bank has to enable. The internal transactions are atleast controlled by OTP.

But this is not sufficient and as in the case of debit cards, SBI should also provide for deactivation and anytime reactivation of even the local use.

We congratulate SBI for the measure since most of the time other Banks tend to follow SBI. These are measures  suggested by the Damodaran Committee in 2011 which are coming to be implemented now. Better late than never!

Also RBI should now audit the actions taken by Banks since July 6 2017 to introduce the measures suggested by the said circular so that customers would feel safer.

Naavi

Posted in Cyber Law | Leave a comment

Will Police Employ Abhinav Srivastava as a consultant?

There is a news report today that the Bangalore Police are so impressed with Mr Abhinav Srivastava who was arrested under the charge of hacking into UIDAI data base that there is a discussion on engaging him as a consultant for the Police. (See Report here).

At this point of time, this remains a rumour and could be a fancy wish of some. At least we have seen TV serials about such a practice in USA where “Community Service” is one of the options offered to a criminal as part of the sentence. Hence the Cyber Crime Police could create a structure for using convicted hackers to be part of the Police team for a certain number of years until the sentence runs out.

I am not sure if Criminal Jurisprudence in India provides similar innovative discretion to a Judge. Probably experienced criminal lawyers can clarify.

However, there is nothing wrong that in deserving cases, Courts could consider such innovative punishments which could be the most appropriate in some cases. But if such things are to be properly brought into the system, then we should be sure about Judges not being corrupt. We have several instances in India of Judges faking arithmetic errors and acquitting criminals or granting bail or allow convicts to be on parole on non existing grounds.

If therefore “Community Service” is allowed as a “Punishment”, then many criminals would buy such punishments and later negotiate with their mentors who are supposed to monitor the sentence to go scot free.

However, in the case of Cyber Crimes in particular, it appears that such punishments are relevant since in most cases the accused could be educated and more often becomes an offender either because of “Ignorance of law” or for psychological conditions such as “Technology Intoxication”. Such persons can be perhaps amenable to a reformatory process.

In the case of Abhinav Srivastava, this could have also been suggested as a face saver for the Police/UIDAI since the case is not strong. The case has been booked and the person has been arrested for “Unauthorized Access of Aadhar Facilities”. But actually he has perhaps created a tool which is used by third parties who made use of an “Authorized Access Source” under circumstances that there was no clear bar on his not using the source.

Without adding the 80000 members of the public who downloaded and used the App as the main accused, it would be difficult to blame only the tool manufacturer.

Further, it is difficult to establish the guilty mind (mens-rea) of the accused to bring about a criminal charge. There will be little scope of civil claims since no body may be able to prove “Wrongful loss”.

If the case is pursued further, several intermediaries also need to be considered as Co-Accused and brought to book. This would be embarrassing both for the complainant as well as the Government.

If the case is dismissed, then there is a possibility of a back lash with an accusation of mishandling of the case and possible human rights violation.

Hence some face saving solution which is a Win-Win solution for all could be a good option to consider.

One possible method by which such innovation can be brought into the system would be through a “Compounding Process” where the complainant and the accused come to a written agreement on the basis of which the Complaint is withdrawn. Probably the Police or the Court can mediate in arriving at such a compounding agreement which is acceptable to all.

Hopefully the Abhinav Case becomes a trend setter in this respect and such a compounding arrangement is worked out. Since an FIR has already been lodged in this case, the Court will have to be in the picture for the compounding agreement. In the process it would be better if an SOP (Standard Operating Procedure) would be drawn up by the Court and the Police to be used when required in future to ensure that the system is not misused .

(Since this is more a matter of Criminal Justice system, I would expect readers to correct if my contentions are incorrect and add their own comments… Naavi)

Naavi

Also Read: Bengaluru Police Smitten by Abhinav’s tech skills

Posted in Cyber Law | 2 Comments

Draft Bug Bounty policy for UIDAI

Naavi.org had suggested a model Bug Bounty Policy for Private Sector Companies as part of its Cyber Law Compliance Center (CLCC) Activity. Copy of this policy is available through the menu link CLCC. This was drawn in March 2016 specifically for private sector companies. This could act as a guide to a possible Bug Bounty policy that UIDAI could use.

Now after the Abhinav Srivastava incident, questions arise on what “Due Diligence” step should UIDAI take in the light of what has happened. On the one hand UIDAI may maintain rightly that this is not a case of hacking of the CIDR and therefore there is no vulnerability in the access system. They would be correct in claiming that whatever is considered as an “Unauthorized Access” could have taken place at the level of the e-hospital platform used by one of the e-hospital users. NIC may be the organization responsible for the maintenance of the e-Hospital platform.

At present, the complaint against Mr Abhinav Srivstava has been made by UIDAI and if the security breach has occurred not at the level of CIDR, it appears that the complaint should not have been entertained in the first place by the Police. On the other hand, UIDAI could have raised the complaint against NIC or the e-hospital user stating that they had caused defamation of UIDAI and its security by not following adequate security at their end.

Also the KUA agreement with UIDAI as well as the check list for accreditation of KUAs clearly mention that the management of the KUA should give an undertaking to UIDAI that they are compliant with ITA 2000/8. It is however proven that the KUA agencies (Hospital) involved in this case never had a proper Privacy Policy, Terms of use and Grievance Redressal Mechanism in place. Hence, there was a clear violation of the contractual arrangement and lack of “Reasonable Security Practice”.

Police cannot however launch any proceedings based on Section 43A of ITA 2000/8 since it is a matter that should be taken up by individual persons who may claim damages on account of the breach or by the Adjudicator who has suo moto powers to take up the case on behalf of the public.  It is unthinkable that the Adjudicator anywhere in India would take up a complaint against NIC or the Government hospitals using e-hospital application since the Government itself is a party to the management or mis-management of the information security practice in these agencies.

Under Section 79 however, if there has been any criminal offence attributable to the intermediary, the crime can be extended to the organization for lack of “Due Diligence”. If therefore it is felt that in the use of Abhinav App, there was some crime committed either under ITA 2000/8  then it would be feasible for Police to have taken action against such intermediaries. However so far Police have not initiated any action in this direction.

Let’s for the time being forget what the Police may do here after and focus on how should UIDAI respond now with all the experience they have gained in the incident.

Failure of the Incident Management System

The first observation I would like to record is that UIDAI did not wake up the presence of an App in Google PlayStore claiming eKYC through Aadhar until around 80000 downloads took place. In fact there were many more such applications in PlayStore some of which might have been taken off now. The inability to observe presence of such Apps can be considered as the “Failure of the Incident Management System” of UIDAI.

Tomorrow if some body opens a website www.uidai-kyc.in or uidai-kyc.com (Both of which are available for registration) does UIDAI have the measures in place to recognize this and take remedial action?… Probably not.

Hence there is an urgent need for UIDAI to set up policies and procedures to identify such “Attempt to Impersonate” as a “Techno Legal Cyber Security Incident” as part of its “Due Diligence” practice. It should raise an internal ticket and resolve it at the earliest documenting the entire resolution and lessons drawn.

Since such measures donot exist, it is just an indication that UIDAI itself is not ITA 2008 compliant and has not taken “Reasonable” measures to prevent occurrence of Cyber Crimes under different sections of ITA 2000/8.

On September 5, 2009, Naavi.org had published an article titled Reasonable Security  Practices For UID Project  A Draft for Debate Prepared by Naavi”. In the last 8 years, UIDAI and Aadhar has changed its perspective and hence this draft needs revision. But the fact that UIDAI needs to be itself ITA 2000/8 compliant still exists and such an exercise includes development of such policies and procedures that would identify and mitigate all risks identified below.

Need for Crowd sourcing Risk identification

UIDAI is a service that would be used by more than a billion people and multiple times during the year. It is a service which will be a prime target of hackers around the world including Cyber terrorists and enemy nations such as China and Pakistan interested in Cyber warfare.

UIDAI may be capable of taking care of internal server security preventing unauthorized access. We can therefore accept their contention that the UIDAI systems are safe.

However, risks arising from the negligence of Users and Sub Contractors which may indirectly cause reputation loss to UIDAI and raise National security issues may not be adequately addressed by UIDAI and this is well demonstrated in the past.

The fact that despite Naavi.org raising several issues not only by the Nov 4 2016 article on e-Hospital but also regarding the domain name registration in individual officer’s names and use of digital certificates of US companies etc, UIDAI has not responded promptly to address the potential risks.

We may therefore consider that the internal Information Security team of UIDAI cannot be expected to mitigate such risks nor even identify them in time.

It is therefore essential that UIDAI responds to the present crisis by inviting well intentioned security  professionals who are not in the roles of UIDAI to be part of the security risk identification infrastructure by starting a “UIDAI-Bug Bounty Program”.

UIDAI as a Protected System

The Need for UIDAI Bug Bounty Program also arises from the fact that UIDAI has been declared as a “Protected System” under Section 70 of ITA 2000/8 though the notification

Government of India has notified through Gazette Notification  GSR 993 (E) dated 11th December 2015 that

UIDAI’s Central Identities Data Repository (CIDR) facilities, Information Assets, Logistics
Infrastructure and Dependencies Installed at UIDAI (Unique Identification Authority of India)
locations to be Protected System for the Purpose of Information Technology Act 2000.

Authorised personnel as per Sub-section (2) of Section 70 of IT Act 2000 (amended 2008)
having role based access to UIDAI-CIDR facility are:

1. Designated UIDAI officers & Support Staff.
2. UIDAI authorised team members of contracted Managed Service Provider (MSP).
3. Other authorised third party Vendors and its partners.
4. UIDAI authorised business partners.

Section 70 of the ITA 2000/8 states as under:

Sec 70: Protected system (Amended Vide ITAA-2008)

(1) The appropriate Government may, by notification in the Official Gazette, declare any computer resource which directly or indirectly affects the facility of Critical Information Infrastructure, to be a protected system.

Explanation: For the purposes of this section, “Critical Information Infrastructure” means the computer resource, the incapacitation or destruction of which , shall have debilitating impact on national security, economy, public health or safety. (Substituted vide ITAA-2008)

(2)The appropriate Government may, by order in writing, authorize the persons who are authorized to access protected systems notified under sub-section (1)

(3)Any person who secures access or attempts to secure access to a protected system in contravention of the provisions of this section shall be punished with imprisonment of either description for a term which may extend to ten years and shall also be liable to fine.

(4) The Central Government shall prescribe the information security practices and procedures for such protected system. (Inserted vide ITAA 2008)

It is obvious that the Gazette Notification of 11th December 2015 does not fulfill the requirements of Section 70 in full since it does not provide the details of how this protected system needs to be operated. Merely stating that “Role Based Access” would be provided is grossly inadequate to meet the requirements of Sec 70. It is necessary that detailed information security practices and procedures need to be developed.

Normally we say that the detailed Information Security Policy may not be “Disclosed to Public” for security reasons.

However, in the case of Section 70 systems, since “An Attempt to Access” the system is as much an offence as actual access and could result in imprisonment of upto 10 years, public have the right to know what would constitute an “Attempt” to access the CIDR systems and who will be considered as “Not Authorized”.

It is our interpretation that persons who are authorized to access these systems should be identified by name and cannot be described as “UIDAI Business Partners” or “Other authorized third party vendors” and its partners or “Designated UIDAI Officers & Support Staff” or “UIDAI authorized team members of contracted Managed Service Providers” or such other general terms.

If and when Abhinav’s case goes to a Court, there will be a discussion on whether UIDAI has clarified on what is “Authorized Access” to UIDAI systems and in the absence of clarity, whether Mr Abhinav can be said to have “Unauthorizedly accessed” the systems.

In view of the need to clarify what constitutes a crime under Section 70 of ITA 2000/8 when some body accesses the CIDR system, UIDAI needs to define and publish “Permitted Access System” and also take reasonable precautions at their end to ensure that any attempt to access their systems outside these permitted parameters are blocked by their Firewall and also generate appropriate alerts/Notices to the person who is attempting to access the system outside the permitted procedure.

The website of www.uidai.gov.in declares certain website policies which are only related to visit to UIDAI website and even in that respect it is not fully adequate. It does not say anything about the access to CIDR systems. This needs to be corrected.

In view of the above, a properly structured Bug Bounty Policy can be a good tool not only to crowd source the skills of security professionals to harden the security around UIDAI but also  to provide clarity to the access rules under Section 70 of ITA 2000/8.

Essential Features of UIDAI Bug Bounty Program

The Model Bug Bounty Policy for Private Sector published by the CLCC provides a general template under which the UIDAI-Bug Bounty Policy needs to be developed.

It would be inappropriate for me to try and draft a final policy for UIDAI on this website since UIDAI is supposed to have more intelligent and more informed persons at their disposal and can do a better job. I therefore would not try to attempt such an exercise.

However some points that needs be made are

  1. In the “Objective Clause” the fact that UIDAI system is a Section 70 declared “Protected System” must be included.
  2. The policy should be prominently shown on the UIDAI website.
  3. Alerts are to be shown when a visitor tries to get any information from the website including getting his own Aadhar data.
  4. The names of authorized persons who have the access rights are to be displayed on the website.
  5. Restricted procedure on how the authorized persons can access the systems should also be displayed. (This does not need disclosure of the detailed information security policy that would reveal the network details etc).
  6. The definition of “Bug” for the “Bug Bounty” purpose should be defined to include all possible means by which the system could be compromised and data accessed except as provided under Section 70 notification.
  7. Being a Bug Bounty program for a “Protected System” where “An attempt to access” can be a crime, it is necessary that any person who would like to check for a “Bug” needs to be first “Registered” as a “Prospective Bug Bounty Hunter”. The registration has to be with UIDAI and obviously with an “Aadhar KYC”. The permission may be restricted to Indian nationals and could be denied on the basis of a background check which the UIDAI can undertake before granting the permission.
  8. Any activity of the Bug Bounty Hunter before he obtains the permission could be treated as an unauthorized attempt to access and UIDAI may reserve it’s right to take action though they can use their discretion in this regard.
  9. The critical aspect of the program would be how the Bug Bounty Committee would be constituted. Given the fact that the receiver of the Bug report can turn around and charge the reporter of a Crime, the reporting has to be treated like “Whistle Blowing”. The Committee therefore cannot be a committee of the CEO/CTO of UIDAI. It has to be committee of “Respected Members of the community” who anonymize the registrant and also scrutinize the bug without any pre-conceived notions and egos. Only after the bug is accepted by UIDAI management, the committee may reveal the identity of the bug reporter at his option. The committee members should provide the confidence to the public that an honest good faith report even if it is incorrect would not be considered as malicious and would not be proceeded against for punishment.
  10. The Bug itself may be never publicized in detail so that UIDAI may retain its reputation and not be open to the charge that several bugs were found to be present. All professionals know that just as there can be no 100% information security, there may not be 100% bug free software service. Hence, mere identification of bugs is not to be considered as a loss of reputation of the IS/IT team of UIDAI. Some politicians particularly in the opposition may not understand this and pass criticisms but such criticisms should be ignored.

Wisemen say

“The Greatness of a person is not that he has never fallen down, but it is how gracefully he gets up”.

This applies to UIDAI after the recent spate of media exposures about the so called Aadhar Data Breach”. It is now in the hands of UIDAI to show if it is a great institution and gets up gracefully or acts mean and crucifies Bug finders.

Naavi

Also Read: The National ID Card Challenge for Nandan Nilekani.. Part I: Part II

Posted in Cyber Law | Leave a comment

UIDAI should introduce a Bug Bounty Program forthwith.. if it is serious of security

“Security is going to be a  Concern” for Aadhar says  Mr Nandan Nilekani, the architect of the system.

Though it has always been a concern for most of the Information Security observers, it is good that now persons close to the project are also realizing that the red flags raised by security observers are not because they were opponents of the scheme but were people who genuinely believed that there was a security issue which was being ignored and brushed under the carpet by UIDAI all along.

Thanks to Mr Abhinav Srivastava, realization has at last come to the UIDAI managers that there is an issue. This is good because “Awareness” is the first step in Information Security implementation. Naavi’s theory of Information Security management identifies “Acceptance” as the second most important aspect of implementation. Mr Nandan’s statement indicates that UIDAI may be in the process of accepting that a Risk exists and it needs to be mitigated. This is a positive development that we need to welcome. Other elements such as “Mitigation through tools that are made available” and “Sanctions and Incentives” need to be combined to ensure that Information security finally becomes a part of the UIDAI structure.

One can always say that “Internet” itself was never designed for secure communication and if it is today used for all E Commerce and E Governance it is an ambitious over reach made to work with tools such as encryption. It is therefore not surprising that Cyber Security has become a problem that all of us are worried about. Similarly, Aadhar system was not created for all the uses that it is presently been put into and the problem actually arises from this aspect.

For example, initially when Mr Nandan designed the system he was very clear that there would be this CIDR server which will receive a structured query from anywhere in the Internet but would give out only a binary reply by just picking the data input and checking with the data base to say either “Yes” or No”. The Aadhar number was to be kept confidential by the Aadhar owner and the verification was always to be done with a biometric input plus one of the several parameters associated with the data base on which the Yes” or “No” reply would be given.

Today the system is used in a completely different manner. Firstly the Aadhar data is printed out and handed over to many KYC users and several copies of are floating around all Gas agencies, Banks etc. During the demonetization days, Banks collected aadhar particulars for deposit of old currency and most of the Bankers have collected photocopies of the aadhar data. Similarly PDS department and Mobile Operators might have collected Aadhar photocopies multiple times. I am sure that many hotels have also collected photo copies for identifying residents when they check in.

Most of the data leaks that the Press is now reporting is from such users of Aadhar information particularly when they put out the data on the Internet as part of their information dissemination to public about their activities (eg: Release of scholarships etc).

The e_KYC process as designed envisages that the KUAs (KYC user agencies) are empowered to get the biometric and the aadhar number and send it to UIDAI for e-KYC. In this process, instead of simply getting the confirmation for individual data elements from UIDAI, the API is designed to extract the data from the CIDR and populate the form at the user end.

In the e-sign process which is the higher end of e-Kyc, the application form to be sent to the Certifying Authority for issue of a Digital Certificate is populated with the data drawn fromt he CIDR by the API and sent on the internet as an undigitally signed application to the Certifying Authority.

Using this “Undigitally signed Application”, the Certifying Authority issues an E-Sign Certificate which is then used to sign the application by the customer of the KUA to deliver any service. It can also be used for signing any contractual document on the web.

Such certificates are being used by Share brokers as well as many websites to e-sign documents on the web for contractual purposes.

How can an e-Signature certificate be issued against an “Unsigned Application from the subscriber”?…. is some thing I have not been able to fully understand till date. But this is the process which the CCA has approved and like the “Telgi Stamp Papers” all such e-signature certificates are considered valid because CCA has not found a better way of handling the problem of authentication before issue of the digital certificate.

Since in the process, the entire Aadhar information gets printed out at the user level, each time an aahdar user uses the e-kyc process, the data keeps printed out at the service provider’s end.

In the e-hospital application, there is no need for the presence of the Aadhar user for requesting the Aadhar information in front of the service provider and no biometric is provided. The query is raised simply on the basis of Aadhar number and acted upon with the OTP verification as if OTP is as good as “Biometric”. This is a much weaker process than the e-sign process.

It is therefore possible for creating a script that can be used in an App and offered to the Aadhar owners to fetch the data as and when required from the CIDR. This is what Abhinav did and called the App as “E-KYC” App. Using this App any owner of Aadhar could fetch the demographic data by just raising a query on the App and providing the OTP. Since in most of the Apps, OTP is automatically read by the App, it does not require any  other affirmative confirmation from the Aadhar owner to fetch the data. Merely invoking the App on the mobile and entering the Aadhar number with a click on the “Submit Request” button is sufficient for the data to be made available to him on the mobile or in his e-mail box.

While in the case of Abhinav, Police are trying to fix him under some sections of ITA 2000 or IPC or Aadhar Act so that he can be jailed as long as possible to create a deterrant, there are many other web based and non web based applications with lakhs of service providers through which a query can be raised for aadhar information and results can be printed out.

When the AEPS (Aadhar Enabled Payment System) comes into use, lakhs of merchants including the neighborhood grocery shop owner will have a Chinese made biometric device connected to a billing software which makes a query to the CIDR for each payment and populates the bill. Any local script kiddie can right a script to extract the demographic data of the AEPS user and give it out as a “E-KYC” document though this does not use the e-Sign system.

Then there will not be one single e-Hospital that can be used by one Abhinav Srivastava but many more channels of accessing the CIDR and many more Abhinav Srivastavas. 

How will UIDAI propose to secure such a system?… no body seems to have an idea.

After the Abhinav case, I had come across one anonymous security professional who was suggesting that he has identified a vulnerability which he wants to report to UIDAI but does not know if any such report would immediately be latched upon by UIDAI to file a criminal case against him like what happened to Abhinav.

He does not even trust reporting to CERT-IN because the Abhinav arrest has created a “Chilling Effect” amongst security professionals to such an extent that they are not going to share any vulnerabilities they may find in Aadhar to either Aadhar authorities or to CERT IN.

This only means that even identified vulnerabilities will go underground and some time later when a black hat hacker finds it out, there will be an attack which could result in greater damage and greater embarrassment.

It is therefore an urgent necessity that UIDAI announces a “Bug Bounty” program and invite “Ethical hackers” to report any observed vulnerabilities. Will they provide any reward? or whether the reward will be good? is secondary.

Naavi has been advocating that “Bug Bounty” programs should be made mandatory in law for all software developers as a part of the Reasonable information security practice and Due diligence under ITA 2000/8 and here is an opportunity for UIDAI to show to the community that it is really concerned in setting things right by being the first Government agency to introduce a Bug Bounty Program.

I call upon Mr Modi to immediately advise UIDAI  to introduce an effective Bug Bounty program which will provide a proper platform for reporting vulnerabilities observed by “Security Professionals” with or without financial incentives.

I also call upon Mr Nandan Nilekani to take up the issue with Mr Modi and UIDAI since his word still carries a very high value with UIDAI as well as Mr Modi himself.

Naavi

Also see:

Three Plus One Dimension of Information Security Management

Bug Bounty Program from Government is required

Posted in Cyber Law | Leave a comment

How will Abhinav case proceed against a “Zero Loss” claim?

Today’s Deccan Herald reports that the Abhinav Srivastava case may result only in a fine and not in imprisonment as per sources inside the Police. It says “IITian may walk free as he only developed ‘innocuous app'” making everyone sit up and wonder what is happening.

If this is true, then did all the media make a hue and cry about nothing? Or is it possible that there is some confusion within the Police circles themselves about how to proceed with the case.?

For the time being I rule out the possibility of media being used by the Police to plant stories so that some information can be elicited from public which can make it possible for them to correct the mistakes in the way the complaint is being handled at present. This is a strategy often used by Police in other criminal investigations.

Probably the media is also confused about the nature of the incident, whether it is a crime? if so is it a civil wrong or a criminal offence? whether it should be the Adjudicator who should lead the investigation or the Police? …etc

Yesterday, we accessed a copy of the FIR filed by the High Grounds Police Station. This was dated 26/07/2017 and records crime number 0130/2017. It is based on a complaint filed by one Mr Ashok Lenin whose address is given as the address of UIDAI at Khanija Bhavan, Reace Course Road, Bangalore.

The details given of the complaint in the FIR are sketchy and indicate in summary that

“one Mr Abhinav Srivastava using a company by name Qarth Technologies Private Limited created a Playstore App and through it misused the information in Adhaar website and was giving it out as e-kyc in association with some unknown person and thereby is creating leakage of Adhaar data.”

The FIR was registered under Sec 65/66 of ITA 2000, Sections 34, 120B, 471 and 468 of IPC. While the complainant seems to have indicated that Sections 37 and 38 of Aadhar Act has been contravened, the FIR itself does not include these sections. The FIR has been submitted at 8th Addl CMM Court, Nrupathunga Road, Bangalore.

However, after this was published in the website of naavi.org, information was received that this FIR is no longer valid since a new FIR has been filed by the Cyber Crime PS after the case was transferred to them. Since ksp.gov.in website does not list Cyber Crime Police Station and its FIRs, the new FIR filed by Cyber Crime PS is presently not available with us. We can neither confirm or deny if the new FIR exists and if so whether any change has been made in the FIR of High Ground PS or will be made in future after another round of investigation.

While investigations will be continued by the Cyber Crime PS and appropriate action will be initiated, from the academic perspective some points come for discussion.

The complaint was filed by a person who is an official of UIDAI. According to the Aadhar Act, complaints under the Act can only be taken note of if filed by UIDAI or by an official under its authority. The FIR does not indicate that the complaint was made by Mr Lenin along with a letter of authority signed by the CEO of UIDAI. So whether it was a personal complaint or a complaint under the Aadhar Act needs to be ascertained. Probably a letter from UIDAI either by the CEO or through a resolution of the Board is required to be filed by who so ever signs the complaint and submits it to the Police. Without this, the FIR/Chargesheet could be considered invalid.

Further UIDAI has made a public statement by the CEO, Ajay Bhushan Pandey himself stating

“No one could get data of any other person through this app. Even though residents were downloading their own demographic data such as name, address etc., yet legal actions were initiated against the owner of the app since it was not authorised to provide such services to people and such acts are criminal offence punishable action as per Aadhaar Act, 2016. It is further reiterated that data of not even a single non-consenting resident has been given by UIDAI through this app.”

Once UIDAI confirmed that there was “no unauthorized data access”, it was clear that the foundation of the complaint itself had become hollow. From the revelations made by Mr Abhinav Srivastava, it was clear that the App would access other websites where there was no restriction on accessing the “Appointment Request through e-hospital app” and place a request along with the Adhar number. This would generate an OTP to the Aadhar owner and once provided, some demographic data would get displayed on the website which can be parsed, filtered and presented in a user friendly format.

The App was actually being used by the Adhar owner himself and hence it was an authorized Aadhar user who was actually using a tool developed by Mr Abhinav and downloading his own data instead of going to the Aadhar website himself and downloading the information.

(P.S:This is based on the information now available unless Police unearth any other way Mr Abhinav was collecting the data for use at his end)

In this process, it was clear that the very basis of the complaint that there was “Unauthorized Access” was perhaps incorrect. Hence the complaint was filed on a wrong understanding of what had happened. Because the complaint had been made by UIDAI, it was immediately acted upon by the Police. While registration of the complaint was fine, the need for actioning an immediate arrest and including clauses from IPC such as 468 and 471 was perhaps unwarranted. An FIR under Section 66 of ITA 2000/8 with a bail in the station would have been a reasonable response from the Police if they had not been pushed by some panic stricken UIDAI official that some national calamity had happened.

Now we understand that the total commercial benefit that the person gained was around Rs 40000/- from advertisements running on the App and not from selling of unauthorizedly accessed data. This also is insignificant for any serious commercial gain case to be made out.

The Complaint said “Some unknown person” collaborated with Mr Abhinav. But where was this “Unknown person”? ….. Is it the Hospital? Is it the NIC? Is it Google Ad supplier? or is it the persons who downloaded the App? or is it the company Qarth technologies which is a subsidiary of Ola Cabs (ANI Technologies Ltd)?. It appeared that this “Unknown Person” was added only to ensure that Section 120B could be added and a “Conspiracy” could be brought in.

When the case was transferred to Cyber Crime Police Station, we can expect that they identified that the FIR was not properly filed and without the case being also filed on the e-Hospital website and/or NIC as the e-Hospital platform owner, the complaint only against Abhinav would be difficult to sustain. They also would have pointed out that if UIDAI maintains that “There is no data loss, No data Breach” etc., then the Courts may frown at the Police for registering a Case against a “Zero Loss” incident.

It is also necessary that information was available in the public domain through an article in www.naavi.org which was a reasonable notice of such incident occuring several months ago. This article was  titled “Online Registration System for Indian Hospitals.. No Privacy Policy?” and was published on  4th November 2016. On the same day, I had sent an e-mail to info@nimhans.kar.nic.in and ms@nimhans.ac.in drawing their attention to the article and expecting them to check with their Information Security department on the issues raised. The article focussed on the lack of a “Privacy Policy” but any professional Information Security professional in say NIC would have understood that the application enables dispensation of aadhar information without the information seeker committing himself to any terms of use or NIMHANS protecting itself with a privacy policy/privacy statement.

Though everybody in the information security loop had a notice through this published article nearly 9 months ago, no body seems to have had the intelligence to recognize that there was a vulnerability in the system which could create a risk.

If the Police now try to pursue the case, there will definitely be a question of the role of “Lack of Due Diligence” by the Hospital site/s which were accessed by the Abhinav App and in the absence of any “Terms of use” how it can be considered as a criminal offence that Mr Abhinav created an app to help the Aadhar owner to access their personal data through the use of these websites.

We can question that Mr Abhinav was also not aware of Cyber Law Compliance as otherwise he should have sensed that he should have sought some kind of permission to use the hospital app for a purpose other than seeking an appointment for which it was primarily meant.

But if the hospitals as an organization, NIC as an institution and UIDAI as a National Critical infrastructure with the nation’s best security officials in their roles did not recognize any threat nor had the system to monitor such articles which  can be accessed simply with a google alert in the name of UIDAI or e-Hospital or NIMHANs etc , then how can an individual like Abhinav be more resourceful?..could be his defense.

If Police pursue their case against the intermediaries such as the hospitals and NIC and ask them questions on “Lack of Due Diligence” or “Negligence”, there will be embarassment for these organizations. At the same time, without the UIDAI admitting that there was some kind of a breach, it is difficult to question any downstream user including NIC, Hospitals or Abhinav.

If the Police try to pursue the case only against Abhinav and does not open the pandora’s box of “Due Diligence by Intermediaries”, then obviously there will be a charge of unfair targetting of the individual in a discriminatory manner which would be an embarrassment for the Police itself.

If the Case needs to be pursued therefore UIDAI should first admit that there has been a “Security Breach” with or without “Data Breach”.

If not, they should withdraw their complaint and a fresh complaint has to be filed by all the hospitals which have been used by the Abhinav App on different occasions which should say that their platform was not meant for public to use it as an aadhar information extraction device even if it was their own. But then they will have to answer why they could not say so on their website in the form of terms of use or privacy policy document. Will they admit that all these organizations donot know the basics of Section 79 requirement of ITA 2000. Their pride will not allow them to admit.

Hence they may not be interested in filing a complaint.

If UIDAI withdraws its complaint and no body else is prepared to register the complaint, what action can the Police take?… They also would not perhaps be interested in inventing some reason to keep the case going since anyway at some point of time in future it may be dismissed by some Court with perhaps some strictures.

In the light of the above, I am not surprised at the indication of the Deccan Herald Report that the complaint would be reduced into a non criminal violation. May be it may be diluted further and even be dropped altogether.

We need to wait an watch…

Naavi

 

 

 

Posted in Cyber Law | Leave a comment