APP Users: If unable to download, please re-install our APP.
Only logged in User can create notes
Only logged in User can create notes

General Studies 3 >> Science & Technology

audio may take few seconds to load

PERSONALITY IDENTIFIABLE INFORMATION (PII)

PERSONALITY IDENTIFIABLE INFORMATION (PII)

1. Context

Recently, a revelation by Resecurity, an American cybersecurity firm, disclosed that personally identifiable information (PII) of 815 million Indian citizens, encompassing Aadhaar numbers and passport details, was available for purchase on the dark web. Threat actors were ready to sell this data for $80,000, marking a significant breach of sensitive information.

2. About Personally Identifiable Information (PII)

  • PII is information that can be used to identify an individual. This can include things like your name, address, phone number, email address, Social Security number, and passport number.
  • PII can also include information that is not directly identifiable, but can be used to identify you when combined with other information. For example, your IP address, your browser type, and your browsing history can all be used to identify you.
  • PII comprises information that, when combined, can identify an individual. In this case, it included Aadhaar numbers, unique 12-digit identification numbers issued by the UIDAI on behalf of the Indian government. Another threat actor named "Lucius" claimed access to a more extensive array of PII, including voter IDs and driving license records.
  • The threat actors declined to specify how they gained access to the data, hindering the identification of the data leak's source. "Lucius" claimed access to a 1.8 terabyte data leak from an unnamed "India internal law enforcement agency." However, the authenticity of this claim remains unverified.

3. Government Response and Investigation

  • India's junior IT minister, Rajeev Chandrasekhar, confirmed the Computer Emergency Response Team's investigation into the alleged data leak.
  • The government is undergoing the arduous task of moving vast amounts of data, including legacy records, to secure storage. However, the actual size and confirmation of the alleged leak were not provided.
  • While the government denies prior biometric data leaks from Aadhaar, Chandrasekhar highlighted the ongoing transition towards a more secure data management system.
  • However, instances of significant leaks, such as farmer data from the PM Kisan website appearing on the dark web, have raised concerns about data security.

4. Threats Arising from Leaked Information

  • The continuous leakage of Aadhaar IDs and their appearance on underground cybercriminal forums pose risks of digital identity theft.
  • With India ranking high in malware detection, there's an increased threat of cyber-enabled financial crimes, tax frauds, and online banking theft.
  • Users are advised to ascertain if their information was part of the leaked data. Caution is urged in handling emails from unknown sources to avoid phishing campaigns.
  • Changing user IDs and passwords, implementing two-factor authentication, and reporting suspicious online activities to authorities are recommended measures to safeguard personal information.

5. Conclusion

The Aadhaar data leak is a serious security breach that could have a devastating impact on millions of Indian citizens. It is important for individuals to take steps to protect their PII and for the government to continue to improve the security of its databases.

For Prelims: Aadhaar, Personally Identifiable Information, cybersecurity, 
For Mains: 
1. Discuss the challenges faced by the Indian government in managing and securing the vast amount of PII collected through various government schemes and initiatives. (250 Words)
 
 
Previous Year Questions
 
1. Consider the following statements: (UPSC 2018)
1. Aadhaar card can be used as a proof of citizenship or domicile.
2. Once issued, the Aadhaar number cannot be deactivated or omitted by the Issuing Authority.
Which of the statements given above is/are correct?
A. 1 only         B. 2 only           C. Both 1 and 2        D. Neither 1 nor 2
 
Answer: D
 
2. Consider the following statements: (UPSC 2020)
1. Aadhaar metadata cannot be stored for more than three months.
2. State cannot enter into any contract with private corporations for sharing of Aadhaar data.
3. Aadhaar is mandatory for obtaining insurance products.
4. Aadhaar is mandatory for getting benefits funded out of the Consolidated Fund of India. Which of the statements given above is / are correct? 
A. 1 and 4 only         B.  2 and 4 only         C. 3 only             D. 1, 2 and 3 only
 
Answer: B
 
Source: The Hindu

Share to Social