Snowden Demands A Penalty For Misuse Of Aadhaar Data

Aadhaar is a 12-digit unique identity number that can be obtained by residents of India, based on their biometric and demographic data. It is the larges Biometric ID program in the world.

Speaking from Moscow, Edward Snowden says that if the Indian government was serious about implementing Aadhaar for public good, it must ensure "criminal penalty."

The Indian government must apply a penalty on anyone using Aadhaar data for purposes other than public services, whistle blower Edward Snowden has said.

Addressing an event via video-conference, he said that if the Indian government was serious about implementing Aadhaar for public good, it must ensure "criminal penalty" against anyone misusing the data. Mass surveillance system would look like Aadhaar as it creates systemisation of society, he told the fifth edition of 'Talk Journalism' event organised recently.
Systemisation of society is something that is not stated in the scheme of things for the Unique Identification Authority of India (UIDAI), he added.

Replying to a question the surveillance issue, he said that no government will say that it has decided that "you don't have rights". They would rather say that they are bringing in a new programme that will safeguard people's rights and protect them.
Snowden said that it's a myth that youngsters are not concerned about privacy. Youngsters are very much concerned about their privacy, he added.

He made a point stating that citizens don't need to explain why they need privacy it's the government that needs to explain why people don't need rights.

The former USA secret agency CIA employee said that "we have privacy issues" because it helps those who violate it. He said that privacy can be safeguarded through better encryption systems and strong legal system.

Money Control:

You Might Also Read:

Your Next Bank Card is a Finger-Scanner:

China’s Electronic Surveillance Program Targets Muslims:
 

« The BA Hack And How Not To Respond To A Cyber Attack
A Breakthrough In Video Analytics »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

UMBRA

UMBRA

UMBRA is solely concerned with protecting governments against Nation State attacks. We are not a consumer or enterprise company.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.