In 2009, I became extremely concerned with the concept of Unique Identity for various reasons. Connected with many like minded highly educated people who were all concerned.
On 18th May 2010, I started this Blog to capture anything and everything I came across on the topic. This blog with its million hits is a testament to my concerns about loss of privacy and fear of the ID being misused and possible Criminal activities it could lead to.
In 2017 the Supreme Court of India gave its verdict after one of the longest hearings on any issue. I did my bit and appealed to the Supreme Court Judges too through an On Line Petition.
In 2019 the Aadhaar Legislation has been revised and passed by the two houses of the Parliament of India making it Legal. I am no Legal Eagle so my Opinion carries no weight except with people opposed to the very concept.
In 2019, this Blog now just captures on a Daily Basis list of Articles Published on anything to do with Aadhaar as obtained from Daily Google Searches and nothing more. Cannot burn the midnight candle any longer.
"In Matters of Conscience, the Law of Majority has no place"- Mahatma Gandhi
Ram Krishnaswamy
Sydney, Australia.

Aadhaar

The UIDAI has taken two successive governments in India and the entire world for a ride. It identifies nothing. It is not unique. The entire UID data has never been verified and audited. The UID cannot be used for governance, financial databases or anything. It’s use is the biggest threat to national security since independence. – Anupam Saraph 2018

When I opposed Aadhaar in 2010 , I was called a BJP stooge. In 2016 I am still opposing Aadhaar for the same reasons and I am told I am a Congress die hard. No one wants to see why I oppose Aadhaar as it is too difficult. Plus Aadhaar is FREE so why not get one ? Ram Krishnaswamy

First they ignore you, then they laugh at you, then they fight you, then you win.-Mahatma Gandhi

In matters of conscience, the law of the majority has no place.Mahatma Gandhi

“The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 of the Indian constitution refers to the right to life and liberty -Attorney General Mukul Rohatgi

“There is merit in the complaints. You are unwittingly allowing snooping, harassment and commercial exploitation. The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except as may be directed by a court for the purpose of criminal investigation.”-A three judge bench headed by Justice J Chelameswar said in an interim order.

Legal scholar Usha Ramanathan describes UID as an inverse of sunshine laws like the Right to Information. While the RTI makes the state transparent to the citizen, the UID does the inverse: it makes the citizen transparent to the state, she says.

Good idea gone bad
I have written earlier that UID/Aadhaar was a poorly designed, unreliable and expensive solution to the really good idea of providing national identification for over a billion Indians. My petition contends that UID in its current form violates the right to privacy of a citizen, guaranteed under Article 21 of the Constitution. This is because sensitive biometric and demographic information of citizens are with enrolment agencies, registrars and sub-registrars who have no legal liability for any misuse of this data. This petition has opened up the larger discussion on privacy rights for Indians. The current Article 21 interpretation by the Supreme Court was done decades ago, before the advent of internet and today’s technology and all the new privacy challenges that have arisen as a consequence.

Rajeev Chandrasekhar, MP Rajya Sabha

“What is Aadhaar? There is enormous confusion. That Aadhaar will identify people who are entitled for subsidy. No. Aadhaar doesn’t determine who is eligible and who isn’t,” Jairam Ramesh

But Aadhaar has been mythologised during the previous government by its creators into some technology super force that will transform governance in a miraculous manner. I even read an article recently that compared Aadhaar to some revolution and quoted a 1930s historian, Will Durant.Rajeev Chandrasekhar, Rajya Sabha MP

“I know you will say that it is not mandatory. But, it is compulsorily mandatorily voluntary,” Jairam Ramesh, Rajya Saba April 2017.

August 24, 2017: The nine-judge Constitution Bench rules that right to privacy is “intrinsic to life and liberty”and is inherently protected under the various fundamental freedoms enshrined under Part III of the Indian Constitution

"Never doubt that a small group of thoughtful, committed citizens can change the World; indeed it's the only thing that ever has"

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” -Edward Snowden

In the Supreme Court, Meenakshi Arora, one of the senior counsel in the case, compared it to living under a general, perpetual, nation-wide criminal warrant.

Had never thought of it that way, but living in the Aadhaar universe is like living in a prison. All of us are treated like criminals with barely any rights or recourse and gatekeepers have absolute power on you and your life.

Announcing the launch of the # BreakAadhaarChainscampaign, culminating with events in multiple cities on 12th Jan. This is the last opportunity to make your voice heard before the Supreme Court hearings start on 17th Jan 2018. In collaboration with @no2uidand@rozi_roti.

UIDAI's security seems to be founded on four time tested pillars of security idiocy

1) Denial

2) Issue fiats and point finger

3) Shoot messenger

4) Bury head in sand.

God Save India

Saturday, June 29, 2013

3466 - Aadhaar not mandatory to benefit from EPFO schemes - First Post



New Delhi: Now EPFO’s over five crore members need not necessarily have Aadhaar numbers to avail the benefits of PF body’s schemes as these are excluded from Centre’s Direct Benefit Transfer (DBT) programme.
“The schemes under EPFO and ESIC have been excluded from the list schemes identified for implementation of Direct Benefit Transfer,” a labour ministry letter to EPFO’s Central Provident Fund Commissioner stated.

Aadhaar logo. Image courtesy UIDAI

Subsequently, the EPFO head office issued an office order to discontinue submission of monthly report on the progress of the work under the DBT scheme by regional offices.
At present, the money is transferred through NEFT and cheques. The scheme was excluded from the DBT scheme mainly because it was for distributing subsidies and grants and PF money is not a subsidy, an official explained.
Earlier this year in January, the Employees’ Provident Fund Organisation (EPFO) has asked the field staff to ensure the collection of data (Aadhaar) in respect of member joining on or after 1 March 2013 on a monthly basis and in respect of existing members by 30 June 2013.
According to the office order issued then, in case an employee does not have the Aadhaar number, the employer can issue an Enrolment Id (EID) as per the guidelines of the body. This EID would be converted into Aadhaar number later on, the order had said.
The body had also decided to seek the Aadhaar numbers of its pensioners through the banks.
Later in February this year, after drawing flak from unionist for the move, the PF body decided to put on hold the decision to make it mandatory for new members joining EPF scheme to provide Aadhaar number as credential for enrolment from 1 March 2013.
The EPFO order circulated in February had observed that getting the Aadhaar was a time consuming process and the (UIDAI) scheme covers only 18 states.
The remaining states are covered by the Register General of India under the National Population Register which would be digital database of country’s residents.
EPFO had envisaged replacing members’ account numbers with their Aadhaar numbers to avoid inconvenience to people as they had to apply for transfer of PF money to new accounts while changing jobs.
Now, EPFO is working on creating a central data base where all members would have a permanent account number and would not require to transfer PF accounts.
Besides, this will help EPFO members, particularly construction workers, who often change their jobs or contractors.
However in the meantime, the body is about the start centralised online clearance of provident fund transfer and withdrawal claims. This will allow members to apply online for the purpose and onus of verification of the detail of applicants would be on EPFO.
PTI

3465 - Direct benefit transfers hit as govt instructions reach offices late VINSON KURIAN - Hindu Business Line



Beneficiary list under National Social Assistance Programme implemented by local self-government department has not been made available in most districts.

THIRUVANANTHAPURAM, JUNE 28:  
The pace of rollout of direct benefit transfer (DBT) scheme has been hit since working instructions on this reached Government offices very late.
Various departments are yet to designate district-level nodal officers for the programme, a State-level review meeting of bankers held here observed.
Beneficiary list under National Social Assistance Programme implemented by local self-government department has not been made available in most districts.

DIGITISED DATA
Lead district managers of banks need digitised data of beneficiaries with name of bank, bank account number and Aadhaar number. Concerned departments were expected to share the data purposes of seeding their bank accounts with Aadhaar numbers.

Many departments had not fallen in line with this. Banks needed updated list immediately so as to complete the process within prescribed time frame.
Further updated lists with incremental additions need to be submitted on a weekly basis only. The meeting observed that feedback from banks with regard to opening of account, seeding of Aaadhar numbers, and issuance of debit cards had not been received.

NOT FURNISHED
Wherever bank accounts were to be opened, camps need to be organised by the department concerned. Lead banks must ensure participation of banks in these camps.
The meeting observed that National Rural Health Msision had not prepared the beneficiary list under Janani Suraksha Yojna, a programme for safe motherhood intervention, in certain districts. Wherever submitted, bank account details had not been incorporated.
For schemes such as National Means-Cum-Merit Scholarship MMS, all post-matric scholarship schemes were updated by respective educational institutions.
These institutions were monitored by directorates of collegiate education; technical education; higher secondary education and medical education.

STUDENT DATABASE
But these departments did not have district offices to monitor updation of database by principals. This had hampered flow of beneficiary list to implementing departments.
Beneficiaries had not received Aadhaar, and hence the mismatch between number of accounts and Aadhaar seeding.
District administrations in coordination with Akshaya/NPR had organised camps for enrolment as well as Aadhaar number generation.
Even after re-opening of schools at post-summer vacation, the list had not been updated. The meeting called for immediate intervention of departments required to complete the process.

(This article was published on June 28, 2013)

3464 - Finally, LPG subsidy project rolls out in Mysore on July 1

Finally, LPG subsidy project rolls out in Mysore on July 1
Lawrence Milton, TNN Jun 28, 2013, 02.26AM IST


MYSORE: At last, the Direct Cash Transfer (DCT) for LPG subsidy is expected to be launched on July 1. Deputy commissioner Ramegowda confirmed to TOI, after a videoconference with ministry of petroleum (marketing) joint director Neeraj Mittal on Thursday, that the project would be launched on Monday.


A meeting of RBI and UIDAI authorities and representatives of oil companies is scheduled in Mysore on Friday and it will decide the schedule. UIDAI chairman Nandan Nilekani is also expected to attend the meet. The DC said officers concerned have been directed to speed up project work.

The launch has been postponed five times, the last two times due to assembly elections.

10% applications rejected
Meanwhile, as many as 10% of applications submitted by consumers for seeding of Aadhaar numbers and their bank accounts have been rejected. Lead bank manager MB Chinappa said to increase the percentage of seeding, drop boxes were placed at gas distributors' offices to collect details from consumers. About 9,951 applications were collected from drop boxes, of which only 8,830 were accepted.

Just over 10% of applications were rejected because of incorrect information and mismatch of bank account details and Aadhaar numbers. Some failed to submit Aadhaar copy along with the prescribed form to the bank while many consumers gave bank account numbers of their husbands or other family members. Consumers have to provide their bank account number because the subsidy is credited soon after booking for LPG refills, Chinappa explained.

Chinappa, who is also convener of the district level review committee, said, "We have directed all controllers of banks to update data without delay because the project will commence on July 1. Only 37% of data is matched with National Payment Corporations of India though 60% of Aadhaar-bank account seeding is complete. It is a technical problem on the bank's side and it will be sorted out."

3463 - Ranchi fares well in anti-poverty scheme - TOI

TNN Jun 28, 2013, 12.23AM IST

RANCHI: The much-talked about anti-poverty programme of the Union government has been successful in Ranchi. The district has performed well in transferring subsidies directly to the bank accounts of people living below poverty line under Direct Benefit Transfer (DBT).


The district administration on Thursday said a total of Rs 4.34 crore has been transferred to 13,378 beneficiaries, highest among all districts in the country. The district administration has made direct benefit transfers to SC/ST students as pre-matriculation scholarships, to SC/ST/OBC students as post-matriculation scholarships. The other benefits have been made as scholarship to various students and to women under Janani Suraksha Yojana.

The Union government had on January 1, 2013 selected 51 districts in the country to run DBT program on a pilot basis. Ranchi is part of 51 districts where 26 anti-poverty government programs are running. The district administration transfers money directly to the bank accounts of the beneficiaries who live below poverty line and are entitled to the benefits.

3462 - 50% of state to get Aadhaar cards by year-end - TOI

50% of state to get Aadhaar cards by year-end
TNN Jun 28, 2013, 03.21AM IST

BANGALORE: Nearly half of Karnataka's population will have Aadhaar cards by this year-end and more people can avail of Direct Benefit Transfer (DBT), chief minister Siddaramaiah said on Thursday at the inauguration of the model Aadhaar enrollment centre in Malleswaram. He later said at another function they are targeting 100% Aadhaar coverage in the state by March next.

"The focus will be on the vulnerable section. We'll ensure that the poor and under-privileged get Aadhaar cards. About 50% of the state population has already enrolled for it and 36% have already received it. By the end of this year, all those who have enrolled will receive the card," said Siddaramaiah

Talking about DBT, chairman of the Unique Identification Authority of India (UIDAI) Nandan Nilekani said, "DBT is working fine and under the scheme, a payment of Rs 10 lakh has been already made in Karnataka."
Speaking on the sidelines of launch of UID Data centre development activities off Bellary Road later, Siddharamaiah said linking Aadhaar to Rs 1 per kg rice scheme would go a long way in ensuring the benefits under the scheme actually beneficiaries in the coming days.

"We have around 99 lakh BPL card holders in the state. We all know that not all of them are deserving beneficiaries. We want Aadhaar enrolment to be speeded up in the state so that it can be a platform to identify deserving beneficiaries in such circumstances," he added.

The CM said the government is planning to ensure that by March next year, Aadhaar reaches everybody in state.

UIDAI deputy director general Ashok Dalwai said the data centre in Bangalore is unique and it would store biometric and demographic data of people enrolled under Aadhaar throughout the country.

"The centre being developed in 3 acres 14 hunts land is estimated to cost Rs 118 crore. The centre with state of the art security features to Aadhar data will also play a big role in Aadhaar related software development. The centre is expected to begin functioning from March 2014," he added.

When questioned about what scheme will be linked with Aadhar after LPG benefit transfer, UIDAI head Nandan Nilekani said LPG itself would take lot of time to implement and other schemes would be taken up gradually.
Even though the construction of data centre began few months, the ritual of foundation laying was pending as there was election code of conduct during assembly polls. The same was completed on Thursday.

To speed up enrolment, the government has come up with a number of enrolment and service centres across the city. Model Aadhaar enrolment centres, appointment-based enrolment centres, call centres for information on enrolment, e-Aadhaar service through Bangalore One and Karnataka One centres and special enrolment drive for vulnerable sections of society are some steps taken in this regard.

To know more about Aadhaar, citizens can call 080-44554499 and 9243700100. If you're heading to an appointment-based enrolment centre, login to to book an appointment.

Model Aadhaar enrolment centres
* Rotary conference hall, 13{+t}{+h} cross Malleswaram
* Ravindra Kalakshetra
* BBMP ward office, Rajarajeshwarinagar
* Balakrishna Rangamandira, Rajarajeshwarinagar
* Vivekananda Rangamandira, Jayanagar
* BBMP ward office, Begur Road, Bommanahalli
* BBMP ward office Rajajinagar
* BBMP ward office, Bagalkunte
* BBMP ward office, Netaji Circle, Mattikere
* Mayo Hall
Appointment-based enrolment centres
* PUC Board 18{+t}{+h} Cross, Malleswaram
* BBMP office, Hudson circle
* Hockey Stadium, Nanjappa Circle, Shantinagar
* Kanteerava Stadium, Kasturba Road
* Synthesis, Electronic City
* Rammandir, Rajajinagar
* Kabaddi Stadium, Vidyapeeta Circle

3461 - Govt looks to post offices to save direct benefits transfer scheme - TOI


Mahendra Singh, TNN | Jun 28, 2013, 07.14AM IST

NEW DELHI: In an attempt to accelerate implementation of the direct benefits transfer (DBT) scheme, touted as UPA's game changer for the 2014 general elections, the government is planning to start banking operations in around 50 post offices across the country, mostly in remote areas. 

A senior government official said the Department of Post has moved a Cabinet note seeking initial capital of Rs 500 crore to run these banks. 


UPA's ambitious scheme is getting delayed due to poor last mile connectivity of banks and their reluctance to reach out to people in remote corners of the country. 

The plan is to use post offices - which have a network of around 150, 000 branches across the country, much more than all banks taken together - to expand rolling out of the DBT scheme. 

An official said that once the proposal gets Cabinet nod, the banking correspondent model envisaged in the DBT scheme will be performed by postmen. Along with regular salary, postmen will get an additional commission of 0.07% for every new deposit. 

The government also plans to link all post offices with core banking solutions ( CBS), which would further enable them to function as full-fledged banks. The plan is to allow post offices, which are allowed to take savings only, to disburse loans also. 

The Centre was worried as many district magistrates and deputy commissioners cited poor last mile connectivity for the delay in rolling out the DBT scheme. Chief ministers, during their meeting with the Planning Commission to finalize state plans, also flagged the issue. 

"Banks are not able to seed the 'Aadhaar' number with bank accounts in time which scuttles the timely transfer of money," an official said. 

Banks are not too enthusiastic of opening new accounts and seeding them with 'Aadhaar' numbers as under DBT, 'no-frills' accounts have to be opened, while they usually ask for a minimum deposit of Rs 1,000 for opening any new account.


Friday, June 28, 2013

3460 - The missing Act - Front Line


Print edition : July 12, 2013


An expert panel recommends a comprehensive law and changes in the existing legal framework to protect the right to privacy. By V. VENKATESAN

THE Indian citizen’s right to privacy is under threat from the increasing efforts to collect data about individuals for various purposes, but there is no specific legislation to regulate any such action. In October last year, a Group of Experts on Privacy (comprising 12 experts) constituted by the Planning Commission under the chairmanship of a former Chief Justice of the Delhi High Court, Ajit Prakash Shah, submitted its report making specific recommendations to the government in order to formulate a suitable framework for a Privacy Act. The group agreed that such a piece of legislation must apply both to the government and the private sector.

The report has noted that with the initiation of national programmes such as Unique Identification Number, National Intelligence Grid (NATGRID), Crime and Criminal Tracking Networking Systems (CCTNS), Rashtriya Swasthya Bima Yojana (RSBY—a health insurance scheme), DNA profiling, privileged communications and brain mapping, most of which will be implemented through ICT (Information, Communication and Technology) platforms, concerns have emerged on their impact on the privacy of persons. The government collects data relating to citizens’ health, travel, taxes, religion, education, financial status, employment, disability, living situation, wealth, citizenship, marriage, crime record, and so on, without an overarching policy. This, according to the report, has led to ambiguity over who is allowed to collect data, what data can be collected, what are the rights of the individual, and how the right to privacy will be protected. The report has further observed that the extent of personal information being held by various service providers, especially the enhanced potential for convergence that digitisation carries with it, is a matter that raises issues about privacy.

The report has enunciated nine fundamental privacy principles to form the bedrock of the proposed Privacy Act. These are based on the need to hold the data controller accountable for the collection, processing and use to which the data are put, thereby ensuring that the privacy of the data subject is guaranteed. The nine principles are as follows:

1. A data controller shall give simple-to-understand notice of its information practices to all individuals before any personal information is collected from them.
2. A data controller shall give individuals choices with regard to providing their personal information and take individual consent only after providing notice of its information practices. Only after consent has been taken will the data controller collect, process, use, or disclose to third parties such information, except in the case of authorised agencies. The data subject shall, at any time while availing himself/herself of the services or otherwise, also have the option to withdraw his/her consent given earlier to the data controller.
3. A data controller shall only collect personal information from data subjects as is necessary for the purposes identified for such collection, regarding which notice has been provided and consent taken. Such collection shall be through lawful and fair means.
4. A data controller shall collect, process, disclose, make available, or otherwise use personal information only for the purposes as stated in the notice after taking the consent of individuals. If there is a change of purpose, this must be notified to the individual. After personal information has been used in accordance with the identified purpose, it should be destroyed as per the identified procedures. Data retention mandates by the government should be in compliance with the National Privacy Principles (NPPs).
5. Individuals shall have access to personal information about them held by a data controller; shall be able to seek correction, amendments, or deletion of such information where it is inaccurate; be able to confirm that a data controller holds or is processing information about them; be able to obtain from the data controller a copy of the personal data.
6. A data controller shall not disclose personal information to third parties, except after providing notice and seeking informed consent from the individual for such disclosure. Third parties are bound to adhere to relevant and applicable privacy principles. A data controller shall not make personal information public.
7. A data controller shall put in place the necessary technical, administrative and physical safeguards for protecting personal information in his/her custody from unauthorised use, destruction, modification, access, and retention, etc.—both from insiders and outsiders.
8. The data controllers shall make their privacy policies, practices, systems, and related developments open, transparent and accessible to individuals through mechanisms such as providing information in multiple languages, and adopting an open standard/accessible format for the disabled.
9. The data controllers shall be accountable to the individual subject, privacy commissioner, and other stakeholders for compliance with all NPPs.
The report has observed that currently, privacy protection in India is piecemeal and does not uphold these principles in a systematic manner. An overarching Privacy Act, which specifically incorporates these principles and sets up an enforcement mechanism to ensure compliance, is an immediate necessity, the report suggests. The report is significant for making a detailed analysis of existing and proposed legislation by applying the NPPs. These include the draft DNA Profiling Bill, 2012; the Citizenship Act, 1955 and Rules, 2003; the Collection of Statistics Act, 2008, and the Collection of Statistics Rules, 2011; the National Identification Authority of India Bill, 2010; and the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011. The report has revealed that these pieces of legislation lack many provisions which ought to have been incorporated in conformity with the NPPs or they have provisions which conflict with the NPPs.

The report has recommended that the proposed Privacy Act must articulate the constitutional basis of privacy as a fundamental right deriving from Article 21 of the Constitution. It has suggested national security; public order; disclosure in the public interest; prevention, detection, investigation, and prosecution of criminal offences; protection of the individual or of the rights and freedoms of others; and historical and scientific research and journalistic purposes as possible exceptions to the right to privacy. To measure the extent and validity of an exception, the report suggests that it should be in proportion to the harm that has been caused or will be caused and the objective of the limitation. Secondly, the limitation on the right to privacy should be in accordance with the laws in force and should extend only to that aspect which is necessary in a democratic state, it says.

The report has found that there are at least 50 laws, rules, regulations and executive orders that articulate privacy principles and practices. The proposed Privacy Act, it says, will be used to harmonise, but not homogenise, these different policy documents in order to ensure that there is consistency and compliance with the NPPs. Once the Privacy Act becomes law, other laws with privacy implications may be amended to ensure broad harmonisation and compliance with the NPPs, the report suggests.

3459 - Can't act against websites for sharing information on Indians with US: SC - IBN Live

CNN-IBN | Updated Jun 27, 2013 at 07:42pm IST


New Delhi: The Supreme Court on Thursday dismissed a Public Interest Litigation (PIL) against nine internet companies for allegedly sharing information of Indian citizens with US intelligence agencies.
Among the nine internet companies are Google, Facebook, Microsoft and Yahoo. The PIL was filed last week to ensure that the rights of internet users are protected.

The apex court said it cannot entertain the petition as Indian agency is not involved in it and allowed the petitioner, former dean of Law Faculty of Delhi University SN Singh, to move any other forum for seeking remedy against Internet companies and the US agency for snooping data resulting in violation of right to privacy.

The bench also said that the court cannot direct Parliament to enact law to safeguard privacy of citizens against such snooping.

In his plea, Singh had alleged that such largescale spying by the US authorities is detrimental to national security and urged the apex court to intervene in the matter.

He had claimed that the Internet companies are sharing information with the foreign authority in "breach" of contract and violation of right to privacy.
Singh had submitted that it is a breach of national security as government's official communications have come under US surveillance as services of private Internet firms are being used by them.

He had sought directions to the Centre to "take urgent steps to safeguard the government's sensitive Internet communications" which are being kept outside India in US servers and are "unlawfully intruded upon by US Intelligence Agencies through US-based Internet companies under secret surveillance program called PRISM".

In his petition, Singh had also sought directions restraining the government and its officials from using US-based Internet companies for official communication and that all such companies, which are doing business in India, must establish their servers here so that they can be regulated as per Indian laws.

The Centre had earlier on June 11 expressed surprise and concern over the snooping and said it will seek information and details from the US over reports that India was the fifth most tracked country by the American intelligence which used a secret data-mining programme to monitor worldwide Internet data.

With Additional Inputs From PTI

3458 - Aadhaar card: Compulsion by stealth - Economic Times

Thursday June 27, 2013, 09:24 AM

The Aadhaar card has been around for a few years now. If you go back and read pronouncements made by senior government functionaries when Aadhaar was launched, in 2009, many of them said Aadhaar isn't mandatory. UIDAI's website still proclaims this. Since the effective launch in 2010, 340 million Indians have voluntarily registered themselves for Aadhaar cards already. There can't be too many places in the world where such remarkably consistent choice has been exercised in favour of a government scheme. In the 4/5 years that have passed since launch, the tenor of pronouncements by senior government functionaries has changed. Initially, it was, Aadhaar isn't mandatory. Then it became, Aadhaar isn't mandatory. But it will be extremely difficult to obtain public goods and services without Aadhaar. Therefore, we won't make it mandatory. But we will force you to make a choice in favour of Aadhaar. Did you read about the decision taken by Jharkhand government a few days ago? Marriages won't be registered in Jharkhand without Aadhaar numbers. By the way, in May 2013, 49.49% of Jharkhand's population had Aadhaar numbers.

Marriage registration isn't compulsory in India. There is a Compulsory Registration of Marriages Bill floating around (since 2005). Though marriage registration has benefits, I think compulsory registrations is a bad idea, both because such provisions are difficult to enforce and because they impose additional transaction costs on the poor. So what about the non-enumerated 51.51% in Jharkhand? I guess the response will be that they will all eventually be enumerated and till then, marriages can be hold. I asked an UIDAI representative about Jharkhand government's decision and about the earlier May decision of Delhi government, making Aadhaar mandatory for property and marriage registration. (There is a PIL in Delhi High Court on this.) His response was that Aadhaar wasn't mandatory for Union public goods and services, though the Union had no control over what State governments did. That's easy, blame State governments, though this 2013 response is quite different from the 2009 response.


So I asked him about EPFO. Aadhaar has been made mandatory for EPFO, hasn't it? And EPFO can't be blamed on State governments. I was thereupon told that this is only for those who enrol in EPFO after March 2013 (I am not sure this is quite right) and therefore, Aadhaar isn't universally mandatory. 
That's a facetious argument. But whichever way you look at it. Aadhaar is gradually being made mandatory. That's understandable. A lot of people who take policy decisions have a 1984 kind of streak (I mean the Orwell novel) in them and probably love the Idea advertisement. Apart from transaction costs on poor, what bothers me about this is the non-transparent way government has gone about this. One might as well have said, right from the beginning, that Aadhaar was going to be mandatory. It would have raised some more hackles and caused a problem with the legislation. But it would have been honest and transparent.




3457 - Between KYC, Aadhaar and CMS, India will be a police state - FirstPost


by R Jagannathan Jun 26, 2013

What is the main purpose of issuing citizens a passport? The idea, as the name suggests, is to enable a you and me to pass through another country’s port. It helps identify one as a citizen of a country, so that other countries know where you or I belong. The passport is one country’s guarantee to another that it is responsible for the person carrying the document.

But surprise! Thanks to stringent identity checks everywhere, the soft police state that India has become is forcing many citizens to carry their passports around to get into domestic airports, buy gold or start a bank account. From being an external validation document, the passport has become a domestic ID document.

What is the purpose of issuing taxpayers a PAN card? The idea is to give them a unique number so that their transactions can be matched, mapped and checked through backend software for potential tax evasion. But in India, the PAN card now travels in wallets, jostling for space with cash, credit cards and driving licences.

The PAN card has also become a primary identity confirmer. It is an essential requirement for opening bank accounts, or doing any kind of high-value financial transaction, but its largest role is about establishing identity. And getting it in future will become harder, Business Standard assures us.

What is the purpose of the Aadhaar card? It is proof of identity and residence -– not citizenship. The Unique Identification Authority of India (UIDAI) collects the biometrics of individuals residing in India—iris prints, fingerprints, demographic details, etc.—and issues you a unique number with which you can be identified anywhere and for validating any transaction. It is the ultimate weapon a police state can possess – and currently the Aadhaar card operates under no law, and has no legislation to protect the privacy of your data.

3456 - Aadhaar vs direct benefit transfer - Financial Express

JUN 26 2013, 04:56 IST


When the first phase of the direct benefit transfer (DBT) was launched on January 1 for pension and scholarship benefits and could disburse only R40 crore in 43 districts, most wrote off Nandan Nilekani’s UIDAI-based Aadhaar cards. It didn’t help that leading banks like SBI refused to cooperate and asked for UIDAI to compensate it for any losses that may occur from making payments based on the Aadhaar system—the government is looking at ways to resolve the issue. The problem with the DBT was that, in all the cases where it was tried, there were multiple authorities—the Centre and the states. Which is why the DBT for LPG, the pilot for which was started in 18 districts at the beginning of the month, was the real test since it was run by three central government-owned PSU companies, the companies were tech-savvy and ran computerised operations anyway and, most important, there were no state government officials involved.

While just 7 lakh households of the 76 lakh in these 18 districts have got their Aadhaar-based DBT, this is a great start in the short period the scheme has been in operation for, the number is likely to cross 10 lakh households by month-end. Right now, just 62% of those with LPG cylinders have Aadhaar numbers—this is expected to reach 80% in the next two months. And of those with Aadhaar numbers, just a fourth have bank accounts—this, in fact, poses a bigger challenge than getting Aadhaar numbers. While the authorities are confident they will be able to tackle the problem, maybe in a few months more than was initially planned for, the real issue is a different one. The UIDAI-based Aadhaar has proved it can deliver payments without any losses along the way. The question is whether the government has the will to extend the system to other areas. Its insistence on going ahead with the Food Security Bill and the refusal to use Aadhaar for making transfers for kerosene suggests the government is not fully convinced.

Thursday, June 27, 2013

3455 - Cypherpunks, Edward Snowden, and the politics of mass surveillance - Live Mint

Edward Snowden has confirmed that the ‘surveillance dystopia’ Assange had warned of is already here

First Published: Tue, Jun 25 2013. 12 27 PM IST


Updated: Tue, Jun 25 2013. 05 18 PM IST

“The internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen... Left to its own trajectory, global civilization will be a post-modern surveillance dystopia, from which escape for all but the most skilled individuals will be impossible. In fact, we may already be there,” writes Julian Assange, the editor-in-chief of WikiLeaks, in his latest book Cypherpunks: Freedom and the Future of the Internet.

When it came out in late 2012, Cypherpunks may have seemed like a book ahead of its times. After all, even six months ago, how many in the world had heard about the PRISM worldwide surveillance programme of the US National Security Agency (NSA)? Or about Boundless Informant? Or that India was one of the top five countries monitored extensively by the NSA? Or that Google, Facebook, Apple, Microsoft, Yahoo, Skype, and several other tech companies shared user data that were supposed to remain private? But a few weeks ago a man named Edward Snowden confirmed to the world that the “surveillance dystopia” Assange had warned “may already be there” is, in fact, already here.
The Snowden saga, far from being an exception that concerns only the American government, points to what nearly all governments have been doing for some time now: snooping on their citizens with no democratic oversight.
The Indian state already has a Central Monitoring System (CMS) that will tap directly into your emails and phone calls with zero oversight by courts or Parliament. In the offline world, surveillance will be taken care of through CCTV cameras, compulsory use of biometric data/identification, elimination of all anonymity wherever possible, and of course, a comprehensive aerial surveillance system that will deploy helicopters and drones to man the skies 24 by 7.

The sheer scale and ambition of state surveillance programmes—with everyone from the US and the UK to India, Saudi Arabia and North Korea eager to get their hands on the latest systems—the exchange of data between private corporations and state agencies, and the extreme secrecy surrounding these operations, should leave no doubt in anybody’s mind about their real (as opposed to the proclaimed) use: control.

Yet it is still common to find conservatives and even liberals framing the whole surveillance issue as one about privacy. Restricting the debate to privacy enables them to argue that one necessarily has to sacrifice some privacy in order to enjoy security. The idiocy and mischief sponsoring this argument is laid bare in Cypherpunks.

Opening with an introduction by Assange titled “A Cryptographic Call to Arms”, Cypherpunks is essentially an edited conversation among Assange and three of his activist/hacker friends, Jacob Appelbaum, Andy Muller-Maguhn, and Jeremie Zimmerman, organized into 10 riveting chapters.

The book opens with a discussion on “Increased communication versus Increased Surveillance”, which offers a historical and political overview of the rise of mass surveillance alongside the growth in communication and information flows via the internet. The following chapter elaborates on the “militarisation of cyberspace”, which is “like having a tank in your bedroom. It’s a soldier between you and your wife as you’re texting. We are all living under martial law as far as our communications are concerned, we just can’t see the tanks—but they are there. To that degree, the Internet, which was supposed to be a civilian space, has become a militarized space.”

The discussants then exchange notes on private sector spying, how it collaborates with state surveillance, and the nature of what former CIA officer Valerie Plame Wilson describes as the “intelligence-industrial complex”. As you’d expect, much of the discussion here is about Google. “Do you know what you looked for two years, three days and four hours ago? You don’t know; Google knows,” notes Muller-Maguhn.

Assange argues that there are three basic freedoms from which all other freedoms derive: freedom of movement, freedom of communication, and freedom of economic interaction. While the three are interlinked, privacy becomes important for freedom of communication (if there’s a threat involved in speaking publicly, then the only way to protect yourself is by communicating privately), and for freedom of economic interaction. The surveillance debate, therefore, is not merely about loss of privacy—it is about an attack on the freedom of whoever is put under surveillance. Therefore, any surveillance can only ever be undertaken for a specific reason and with permission—there can never be any case for mass surveillance of innocent and guilty alike, as is the case now with programmes like PRISM and CMS.

Assange attributes the drive for mass surveillance to the insecurity of the nation state when faced with the burgeoning transnational reach and influence of the Internet—which is beyond the jurisdiction or control of any one state. But then, he asks, what if nation states, and a world divided by national boundaries, are no longer the answer to humanity’s problems?

The outfit he founded, WikiLeaks, is a transnational entity that belongs to no country. It took on the world’s most powerful nation state, bore the brunt of its vengeance, and has survived. The weapon that helped WikiLeaks survive—cryptography—is what Assange recommends to all those who would fight to protect their privacy and freedom in an era when “transnational surveillance and endless drone wars are almost upon us”.

Cryptography is the art and science of making sure that when you want your data to be read only by yourself, nobody else can read it. “The universe believes in encryption,” writes Assange, which is why it is easier to encrypt information than it is to decrypt it. It’s probably also why in many countries, including the US and Russia, it is illegal for individuals to practice cryptography beyond a certain strength—for then they cannot snoop on you.

Assange envisions the Internet as a free, platonic realm that could be fortified “behind a cryptographic veil.” He wants the netizens of the world to unite and “create new lands barred to those who control physical reality, because to follow us into them would require infinite resources. And in this manner to declare independence.”

“Cypherpunks advocate for the use of cryptography and similar methods as ways to achieve societal and political change,” says a small note explaining the term at the beginning of this book. While cryptography is one part of it, the politics and values of cypherpunk can be an even more effective weapon and rallying point against the abuses of power that lead up to, and can be the outcomes of, mass surveillance.

The fundamental cypherpunk position is summed up in the motto: privacy for the weak, transparency for the powerful. Obviously, the reality today is the exact opposite, which is why much of civil-political action is about using one’s freedom of expression to force transparency and accountability on the powerful. This was also what Snowden attempted to do, as he explains in this video interview .

“They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety,” wrote Benjamin Franklin. History has borne out the truth of this observation, and will do so again if we let it. Though Assange insists that “this book is not a manifesto”, it is worthy of being one. Cypherpunks is a must-read for anyone and everyone who has an email account and/or uses a mobile phone.
   



3454 - Direct benefit transfer for LPG crosses 1 million transactions - NDTV


Press Trust of India | Updated On: June 27, 2013 00:54 (IST)

New Delhi: Within weeks of its launch, the ambitious direct benefit transfer (DBT) programme for cooking gas (LPG) crossed a million transactions mark with Rs.41 crore of subsidy given to consumers directly.

"The Direct Benefit Transfer for LPG (DBTL) scheme, launched in 18 districts on June 1, has thus far been a great success with more than 1 million (10 lakh) direct cash transfers to consumers' bank accounts," an official statement said.

A sum of Rs.41 crore has been transferred in the hands of LPG Consumers in these districts.

The government launched DBTL scheme in 18 high Aadhaar coverage districts benefitting 67 lakh consumers.

"The scheme aims to curb leakages and prevent black-marketing and provide subsidy to consumers in their bank accounts. In these 18 districts the subsidy on LPG cylinders is being provided directly to consumers in their Aadhaar linked bank accounts," it said.

Under the scheme launched on June 1, LPG consumers get Rs. 435 in their bank accounts when they book an LPG cylinder. They are then expected to use this cash subsidy to buy a LPG refill at market price which is roughly the double of Rs.410 per 14.2-kg subsidised rate in Delhi.

The scheme was to be rolled out in 20 districts initially but the launch in Mysore in Karnataka and Mandi in Himachal Pradesh has been put off by a month due to assembly and Parliamentary bypolls there, the official said.

The government intends to extend the scheme to rest of the country before the end of the year but wants to see results in the 20 districts first. The districts selected have high Aadhaar or unique identification number penetration.

While as many as 89 per cent of the LPG consuming population in these districts have Aadhaar number, government will give a three-month grace period to them to procure the UID number and seed it with their bank accounts where cash subsidy has to be transferred.

"After the end of grace period, that is with effect from September 1, LPG cylinders will be sold to all domestic LPG consumers at market price. However, the subsidy will be transferred to only those who have linked Aadhaar number to LPG consumer number and Bank account and others will not get any subsidy," the statement said.

The government anticipates a saving of Rs.8,000-10,000 crore in LPG subsidy annually after the scheme is rolled out all over the country.

Currently, consumers are entitled to nine 14.2-kg LPG cylinders at subsidised rates in a year from the dealers. Many of these are black-marketed to unintended users like commercial establishments who otherwise have to buy the fuel at market price.


Business Standard
With the direct benefit transfer (DBT) for liquefied petroleum gas (LPG) almost completing a month, the scheme has so far roped in more than one million consumers getting direct cash transfers to their bank accounts in 18 districts across the country ...
CIOL
"About 67 lakh consumers from 18 districts are getting subsidy on LPG cylinders in their Aadhaar linked bank accounts," said a release and further added, The Direct Benefit Transfers for LPG (liquified petroleum gas) scheme would benefit over 6.7 ...

3453 - Schools in Mumbai fail to meet deadline for Aadhaar cards - Hindustan Times

Puja Pednekar, Hindustan Times  Mumbai, June 26, 2013


First Published: 10:12 IST(26/6/2013) | Last Updated: 10:15 IST(26/6/2013)

More than 50% students and teachers across the city’s secondary schools have not yet got their Aadhaar cards, forcing the education department to extend the deadline for acquiring these cards with a unique identification (UID) number to June 30.

All city schools including government aided and private unaided had to ensure that their students and teachers had acquired the card by May 31.
Aadhaar cards have become a must for teachers to get salaries and students to claim benefits for 27 items, including stationery, uniforms, books and scholarships.

A review conducted by the deputy director of education, Mumbai division, in the first week of June, revealed that 4.51 lakh students out of a total of 8.67 lakh students still do not have Aadhaar cards.

Similarly, 9476 teachers out of 28,627 teachers, between Class 5 to 10 do not have Aadhaar cards.

‘’We had urged schools to send their teachers and students to the nearest BMC ward office to get their Aadhaar card,” said NB Chavan, deputy director of education.

“It is shocking that so many schools have ignored the order,’’ he said He added that action would be taken against schools that do not complete the process on time.

The UID number will help the department in knowing the exact number of students enrolled in schools.

The number will also be used to record the attendance of students and teachers online, allowing the government to keep a check on bogus students and absentee teachers.

In a statewide survey in October 2011, many schools were found to be indulging in malpractices by showing bogus students on their rolls. 

Tuesday, June 25, 2013

3452 - World Bank: Money Laundering Criminals | Interview with Whistleblower Karen Hudes

3451 - Edward Snowden’s Ordeal Is Just Beginning By Julian Assange, WikiLeaks

Posted on June 23, 2013
by Jean

Source: Reader Supported News
23 June 13


It has now been a year since I entered this embassy and sought refuge from persecution.
As a result of that decision, I have been able to work in relative safety from a US espionage investigation.
But today, Edward Snowden’s ordeal is just beginning.
Two dangerous runaway processes have taken root in the last decade, with fatal consequences for democracy.
Government secrecy has been expanding on a terrific scale.
Simultaneously, human privacy has been secretly eradicated.

A few weeks ago, Edward Snowden blew the whistle on an ongoing program – involving the Obama administration, the intelligence community and the internet services giants – to spy on everyone in the world.

As if by clockwork, he has been charged with espionage by the Obama administration.

The US government is spying on each and every one of us, but it is Edward Snowden who is charged with espionage for tipping us off.

It is getting to the point where the mark of international distinction and service to humanity is no longer the Nobel Peace Prize, but an espionage indictment from the US Department of Justice.

Edward Snowden is the eighth leaker to be charged with espionage under this president.
Bradley Manning’s show trial enters its fourth week on Monday.
After a litany of wrongs done to him, the US government is trying to convict him of “aiding the enemy.”

The word “traitor” has been thrown around a lot in recent days.
But who is really the traitor here?
Who was it who promised a generation “hope” and “change,” only to betray those promises with dismal misery and stagnation?

Who took an oath to defend the US constitution, only to feed the invisible beast of secret law devouring it alive from the inside out?

Who is it that promised to preside over The Most Transparent Administration in history, only to crush whistleblower after whistleblower with the bootheel of espionage charges?

Who combined in his executive the powers of judge, jury and executioner, and claimed the jurisdiction of the entire earth on which to exercise those powers?

Who arrogates the power to spy on the entire earth – every single one of us – and when he is caught red handed, explains to us that “we’re going to have to make a choice.”

Who is that person?
Let’s be very careful about who we call “traitor”.
Edward Snowden is one of us.
Bradley Manning is one of us.
They are young, technically minded people from the generation that Barack Obama betrayed.

They are the generation that grew up on the internet, and were shaped by it.
The US government is always going to need intelligence analysts and systems administrators, and they are going to have to hire them from this generation and the ones that follow it.

One day, their generation will run the NSA, the CIA and the FBI.
This isn’t a phenomenon that is going away.
This is inevitable.
And by trying to crush these young whistleblowers with espionage charges, the US government is taking on a generation, and that is a battle it is going to lose.

This isn’t how to fix things.
The only way to fix things is this:
Change the policies.
Stop spying on the world.
Eradicate secret law.
Cease indefinite detention without trial.
Stop assassinating people.
Stop invading other countries and sending young Americans off to kill and be killed.
Stop the occupations, and discontinue the secret wars.
Stop eating the young: Edward Snowden, Barrett Brown, Jeremy Hammond, Aaron Swartz, Gottfrid Svartholm, Jacob Appelbaum, and Bradley Manning.
The charging of Edward Snowden is intended to intimidate any country that might be considering standing up for his rights.

That tactic must not be allowed to work.
The effort to find asylum for Edward Snowden must be intensified.
What brave country will stand up for him, and recognize his service to humanity?
Tell your governments to step forward.

Step forward and stand with Snowden.

3450 - Direct Cash Transfer - A Game Changer for Whom? 0 News Click



Author / Source / Date: 
Monita Muralidharan, Newsclick, June 22, 2013

Direct Cash Transfer (DCT) scheme aims to transfer the difference between the market price and subsidized price directly to the beneficiary in the form of cash. UPA II government is accelerating the implementation of DCT keeping 2014 elections in mind.

The consensus or hope in the ruling circles is that direct cash transfer scheme which allures people with the idea of “Aapka paisa, aapke haath mein”, will be a game changer in the forthcoming elections. Government promises that once the “system is in place”, the scheme would be extended to essential commodities like food and fertilizers. In this period of high inflation, it is widely argued that a move to replace distribution of goods like food, kerosene etc., with cash transfer will only add to the burden of India's poor. While DCT is appreciable for scholarships, various pension schemes or unemployment wages, it cannot be a replacement for all subsidized public delivery systems.

DCT can not be a substitute for PDS
Neo-liberal economists, policy makers advocate for the withdrawal of State from public delivery systems (PDS). The goal is to eventually replace universal PDS and other forms of subsidies with direct cash transfer. The PDS is a vital source of economic security and nutritional support for millions of people. It should be expanded and consolidated, not dismantled. The State should redeem its promise of enactment of National Food Security Policy at the earliest. It is important to understand that cash transfers should compliment, but not substitute for the provision of public services such as health care, school education, water supply, basic amenities, and the PDS.

Unique Identification - AADHAR and Direct cash transfer
One of the main problems that are associated with DCT is to make AADHAR mandatory. As pointed out by experts, biometric identification for manual workers has a 20% margin of error since fingerprints of such workers are susceptible to change. So is the case with senior citizens. The difference between UID enrollment figures and the number of actual beneficiaries is suspected to be very large at least in the present. Moreover, duplicate or deliberate incorrect inclusions and forced exclusions from the AADHAR project, questions the very integrity of the UID database. Many human rights organizations raised valid concerns about the possible misuse of UID data by law enforcing agencies and its potential impact on the civil liberty rights. Before correcting these flaws and addressing these concerns, making AADHAR mandatory for critical programs like food subsidy would be catastrophic.
Access to banks and infrastructures in rural India
In a country like India, where the rural poor have little or no access to banks or knowledge of the banking system, money may not reach the desired ones. The possibility of exploitation is huge mainly in tribal regions and in villages where quasi-feudal systems still persist. In simpler terms, money might just get snatched away from the poor. Data shows only about a third of Indians have bank accounts. Enrolling all the beneficiaries into the banking system is a huge operational challenge which might take enormous amount of time. Rushing into DCT without a truthful analysis of the actual enrollment numbers and of the timeline will only contribute to the increased rate of starvation deaths and farmer suicides.
Patriarchal society and gender power equations
While responding to a question related to DCT, eminent economist Amartya Sen noted that, DCT may hurt girls and kids. In a society like India where patriarchal power structure still exists, the authority to take financial decisions is the prerogative of males who are considered as ”head of the family”. Cash can be easily used for wrong priorities like addictions. Even if that might not be the case, we have no way to believe that with the existing gender inequalities in place, resources will be equally divided in the family. Already there are enough empirical evidences to suggest that malnutrition among girl children and females is much higher than the boys and adult males
1  . We have every reason to believe that replacing direct distribution of food with cash transfer will worsen the malnutrition figures among girl children and women.
Forced participation of poor in unregulated open markets
In India, food inflation figures are high due to several reasons ranging from artificial shortages to agricultural crises to government policies. It is of no doubt that there will be a time lag for actual money to get reflected in the beneficiary account in case of inflation. Looking at the past experiences, we can easily assume that these time lags can be notoriously long. This is going to create an enormous damage to the nutritional intake of the urban and rural poor who literally live a hand to mouth existence. The poor eventually have to borrow money from local money sharks to buy food and fuel. By forcing poor to buy food from open markets (supermarkets in urban areas where kirana shops are becoming non-existent) at highly inflated prices, the government is pushing poor into an endless debt abyss.
Adverse Effects
There are so many adverse effects of DCT, like price rise of the essential goods and potential unemployment of government fair price shop employees which are not discussed in this article but are also of immense concern. The neo-liberal ideologues have been urging the government to withdraw from the social security measures in a timely manner and have been declaring that the government’s job is to just act as an enabler of conducive business environment. The Government of India happily echoes these sentiments. The very argument that public distribution of food is not effective is not valid. We have several successful models like one that exists in Kerala
2   and Tamil Nadu which has a highly efficient public distribution system for food, kerosene and even for essential drugs.
References
1. Kaur, I. P. and Kaur, S. A Comparison of Nutritional Profile and Prevalence of Anemia
among Rural Girls and Boys, Journal of Exercise Science and Physiotherapy, 2011, 7 (1), 11-18
2 K. P. Kannan, Declining Incidence of Rural Poverty in Kerala, Economic and Political Weekly, 1995, 30, 2651-2662
Disclaimer: The views expressed here are the author's personal views, and do not necessarily represent the views of Newsclick

3449 - Easy to abuse cash assistance in NYS

Unclear how many tax dollars used inappropriately
Updated: Friday, 21 Jun 2013, 6:26 PM EDT
Published : Friday, 21 Jun 2013, 6:21 PM EDT
ALBANY, N.Y. (WIVB) - The State Senate wants to end the ability of those on welfare who receive cash assistance to use that money to pay for things like lottery tickets, cigarettes gambling, strip clubs, drugs and alcohol.
The money comes from your tax dollars and is withdrawn from EBT (Electronic Benefit Transfer) cards. But some lawmakers to do not support a proposed law that would restrict how that money can be used.

EBT cards are loaded up each month with benefits, including those for food stamps and Medicaid. Food stamps are tightly regulated by the federal government and the EBT cards are used much like a debit card, allowing officials to see how the money is spent. But in New York State, cash assistance, which comes from Medicaid, can be used for just about anything once it's withdrawn from an EBT card.

Most of the cash assistance is used the way its supposed to be - on food, like at the Broadway Market, or on rent, utility payments, and the like. Shopkeepers at the Broadway Market gladly accept the cards. But many do not agree with cash assistance being used to pay for beer, lottery tickets, or cigarettes.

Scott MacCallum, who works at Camellia's Meats, says, "It is something you just should not do. That money is there provided for food stamps, and it should not be provided for anything else, other than that."

The problem is, in New York, food stamp recipients who also receive cash assistance can withdraw that money from their EBT card and use it on just about anything - even strip clubs or drugs.

Senator Mark Grisanti said, "The money on those cards are being used to buy alcohol, tobacco, lottery tickets. They are being used at the casino, lap dances."
State lawmakers are trying stop that with the Public Assistance Integrity Act and limit the use of cash assistance to general necessities.

"The cash money is supposed to be used to pay your electric bill, your gas bill, your rent, buy clothing, buy toilet paper," Sen. Grisanti argued.

Lawmakers in the State Senate have passed measures in the last two years that would crack down on abuse of cash assistance. Last year, that bill died in the Assembly, and this year it could meet the same fate.

Critics of the measure, mostly downstate Democrats, say limiting what someone on public assistance can buy reduces them to second class citizens. But even if the bill passes, it would only prevent someone with an EBT card from withdrawing cash assistance inside liquor stores, casinos and any "adult-oriented" entertainment facilities, which means all a welfare recipient would need to do is stop at another ATM before visiting one of those establishments and using their cash assistance.

If the state doesn't act by February, New York stands to lose $120 million in federal funding.

Right now, the Senate is working with banks to develop technology that would block the purchases of non-essentials when a social services debit card is used at the point of sale. Monitoring cash withdrawals from ATMs will be tougher.
The Assembly is considering restricting the use of cash by regulation through the Office of Temporary Disability Assistance. After that, a spokesman for Assembly Speaker Sheldon Silver says the Assembly will consider legislation.
Republicans speculate as much as $4 million in cash assistance is used inappropriately, largely because it is withdrawn between the hours of midnight and 6 a.m., when they argue it is unlikely recipients will be using the money for groceries or to pay bills.


Copyright WIVB.com

Monday, June 24, 2013

3448 - RFID CHIP & NATIONAL ID Coming - You Tube


RFID CHIP & NATIONAL ID Coming 
March 23, 2013 Ron Paul warns


3447 - Aadhaar number must for teaching, non-teaching staff - Business Standard

Press Trust of India  |  Mumbai  June 20, 2013 Last Updated at 21:55 IST


Maharashtra government today said it would be mandatory for teaching and non-teaching employees in the state to possess an Aadhaar card to draw their salaries from August.

"UID number is mandatory for teaching and non-teaching employees to draw their monthly salaries," Chief Minister Prithviraj Chavan was quoted as saying in a press statement issued here.

Chavan held a review meeting on Aadhaar card registration at his residence, which was attended by UIDAI Chairman Nandan Nilekani, chief secretary of Maharashtra J K Banthia and other senior officials of the state government.

"Speedy registration procedures are on to avail the Aadhaar card. UID number is mandatory for the government employees, college students availing scholarships," Chavan said.

Nilekani expressed satisfaction over UID registration process in the state and said a report in this regard will be submitted to the central government, it said.


Economic Times
"Speedy registration procedures are on to avail the Aadhaar card. UID number is mandatory for the government employees, college students availing ...
Jagran Josh
The Chief Minister of the Maharashtra Prithviraj Chavan quoted “UID number ... review meet held on Aadhaar Card Registration between the Chief Minister with ...
Press Trust of India
... the state to possess an Aadhaar card to draw their salaries from August. "UID number is mandatory for teaching and non-teaching employees to draw their ...

3446 - The spook department - Asianage

Jun 22, 2013


With the wall between government and private sector collapsing, our problems are compounded. India does not have laws to protect either data or our privacy.

There is public outrage in the United States because the government seems to have crossed the boundary of acceptable data collection. It started with Edward Snowden, a government official, leaking details of PRISM, an operation by which most of the global Internet technology companies in the US — including Facebook, Google, Yahoo, Microsoft, Skype and YouTube — handed over user information to the National Security Agency (NSA).

If true, this could be one of the biggest surveillance operations in history. It promptly slammed the panic button even in a society that has become increasingly tolerant of government surveillance in an age of terrorism. The government clarified that everything was legal and only targeted at “foreigners” as possible terror suspects, that the rights, freedoms and privacy of American citizens were unharmed. The tech companies denied that there was automatic or large-scale data transfers. Facebook, Yahoo, Microsoft and Apple gave out details of how many requests they had had for user data information and how these were generally related to criminal cases. The user could relax, they insisted, their personal information was safe, their privacy was respected.
Yet the outrage continued. the New York Times has now highlighted the ties between the Silicon Valley and the “spy agency” NSA, underlining the “deep connections” between the two. The fact that Max Kelly, the chief security officer for Facebook responsible for protecting the data of its billion-plus users had left FB in 2010 to join the NSA was suddenly headline news today as proof of the nexus between Silicon Valley and the government’s spook department. American civil society — in spite of its tendency to accommodate security measures that “fight terror” — was very concerned.

The NSA’s interest in the Silicon Valley was understandable. Where information is power data is kingmaker. The amount of private data Silicon Valley has is amazing, and in an age of data mining it is heaven for commercial companies forever seeking information on consumers in order to ensnare them better. And when “security” is a magic word that quietly opens doors to a surveillance society, it is equally natural for the NSA to cosy up to the treasure trove in the Valley. Besides, on top of the raw data, the Silicon Valley also has sophisticated software that can analyse it. No wonder the NSA is so interested in a long and meaningful relationship. And no wonder the public — especially the media — is outraged.

We have seen this quiet convergence between government and commercial interests closer home. In India, with the Unique Identity (UID) number or Aadhaar project the boundary between government operations and private enterprise has blurred dangerously in the area of data collection. And there has been no outrage from the media, no flurry of concern from civil society, no panic — in spite of repeated warnings from worried experts and activists.
The Indian government uses its authority to collect personal data from its citizens and hands it all over to the Unique Identity Authority of India (UIDAI). For example, I went to get myself registered with the National Population Register (NPR), which is compulsory for all citizens. I specified, with the strict and repetitive enthusiasm of retired school teachers, that I did not want an Aadhaar number. Just the NPR, thank you. No UID, okay? Okay, okay, they said. Just look through here and give me your finger… And voila! I instantly got an Aadhaar number! The NPR data is automatically shared with the UID. And then, the data, by some peculiar logic, becomes the property of the UIDAI. The UIDAI can thereafter sell that data or share it with anyone they choose.
This may lead you to believe that the UIDAI is a rather peculiar government entity. Not so. Contrary to popular belief, the UIDAI is not a government entity at all. There was no democratic process behind it. There is no new law for it. In fact, when a couple of years after arbitrarily starting the UID process the government finally got around to drafting a Bill to convert the UIDAI into a statutory authority, it was unambiguously rejected by the Parliamentary Standing Committee on Finance, which examined it. Never mind. The UID project is elbowing its way through our fast eroding democracy without Parliament’s approval. And costing the national exchequer a bomb. After which, the UIDAI will not have any of the accountability issues that a government agency born and nurtured on tax payers’ money has. It will be a business enterprise bowing to – or winking at – only company laws.
Once the UIDAI has all its demographic and biometric data and processes in order it would swiftly cut the governmental umbilical cord and spring forth as a commercial body. Working for profit, it would offer identity authentication as a paid service to both private and government agencies. It will make money every time someone wants a gas or a telephone connection, a bank account, a PAN card, a passport, a credit card or whatever. The government will then have to buy its services.

Similarly, there are other data collating entities linked to the UID like the National Information Utilities (NIUs) that would be set up, fed, funded and nurtured by the government till they become self-sustaining, at which point the government would become their paying customer. NIUs will privatise government databases and, like the UID, will thereafter own that government data and use it for profit.

So what’s wrong with this fond sharing of personal data between the government and the born-to-be-commercial entities it creates? Just that unlike commercial companies, the government is supposed to protect the information on its citizens and not use it for its own benefit. There is a certain trust involved. Giving out the information to commercial companies is a breach of trust. It violates the citizen’s right to privacy. And it can lead to enormous harm.

With the wall between government and private sector collapsing imperceptibly, our problems are compounded. Especially since India does not have specific laws to protect either data or our privacy. Data mining is the new power tool, and both government and private businesses are likely to use data like never before. Now government accountability is low, and we cannot be sure that all this detailed information — say on caste or religious identities — would not be used for political purposes to harm certain communities and thereby harm our democracy. And once the government hands over the data to private enterprise there is no state accountability, and information on Indian citizens may be used by any paying customer for their own purposes.

Besides, government has no qualms about surveillance. Like the US we too need to “fight terror” and would happily overrule citizen’s rights for it. Unlike the US, our civil society seems unperturbed by the possibility. Or by the irresponsible sharing of personal data by government and the private sector that can wipe out the democratic freedoms guaranteed by our Constitution.
The writer is editor of The Little Magazine.


Sunday, June 23, 2013

3445 - Edward Snowden's Wake Up Call: Cyber Security, Surveillance And Democracy By S.G.Vombatkere - Counter Currents


By S.G.Vombatkere
21 June, 2013
Countercurrents.org

Edward Snowden, in his courageous, principled expose, has brought out how USA's National Security Agency (NSA) has been spying on most nations in the world. This spying is clearly to establish or strengthen USA's political, economic and military global clout. India is the fifth-most spied-upon nation, even more than China and Russia. Considering that India is USA's strategic partner, spying on India is breach of faith. Iran tops the list (14 billion pieces of intelligence); then come Pakistan (13.5 billion), Jordan (12.7 billion), Egypt (7.6 billion), and India (6.3 billion). [Ref.1] It is piquant that India, USA's strategic partner, is in the “club” of Iran, Pakistan, Jordan and Egypt, where USA perceives “threat” to its global hegemony. USA has other strategic partners and doubtless they too are being spied upon, and many national leaders, notably of Turkey, Germany and Russia, have raised serious objections. But India is USA's junior and subservient strategic partner due to the long-term, built-in subservience of India's political and bureaucratic architects of the strategic alliance.

There has been no official Indian protest and there is unlikely to be even a squeak on this sovereignty issue. However, people's voices have been raised, especially from within USA, against USA's presidentially-sanctioned, global electronic spying and surveillance. These voices are directed simultaneously at demanding recognition and protection of individual privacy rights, calling for accountability and transparency of U.S presidential and Congress decisions, and attempting to influence USA to pardon whistleblower Edward Snowden who is still in hiding.

Snowden's expose on the heels of the commencement of the trial of that other courageous and righteous prisoner-of-conscience whistleblower Bradley Manning, is a grievous blow to the pride of NSA and the U.S establishment. Thus these whistleblowers are “traitors” who need to be punished severely because they have weakened USA against its “enemies”, self-created and self-imagined. Added to the list of “traitors” are the courageous people in The Guardian and Washington Post, like Laura Poitras and Glenn Greenwald, who actually brought Snowden's leaked information to public glare. It is now clearer than ever before that USA's official enemy is not this country or that, not Al Qaeda or Taliban, not this religion or that, but the spread of peace and real democracy, and the demands for human and civic rights, all of which threaten the pre-eminence of the military-industrial complex MNCs which run USA from behind a teflon curtain.

Like all colonial powers of the past, this pre-eminence is based heavily on political, economic and military intelligence. In modern times it calls for surveillance and access to data and information from within and outside USA. Thus, U.S intelligence agencies would be particularly interested to access databases of various kinds, and real-time data as it is being created by land, ocean, aerial and space surveillance devices. With the kind of super-computing capability, global intelligence experience, and unparalleled military power and reach that USA possesses, this collated intelligence can be used for hegemonic aims. These are stated in the Project for a New American Century (PNAC) created in 1997 by a group of conservative American politicians, academics and policy brokers. PNAC aims to “shape a new century favourable to American principles and interests” and “make the case and rally support for American global leadership” [Ref.2].

Thus it is the business of every country to protect its databases from hackers, sleuths, mercenary spies and intelligence agents, who try to obtain intelligence by one or more of several fair or foul means.

System and data security
The damage that can be wreaked by deliberate corruption or destruction of programs or data, or lifting of data without the knowledge of the rightful owner of the data, by illegal access into the operating system is enormous. For example, if the computer system of Indian Railways is tampered with, goods and passenger trains across the country can be brought to a halt, causing huge economic loss, with heightened accident risk. Or if, like NSA's Stuxnet program destroyed Iran's nuclear enrichment centrifuges, our nuclear power plants' systems are broken into, it can result in a nuclear disaster. Government of India (GoI) has listed“the civil aviation sector (ATC), railway passenger reservation system and communication network, port management, companies and organizations in power, oil and natural gas sectors, banking and finance and telecom sectors” as critical, apart from certain “strategic government departments such as space (ISRO), External Affairs Ministry (passport database), the Home Ministry's police and intelligence networks,.... the Prime Minister's Office (PMO), the NSCS and the Cabinet Secretariat”. [Ref.3].
Security of government data and data concerning its citizens is vital for any government. Government and private intelligence agencies (the services of the latter purchasable by the highest bidder) are engaged in acquiring or “mining” information from their own country and from other countries which are competitors in the political, economic or military senses. It is standard security practice, for instance, that computers which are connected to the internet are not connected with the LAN, so that there is no access to the system through the internet. Other security measures are physical security to ensure that data is not tampered with or copied by individuals who work within the system or obtain physical access to the system. However, for systems which are necessarily connected to the internet for their functioning (e.g., internet banking), it is a mere combination of motivation – money, display of capability, ideology, etc – and time-on-the-job, for an experienced hacker to crack firewall codes and find passwords to gain access to programs and data. This has been demonstrated by hackers, detected and punished or not, who have broken into systems as varied as banks, strategic, military, scientific, technical or industrial databases around the world. Another method is to plant viruses or clandestinely embed special-purpose hardware and software into commercially supplied hardware devices and software systems to transmit data that passes through the system. Routinely, firewalls to prevent unauthorized access into systems, regular change of passwords at all levels within the system, and restricting physical access to system terminals are time-tested methods for system and data security.

Rudderless national security ?
It is known that GoI intelligence or infotech agencies have not indigenously created, tested and certified a firewall for system and database security. The GoI firewalls in use are purchased commercially from international infotech vendors. It is no big deal for an employee of an infotech corporation which has designed GoI's firewalls, to part with key information for personal gain, to any person or intelligence agency who wants to break into GoI systems without even being observed.

India's apex security body, the National Security Council (NSC), admits that India's cyber security strength is “grossly inadequate to handle cyber security activities in a meaningful and effective manner”. Therefore, “Now, India is also setting up its own 'cyber security architecture' that will comprise the National Cyber Coordination Centre (NCCC), ... the Cyber Operation Centre, ... and National Critical Information Infrastructure Protection Centre (NCIIPC) ...”. [Ref.3]. This pathetic admission, clearly after exposure of NSA's spying success with India as a preferred target, indicates institutional failure of India's intelligence organizations, and worse, failure of NSC itself to comprehend strategic imperatives. If this is considered an unduly harsh statement, consider that in 15 years of its existence, NSC, headed by none less than the Prime Minister of India, has not brought out a national security strategic document. NSC's post-Snowden awakening to India's gross inadequacy in cyber security appears to be a knee-jerk reaction rather than part of a strategic plan.

Corporations in intelligence and surveillance
One of India's premier science institutions, The Indian Institute of Science (IISc), Bangalore, signed an agreement with Huawei Technologies Corporation, to set up a telecom laboratory. The data that Huawei would have access to, would not only be that of IISc research but also of its projects financed by GoI, and access through internet and other means to the GoI agencies with which IISc has data exchange and correspondence. Since Huawei has close links with the Chinese government, the Indian intelligence community expressed disapproval of this transaction, obviously because data security was a concern.
However, according to the Unique ID Authority of India website (UIDAI is the creator of India's grandiose national information infrastructure “Aadhaar”), several U.S firms have been awarded contracts to provide goods and services to implement the Aadhaar project. For example, Ernst & Young was contracted for setting up UIDAI's Central ID Data Repository (CIDR), and L-1 Identity Solutions Inc., a U.S-based intelligence and surveillance corporation, for technical support and biometric capture devices. Also, Accenture Services Pvt Ltd which works with U.S Homeland Security, was contracted for implementation of biometric solution. Thus, U.S firms with known links to U.S intelligence are in a position where they can directly or indirectly, by contract or clandestinely, access India's national database owned and operated by UIDAI.

Surely this was known to data system designers in UIDAI and to India's intelligence organizations. Also surely known is the fact that U.S legislation makes it mandatory for U.S firms to provide to the U.S administration on demand, any or all data or information that they may acquire in the course of their operations. Thus, the fact that the Indian intelligence community was strangely silent on the UIDAI contracts, leads an impartial observer to view this as another sign of India's subservience to U.S diktat, not necessarily unconnected with corruption at some individual level. Whatever the reason for this, there can be no excuse for compromising India's data security.
India also imports electronic hardware from China (e.g. data routers, which handle data within networks), Japan and South Korea, which is used in government departments. There is little if any systemic method by which these hardware devices with embedded software can be checked for their ability to access the data which they are only meant to handle.

Enabling U.S cyber hegemony
Linked with Snowden's expose is the report that U.S president Obama has authorized drawing up a list of potential targets for Offensive Cyber Effects Operations (OCEO), to advance “U.S national objectives around the world”. This could be in pursuance of the PNAC. An intelligence source with extensive knowledge of NSA's systems told the Guardian, that with both defensive and offensive cyber operations being central to U.S strategy, “ ... America had participated in offensive cyber operations and widespread hacking – breaking into foreign computer systems to mine information”. OCEO by the U.S military is also very much on the table. [Ref.4]. Thus the hegemonic cyber-power of USA in political, economic and military spaces is frighteningly real.
UIDAI's Aadhaar program aims to provide a unique identity to all Indian residents including non-citizens, by providing a unique 12-digit number based upon biometric records of every individual, to form India's flagship database. The Aadhaar number will be used by various government, quasi-government and non-government systems across India to establish the identity of any person who wishes to receive a service or derive benefit from it. Breaking into the Aadhaar database can provide an individual's primary personal data (e.g., biometrics, name, age, sex, relation, address, mobile number, bank account, etc), thus violating his/her privacy. [Ref.5].

Thus, access into UIDAI's CIDR and associated programs due to UIDAI's contracts, provides reach into personal information of all India's residents. Compromising an individual’s personal data affects only that person, but when the personal data of many millions of people is involved, there is potential for all kinds of use of data for corporate gain or for misuse for profiling people on the basis of caste, religion, language, etc. This would be an unmitigated national disaster not merely because of loss of security and the resulting disgrace, but also because it will effectively allow foreign control of India's flagship database.

The Indian establishment may publicly rubbish the foregoing, but that is only to be expected from a political-bureaucratic-intelligence set-up that has possibly colluded to award sensitive contracts concerning India's strategic interests to U.S corporations specializing in intelligence and surveillance. This is not to suggest that USA will launch offensive cyber operations against its strategic partner, but to point out that with the strategic upper hand, USA will be in a position to dictate policy and action to India, exacerbating its subservience besides compromising sovereignty. That the U.S military, already organized into six commands that straddle the globe [Ref.6] has expanded its Cyber Command, should sound alarm bells in the Indian military, unless the canker of subservience has affected it too.

Ownership of databases
Data is the new property. An executive notification of the Planning Commission dated January 28, 2009, stated among other things, that UIDAI “shall own and operate” the Aadhaar database. [Ref.7]. The Technical Advisory Group for Unique Projects (TAG-UP) chaired by UIDAI Chairman Nandan Nilekani, envisages formation of National Information Utilities (NIUs) which would be “private companies with a public purpose: profit-making, not profit maximising”, with at least 51% private ownership and at least 26% government shares. TAG-UP envisages that when the Aadhaar system attains a “steady state”, the database will be taken over by a NIU and government, which set up the Aadhaar system at enormous public cost, will take the role of a “paying customer”. Indeed, the TAG-UP states, “Once the rollout is completed, the government’s role shifts to that of a customer“.

Apart from the sheer audacity of TAG-UP's proposal of government funding the start-up of private companies, the data-security risks of private companies owning and handling strategic databases appears to have been overlooked. Data security of Indian citizens and other residents would be compromised, simplifying the task for NSA. Purchasing the desired data from an entity which has it or has access to it, is so much more elegant, risk-free and cheaper that hacking into a system! This is not to suggest that only USA (through its NSA, CIA and FBI) would be interested in hacking into India's critical information infrastructures. Surely China, Pakistan, Russia, Israel, Britain, France, Iran, Bangladesh, Sri Lanka and Myanmar at the very least, would have reasons to obtain data and information from India for political, economic and military purposes.

Impending death of democracy
India's new Centralized Monitoring System (CMS) has, like UIDAI before it, been created by executive fiat. CMS is a wide-ranging surveillance programme that will give its security agencies the ability to tap directly into e-mails and phone calls without oversight by courts or parliament. Security agencies will not need to seek a court order for surveillance. CMS will provide government unfettered access to all landline and mobile phone calls (900 million subscribers), SMSs, e-mails, web browsing (120 million internet users), video-conferencing, multi-media streaming and even video games. [Ref.8]. This has been planned and put into place without any legal safeguards and procedures concerning who or what will be surveilled, who will authorise surveillance, the period of surveillance, etc. In typical obfuscation, junior minister for Information Technology, Mr.Milind Deora, said the new data collection system would actually improve citizens' privacy because telecommunications companies would no longer be directly involved in the surveillance - only government officials would.

The purpose of UIDAI's Aadhaar project was stated to be reaching government benefits and programs to the poor by direct benefit transfer (DBT). If that was indeed so, then there was no need to coercively enrol the non-poor into Aadhaar as has been done, and to link up rights like salary and pension to the Aadhaar number. Thus, with plans to hand over strategic databases to private entities (NIUs), there is little doubt that UIDAI's Aadhaar project will be an enabler in the CMS plan. The doubt is only whether it was planned to be the enabler, to facilitate surveillance.

The operationalization of CMS together with UIDAI's Aadhaar operating in corporate (NIU) hands will make India into a police state under unfettered capitalism of corporate control. The power of the people by electing representatives to legislatures will be meaningless as legislators are themselves corporate honchos or increasingly under the influence of corporates. Those who are not, will be silenced with information obtained by CMS investigation.
The strategic subservience of India to USA and the latter's PRISM, will ensure that India's chief executive (prime minister) will toe the U.S line, not unlike USA's imposition of dictators in the countries of South America in the 1970s and 1980s. This was done to impose neo-liberal economic policies according to Milton Friedman, through political shock doctrine methods. These include harassing, arresting or “disappearing” dissenters, objectors, political opponents, trade union leaders, whistleblowers, intellectuals, and all those who are foolish or courageous enough to demand social justice, equity and democracy, because locating and targetting them through Aadhaar and CMS will be child's play. [Ref.9].

References
1. Tom Engelhardt; “The Making of a Global Security State”; <http://www.countercurrents.org/engelhardt180613.htm>; Countercurrents.org; June 18, 2013.
2. Zia Mian, “America's Time and Place”; Economic & Political Weekly; Vol.XL, No.16, April 16, 2005.
3. Sandeep Joshi; “Waking up now, India to up cyber security strength”; The Hindu, Bangalore, June 19, 2013, p.14.
4. “Obama orders US to draw up overseas target list for cyber-attacks”; The Guardian; <http://www.guardian.co.uk/world/2013/jun/07/obama-china-targets-cyber-overseas>; June 9, 2013.
5. Indulekha Aravind; “Criminals will be able to crack UID system easily: Jacob Appelbaum”; <http://www.business-standard.com/article/economy-policy/criminals-will-be-able-to-crack-uid-system-easily-jacob-appelbaum-113053100728_1.html>; Business Standard, Bangalore, June 1, 2013.
6. Vombatkere, S.G., “The US War Machine – Yesterday, Today and Tomorrow”, Mainstream, New Delhi, Vol XLVIII No 17, April 17, 2010, p.25-30.
7. Usha Ramanathan; “Your data, going on sale soon”; <http://www.thehindu.com/opinion/op-ed/your-data-going-on-sale-soon/article4733606.ece>; The Hindu; May 13, 2013.
8. Shalini Singh; “India's surveillance project may be as lethal as PRISM”; The Hindu; June 21, 2013; p.1.
9. Naomi Klein; “The Shock Doctrine: The Rise of Disaster Capitalism”; Random House, Toronto, 2007.


Major General S.G. Vombatkere retired as the Additional Director General, Discipline & Vigilance in Army HQ, New Delhi. The President of India awarded him the Visishta Seva Medal in 1993 for distinguished service rendered over 5 years in Ladakh. He holds a PhD degree in Structural Dynamics from IIT, Madras. He is Adjunct Associate Professor of the University of Iowa, USA, and is a member of NAPM and PUCL. He writes on strategic and development-related issues.: Email: sg9kere@live.com