8/12/2019 Playing the Identity Card
1/28
Playing the Identity
Card
Mohit Gupta
8/12/2019 Playing the Identity Card
2/28
Introduction 3
National Identity Systems 6
UIDAI 8
Brief History of the Indian National Identification System 9
Identity, Identification and Mediation 12
The Card Cartel 15
Conclusion 19
Appendix I: Understanding a National Identification System 21
Endnotes 26
2
8/12/2019 Playing the Identity Card
3/28
Introduction
The Unique Identification Authority of India (UIDAI), was created under the Plan-
ning Commission to develop and implement the necessary institutional, technical and
legal infrastructure to issue unique identity numbers to Indian residents. (UIDAI) The
project, aimed at providing and managing unique IDs to more than 1.2 billion residents
in India at an initial investment of close to $23 million in 2009-2010 is an huge under-
taking by any standards. It is this unprecedented scale and the rapid progress of the pro-
ject, that have invited the attention of the mainstream media, bloggers and academics.
Many titles of being the first or the largest are often discussed in relation to the project.
It is the first large scale biometric identification system in the world, and if successful
will be one of the largest database of individuals ever collected.
The scale and scope of the project has led to a flurry of activity by Indian bloggers,
discussing various aspects of the project with a mix of celebration, confusion and fear.
Since the project was launched in January 2009, it has been actively debated in schol-
arly journals in India, and some have identified it an opportunity for opening up debates
around state-citizen relationship in India (Maringanti 2009; Shukla 2010). Newspapers
closely follow the project, with popular dailies publishing stories about most of the new
reports published by the UIDAI. Even though the discussions have ranged from celebra-
tions around Indias technical prowess to the relevance of post-structuralist analysis in
modern India, there seems to be gaps when one tries to look at the purpose and history
of the project. This paper is an attempt to join in these myriad discussions around the
3
8/12/2019 Playing the Identity Card
4/28
UIDAI with a by connecting together dots from the history of the project, global discus-
sions on national identity systems and concerns expressed by academics and bloggers.
Identification and accounting of citizens is an integral part of modern states. The
process of authenticating identity is essential to the functioning of not only the nation-
state, but also for most interactions with private institutions. Entering a workplace,
travel, accessing a bank account, access to health services or just passing through a toll
booth rely on some kind of ID. In recent years, more of these transactions are based on
some kind of identification card. The cards however, are only the tangible edges of iden-
tity management systems and databases underlying such systems. These systems store
identity information to authenticate (check to see if you are who you say you are), col-
lect information about usage, and often responsible for just-in-time decisions about ac-
cess. Using pre-defined rules these systems are often responsible for sorting people into
categories to ensure the delivery of access to the some individuals and denying services
to others. In essence, processes for authenticatingusers and citizens are not new, they
have been essential for managing access for large groups of people. There are however,
some significant differences in contemporary identification systems due to develop-
ments in technology. These systems, motivated by immigration control, anti-terrorism,
electronic government, or delivery of social services are being debated in many countries
around the world (Lyon and Bennett 2008). Development of these systems involves a
complex mix of organizational structures, policies and technical infrastructure unique to
each implementation. They are shaped by differences in political climate, history of us-
ing identification systems, state-citizen relationships and cultures. Even though various
theoretical discussions and learnings from the experiences of setting up identification
4
8/12/2019 Playing the Identity Card
5/28
systems can be extremely instructive towards the understanding and analysis globally
the complex mix of social, cultural and political histories ecologies of each system can
not be ignored.
The UIDAI is unique amongst the many systems that are being developed globally as
it focusses primarily on authentication, without making clear the direct use for identifi-
cation, or the form in which the identification number will be distributed. This has
meant that there in an increased focus and discussion around the collection, storage and
management of authentication data, but obscures the purpose(s) and implications. Cou-
pled with the many changes in the way the system is presented to the media, it makes it
important to look at the history of the project, and the big events (Lyon and Bennett
2008) that have pushed it forward. Unlike some discussions around the project that fo-
cus on analyzing the benefits or faults of the project, my focus is to try and map out spe-
cific aspects of the project, especially its history. The belief is that looking at the UIDAIs
history in light of studies of national identification systems and case studies of other
large scale digitization and identification project can provide a more complete picture of
the project. It is also important to understand the various stakeholders in the project. By
disconnecting itself from the actual delivery of cards and services, the UIDAI does not
have to speak about the processes of identification involved, but only the technical de-
tails of authentication. Looking at the history could help trace the interests of various
groups that have invested in the system.
Impacts and implications of efforts at the scale of the UIDAI are extremely hard to
predict. To label the effort as something that would bring harm to all minorities, or to
5
8/12/2019 Playing the Identity Card
6/28
argue that it would result in broad surveillance and loss of privacy is more distracting
than useful. It does not mean, however that the project will automatically empower the
poor, alleviate issues of delivering social services and strengthen security (Maringanti
2009). It is a large administrative and technology regime of identity control and man-
agement, requiring a complicated series of social and policy issues. Identification sys-
tems are not necessarily bad, but they are also not neutral(Lyon 2009). Their scope
and reach demands an exploration of their histories, and the political and social condi-
tions that have shaped decisions. Hopefully this paper will contribute towards creating a
platform for further discussion around the UIDAI project, and identification systems in
developing regions.
National Identity Systems
Though systems of identification have a long history in the modern world, new pres-
sures have led to a marked increase in discussions about creating technological systems
to support authentication and identity management. Motivations around increasing
administrative efficiencies through e-governance and security imperatives coupled with
the need for authentication in commercial spheres such as banking and credit have
played an important part towards this. Contemporary identity systems that employ em-
bedded microchips, biometrics and other machine readable systems (e.g. RFID) con-
nected to centralized databases result in new possibilities for identification and tracking.
Automated systems allow a much expanded and pervasive organizational access to citi-
zen data, streamlining not only access to services, but also allowing for increased sur-
veillance. Capabilities of these new systems also go beyond authentication and identifi-
6
8/12/2019 Playing the Identity Card
7/28
cation to greatly reducing the cost of social sortingor the process of dividing those reg-
istered into different categories. Though these categories are required for increased effi-
ciencies towards providing services such as health services access and employment, they
can put certain groups at a disadvantage almost as much (and maybe more) as those
who are not included. National systems also require large personnel and financial costs,
which could not only divert attention from other efforts but also lead to financial trans-
actions around technology development and standards.
As outlined above, the impacts of national identity systems are almost always
broader than the proposed requirements and needs for a national identity system. It is
important to emphasize again, that even though these systems might bring about gov-
ernance efficiencies, security and increased access as promised, there are larger politi-
cal, social and organizational impacts that need to be considered.
Given that these systems are complex, multi faceted and uniquely designed and de-
veloped for each context, they present various issues when trying to get a comprehen-
sive picture. As part of my own process of trying to explore the Indian National Identity
System, I referred to various works that have focussed both specifically on individual
aspects and more general descriptions. Outlining the various aspects that allow for get-
ting more holistic sense of ID projects provides a basis for pulling out certain aspects in
discussion. Of course this is not meant to be a complete set of questions, but those that
have driven the understanding of the UIDAI in this paper. Bennett and Lyon, in their
publications that have looked at surveillance and identification globally, publications in
the Electronic and Political Weekly on the UIDAI and publications by the Committee on
7
8/12/2019 Playing the Identity Card
8/28
Authentication Technologies and Their Privacy Implications have informed these ques-
tions (Lyon and Bennett 2008, 2009; Maringanti 2009; Shukla 2010; Kent and Millett
2002, 2003). For details see Appendix I.
UIDAI
The centralized UIDAI effort towards addressing issues relating to identity comes
after the failure of various government departments aiming to provide identity cards to
citizens. Passports by the Home Ministry, PAN (permanent account number) through
the Income-Tax Department and the voter identity card issued by the election commis-
sion, are all aimed at simplifying their specific interactions with citizens. It is expected
that the UIDAI will aim to evolve an ecosystem (and architecture) to support creation,
verification and management of identity for the entire Indian population.
The UIDAI has expressed in its draft reports that they are primarily concerned with
the issuing of identity numbers, verification of data and management of the technical
and institutional aspects of data related to the unique identifier. It is not directly re-
sponsible for the issuing of identity cards, ..the authoritys role is limited to issuing the
number. This number may be printed on the document/card that is issued by the Regis-
trar. (UIDAI) This is done to leverage the various governmental institutions already
setup in the country at the state, regional and local levels for distribution of cards. The
discussions around UIDAI, due to its concern with the the numbers has been limited to
technical and financial concerns. To expand the view on the UIDAI the following sec-
tions explore the history of the system, as well place possible uses in context of theoreti-
cal concerns related to other national identity systems.
8
8/12/2019 Playing the Identity Card
9/28
Recent History of Identification in India and Security Concerns
This history is primarily focussed on how security threats have coincided with
the development of the UID project. A more multifaceted account of the devel-
opment, though useful, is beyond the scope of this paper.
The Universal Identification Authority of India was officially constituted in Novem-
ber, 2008 and established in January 2009 under the aegis of the Planning Commission
of India. The UIDAI was made responsible for the developing policies, planning the im-
plementation and managing the UID (Universal Identification) scheme. The universal
identification scheme however, has a history that can be traced back at least to the be-
ginning of the 21st century. A even looser conception would allow us to trace back the
roots of biometric authentication and identification in India to the colonial times.
There have been multiple efforts by the Government of India to establish an identity
system in India to provide clear identity to residents over the last two decades since
the launch of photo-identification cards by the Election Commission in 1993. In 2003,
the government approved the Multipurpose National Identity Card, which can be seen
as the direct predecessor to the UID project. It is an extremely instructive exercise to
look at the environment that led to the approval of the MNIC project, and shifts over the
years, from the original goals.
The MNIC pilot project in 2003 was initiated on basis of a recommendation by a
Group of Ministers (GoM) report on National Security. The report itself was formed in
2000 in accordance to a directive by the Kargil Review Committee (KRC) which has
been established to look into the causes of the Kargil conflict with Pakistan. The Kargil
9
8/12/2019 Playing the Identity Card
10/28
conflicts were an extended military engagement between India and Pakistan over the
border areas in the state of Jammu and Kashmir. The conflicts involved heavy human
causalities largely attributed to insurgents supported by the Pakistani military. The KRC
report dealing with issues of Indian defense and internal security policies argued for the
issuing of identification cards to people in the border villagers. These cards, aimed to
provide identification to citizens would, according to the KRC report, allow for better
tracking of insurgents. The KRC urged that the cards be issued on a priority basis, to the
border villages and eventually be extended to areas that constantly deal with security
issues. Other areas mentioned in the report were north-east Sikkim and parts of West
Bengal, that border with China and Bangladesh respectively (Mehmood 2008, 114).
There was an attack on the Red Fort (considered a strong symbol of Indias sover-
eignty) in December 2000. This led to the launch of the first ever compilation of ten-
ants living in Delhi, by the Delhi Police. A couple of months later the GoM on National
Security submitted their report which appealed for a national registry for all Indian citi-
zens. They mentioned that non-citizens should be given visually different cards so that
nation wide identification of citizens would be facilitated. Identification cards in the
scope of this report were concerned primarily with Border Management, wherein all
but five out of the 28 states and 7 union territories were treated as a Border (Mehmood
2008, 121). MNIC, therefore was proposed as a citizen card, a feature that has been
dropped from the plans of the UIDAI because of the complexity of identifying citizen-
ship status1(Planning Commision 2007).
10
8/12/2019 Playing the Identity Card
11/28
The GoM report on National Security based the need for citizen cards on illegal im-
migration. Illegal immigration has assumed serious proportions. There should be com-
pulsory registration of citizens and non-citizens living in India. This will facilitate prepa-
ration of a national register of citizens. Controversies around the MNIC was focussed
primarily on the ambiguous and transient nature of citizenship in India as an important
issue towards the development of the MNIC (Chatterjee 2006, Mehmood 2006).2It is
interesting to note that even though citizenship status is no longer a part of the UIDAIs
mission, there was a change made in 2003 to the 1955 Citizenship Act mentioning that
the the Central Government may compulsorily register every citizen of India and issue
national identity card to him as well as maintain a National Register of Indian Citizens
and for that purpose establish a National Registration Authority. The National Popula-
tion Register also mentioned in related discussions, will be enumerated through the
2011 census in India (Chidambaram 2009).
The 2011 census itself has attracted significant attention reintroduction of casteas
one of the parameters collected, the first time after 1931. The census, which is a huge na-
tionwide exercise is expected to provide data for the UID project. Processes for collec-
tion have been modified so as to collect personal information and even biometric data
(in some cases) for the census. These changes align with the urgency of collecting identi-
fication data across the country after the November 2008 attacks in India (Chidamba-
ram 2009).
In 2001, another prominent attack on the parliament in New Delhi, had led to dis-
cussions about creating a registry of citizens. The attacks also motivated the passing of
11
8/12/2019 Playing the Identity Card
12/28
the infamous Prevention of Terrorist Activities Act (POTA) in 2002. POTA was repealed
by the current government due to pressure from human rights and civil liberty groups,
as well as publicly discussed cases of misuse. It is interesting to note though, that after
the attacks on Mumbai in November 2008 the parliament enacted the Unlawful Activi-
ties Act, which is similar to POTA. The attacks also resulted in the appointment of P.
Chidambaram as the Union Minister of Home Affairs (responsible for internal admini-
stration of the country) who was earlier the Finance Minister of India. Chidambram af-
ter appointment has spoken about increasing security preparedness, and cites the Na-
tional Population Registry and the UIDAI as important parts of the process.
Identity, Identification and Mediation
Though systems like the UIDAI are often called identity systems, they are concerned
more with identification and authentication, than with peoples identity. Since the
French revolution, nation states have depended on various kinds of identification sys-
tems to recognize the civil identity of individuals. Much research, in humanities and so-
cial sciences has focussed on the relationships between information, documentation and
governance (Caplan and Torpey 2001). Foucaults analysis has popularly explored the
processes of using technologies of enumeration and calculation towards governance
where the problem of governance is ultimately one of how to conduct the conduct of
populations in the most economic manner. (Maringanti 2009) How these systems of
governance, affect the identities of populations has been explored in depth by various
scholars (Foucault 3; Torpey 2001; Lyon 2009). These discussions highlight the rele-
vance of reducing the multiple identities of people (as parents, friend, employee etc)
12
8/12/2019 Playing the Identity Card
13/28
which are defined through changing contexts and histories to a singular number. Con-
trol over identity is further eroded through the process of defining it through the body,
using biometrics.
Introduction of the UIDAI as a singular system for identifying residents in India,
could greatly affect the relationships between the citizen and the state. Furthermore,
since the uses for the UID are disconnected from its initial implementation there are
various scenarios where residents would loose control over their identities. In particular,
a similar unintentional loss of control can be seen through the case study of Bhoomi.
The project involved digitization of land records that have led to a reduction of subjec-
tivity and the argumentative nature of previous processes. A report looking at the socie-
tal context of the project mentions that most small farmers and marginal groups find
themselves in situations where there land records have not been updated and consoli-
dated for years. Before digitization supposed inefficiencies in the system allowed mar-
ginalized groups to interact with local officials to update their records. However, with
the introduction of Bhoomi, such processes are handled centrally where excessive brib-
ery and complicated processes make it harder for certain groups to operate on their re-
cords (International Institute of Information Technology 2005).
Universal identification connects various aspects of a person over time into one im-
mutable history. The UIDAI currently structures its operations are read only, where re-
quests made to the server for authentication would only respond with a Yes or No.
Thus by restricting the amount of information that can be accessed when an authentica-
tion request is made, and having no provisions for recording such information does not
13
8/12/2019 Playing the Identity Card
14/28
impede on an individuals control over their history. This does not explain the many sys-
tems described in news and reports that would not function without tracing an indi-
viduals data. The UIDAI claims that access loans would become easier for the poor, by
ensuring identity. In practice, for financial institutions to ensure that loans are returned,
it would require aggregated financial histories of people. This is not to say, that preven-
tion of financial fraud is not an important part of extending credit access in India, but
points to some issues surrounding the disconnect between UIDAI and its uses. Fur-
thermore, the UIDAI strategy overview discusses a micro-payment architecture where
the UID-linked to a bank account would enable access for the poor. One of the actors
mediating the connections between banks and the poor are business correspondents
(e.g. self-help groups, post offices, small shops). As seen in the case of the Bhoomi pro-
ject, increased distancing of the person and their identity can create scenarios where in-
termediaries can exert additional leverage over end users.
The LSE report on the UK National Identity Cards bill explore the issue of mediation
and loss of discretion extensively in around policing and IDs. The improvements in po-
licing given conditions of mandatory possession of cards at all times, and limited track-
ing are primarily related to increase in efficiencies around stop and search. These bene-
fits however are seen in tension with increase in mediation between the police personnel
and the community. They mention that administration of order is an act of peacekeep-
ing that depends chiefly on discretion and common sense; these attributes open up a
range of possibilities for the administration of order. Maintenance of order, except with
some notable exceptions depends on the voluntary compliance of most citizens. Increase
in identification systems could lower necessary discretion that is part of peacekeeping
14
8/12/2019 Playing the Identity Card
15/28
efforts as increased surveillance of police personnel could lead to mechanistically using
available biometric identification technologies (LSE 2005). In summary, they argue that
though identification and biometric systems may increase efficiencies, it would also
change the relationship between the police and the public. Such relationships between
the community and systems of governance are extremely fluid, and broad (nationwide)
policies and rules around authentication technologies would disrupt social systems in
unpredictable ways.
The Card Cartel
"A concern with iris [scans] has been on cost. However, the current high prices
for iris technology are a result of low volume and its use in cost insensitive secu-
rity applications. Considering the large demand that will come from India for
iris devices and software, the UIDAI expects the prices for iris devices and soft-
ware will fall rapidly." Nandan Nilekani (The Economic Times 2010)
The confident statement by Nandan Nilekani, head of the UIDAI shows the huge fi-
nancial transactions that underlie the development of a national identification system.
The 2010-2011 budget has allocated $400 million for the project, and the UIDAI is ac-
tively setting standards for biometric devices and software systems. The organization
has already asked for various private entities to submit applications for developing the
software and biometric systems that are required for implementation. Recently, the UI-
DAI awarded a $6.6 million contract to MindTree, a medium-sized Hyderabad based
software company. This contract is small in comparison to the total amount of $1 bil-
lion, expected to be outsourced.
15
8/12/2019 Playing the Identity Card
16/28
In light of the financial incentives tied to national identity projects and the huge in-
crease in demand for biometric technologies, embedded microchips and other systems,
it is expected that there are many interests tied to the implementation of such systems.
Lyon has identified such economic and systemic motivations for identity systems as the
card cartel. He argues that the identity systems are no no longer be understood as inter-
actions just between the state and the citizen. We have to recognize that todays identity
cards are the product, not merely of formally constituted bodies, but of corporate enti-
ties competing for contracts to use their solutions, and also of technical standards which
shape the very architecture and the peculiar characteristics of the scheme i question
(Lyon and Bennett 2008, 11). Also as seen in the history of the UIDAI, pre-histories of
identity systems result in various expectations and pressures on design of the system.
Identity and identification are inherently social processes, that interact with the techno-
logical media they depend on. Similarly decisions around the implementation and de-
sign of an identity system is go through a political process, with unique power relations
for each case. Through the structures of organizations that support them, and the people
that make choices they are continuously shadowed by various narratives and histories.
Toropys work on identity systems makes the case that the state, through the pass-
port creates a monopoly on mobility. Tracing the history of authentication in relation to
mobility, he argues that the state, through control of mobility also manages identity
(and vice versa). By requiring identification for mobility, states make people depend on
them for identity. Furthermore, being able to identify with a state, is a often a long proc-
ess with many controls. Thus, by securing mobilities, states create a division between
the self and the other, which in various senses is essential to the very concept of a nation
16
8/12/2019 Playing the Identity Card
17/28
state. Lyons conception of the card cartelfurther expands on Toropys arguments to
recognize that the state and the citizens operate in relation to each other. In line with
Foucaults notion of governmentality, Lyon describes the state as it is constructed
through the process of interacting with the populations and organizations it seeks to
govern.
In case of the UIDAI, there are various standards and investments made by govern-
ment bodies that have experimented with the identity systems. The MNIC project, which
is still active, and sometimes in contention with the UIDAI plan had led to a huge explo-
sion in companies developing smart cards and related technologies in India. Many of
these companies, supported through contracts and partnerships with the government
are now looking for markets beyond the MNIC. Other corporations, in software and
technology support are offering their support to the UIDAI. Technology decisions made
by the UIDAI will lead to not only large revenues, but also large scale adoption in vari-
ous new and traditional areas that could shape standards. After 9/11, in the US Larry
Ellison of Oracle offered free software to the government for building a national identity
system, and similarly ex-Microsoft chief Bill Gates has mentioned publicly that Micro-
soft would support the UIDAI to build their infrastructure. The point here is not to say
that corporations are making decisions towards the development of these systems. The
examples show that there are various power relationships and invested costs that affect
the design of identity systems.
Another example to explore the various influences towards the adoption of large
scale technology systems is described by Ravi Shukla in his article about UIDAI. Shukla
17
8/12/2019 Playing the Identity Card
18/28
describes Winners work around decisions to build technology systems as one motiva-
tion for the UIDAI. Winner argues that technology is often used as a marker for pro-
gress, and combined with the celebration of technical systems creates a scenario where
socio-political issues are also interpreted as technical problems (Shukla 2010). There are
various sectors that have seen marked transformations brought about by information
and communication technologies. The rapid progress in these technologies, economic
growth, and increased attention to the technology sector as the rising star of the Indian
economy leads people to turn to technologies as a solution for any problems. Organiza-
tions such as the Department of Information Technology and commercial enterprises
are also looking to offer solutions towards fulfilling the promise of e-governance. Lastly,
pressures from security agencies and media to act decisively in response to threats fur-
ther motivate towards the development of centralized systems that promise dissolution
of issues. The UIDAIs chairperson has cautioned against people interpreting the UIDAI
as a panacea for all problems while arguing that the UID scheme will enable improve-
ments. In the mix of technological pressures, it is hard to predict the benefits of a system
that is still seen by many as an impossibility.
Additionally, the UIDAI has initiated projects around the standardization of biomet-
rics. The Committee on Biometric Standards, constituted in September, 2009 recom-
mended the use of iris scans in addition to fingerprint scans and photographs to be used
by the UIDAI. Due to apprehensions around the cost and need for iris scans, the com-
mittee released a report in May 2010 arguing that devices for iris scans can be cheaply
produced at scale. The UIDAI has been declared as the Apex body for setting standards
around biometrics and demographic data. It has released various reports describing the
18
8/12/2019 Playing the Identity Card
19/28
minimum requirements for biometrics. Organizations involved in the design and devel-
opment of biometrics technologies have a strong incentive to follow the standards re-
leased by the UIDAI. It is important to note, that the installed capacity at the scale re-
quired for the UIDAI is anticipated by the industry, and it would be increasingly difficult
to roll back on plans for biometrics. The UIDAI with its investment in biometrics will
create an environment where not only jobs and expertise in biometrics will grow, but
they will also find their way into other systems. The case for the second generation iden-
tity card for China allowed it to become the largest manufacturer of biometric devices in
the world. These installed capacities, and technology infrastructures further impose
pressures on the kinds of options that are evaluated in the future.
Conclusion
In this paper the attempt has been to look at the history of UIDAI and evaluate it in
relation to theories and concerns around other national identity systems. This paper
however, provides just a framework to start looking at the possible implications of the
UIDAI. The influential LSE report in UK and publications by the Committee on Authen-
tication Technologies and Their Privacy Implications have shown that studies around
the efficacies of national identity systems can influence both debate and popular opin-
ion. Given the scale and scope of the UIDAI effort, it is important that studies focus on
the micro and macro implications of such a system. The project is a reality, and is mov-
ing fast towards implementation, but a close look at the stakeholders and policies
around the system can influence lawmaking and controls that are built to support the
technical infrastructure.
19
8/12/2019 Playing the Identity Card
20/28
The history of the National ID system in India reveals the overlap of various interests
that have pushed the system towards implementation. Media coverage and public dis-
cussions around the project are focussed on some very specific aspects of the project.
Furthermore, the separation of the project from service delivery has meant that most
discussions around the impact of the effort are fluid, and deal primarily with the costs
and the scale of the project. A comparative look at the project in relation to similar sys-
tems in other countries reveals the various complications and issues around national
identity systems.
The UIDAI project like any other project would fundamentally change the way resi-
dents interact with the government and even with the private sector. Discussions that
focus primarily on the efficacy or validity of the project, though important should also be
supported by debates about the legal and policy framework within which the project
functions. These debates are essential to monitoring the progress of the project. It is im-
portant to outline the landscape of changes brought about by the system, and to explore
how the socio-political relationships and power structures evolve.
20
8/12/2019 Playing the Identity Card
21/28
Appendix I: Understanding a National Identification System
The most important question, which is many times only loosely identified in identi-
fication and authentication systems is the proposedpurposeof the system. Though the
reasons vary widely, studies frequently point out that the purpose of identity efforts is
only loosely defined and is often shifts constantly. Systems also differ in how they are
used by different organizations. Some are proposed towards a specific goal such as the
Social Security system in US, and others are multi-purpose like the proposed system in
UK or the UIDAI. Decisions about policy and design of the system (for e.g. the kinds of
data required, inclusiveness, and voluntariness) largely depend on the uses of the sys-
tem. In various cases, uses of identification systems grow beyond the original indented
uses - such as the use of driving licenses as proof-of-age. Such change in use can new
avenues for tracking by co-relation between different data sets, and the design of poli-
cies of the original system may no longer be secure. The addition of functions is not al-
ways organic. New systems are often built using data from existing systems, or by aggre-
gating data in different systems. Processes or laws that control the use of the system (or
card or number) in new contexts should be noted, as they greatly affect trajectories of
development. Also, the name of the project is often not indicative of its purposes. Stud-
ies around global identification schemes have shown that many such examples such as
the proposed federal Real ID programme in the US, which would build on state driving
license records. Critiques around the UIDAI argue that the database would support
stricter security and immigration controls, but is being presented primarily as a measure
for improved social services and extending the reach of financing options.
21
8/12/2019 Playing the Identity Card
22/28
Many identity systems that are not labeled as national, are used as proxies for identi-
fication. Often cited as the purpose for introducing universal identification, such cases
point towards the scope of populationsthat are covered. Questions about requirements
for requesting or being required to have register with the system, and the amount of
data collected for differing populations are important. In many scenarios the issue is
considered one of inclusiveness - will the minorities be able to get an identity, the dis-
abled, children and in case of citizens those who living outside of the country. Some-
times, however registration might focus only on the unemployed, refugees or those seek-
ing healthcare. These concerns are further complicated by the introduction of biomet-
rics, where many systems gather more and more data to deal with disabilities and work-
ing conditions as in the case of inclusion of iris scans in UK and India respectively. What
legal and policy frameworks exist for limited the use of the data, to ensure adequate con-
trol of information and protect against discrimination. How is the ID system marketed
to the population? How is the ID assigned and how can it be obtained by an individual?
People usually interact with identity systems by showing their card, or by presenting
information (from memory, through documents, or biometric) to some agent that could
be a person or a machine. How is theagents control over the informationmonitored.
Authenticating is often considered by many to be invasive, and the agent also acts as a
gatekeeper to services that can be accessed through authentication. Which choices in the
technical development, policy design and law protect the user from abuse by the agent.
This also includes issues relating to the protection of private information from agents,
and to prevent leaks of the same. Similar concerns arise around the forgery and fraudu-
lent use of the system. Is it possible for certain people to control the identity of others?
22
8/12/2019 Playing the Identity Card
23/28
How are duplicates resolved? These questions that may are shaped by the socio-political
environment, are often only dealt with at the technical level. Many systems describe the
use of biometric information as a prevention against fraud and forgery, but there are
other issues relating to the abuse of the identities of those who do not understand the
system. For instance, an analysis of the Bhoomi project in India, which is often seen as
an technical and managerial success resulting in efficiencies has pointed out such issues.
The project which involved the digitization of land records in Karnataka has in cases,
made it harder for the local poor to access land records, while making it more easily ac-
cessible to those with access to technical and financial resources. Small and medium
sized farmers, as well as marginalized groups have to increasingly depend on middle-
men to access the system. Also centralization of records has resulted in creating more
distancing from the poor, while providing more control to lobbies who can access the
state government. (International Institute of Information Technology 2005)
Along with policies and laws for protection from agents there are also issues of shar-
ing and access of data stored and collected. Is the data only accessible for verification, or
can the details of a person be accessed. Which organizations have access to the data, and
what are the costs of using the database. Is the database accessible remotely? If so, what
kinds of policies govern conditions in which a person can be authenticated. If commer-
cial and private sector can access services offered by the system, what controls are in
place to regulate their behaviors. Can organizations collect additional data from users
and co-relate the same with the unique identifiers? What kindsof queries that are al-
lowed on the data. Is analysis and mining of data allowed? These questions aboutusers
23
8/12/2019 Playing the Identity Card
24/28
of the system (as opposed to those recorded by the system)affect the kinds of aggrega-
tion, sorting and surveillance that are enabled by a national identity system.
Another salient dimension is whether it is mandatory for targeted populations. Cer-
tain systems such as those in France are mandated, where as others are voluntary. There
are however, many cases where essential services are tied to the system and registration
becomes mandatory not by policy but by use. In other cases, parts of the population that
have opted out are often treated by suspicion or have to go through alternative processes
that drastically increase cost of access. It is important to question the implications of not
having an entry in the system. The UIDAI plans to use demand for access to service as a
methodology for increasing adoption. By tying in the UID with a broad spectrum of gov-
ernment services such as the voting, food distribution and even the census, the UIDAI
hopes to be able to create a catalog of all residents in India. Voluntary registrations also
create inequities of access for those who do not posses information about registration,
the ill and the old, and the poor. These might be exactly the people who would need ac-
cess to the system (Lyon 2008). Many efforts such as the UIDAI and Chinas second-
generation identity card have developed special processes for targeting rural popula-
tions that might not be able to register through other methods.
Most systems store data for authentication, but the details of the storage and security
greatly varies. Storage can be centralized, and in control of a specific agency or aggre-
gated from different participating organizations. The storage of identifiers could also be
distributed geographically or across organizations. These decisions also affect the kinds
of access and the response times of authentication requests, which in turn change the
24
8/12/2019 Playing the Identity Card
25/28
kinds of services that can benefit from the system. Similarly, there are issues of physical
and technical security of the data.
Kent and Millet, in their report around nationwide identity systems raise various
questions relating to the kinds of data collected. What is the scope of the data that
would be gathered about individuals participating in the system and correlated with
their national identity? While colloquially it is referred to as an identification system,
implying that all the system would do is identify individuals, many proposals talk about
the ID as a key to a much larger collection of data. Would these data be identity data
only (and what is meant by identity data)? Or would other data be collected, stored,
and/or analyzed as well? With what confidence would the accuracy and quality of this
data be established and subsequently determined? (Kent and Millet, 2002)
25
8/12/2019 Playing the Identity Card
26/28
Endnotes
1.The creation of a data base of residents and assignment of a unique ID to each resident is much easier
than the creation of a data base of citizens, because of the difficulty of authentication of citizenship and
the legal implications that it may have. We are therefore focusing in the first stage on the creation of a
residents data base. (Planning Commision 2007, 5)
2.at Murshidabad, which[MNIC] failed to verify some 90 per cent of the population. Among them are
some Iranian families living in Murshidabad for 70 years. The Indian authorities think they are Iranians
and they should go back to Iran and the Iranian government believes them to be Indian.
Foucault is mentioned frequently in discussions around the relationships between technology, governance
and ethics. My understandings of governmentalityhowever, are based only on secondary sources and
through online non-academic resources. (Gary Sauer-Thompson 2004; Ali Rizvi)
26
8/12/2019 Playing the Identity Card
27/28
Bibliography
Anthropolgy at Berkeley.Globalization and Governmentality.Anthropolgy at Berkeley.
http://anthropology.berkeley.edu/gandg.html#ggoverview.
Bennett, C. J, and D. Lyon. Playing the identity card: surveillance, security and identification in global
perspective. Routledge, 2008.
Caplan, J., and J. C Torpey. Documenting individual identity: The development of state practices in the
modern world. Princeton Univ Pr, 2001.
Chatterjee, Manini. I-Day pledges: war on poverty, war on terror. The Indian Express, August 15, 2006.
http://www.indianexpress.com/printerFriendly/10639.html.
Chidambaram, P. We should have a good National Population Register by 2011-12, data of every citi-
zen, January 12, 2009.
http://www.indianexpress.com/news/we-should-have-a-good-national-population-register-by-20111
2-data-of-every-citizen/409666/0.
Department of Information Systems, LSE, L. S. E. An assessment of the UK Identity Cards Bill and its
implications : ID Cards - UK's high tech scheme is high risk (June 27, 2005).
http://eprints.lse.ac.uk/741/.
Planning Commission.Entitlement Reform For Empowering The Poor: The Integrated Smart Card
(ISC) System. Planning Commission, Government of India, January 2007.
http://planningcommission.nic.in/aboutus/committee/wrkgrp11/wg11_smtcard.pdf.
International Institute of Information Technology. Information and Communications Technologies for
Development: A Comparative Analysis of Impacts and Costs from India, July 2005.
Kent, S. T, and L. I Millett. IDsnot that easy: questions about nationwide identity systems. Natl Academy
Pr, 2002.
27
http://planningcommission.nic.in/aboutus/committee/wrkgrp11/wg11_smtcard.pdfhttp://eprints.lse.ac.uk/741/http://www.indianexpress.com/news/we-should-have-a-good-national-population-register-by-201112-data-of-every-citizen/409666/0http://www.indianexpress.com/news/we-should-have-a-good-national-population-register-by-201112-data-of-every-citizen/409666/0http://www.indianexpress.com/printerFriendly/10639.htmlhttp://anthropology.berkeley.edu/gandg.html#ggoverviewhttp://planningcommission.nic.in/aboutus/committee/wrkgrp11/wg11_smtcard.pdfhttp://planningcommission.nic.in/aboutus/committee/wrkgrp11/wg11_smtcard.pdfhttp://eprints.lse.ac.uk/741/http://eprints.lse.ac.uk/741/http://www.indianexpress.com/news/we-should-have-a-good-national-population-register-by-201112-data-of-every-citizen/409666/0http://www.indianexpress.com/news/we-should-have-a-good-national-population-register-by-201112-data-of-every-citizen/409666/0http://www.indianexpress.com/news/we-should-have-a-good-national-population-register-by-201112-data-of-every-citizen/409666/0http://www.indianexpress.com/news/we-should-have-a-good-national-population-register-by-201112-data-of-every-citizen/409666/0http://www.indianexpress.com/printerFriendly/10639.htmlhttp://www.indianexpress.com/printerFriendly/10639.htmlhttp://anthropology.berkeley.edu/gandg.html#ggoverviewhttp://anthropology.berkeley.edu/gandg.html#ggoverview8/12/2019 Playing the Identity Card
28/28
Kent, S. T, and L. I Millett. Who goes there?: authentication through the lens of privacy. Natl Academy Pr,
2003.
Lyon, D. Identifying citizens: ID cards as surveillance. Polity, 2009.
Maringanti, Anant. Sovereign State and Mobile Subjects: Politics of the UIDAI.Economic & Political
Weekly44, no. 46 (2009): 35.
Mehmood, T. India's New ID Card. Playing the identity card: surveillance, security and identification in
global perspective (2008): 112.
Mehmood, Taha. The ID-Entity Bogey. The Indian Express, August 20, 2006.
http://www.indianexpress.com/news/the-identity-bogey/10969/.
Roy, Subir. UID to empower the poor: Nilekani.Business Standard. Bangalore, September 9, 2009.
http://www.business-standard.com/india/news/uid-to-empowerpoor-nilekani/369531/.
Shukla, R. Reimagining Citizenship: Debating indias Unique identification scheme.Economic & Politi-
cal Weekly45, no. 2 (2010): 31.
Times News Network. Citizen IDs to cost Rs 1.5 lakh crore - India - The Times of India. TheTimes of
India, June 26, 2009.
http://timesofindia.indiatimes.com/India/Citizen-IDs-to-cost-Rs-15-lakh-crore/articleshow/470379
4.cms.
The Economic Times. UIDAI brings out status paper on iris scan-Software-Infotech-The Economic
Times. The Economic Times. New Delhi, May 5, 2010.
http://economictimes.indiatimes.com/infotech/software/UIDAI-brings-out-status-paper-on-iris-sca
n/articleshow/5893961.cms.
UIDAI. Ensuring Uniqueness: Collecting iris biometrics for the Unique ID Mission. Unique Identification
Authority of India, Planning Commission, Govt. of India, May 2010.
UIDAI. UIDAI Strategy Overview. Unique Identification Authority of India, Planning Commission, Govt.
of India, April 2010.
http://economictimes.indiatimes.com/infotech/software/UIDAI-brings-out-status-paper-on-iris-scan/articleshow/5893961.cmshttp://economictimes.indiatimes.com/infotech/software/UIDAI-brings-out-status-paper-on-iris-scan/articleshow/5893961.cmshttp://economictimes.indiatimes.com/infotech/software/UIDAI-brings-out-status-paper-on-iris-scan/articleshow/5893961.cmshttp://timesofindia.indiatimes.com/India/Citizen-IDs-to-cost-Rs-15-lakh-crore/articleshow/4703794.cmshttp://timesofindia.indiatimes.com/India/Citizen-IDs-to-cost-Rs-15-lakh-crore/articleshow/4703794.cmshttp://www.business-standard.com/india/news/uid-to-empowerpoor-nilekani/369531/http://www.business-standard.com/india/news/uid-to-empowerpoor-nilekani/369531/http://www.indianexpress.com/news/the-identity-bogey/10969/http://www.indianexpress.com/news/the-identity-bogey/10969/http://www.indianexpress.com/news/the-identity-bogey/10969/http://economictimes.indiatimes.com/infotech/software/UIDAI-brings-out-status-paper-on-iris-scan/articleshow/5893961.cmshttp://economictimes.indiatimes.com/infotech/software/UIDAI-brings-out-status-paper-on-iris-scan/articleshow/5893961.cmshttp://economictimes.indiatimes.com/infotech/software/UIDAI-brings-out-status-paper-on-iris-scan/articleshow/5893961.cmshttp://economictimes.indiatimes.com/infotech/software/UIDAI-brings-out-status-paper-on-iris-scan/articleshow/5893961.cmshttp://timesofindia.indiatimes.com/India/Citizen-IDs-to-cost-Rs-15-lakh-crore/articleshow/4703794.cmshttp://timesofindia.indiatimes.com/India/Citizen-IDs-to-cost-Rs-15-lakh-crore/articleshow/4703794.cmshttp://timesofindia.indiatimes.com/India/Citizen-IDs-to-cost-Rs-15-lakh-crore/articleshow/4703794.cmshttp://timesofindia.indiatimes.com/India/Citizen-IDs-to-cost-Rs-15-lakh-crore/articleshow/4703794.cmshttp://www.business-standard.com/india/news/uid-to-empowerpoor-nilekani/369531/http://www.business-standard.com/india/news/uid-to-empowerpoor-nilekani/369531/http://www.indianexpress.com/news/the-identity-bogey/10969/http://www.indianexpress.com/news/the-identity-bogey/10969/