Wednesday, April 1, 2026

SIM Card Registration and Privacy Issues: New SIM Card Rules Will Stop Cyber Crime?

Date:

July 31, 2025: Airtel and Reliance Jio have begun enforcing mandatory facial authentication for Aadhaar verification during the issuance of SIM cards. This practice is currently being implemented at various retail locations in Chennai and is reported to violate guidelines from the Unique Identification Authority of India (UIDAI) and the Department of Telecommunications (DoT).

The facial authentication requirement has been observed in multiple retail outlets across Chennai, including regions such as Mogappair, Korattur, Anna Nagar, Adyar, and Ayanavaram. Customers seeking new SIM cards or replacements are required to undergo facial scans, with service denied if authentication fails or is declined.

  • Violation of UIDAI Guidelines:
    • UIDAI stipulates that facial authentication must be consent-based and part of a range of authentication options, which typically include:
      • One-time passwords (OTP)
      • Fingerprint scans
      • Iris scans
    • Customers have reported a lack of transparency regarding the purpose and process of facial authentication, often being asked to comply without proper briefing.

Increased Vulnerability During Outages

During an outage, organizations might resort to less secure temporary alternatives to maintain operations, creating opportunities for attackers. This could involve reverting to password-based authentication without multi-factor authentication (MFA), which is more susceptible to brute-force attacks or phishing.

JANUARY 2025: AADHAAR-BASED BIOMETRIC VERIFICATION IS NOW MANDATORY FOR OBTAINING A NEW SIM CARD IN INDIA

The new Telecommunications Bill in India, which mandates biometric authentication for obtaining new mobile numbers and potentially for existing users, has faced opposition primarily due to concerns regarding privacy, proportionality, and the potential for exclusion. The primary identification method for this biometric authentication is expected to be Aadhaar, India’s national biometric identity system .

Is Aadhaar mandatory for getting mobile SIM?

UIDAI: NO. As per the amendments of the Telegraph Act, 1885, telecom users can use their Aadhaar number as a KYC documents along with authentication on voluntary basis to obtain a new mobile connection.

https://uidai.gov.in/en/my-aadhaar/about-your-aadhaar/aadhaar-myth-busters.html

Opposition to the New SIM Card Rule

The opposition to the new SIM card rule largely stems from legal and civil liberties groups, privacy advocates, and some legal experts who argue that the mandate for biometric authentication, particularly through Aadhaar, infringes upon fundamental rights and raises significant questions about state surveillance.

Legal and Constitutional Challenges

A key point of contention is the Supreme Court of India’s landmark judgment in Justice K.S. Puttaswamy (Retd.) & Anr. vs. Union of India & Ors. (2017), which declared privacy a fundamental right under Article 21 of the Indian Constitution. This judgment established a three-part test for any state action that infringes on privacy: legality, necessity, and proportionality. Critics argue that mandating biometric authentication for SIM cards, especially for existing users, may not meet the proportionality test. Manmeet Kaur, a Partner at Karanjawala & Co., notes that the Supreme Court in the Puttaswamy judgment observed the linking of Aadhaar with mobile numbers as “disproportionate and unreasonable state compulsion”.

Abhay Chattopadhyay, Partner at Economic Laws Practice, highlights that while the Department of Telecommunications (DoT) previously allowed voluntary Aadhaar-based biometric verification, the new Section 3(7) of the Telecommunications Act mandates “verifiable biometric based identification” for all prospective subscribers. He suggests that this reversal of the previous voluntary stance will likely undergo further judicial scrutiny to ensure it falls within the parameters of the Puttaswamy judgment. The government will need to demonstrate a clear rationale for this mandatory requirement.

Concerns over Surveillance and Data Security

Civil society organizations and privacy advocates express apprehension that mandatory biometric authentication could lead to increased state surveillance and the creation of a comprehensive digital footprint of citizens’ communication activities. The continuous linking of a mobile number to an individual’s biometric identity, especially if extended to existing users, could enable real-time tracking and monitoring, raising fears about the erosion of civil liberties.

Furthermore, concerns about data security and the potential for breaches of sensitive biometric information are paramount. While the Aadhaar system has robust security measures, any system handling such a vast amount of personal and biometric data is a potential target for cyberattacks. A breach could have severe consequences, including identity theft and misuse of personal information.

Potential for Exclusion and Accessibility Issues

Critics also point to the potential for exclusion, particularly for individuals who may face difficulties with biometric authentication due to physical disabilities, age-related biometric changes, or lack of access to necessary technology. While the proposed framework includes fallback mechanisms like OTP verification and in-person checks, the primary reliance on biometrics could disproportionately affect vulnerable populations or those in remote areas with limited digital infrastructure. The 2011 Census of India indicates that over 2.21% of the population lives with some form of disability, and many may struggle with consistent facial recognition data.

Drawbacks of Aadhaar-based Biometric Verification for New SIM Cards

While Aadhaar-based biometric verification offers enhanced security and identity assurance, it also presents several drawbacks, particularly when mandated for new SIM card activations.

Single Point of Failure and Security Vulnerabilities

Relying solely on Aadhaar for biometric verification creates a single point of failure. If the Aadhaar system itself is compromised, or if there are vulnerabilities in the authentication process, it could have widespread implications for telecommunication security. Although the Unique Identification Authority of India (UIDAI) maintains a secure database, the potential for spoofing attacks, where individuals attempt to bypass biometric checks using fake identities or manipulated biometric data, remains a concern. Advanced liveness detection mechanisms are crucial but require continuous updates and sophistication to counter evolving threats.

Accuracy and Reliability Issues

While facial recognition technology has advanced significantly, achieving near human-level accuracy in controlled environments, real-world deployment across India’s diverse demographic spectrum presents challenges. Factors such as variations in skin tone, lighting conditions, facial obstructions, and aging can affect the accuracy and reliability of facial recognition systems. Research has shown that certain algorithms may underperform across different ethnicities, leading to concerns about algorithmic bias and potential wrongful denial of services. This could lead to legitimate users being unable to obtain a SIM card or facing repeated authentication failures.

Privacy Concerns and Data Minimization

The collection and storage of biometric data, even for verification purposes, raise significant privacy concerns. While the Aadhaar system is designed to minimize data exposure by only returning a “yes” or “no” for authentication, the very act of mandating its use for every SIM card transaction expands the scope of biometric data processing. Critics argue that this goes against the principle of data minimization, which suggests that only the necessary data should be collected and processed.

Operational Hurdles and Infrastructure Gaps

Implementing mandatory biometric verification nationwide presents significant operational hurdles. While urban areas may have the necessary infrastructure, rural and remote regions often lack reliable internet connectivity, consistent electricity, and widespread access to smartphones with adequate camera quality for facial recognition. The Telecom Regulatory Authority of India (TRAI) reports that approximately 44% of mobile subscribers reside in rural regions, where connectivity quality and smartphone penetration are often lower. This digital divide could create barriers for a substantial portion of the population trying to acquire new SIM cards.

Cost Implications

While the cost per Aadhaar authentication transaction is relatively low, the cumulative cost of implementing and maintaining a nationwide biometric re-authentication system for all SIM card users could be substantial. This includes costs for developing and integrating biometric modules, upgrading infrastructure in underserved areas, training personnel, and managing a robust grievance redressal system. These costs could ultimately be passed on to consumers, making mobile services more expensive.

Lack of Continuous Verification

A significant drawback of the current Aadhaar-based KYC protocols is that identity verification is primarily conducted only during the activation of the SIM card. This creates a vulnerability where SIM cards can be transferred to different users without further verification, potentially bypassing the biometric safeguards. While the new law aims to address this by making biometric authentication applicable to existing users as well, the initial point-of-sale verification still leaves a loophole for misuse if not followed by continuous re-authentication.

In conclusion, while the new SIM card rule aims to bolster national security by preventing misuse of mobile networks, it faces significant opposition due to concerns about privacy, proportionality, and potential exclusion. The drawbacks of Aadhaar-based biometric verification, including security vulnerabilities, accuracy issues, privacy concerns, operational hurdles, and cost implications, highlight the complex challenges in implementing such a widespread and mandatory system.

https://www.theguardian.com/world/2018/jan/04/india-national-id-database-data-leak-bought-online-aadhaar

Aadhaar System Overview

Aadhaar, managed by the Unique Identification Authority of India (UIDAI), was launched in 2009 as a voluntary program to prevent benefit fraud and facilitate access to various government-controlled services . The system collects extensive personal data, including names, addresses, phone numbers, email addresses, photographs, and core biometrics such as 10 fingerprints and two iris scans. With roughly 1.4 billion Aadhaar numbers issued, it stands as one of the largest biometric identification programs globally. The system enables digital payments, online Know Your Customer (e-KYC) verification, e-tax filing, bill payments, and financial asset management, and has been credited with improving access to subsidies and pension payments.

Privacy Threats and Concerns

The comprehensive nature of data collected by Aadhaar presents inherent privacy risks. Critics have consistently argued that such a massive, centralized database is an attractive target for cybercriminals and raises concerns about government surveillance. The potential for “political microtargeting” and the spread of misinformation and disinformation through the linkage of Aadhaar with other databases, such as voter registration, have also been flagged. The 2022 Brookings report highlighted the program’s “insecure ecosystem, lack of data standards, and the UIDAI’s lack of transparency and accountability,” citing the Comptroller and Auditor General (CAG) of India’s findings that the UIDAI failed to properly regulate its client vendors and ensure data security.

Edward Snowden, a prominent whistleblower, criticized the system, stating that the government should be “reforming the policies that destroyed the privacy of a billion Indians” rather than investigating journalists who expose vulnerabilities. The Institute for Development and Research in Banking Technology, an affiliate of the Reserve Bank of India, labeled the Aadhaar database “a prime target,” warning that the economic and citizen loss in case of an attack would be “incalculable”.

“The journalists exposing the Aadhaar breach deserve an award, not an investigation. If the government were truly concerned for justice, they would be reforming the policies that destroyed the privacy of a billion Indians. Want to arrest those responsible? They are called @UIDAI,” said Snowden.

Major Data Breach Incidents and Timeline

Despite the UIDAI’s repeated assertions that the Aadhaar database is secure and has not been breached, several incidents have exposed significant vulnerabilities and led to the compromise of sensitive personal information.

2017-2018 Aadhaar Data Exposure (The Tribune Investigation)

Date of Public Exposure: January 3, 2018 

In early 2018, a journalistic investigation by The Tribune newspaper revealed that unrestricted access to the Aadhaar database could be purchased for as little as 500 rupees (less than $7 USD). This was not a sophisticated hack but rather a failure of access controls, where unauthorized agents were selling login credentials that provided a gateway to the personal details of any registered citizen. The vulnerability was publicly exposed on January 3, 2018, though the access flaw may have existed for an unknown period prior.

The exposed data included names, addresses, photographs, phone numbers, and email addresses . While biometric data like fingerprints and iris scans were reported to be secure in this specific incident, the exposed PII was sufficient to enable identity theft, phishing scams, and other fraudulent activities. This incident potentially affected over 1.1 billion people enrolled in the Aadhaar system at the time, making it one of the largest data exposures ever recorded.

The UIDAI’s initial response was widely criticized. They denied a breach had occurred, calling The Tribune‘s report “misreporting,” and filed a police complaint against the journalist and the newspaper. This action sparked widespread criticism over press freedom and was seen as an attempt to “shoot the messenger”. Later, the UIDAI clarified that the FIR was not against the journalist for reporting but against the unauthorized access itself.

The technical details pointed to credential abuse and a fundamental flaw in identity and access management (IAM) within the Aadhaar ecosystem, where user privileges were not sufficiently restricted or monitored. The attack vector was simple: compromised access credentials sold through informal channels like WhatsApp.

Following the incident, the government announced new security measures, including allowing users to generate a randomly-generated virtual ID or token to avoid sharing their direct Aadhaar number for authentication, and preventing secondary agencies from storing an individual’s Aadhaar number.

State Government Website Leaks (2017)

Date of Public Exposure: May 2017 (reported) 

Prior to the 2018 Tribune investigation, in 2017, it was reported that Aadhaar information of over 130 million citizens was breached through state government websites. Over 200 government websites erroneously made the database public, exposing Aadhaar numbers along with names, addresses, and bank details. The UIDAI stated that this information had been inadvertently published by other government departments and was removed once the breach became apparent.

Indane LPG System Leak (2018)

Date of Public Exposure: Reported in the months following early 2018 

Another data leak was discovered in the months following early 2018, involving a state-owned utility company, Indane (LPG). Its unprotected system allowed anyone to access private information on all Aadhaar holders. The company had unlimited access to the Aadhaar database to verify user accounts, and an unprotected API endpoint through the company’s system allowed unauthorized queries to the database for potentially all Aadhaar holders.

Dark Web Sales of Aadhaar Data (2023)

Date of Public Exposure: October 2023

In early October 2023, Resecurity’s HUNTER unit identified millions of personally identifiable information (PII) records, including Aadhaar cards, belonging to Indian residents being offered for sale on the Dark Web. A threat actor, ‘pwn0001’, posted on Breach Forums, brokering access to 815 million “Indian Citizen Aadhaar & Passport” records. The data set included names, father’s names, phone numbers, passport numbers, Aadhaar numbers, age, gender, addresses, districts, pincodes, and states. Resecurity analysts validated the authenticity of some Aadhaar Card IDs using a government portal’s “Verify Aadhaar” feature.

Another threat actor, ‘Lucius’, also promoted a 1.8 terabyte data leak impacting an unnamed “India internal law enforcement organization,” which contained Aadhaar IDs, Voter IDs, and driving license records. This data set also included MSISDN, SIM activation dates, and other PII, suggesting a breach from a third-party, possibly a telecom/mobile operator.

COVID-19 Data Leak (2023)

Date of Public Exposure: June 12, 2023

In June 2023, reports surfaced indicating that several records from the CoWin database, used for COVID-19 vaccination registration, were leaked by a threat actor. This exposed personal information, including Aadhaar numbers, PAN card information, mobile numbers, and home addresses.

Indian Council of Medical Research (ICMR) Data Breach (2023)

Date of Public Exposure: October 2023

In October 2023, the Indian Council of Medical Research (ICMR) experienced a significant data breach, exposing the COVID-19 testing data of 815 million individuals. This breach included critical personal details such as names, Aadhaar numbers, passport information, phone numbers, residential addresses, and COVID-19 test results. Cybercriminals reportedly infiltrated ICMR’s extensive COVID-19 test data repository and subsequently listed the stolen data for sale on dark web forums.

Aadhaar System Vulnerability via Software Patch (2017-2018)

Date of Exploitation: Between 2017 and 2018 

A series of security breaches between 2017 and 2018 exposed vulnerabilities in the Aadhaar system due to a software patch exploited by hackers. This patch, reportedly available for as little as $35, allowed unauthorized users to bypass critical security measures, including biometric authentication (iris scans and fingerprints) and GPS location tracking for enrollment operators. This meant new Aadhaar numbers could be generated from anywhere in the world without proper verification. Additionally, government websites provided unrestricted access to Aadhaar data via an API, allowing anyone with basic details like name and date of birth to check if the information corresponded to an Aadhaar number. The exposed data included sensitive information such as names, addresses, phone numbers, and biometric data.

Lessons Learned

The Aadhaar data breaches highlight several critical lessons for large-scale digital identity systems and data management:

  • Principle of Least Privilege: Granting broad access to users or third-party agents is a recipe for disaster.
  • Third-Party Risk Management: When vendors or partners are granted access to systems, their security posture becomes a critical concern.
  • Transparency and Incident Response: Denying a breach and taking legal action against those who report vulnerabilities erodes public trust.
  • Strict Access Controls and Endpoint Security: Many breaches stemmed from poorly secured APIs and vulnerable endpoints, lacking proper authentication, authorization, and rate-limiting mechanisms.

The ongoing sale of Aadhaar data on the dark web underscores the persistent threat and the need for continuous vigilance and improved security practices.

Online fraud will be Stopped? New SIM Card Rules Will Stop Cyber Crime?

Ref:

  1. The Aadhaar data breach wasn’t your typical smash-and-grab cyberattack. It exposed the personal information of over a billion Indian citizens, making it one of the largest data exposures in history. [ https://www.huntress.com/threat-library/data-breach/aadhaar-data-breach ]
  2. PII Belonging to Indian Citizens, Including their Aadhaar IDs, Offered for Sale on the Dark Web. [ https://www.resecurity.com/blog/article/pii-belonging-to-indian-citizens-including-their-aadhaar-ids-offered-for-sale-on-the-dark-web ]
  3. Digital Disasters: The Biggest Data Breaches of All Time. [ https://vipre.com/blog/digital-disasters-the-biggest-data-breaches-of-all-time/?srsltid=AfmBOoroI_KEH3kmDvmcdc6UVfFL8_rgSByaLLvz9mAJ3R3wpAL1w10p ]
  4. The Indian government has announced new security measures following reports of an alleged security breach in the country’s vast biometric database, which contains the personal details of 1.2 billion Indian citizens. [ https://www.cnn.com/2018/01/11/asia/india-security-breach-biometric-database-intl ]
  5. Aadhaar data breach. [ https://en.wikipedia.org/wiki/Data_breaches_in_India ]
  6. The personal information of more than a billion Indians stored in the world’s largest biometric database can be bought online for less than £6, according to an investigation by an Indian newspaper. [ https://www.theguardian.com/world/2018/jan/04/india-national-id-database-data-leak-bought-online-aadhaar]
  7. Aadhaar data breach. [ https://en.wikipedia.org/wiki/Data_breaches_in_India ]
  8. Data breaches in India. [https://en.wikipedia.org/wiki/Data_breaches_in_India]
  9. Learn about the biggest data breaches in India, why the India is an attractive target for cyber attacks and how these could have been prevented. [https://www.corbado.com/blog/data-breaches-India]
  10. The Indian Council of Medical Research’s Data Breach (2023). [ https://vipre.com/blog/digital-disasters-the-biggest-data-breaches-of-all-time/?srsltid=AfmBOoroI_KEH3kmDvmcdc6UVfFL8_rgSByaLLvz9mAJ3R3wpAL1w10p]
  11. India’s Ambitious Digital Identity System Breached Because of Old Patch. [ https://www.revelsi.com/en/blog/indias-ambitious-digital-identity-system-breached-because-of-old-patch/]
  12. https://m.economictimes.com/wealth/save/you-wont-be-able-to-buy-new-mobile-number-without-aadhaar-biometric-authentication-soon/articleshow/106182176.cms
  13. https://www.sciencepublishinggroup.com/article/10.11648/j.ajist.20250902.16

Also Read:

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related articles

Vedanta Group approached the Supreme Court against the Adani Group

# Vedanta -Group #approach# Supreme -Court #against #Adani-Group#uproar #Adani's deal. Due to Prime Minister Narendra Modi's influence on Gautam...

stampede at the Sheetla Temple in Nalanda,compensation announced

Tuesday morning at the famous Maa Sheetla Temple (Maghra) in Bihar Sharif, Nalanda district, turned to mourning when...

Most people make these 5 mistakes while charging theirlapto

Charging a laptop may seem like a simple task, but even small carelessness can damage your device. Improper...

Millions of people in India are living with hepatitis

Millions of people in India are living with hepatitis B or C, but they are unaware of it....
news-1701

sabung ayam online

yakinjp

yakinjp

rtp yakinjp

slot thailand

yakinjp

yakinjp

yakin jp

yakinjp id

maujp

maujp

maujp

maujp

sabung ayam online

sabung ayam online

judi bola online

sabung ayam online

judi bola online

slot mahjong ways

slot mahjong

sabung ayam online

judi bola

live casino

sabung ayam online

judi bola

live casino

SGP Pools

slot mahjong

sabung ayam online

slot mahjong

SLOT THAILAND

article 138000631

article 138000632

article 138000633

article 138000634

article 138000635

article 138000636

article 138000637

article 138000638

article 138000639

article 138000640

article 138000641

article 138000642

article 138000643

article 138000644

article 138000645

article 138000646

article 138000647

article 138000648

article 138000649

article 138000650

article 138000651

article 138000652

article 138000653

article 138000654

article 138000655

article 138000656

article 138000657

article 138000658

article 138000659

article 138000660

article 138000661

article 138000662

article 138000663

article 138000664

article 138000665

article 138000666

article 138000667

article 138000668

article 138000669

article 138000670

article 138000671

article 138000672

article 138000673

article 138000674

article 138000675

article 138000676

article 138000677

article 138000678

article 138000679

article 138000680

article 138000681

article 138000682

article 138000683

article 138000684

article 138000685

article 138000686

article 138000687

article 138000688

article 138000689

article 138000690

article 138000691

article 138000692

article 138000693

article 138000694

article 138000695

article 138000696

article 138000697

article 138000698

article 138000699

article 138000700

article 138000701

article 138000702

article 138000703

article 138000704

article 138000705

article 208000456

article 208000457

article 208000458

article 208000459

article 208000460

article 208000461

article 208000462

article 208000463

article 208000464

article 208000465

article 208000466

article 208000467

article 208000468

article 208000469

article 208000470

208000446

208000447

208000448

208000449

208000450

208000451

208000452

208000453

208000454

208000455

article 228000306

article 228000307

article 228000308

article 228000309

article 228000310

article 228000311

article 228000312

article 228000313

article 228000314

article 228000315

article 228000316

article 228000317

article 228000318

article 228000319

article 228000320

article 228000321

article 228000322

article 228000323

article 228000324

article 228000325

article 228000326

article 228000327

article 228000328

article 228000329

article 228000330

article 228000331

article 228000332

article 228000333

article 228000334

article 228000335

article 238000336

article 238000337

article 238000338

article 238000339

article 238000340

article 238000341

article 238000342

article 238000343

article 238000344

article 238000345

article 238000346

article 238000347

article 238000348

article 238000349

article 238000350

article 238000351

article 238000352

article 238000353

article 238000354

article 238000355

article 238000356

article 238000357

article 238000358

article 238000359

article 238000360

article 238000361

article 238000362

article 238000363

article 238000364

article 238000365

article 238000366

article 238000367

article 238000368

article 238000369

article 238000370

article 238000371

article 238000372

article 238000373

article 238000374

article 238000375

article 238000376

article 238000377

article 238000378

article 238000379

article 238000380

article 238000381

article 238000382

article 238000383

article 238000384

article 238000385

article 238000386

article 238000387

article 238000388

article 238000389

article 238000390

article 238000391

article 238000392

article 238000393

article 238000394

article 238000395

article 238000396

article 238000397

article 238000398

article 238000399

article 238000400

article 238000401

article 238000402

article 238000403

article 238000404

article 238000405

article 238000406

article 238000407

article 238000408

article 238000409

article 238000410

sumbar-238000336

sumbar-238000337

sumbar-238000338

sumbar-238000339

sumbar-238000340

sumbar-238000341

sumbar-238000342

sumbar-238000343

sumbar-238000344

sumbar-238000345

sumbar-238000346

sumbar-238000347

sumbar-238000348

sumbar-238000349

sumbar-238000350

sumbar-238000351

sumbar-238000352

sumbar-238000353

sumbar-238000354

sumbar-238000355

sumbar-238000356

sumbar-238000357

sumbar-238000358

sumbar-238000359

sumbar-238000360

sumbar-238000361

sumbar-238000362

sumbar-238000363

sumbar-238000364

sumbar-238000365

sumbar-238000366

sumbar-238000367

sumbar-238000368

sumbar-238000369

sumbar-238000370

sumbar-238000371

sumbar-238000372

sumbar-238000373

sumbar-238000374

sumbar-238000375

sumbar-238000376

sumbar-238000377

sumbar-238000378

sumbar-238000379

sumbar-238000380

sumbar-238000381

sumbar-238000382

sumbar-238000383

sumbar-238000384

sumbar-238000385

sumbar-238000386

sumbar-238000387

sumbar-238000388

sumbar-238000389

sumbar-238000390

sumbar-238000391

sumbar-238000392

sumbar-238000393

sumbar-238000394

sumbar-238000395

sumbar-238000396

sumbar-238000397

sumbar-238000398

sumbar-238000399

sumbar-238000400

news-1701