1.  Is the government empowered to intercept communication between two individuals? Answer: Yes. The Central and the State government can intercept communication.  Letters, telephone (mobiles and landlines) and internet communication (e mails, chats etc.) can be intercepted by the government. Interception of:

  • postal articles is governed by the Indian Post Office Act, 1898 [Section 26];
  • telephones is governed by the Indian Telegraph Act, 1885 [Section 5(2)];
  • e mails/chats etc. is governed by the Information Technology Act, 2000 [Section 69].

2. Under what circumstances can the government intercept communication? Answer: The circumstances under which communication can be intercepted by the government are:

  • for postal articles: the occurrence of any public emergency, or in the interest of the public safety or tranquility;
  • for telephones: in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence;
  • for e mails / chats etc.: in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order or for preventing incitement to the commission of any cognizable offence relating to above;

3. Are there any safeguards that have been built into the interception process? Answer: The Supreme Court in the case of PUCL Vs Union of India observed that the right to have telephone conservation in the privacy of one’s home or office is part of the Right to Life and Personal Liberty enshrined in Article 21 of the Constitution, which cannot be curtailed except according to the procedure established by law. Elaborating the scope of Section 5 (2) of the Indian Telegraph Act, 1882 the Court clarified that this section does not confer unguided and unbridled power on investigating agencies to invade a person’s privacy. The court laid down the following safeguards: a.  Tapping of telephones is prohibited without an authorizing order from the Home Secretary, Government of India or the Home Secretary of the concerned State Government b. The order, unless it is renewed shall cease to have authority at the end of two months from the date of issue. Though the order may be renewed, it cannot remain in operation beyond six months. c. Telephone tapping or interception of communications must be limited to the address (es) specified in the order or to address (es) likely to be used by a person specified in the order. d. All copies of the intercepted material must be destroyed as soon as their retention is not necessary under the terms of Section 5 (2) of the Indian Telegraph Act, 1882. e. In an urgent case, this power may be delegated to an officer of the Home Department, Government of India or the Home Department of the State government, who is not below the rank of Joint Secretary. Copy of this order should be sent to the concerned Review Committee within one week of passing of the order. f. This Review Committee shall consist of the Cabinet Secretary, Law Secretary and the Secretary Telecommunications at the Central Government. At the state level, the Committee shall comprise of Chief Secretary, Law Secretary and another member (other than the Home Secretary) appointed by the State Government. The Committee shall on its own, within two months of the passing of an order under Section 5 (2) investigate whether its passing is relevant. If an order is in existence, the Committee should find out whether there has been a contravention of the provisions of Section 5 (2). If the Review Committee on investigation concludes that provisions of Section 5 (2) have been contravened, it shall direct destruction of the copies of the intercepted material. In pursuance of the Supreme Court judgement the Indian Telegraph (First Amendment) Rules, 1999 were framed and notified on 16.02.1999. A similar notification titled, the Information Technology (Procedures and Safeguards for Interception, Monitoring and Decryption of Information Rules, 2009 were notified on October 27, 2009. [see page 18] 4. Are there any other known cases of telephone tapping of politicians? Answer: In 2005, Shri Amar Singh alleged that his telephones were tapped by private individuals.  The case against them is currently pending in the Tis Hazari court in Delhi. 5. Are there any statistics about the number of telephones being tapped by the government? Answer:  Currently no such statistics are publicly available.  In a similar context, in the UK (where the Regulation of Investigatory Powers Act 2000 governs this particular subject) a Report of the Interception of Communications Commissioner states that a total of 5344 warrants were issued for interception of communication in 2008.

Recently, the government announced that it plans to transfer benefits under various schemes directly into the bank accounts of individual beneficiaries.  Benefits can be the Mahatma Gandhi National Rural Employment Guarantee Scheme (MNREGS) wages, scholarships, pensions and health benefits.  Beneficiaries shall be identified through the Aadhaar number (Aadhaar is an individual identification number linked to a person’s demographic and biometric information).  The direct cash transfer (DCT) system is going to be rolled out in 51 districts, starting January 1, 2013.  It will later be extended to 18 states by April 1, 2013 and the rest by April 1, 2014 (or earlier).  Presently, 34 schemes have been identified in 43 districts to implement the DCT programme. Currently, the government subsidises certain products (food grains, fertilizers, water, electricity) and services (education, healthcare) by providing them at a lower than market price to the beneficiaries.  This has led to problems such as high fiscal deficit, waste of scarce resources and operational inefficiencies.  The government is considering replacing this with an Aadhaar enabled DCT system.  It has claimed that the new system would ensure timely payment directly to intended beneficiaries, reduce transaction costs and leakages.  However, many experts have criticised both the concept of cash transfer as well as Aadhaar (see here, here, here and here). In this blog, we provide some background information about cash transfer, explain the concept of Aadhaar and examine the pros and cons of an Aadhaar enabled direct cash transfer system. Background on cash transfer Under the direct cash transfer (DCT) scheme, government subsidies will be given directly to the beneficiaries in the form of cash rather than goods.  DCTs can either be unconditional or conditional.  Under unconditional schemes, cash is directly transferred to eligible households with no conditions. For example, pension schemes.  Conditional cash transfers provide cash directly to poor households in response to the fulfillment of certain conditions such as minimum attendance of children in schools.  DCTs provide poor families the choice of using the cash as they wish.  Having access to cash also relieves some of their financial constraints.  Also, DCTs are simpler in design than other subsidy schemes.  Even though cash transfer schemes have a high fixed cost of administration when the programme is set up, running costs are far lower (see here, here and here). Presently, the government operates a number of DCT schemes.  For example, Janani Suraksha Yojana, Indira Awas Yojana and Dhanalaksmi scheme. In his 2011-12 Budget speech, the then Finance Minister, Pranab Mukherjee, had stated that the government plans to move towards direct transfer of cash subsidy for kerosene, Liquified Petroleum Gas (LPG), and fertilizers.  A task force headed by Nandan Nilekani was set up to work out the modalities of operationalising DCT for these items.  This task force submitted its report in February 2012. The National Food Security Bill, 2011, pending in Parliament, includes cash transfer and food coupons as possible alternative mechanisms to the Public Distribution System. Key features of Aadhaar The office of Unique Identification Authority of India (UIDAI) was set up in 2009 within the Planning Commission.  In 2010, the government later introduced the National Identification Authority of India Bill in Parliament to give statutory status to this office.

  • The Aadhaar number is a unique identification number that every resident of India (regardless of citizenship) is entitled to get after he furnishes his demographic and biometric information.  Demographic information shall include the name, age, gender and address.  Biometric information shall include some biological attributes of the individual (such as fingerprints and iris scan).  Collection of information pertaining to race, religion, caste, language, income or health is specifically prohibited.
  • The Aadhaar number shall serve as proof of identity, subject to authentication.  However, it should not be construed as proof of citizenship or domicile.
  • Process of issuing and authenticating Aadhaar number: First, information for each person shall be collected and verified after which an Aadhaar number shall be allotted.  Second, the collected information shall be stored in a database called the Central Identities Data Repository.  Finally, this repository shall be used to provide authentication services to service providers.

For a PRS analysis of the Bill, see here. Aadhaar enabled direct cash transfers Advantages Identification through Aadhaar number: Currently, the recipient has to establish his identity and eligibility many times by producing multiple documents for verification.  The verification of such documents is done by multiple authorities.  An Aadhaar enabled bank account can be used by the beneficiary to receive multiple welfare payments as opposed to the one scheme, one bank approach, followed by a number of state governments. Elimination of middlemen: The scheme reduces chances of rent-seeking by middlemen who siphon off part of the subsidy.  In the new system, the cash shall be transferred directly to individual bank accounts and the beneficiaries shall be identified through Aadhaar. Reduction in duplicate and ghost beneficiaries: The Aadhaar number is likely to help eliminate duplicate cards and cards for non-existent persons or ghost beneficiaries in schemes such as the PDS and MNREGS.     Disadvantages Lack of clarity on whether Aadhaar is mandatory:  According to UIDAI, it is not mandatory for individuals to get an Aadhaar number.  However, it does not prevent any service provider from prescribing Aadhaar as a mandatory requirement for availing services.  Therefore, beneficiaries may be denied a service if he does not have the Aadhaar number.  It is noteworthy that the new direct cash transfer policy requires beneficiaries to have an Aadhaar number and a bank account.  However, many beneficiaries do not yet have either.  (Presently, there are 229 million Aadhaar number holders and 147 million bank accounts). Targeting and identification of beneficiaries:  According to the government, one of the key reasons for changing to DCT system is to ensure better targeting of subsidies.  However, the success of Aadhaar in weeding out ‘ghost’ beneficiaries depends on mandatory enrollment.  If enrollment is not mandatory, both authentication systems (identity card based and Aadhaar based) must coexist.  In such a scenario, ‘ghost’ beneficiaries and people with multiple cards will choose to opt out of the Aadhaar system.  Furthermore, key schemes such as PDS suffer from large inclusion and exclusion errors.  However, Aadhaar cannot address errors in targeting of BPL families.  Also, it cannot address problems of MNREGS such as incorrect measurement of work and payment delays. Safeguard for maintaining privacy: Information collected when issuing Aadhaar may be misused if safeguards to maintain privacy are inadequate.  Though the Supreme Court has included privacy as part of the Right to Life, India does not have a specific law governing issues related to privacy.  Also, the authority is required to maintain details of every request for authentication and the response provided.  However, maximum duration for which such data has to be stored is not specified.  Authentication data provides insights into usage patterns of an Aadhaar number holder.  Data that has been recorded over a long duration of time may be misused for activities such as profiling an individual’s behaviour.