Can Fingerprint Evidence from Crime Sites Be Utilized in Criminal Investigations via the Aadhar Database?

Can Fingerprint Evidence from Crime Sites Be Utilized in Criminal Investigations via the Aadhar Database?

The Aadhaar database is a biometric identification system in India that includes fingerprints and other biometric data. While it has become an integral part of various governmental and non-governmental processes, its use in criminal investigations is a contentious topic.

Current Legal Framework and Challenges

As of June 2018, the use of Aadhaar biometric data for criminal investigations was not permissible under the Aadhaar Act 2016. Section 29 of the Act explicitly prohibits the use and access to Aadhaar biometric data for purposes such as criminal investigation. This legislation aims to protect the privacy of individuals whose biometric data is stored in the Aadhaar database.

However, for exceptional cases, such as national security, the use of Aadhaar data might be permissible. This has led to discussions about potential future changes in Aadhaar policy to address certain needs, such as criminal investigations.

Technological Feasibility vs. Legal Constraints

Technically, it is possible to use fingerprint evidence from crime sites to identify individuals through the Aadhaar database. The Aadhaar card contains a multitude of biometric and personal data points, including fingerprints, iris scans, and photographs. This makes it highly effective for quick and accurate identification. However, the legal framework and privacy concerns make this approach complex.

The current legislation forbids the use and procurement of biometric information from the general public unless it is for suspects or convicted criminals. This restriction ensures that individual privacy is not violated unnecessarily. If privacy were not a concern, law enforcement could identify suspects rapidly using biometric identification methods by connecting to the Aadhaar server.

Challenges and False Data

While the Aadhaar database contains a wealth of biometric data, there are challenges that must be addressed. Sometimes, there may be false data in the database, which can create complications in tracking and identifying individuals. This inconsistency in data quality can lead to incorrect matches, thereby hampering criminal investigations.

Aadhaar is a useful alternative for confirming someone's identity but is not the perfect solution, even when it comes to biometric data. The database is not fully implemented in all security units in the country, with high-level security units like RAW (Research and Analysis Wing) and CBI having better access. UIDAI (Unique Identification Authority of India) does not allow the sharing of details to match identification of individuals without proper authorization.

The Aadhaar card includes personal details such as address, name, and other identifying information. Currently, all regions are setting up Aadhaar identification for final identity verification purposes in banks and other establishments. This initiative aims to streamline the process and combat identity fraud.

Recent Developments in Madhya Pradesh

Madhya Pradesh, a state in central India, is planning to link Aadhaar cards with the Crime and Criminal Tracking Network and System (CCTNS). This move is expected to enhance the ability of law enforcement to verify the background and identity of offenders. According to a Times of India report, the Madhya Pradesh police are planning this setup to more effectively track criminals and verify their identities.

Linking Aadhaar with CCTNS would provide the police with valuable information such as address, name, and other biometric data. This integration is expected to streamline criminal investigations and improve the overall efficiency of the law enforcement system.

To read more about this initiative, visit the following link: MP cops mull Adhaar link to track criminals - Times of India.

In conclusion, while the Aadhaar database can be a powerful tool for criminal investigations, it is subject to stringent legal and privacy regulations. The technology is feasible, but its implementation must carefully balance the need for security with individual privacy rights.