Composed by Rohail Safdar
Take 10 minutes away from your busy scrolling of Facebook and search for groups which offer citizens’ personal details — claimed to be from files maintained by the National Database Registration Authority (Nadra) as well as by telecom companies.
You’ll find dozens of these groups.
One group, for example, offers Nadra data which includes “family trees” with pictures for an undisclosed amount of money. Another can provide you lists sorted by cities. And some can go as far as to tag you in your national and provincial constituencies.
Upon exploring two of these groups in more depth — one with over 250 members and one with around 400 members — Eos discovered people offering subscriber details of numbers from various mobile networks in Pakistan, call history and location.
If your cell number is getting unsolicited messages and requests, beware: your personal details have been compromised and your digital imprint is now being tracked.
We got in touch with an administrator of one such group, pretending to be a client, and confirmed if indeed he was selling Nadra data. He replied with, “All types of data [are] available.” This man’s Facebook profile picture was a collage of a family tree of a citizen, Nadra form details, and the photo of a person.
We got in touch with another agent on Facebook, and upon their insistence, contacted them on Whatsapp.
Interestingly, the contact was using a Whatsapp Business account; an automated message listed their company’s various offerings. These included: “locations of all networks, Nadra number details, CNIC pictures, call detail record (CDR), IMEI scanning, fake call, bank account details and secure active sims available.”
We then asked if we can be furnished with a family tree of a person if we provided CNIC details. The gent replied that a family tree with pictures would cost 1,200 rupees and one without pictures would cost 600 rupees.
As Pakistanis’ digital footprint grows, so do the threats to their confidential details. Without data protection laws in place, businesses and criminals are able to misuse private data they should not even have access to
We enquired if he could provide the call history of a particular number. He replied that the rates depended on the cell phone network —3 ,000 rupees for one network and 2,600 rupees for another different network, with data to be provided “within two hours.”
When asked if we could trust him to provide real data and not fake, he said: “See, we provide screenshots from a computer of Nadra data and not handwritten notes. Call history [selling] is also something we have been doing since long, it’s a daily thing for us.” He assured us that data for a particular network would be provided within two hours. Further details were contingent upon providing him with a CNIC number and payment, which we didn’t proceed with.
The buying and selling of personal data has been increasing as Pakistan’s population on the internet increases by the day. An investigative officer with the Federal Investigation Agency (FIA) said that they are aware such groups might exist but said no complaint has been registered by Nadra as yet.
But as internet and telecom penetration in Pakistan has increased, calls for legislation to protect personal data of the country’s citizens have also grown louder.
But what does personal data constitute? Why do we need laws to govern how it is used, retained, shared or processed?
UNDERSTANDING DIGITAL IMPRINTS
There was a time when linking to a national identity card and a passport were the most popular and accessible means to have private data stored in one place. And as Nadra came into being, much of this, as well as data on child registration certificates or family registration certificates was computerised and added to a central storage.
But over time, data has become the new oil — companies little and large are after personal and private details of consumers in an attempt to target their marketing campaigns better to their prospective customers.
While large advertising hoardings were the way of the past, habits and behaviours on Facebook or WhatsApp, for example, are more important to companies now than ever before.
According to Privacy International, any data which can be used to identify an individual directly or indirectly can be termed personal data. A more comprehensive definition is that provided by the European Union’s General Data Protection Regulation (GDPR), which came into effect in April 2016.
The GDPR’s ‘personal data’ definition incorporates “any information relating to an identifiable person who can be directly or indirectly identified in particular by reference to an identifier.” Personal data subjects are identifiable if they can be directly or indirectly identified, especially by reference to an identifier such as a name, an identification number, location data, an online identifier or one of several special characteristics, which expresses the physical, physiological, genetic, mental, commercial, cultural or social identity of these natural persons. For example, the telephone, credit card or personnel number of a person, account data, number plate, appearance, customer number or address are all personal data.
As digital transformations take over governmental processes, almost each and every one of us has a digital footprint — whether we notice it or not. Take, for example, the information entered into your Android phone. These details include your name, telephone number, addresses, etc. In a way, we voluntarily hand over personal data with some degree of confidence that our details will not be used or abused.
But things always don’t pan out that way.
Asad is a low-grade employee at a hospital in Karachi. One day, he was approached by the FIA who told him that a transaction of a significant amount of money has been detected from his account.
Asad was flabbergasted — never could he have dreamt of seeing so much money let alone count it. He didn’t even understand much of how online transactions such as bank transfers or bill payments could be carried out.
He later told investigators that a nurse had asked for his bank details, saying that she needed it for receiving money from a relative and that she did not have her own bank account. Asad had no reason to have any doubts and he handed his bank details over to her.
By the time the FIA approached Asad, the nurse had already made good on her escape.
OFFLINE REPERCUSSIONS
Have you ever switched on your phone to a barrage of unwanted text messages from companies that you don’t care for much? Or have you ever had a request from “Ayesha” or “Sana” to send her some mobile credit? Or better yet, have you ever been informed that you are eligible for the Benazir Income Support Programme?
These text messages are not just irritants; they are meant for you to reply and to comply with directives. Scammers then use your personal information for their gain.
When Shahida ordered a package from a well-known local online marketplace, she didn’t know she would end up being harassed and threatened by unknown men on the phone. She had added her mobile number at the site as it is a requirement to proceed with the order.
Shortly after the package was delivered to her, she started getting calls and messages quoting her address. People from a couple of numbers threatened her to answer their call or they would “show up” at her home. She complained to the company, who were polite and promised to handle the matter, but the messages didn’t stop.
Shahida’s personal data was likely procured from businesses set up to sell this service.
Omer Alvi of Al-Rahim Printers, a small company providing various services, including SMS marketing, boasts of various clients who come for SMS marketing. He says even huge brands utilise SMS marketing to reach out to a large number of people with minimum cost.
“[We] acquire and amass mobile numbers from various sources, such as the Yellow Pages, phone directories, business cards, and door-to-door surveying, where they ask residents for their contact details,” he explains. “It takes hard work. I also purchase lists from other SMS marketing companies from Karachi and, rarely, from Lahore too. I pay 150,000 rupees to buy a list from a Karachi-based company.”
The old method for spammers was to take one number and change the last digit and generate a series. Another technique was to scourge Facebook, Twitter and LinkedIn for mobile numbers, which the users may have kept on public view.
Alvi says he is looking to now sell SMS marketing software, which is in high demand, especially to housing societies and travel agencies who are looking to do it themselves rather than outsource. Al-Rahim Printers charges 1,500 rupees for 10,000 messages and 3,500 rupees for 50,000 messages.
“That is how cheap your mobile number is up for — the digits which are linked to your bank account, your social media accounts, your email and your ride-hailing app,” he says. With these digits on hand, they can be misused in more ways than fathomable.
Al-Rahim Printers charges 1,500 rupees for 10,000 messages and 3,500 rupees for 50,000 messages. “That is how cheap your mobile number is up for— the digits which are linked to your bank account, your social media accounts, your email and your ride-hailing app,” he says.
Such fraud is becoming increasingly commonplace but, slowly, it is beginning to claim droves of victims rather than just individuals.
Popular ride-hailing company Careem warned its customers on April 23 last year that a massive data breach had compromised their data, including name, ride history and email addresses. Users’ passwords and credit card details were not stolen, the company reassured clients. No details about the nature of the cybersecurity attack were given and the company was not answerable or liable in the absence of a data protection law in Pakistan.
But the bigger moment of reckoning arrived in November last year when the FIA announced that the data of millions of customers from “almost all” banks operating in the country was stolen and allegedly dumped on the ‘dark web’ — a collection of websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers. It was the biggest data breach to hit the banking industry in the country. According to the FIA, an international company named Group-IB, which was working in Pakistan to prevent cyberattacks, had discovered the payment details of 177,878 plastic cards from Pakistani and other international banks.
The banks affected by this breach included Habib Bank, MCB, Allied Bank Limited, and many others. Habib Bank was the most affected by the breach. Around 150,000 dumps of data of Pakistani banks went on sale on the dark web. The company reported that another data dump of around 70,000 Pakistani banks cards’ data with PINs — Personal Identification Numbers — was on sale for 50 dollars in January.
What is common between all these instances is that none of the companies or organisations that had data leaks had to face any repercussions or even tough questions about putting sensitive user data at risk. There remains a lot of obscurity about whether proper mechanisms are in place to prevent such incidents in the future and, for that matter, details about the nature of attacks and what is done to address them.
In the absence of any legislation on data protection, a common citizen has no way to legally ask questions from the government departments and private companies as to how and why their data is being held, retained, processed and shared.
THE POLITICS OF PRIVACY