This document discusses research on the global network of corporate control. It finds that a small group of companies, mainly banks, control a large portion of the world's wealth. A "super-entity" of 147 tightly-knit companies control over 40% of the total wealth in the network. The high level of interconnection between these companies makes the global economy fragile, as the failure of one company could propagate through the system and cause widespread failures. The document also raises issues with India's Unique Identification (UID) system, arguing it could propagate fraud and make the banking system vulnerable if various responsibilities are not clearly defined.
What will education and teaching look like in the future. Emerging technologies, changing pedagogies, new literacies and digital learners. This presentation is produced for teachers and trainers.
KEYNOTE: The Unlikely Romance: Part 2 - What Now?Casey Ellis
Over the past 7 years Bugcrowd has had a front-row seat to watch hackers (and cybersecurity itself) go from scary, to relevant, to cool, to normal...
So, what now?
Midway through a project, a client of ours recently said "One thing I'm learning is that it's ok to give up on the desktop experience once it stops making sense". This wasn't an isolated incident. In fact, i'm beginning to think desktop web sites stopped making sense quite a while ago. We've just had nothing viable to replace them with. Mobile apps have given us a glimpse, but I think they're merely a glimpse into something bigger.
Mobile isn't merely a new stage in the evolution of the web, it's not even merely a new context, it's the very early stages of an entirely new system. A system that has already started to shape our environment, affect the way we live, how we choose to connect with others, and how we're able to spend our time. A system that is also slowly unravelling our assumptions and causing us to question the very reason we build web sites, why people visit them, and where the true value of the web actually lies.
Presented by Stephanie Rieger at Breaking Development in Orlando, Florida on April 17, 2012.
What will education and teaching look like in the future. Emerging technologies, changing pedagogies, new literacies and digital learners. This presentation is produced for teachers and trainers.
KEYNOTE: The Unlikely Romance: Part 2 - What Now?Casey Ellis
Over the past 7 years Bugcrowd has had a front-row seat to watch hackers (and cybersecurity itself) go from scary, to relevant, to cool, to normal...
So, what now?
Midway through a project, a client of ours recently said "One thing I'm learning is that it's ok to give up on the desktop experience once it stops making sense". This wasn't an isolated incident. In fact, i'm beginning to think desktop web sites stopped making sense quite a while ago. We've just had nothing viable to replace them with. Mobile apps have given us a glimpse, but I think they're merely a glimpse into something bigger.
Mobile isn't merely a new stage in the evolution of the web, it's not even merely a new context, it's the very early stages of an entirely new system. A system that has already started to shape our environment, affect the way we live, how we choose to connect with others, and how we're able to spend our time. A system that is also slowly unravelling our assumptions and causing us to question the very reason we build web sites, why people visit them, and where the true value of the web actually lies.
Presented by Stephanie Rieger at Breaking Development in Orlando, Florida on April 17, 2012.
Without nervous systems nothing can live or be alive. Cities that are alive and vibrant need nervous systems. Cities need nervous systems to sustain themselves. Are you ensuring your city has a nervous system?
SPARK Lecture at IUCAA in Pune.
Can perpetual growth be created in a closed system? Can technology, politics or markets make perpetual growth happen? What happens when growth is unconstrained? Can growth be uneconomic? Is the pursuit of growth as an end the sign of a purposeless society?
Section 4 is the most important Section in the Right to Information Act. As yet it is the least used by information seekers, the least enforced by Information Commissioners and the least complied to by government agencies.
This presentation makes a case for making Section 4 work.
Presentation at seminar on "Role of Civil Society in enhancing transparency".
Killing india's rivers a stream by streamAnupam Saraph
Urban "development" is killing India's rivers a stream at a time. We are violating wetlands that charge streams and groundwater. We are channelizing small streams that charge rivers. We are converting rivers to sewers. We are reclaiming the land of the river.
This photo presentation illustrates each of these ways we kill our rivers. It also narrates the fight of a few people to save a small stream, Devnadi, in Baner in Pune.
A plea is made for an Conservation of Rivers Act outlining the chapters that would need to go into such an Act.
Release The Hounds: Part 2 “11 Years Is A Long Ass Time”Casey Ellis
Bugcrowd was founded at an inflection point in the history of the Internet and awareness of cybersecurity. A lot has changed since 2012 - to the cybersecurity industry, to the technology landscape, to the view of hackers as helpful and not just harmful, and - importantly - to the awareness of cybersecurity as "everyone's problem".
In 2023, we find ourselves at a similar inflection point for our space. This keynote unpacks the last 11 years as a predictor of what is next, and as an encouragement and roadmap for budding cybersecurity entrepreneurs and solutioneers.
Cybercrime - Stealing in the Connected Agedlblumen
Cybercrime is a good business - for criminals. This presentation describes the types of cybercrime and steps your organization can take to avoid being victimized and what to do if you have.
Without nervous systems nothing can live or be alive. Cities that are alive and vibrant need nervous systems. Cities need nervous systems to sustain themselves. Are you ensuring your city has a nervous system?
SPARK Lecture at IUCAA in Pune.
Can perpetual growth be created in a closed system? Can technology, politics or markets make perpetual growth happen? What happens when growth is unconstrained? Can growth be uneconomic? Is the pursuit of growth as an end the sign of a purposeless society?
Section 4 is the most important Section in the Right to Information Act. As yet it is the least used by information seekers, the least enforced by Information Commissioners and the least complied to by government agencies.
This presentation makes a case for making Section 4 work.
Presentation at seminar on "Role of Civil Society in enhancing transparency".
Killing india's rivers a stream by streamAnupam Saraph
Urban "development" is killing India's rivers a stream at a time. We are violating wetlands that charge streams and groundwater. We are channelizing small streams that charge rivers. We are converting rivers to sewers. We are reclaiming the land of the river.
This photo presentation illustrates each of these ways we kill our rivers. It also narrates the fight of a few people to save a small stream, Devnadi, in Baner in Pune.
A plea is made for an Conservation of Rivers Act outlining the chapters that would need to go into such an Act.
Release The Hounds: Part 2 “11 Years Is A Long Ass Time”Casey Ellis
Bugcrowd was founded at an inflection point in the history of the Internet and awareness of cybersecurity. A lot has changed since 2012 - to the cybersecurity industry, to the technology landscape, to the view of hackers as helpful and not just harmful, and - importantly - to the awareness of cybersecurity as "everyone's problem".
In 2023, we find ourselves at a similar inflection point for our space. This keynote unpacks the last 11 years as a predictor of what is next, and as an encouragement and roadmap for budding cybersecurity entrepreneurs and solutioneers.
Cybercrime - Stealing in the Connected Agedlblumen
Cybercrime is a good business - for criminals. This presentation describes the types of cybercrime and steps your organization can take to avoid being victimized and what to do if you have.
Cyber crime - Understanding the Organised Criminal Group modelInnesGerrard
Keep your friends close and your enemies closer. Very few people are aware of the extent of the online criminal ecosystem that supports and enables cyber attacks and the business model behind it. This is an eye opener!
How The Future Internet Will Change The World WEB 3.0aNumak & Company
The next frontier in Internet evolution, Web 3.0, promises a permission-less, decentralized open source alternative that will transform computation, data storage, and peer-to-peer transactions.
What purpose do the economy, energy, or environment serve?Anupam Saraph
Address to the Pune International Centre Conference on:
Energy, Environment and Economic Growth: Emerging Challenges on 22-23 January 2021
Are we addicted to the economy? Have we forgotten it is the environment that gives life, not the economy? Do we recognize that energy, green or otherwise, will not protect the planet, or create reverence for the sacred, or care and respect for the community of life?
Benami voters and laundering elections with aadhaarAnupam Saraph
Why is Aadhaar worse for democracy than Cambridge Analytica?
The UIDAI's own claims about Aadhaar tell how Aadhaar not only destroys democracy but also the sovereignty of India. It pushes control of the elections into the hands of the ecosystem of Aadhaar: those who create Aadhaar enrolments, those who authenticate using Aadhaar, those who decide if your Aadhaar is deactivated and those who make beneficiary and electoral rolls with Aadhaar numbers.
The IPCC says 10 years is all we have. Start your own initiatives to be a climate change leader. Help ensure we halt, even reduce global warming. Help ensure we protect our streams and rivers to ensure our life line.
Share widely with clubs in your city and across your district. Be a climate leader. Say I Can.
This presentation asks 7 key questions to demystify the magic of Aadhaar:
# Is Aadhaar a unique ID?
# Who certifies the identity, age, address, resident status, or even existence of persons assigned a Aadhaar number?
What documents were used to issue Aadhaar numbers?
# Who audited and verified the Aadhaar?
# What is the location address of enrolment operators submitting enrolment packets to be assigned Aadhaar numbers?
# Does Aadhaar identify anyone?
# Whose purpose does Aadhaar serve?
The presentation lists the key implications of the responses of the UIDAI to these questions under the Right to Information Act.
Summary of talk at the Centre for Energy and Environment Studies at the Rijksuniversiteit Groningen.
I described the nature of systems challenges and ways to identify that a challenge is a systems challenge. I then highlighted a few projects currently undertaken by the Government of India and described the systems challenges they created for India. Finally I described the methodology of systems interventions that avoid creating systems challenges and help accomplish difficult missions.
Wicked problems are those that benefit us individually but hurt us as a society. They turn up decades later in unexpected places, often far away from where you are. Often it's too late to be able to address them in our lifetime when we notice them.
Here is my short list of 3 wicked problems we are facing today. Sadly government's don't have think tanks that even understand, let alone address any of these problems.
This is part of my address to 600 students on the biggest challenges they need to deal with in their life.
Address delivered to the aspiring Ph.D. students on responsible conduct of research. Lists various examples of research from diverse fields that have raised questions about the responsible conduct. Asks what the purpose of responsible research should be and how and who should evaluate it.
There may be a video link to the actual talk somewhere, will link it when I have it.
How does one create enduring water security for each community?
These points are a summary of the steps required to be taken to ensure that no community will be without water for a single day and no community would suffer floods. The simple steps described here will ensure resilience from climate change.
This is the slide deck of my introductory sessions on Systems Thinking. Systems Thinking will help you understand change in the systems you are a part. It offers insights into counterintuitive outcomes you often observe in your own systems. It offers insights into making impact and why impacts fail. It hopes to give you the strength to leave your system better than when you found it.
Quick summary of points submitted to the PMO on why the UIDAI is not even an ID, not even needed, how it facilitates anti-nationals, destroys governance, creates pandora accounts and destroys sovereignty.
Why the United Kingdom scrapped its UIDAnupam Saraph
Presentation made in June 2014 to explain David Cameroon's reasons for keeping his election promise in 2011 and scrapping the UK's UID program and destroying its database.
There is no escape from the cyber space and risks associated with it. Therefore we need to have a strategy to minimise our risks, including, protection from obsolescence, unfair practices, and protection of our identity and digital assets.
Slide deck used for talk for Moneylife Foundation. Video of talk at: https://www.youtube.com/watch?v=IMD8eO0aQUU&feature=youtu.be
Smart Projects for Smart Cities: The Government Way (Updated to Nov 2015)Anupam Saraph
This is a case study illustrating how bad projects are the norm in smart cities. It illustrates the bad governance and failure of the Ministry of Environment, Ministry of Urban Affairs, the State government and the Urban Local Body to protect public interest.
This case study demonstrates with the example of one stream of how the Pune Municipal Corporation and the JNNURM have been instrumental in destroying urban streams across Pune. JNNURM has funded similar projects across the country.
This has resulted in heavy costs to citizens, particularly:
• 66 Crores of tax money wasted on one streami alone in private interest to steal the green belt and water stream
• Project aimed to continuously waste more money in private interest to destroy all natural streams in Pune and in every urban centre under JNNURM
• Approximately 90 crores worth of wetland and green belt stolen from the public in Devnadi alone
• Water table for entire Baner in Pune (aprox 10 sq Km) destroyed (aprox annual cost of replacing the services 5X the current annual supply of water by tanker mafia)
• Pollution of the ground water and spread of water borne disease by laying sewage lines in the stream (Aprox 44 crores per year in purified drinking water costs for Baner alone + medical expenses to treat water borne disease and mosquito borne disease)
• Crime, failure of the Development Plan by promoting slums to grab the land of the river (Cost to mental health, peace and well being for entire Baner; crime rate up in Baner by more than 100% in last 5 years)
• Risk of damage by flooding increased at least 60 fold as the stream is channelized, constricted and flow changed to 1/60 of its avg. width
• Biodiversity and lungs of the Baner area destroyed by removing the trees and vegetation from the green belt and the river
Keynote address for Common Purpose workshop on Urban Sprawls in Dubai.
Urban sprawls have made cities unliveable. Despite the high costs of sprawls they have grown like cancer across the world.
What are the drivers that make cities sprawl? Can we regulate the sprawl? How can we ensure cities do not grow for ever?
How does the speed of urban transportation drive the urban sprawl? What is the role city nervous systems have to ensure liveable cities?
Draft Clean Ganga Bill 2014: An enduring answer to every Indian's plea for cl...Anupam Saraph
The Supreme Court of India the agony of every Indian in stating "When will Ganga flow with its pristine glory? We are not sure if our generation can see it. We would like at least our future generation to see the development,".
This ‘Clean Ganga Act 2014’ is a draft to provide a enduring mechanism to ensure "suitable means for maintenance of ecological flow." as promised by the government to the court. It aims to empower citizens and local-bodies to discharge their responsibility of protection, conservation and restoration of the lost glory of the Ganga and all water bodies across the country.
This draft is the result of more than 5 years of efforts of river activists across India and Policy-makers of various State and National Water Policies, under the leadership of Raincatcher and Waterman, Magsaysay Award winner Dr. Rajendrasingh.
Roadmap for Digital India submitted to the Prime Minister of India and the Information Technology Minister of India.
Ideas that protect the assets of the country, ensure right projects are being undertaken, no one is denied benefits, justice, equality, liberty and fraternity are within reach, the future scenarios are shared and democracy is not a distant dream.
Designing sustainable and resilient citiesAnupam Saraph
Talk given at Future Proofing Indian Cities in 2011
How does one leverage systems principles to build sustainable and resilient cities? A walk through 5 design principles based on systems characteristics for city designers.
What website can I sell pi coins securely.DOT TECH
Currently there are no website or exchange that allow buying or selling of pi coins..
But you can still easily sell pi coins, by reselling it to exchanges/crypto whales interested in holding thousands of pi coins before the mainnet launch.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and resell to these crypto whales and holders of pi..
This is because pi network is not doing any pre-sale. The only way exchanges can get pi is by buying from miners and pi merchants stands in between the miners and the exchanges.
How can I sell my pi coins?
Selling pi coins is really easy, but first you need to migrate to mainnet wallet before you can do that. I will leave the telegram contact of my personal pi merchant to trade with.
Tele-gram.
@Pi_vendor_247
what is the future of Pi Network currency.DOT TECH
The future of the Pi cryptocurrency is uncertain, and its success will depend on several factors. Pi is a relatively new cryptocurrency that aims to be user-friendly and accessible to a wide audience. Here are a few key considerations for its future:
Message: @Pi_vendor_247 on telegram if u want to sell PI COINS.
1. Mainnet Launch: As of my last knowledge update in January 2022, Pi was still in the testnet phase. Its success will depend on a successful transition to a mainnet, where actual transactions can take place.
2. User Adoption: Pi's success will be closely tied to user adoption. The more users who join the network and actively participate, the stronger the ecosystem can become.
3. Utility and Use Cases: For a cryptocurrency to thrive, it must offer utility and practical use cases. The Pi team has talked about various applications, including peer-to-peer transactions, smart contracts, and more. The development and implementation of these features will be essential.
4. Regulatory Environment: The regulatory environment for cryptocurrencies is evolving globally. How Pi navigates and complies with regulations in various jurisdictions will significantly impact its future.
5. Technology Development: The Pi network must continue to develop and improve its technology, security, and scalability to compete with established cryptocurrencies.
6. Community Engagement: The Pi community plays a critical role in its future. Engaged users can help build trust and grow the network.
7. Monetization and Sustainability: The Pi team's monetization strategy, such as fees, partnerships, or other revenue sources, will affect its long-term sustainability.
It's essential to approach Pi or any new cryptocurrency with caution and conduct due diligence. Cryptocurrency investments involve risks, and potential rewards can be uncertain. The success and future of Pi will depend on the collective efforts of its team, community, and the broader cryptocurrency market dynamics. It's advisable to stay updated on Pi's development and follow any updates from the official Pi Network website or announcements from the team.
how to sell pi coins at high rate quickly.DOT TECH
Where can I sell my pi coins at a high rate.
Pi is not launched yet on any exchange. But one can easily sell his or her pi coins to investors who want to hold pi till mainnet launch.
This means crypto whales want to hold pi. And you can get a good rate for selling pi to them. I will leave the telegram contact of my personal pi vendor below.
A vendor is someone who buys from a miner and resell it to a holder or crypto whale.
Here is the telegram contact of my vendor:
@Pi_vendor_247
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
how to sell pi coins on Bitmart crypto exchangeDOT TECH
Yes. Pi network coins can be exchanged but not on bitmart exchange. Because pi network is still in the enclosed mainnet. The only way pioneers are able to trade pi coins is by reselling the pi coins to pi verified merchants.
A verified merchant is someone who buys pi network coins and resell it to exchanges looking forward to hold till mainnet launch.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
how to swap pi coins to foreign currency withdrawable.DOT TECH
As of my last update, Pi is still in the testing phase and is not tradable on any exchanges.
However, Pi Network has announced plans to launch its Testnet and Mainnet in the future, which may include listing Pi on exchanges.
The current method for selling pi coins involves exchanging them with a pi vendor who purchases pi coins for investment reasons.
If you want to sell your pi coins, reach out to a pi vendor and sell them to anyone looking to sell pi coins from any country around the globe.
Below is the contact information for my personal pi vendor.
Telegram: @Pi_vendor_247
How to get verified on Coinbase Account?_.docxBuy bitget
t's important to note that buying verified Coinbase accounts is not recommended and may violate Coinbase's terms of service. Instead of searching to "buy verified Coinbase accounts," follow the proper steps to verify your own account to ensure compliance and security.
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Cardnickysharmasucks
The unveiling of the IndusInd Bank Poonawalla Fincorp eLITE RuPay Platinum Credit Card marks a notable milestone in the Indian financial landscape, showcasing a successful partnership between two leading institutions, Poonawalla Fincorp and IndusInd Bank. This co-branded credit card not only offers users a plethora of benefits but also reflects a commitment to innovation and adaptation. With a focus on providing value-driven and customer-centric solutions, this launch represents more than just a new product—it signifies a step towards redefining the banking experience for millions. Promising convenience, rewards, and a touch of luxury in everyday financial transactions, this collaboration aims to cater to the evolving needs of customers and set new standards in the industry.
how to sell pi coins in South Korea profitably.DOT TECH
Yes. You can sell your pi network coins in South Korea or any other country, by finding a verified pi merchant
What is a verified pi merchant?
Since pi network is not launched yet on any exchange, the only way you can sell pi coins is by selling to a verified pi merchant, and this is because pi network is not launched yet on any exchange and no pre-sale or ico offerings Is done on pi.
Since there is no pre-sale, the only way exchanges can get pi is by buying from miners. So a pi merchant facilitates these transactions by acting as a bridge for both transactions.
How can i find a pi vendor/merchant?
Well for those who haven't traded with a pi merchant or who don't already have one. I will leave the telegram id of my personal pi merchant who i trade pi with.
Tele gram: @Pi_vendor_247
#pi #sell #nigeria #pinetwork #picoins #sellpi #Nigerian #tradepi #pinetworkcoins #sellmypi
The European Unemployment Puzzle: implications from population agingGRAPE
We study the link between the evolving age structure of the working population and unemployment. We build a large new Keynesian OLG model with a realistic age structure, labor market frictions, sticky prices, and aggregate shocks. Once calibrated to the European economy, we quantify the extent to which demographic changes over the last three decades have contributed to the decline of the unemployment rate. Our findings yield important implications for the future evolution of unemployment given the anticipated further aging of the working population in Europe. We also quantify the implications for optimal monetary policy: lowering inflation volatility becomes less costly in terms of GDP and unemployment volatility, which hints that optimal monetary policy may be more hawkish in an aging society. Finally, our results also propose a partial reversal of the European-US unemployment puzzle due to the fact that the share of young workers is expected to remain robust in the US.
1. The Future of Risks of Banking
Inaugural Address at Bankers Meet
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
3. Occupy Wallstreet
• Occupy Wall Street is a people-powered
movement that began on September 17, 2011 in
Liberty Square in Manhattan’s Financial
District, and has spread to over 100 cities in the
United States and actions in over 1,500 cities
globally.
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
4. Why Occupy?
• #ows is fighting back against the corrosive power
of major banks and multinational corporations
over the democratic process, and the role of Wall
Street in creating an economic collapse that has
caused the greatest recession in generations.
• The movement is inspired by popular uprisings in
Egypt and Tunisia, and aims to fight back against
the richest 1% of people that are writing the rules
of an unfair global economy that is foreclosing on
our future.
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
5. Web of ownership
• From Orbis 2007, a database listing 37 million companies and
investors worldwide, Swiss researchers pulled out 43,060
TNCs and the share ownerships linking them.
• They found a core of 1318 companies with interlocking
ownerships had ties to two or more other companies, and on
average they were connected to 20.
• Although they represented 20 per cent of global operating
revenues, the 1318 appeared to collectively own through
their shares the majority of the world's large blue chip and
manufacturing firms - the "real" economy - representing a
further 60 per cent of global revenues.
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
6. Vitali S, Glattfelder JB, Battiston S (2011) The Network of Global Corporate Control. PLoS ONE 6(10): e25995. doi:10.1371/journal.pone.0025995
http://www.plosone.org/article/info:doi/10.1371/journal.pone.0025995
connected 1318
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
7. superowners
• When the team further untangled the web of
ownership, it found much of it tracked back to a
"super-entity" of 147 even more tightly knit
companies, mainly banks and other financial
institutions, - all of their ownership was held by
other members of the super-entity - that
controlled 40 per cent of the total wealth in the
network.
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
8. Superconnected 50
1. Barclays plc 2. Capital Group Companies Inc 3. FMR
Corporation 4. AXA 5. State Street Corporation 6. JP
Morgan Chase & Co 7. Legal & General Group plc 8.
Vanguard Group Inc 9. UBS AG 10. Merrill Lynch & Co Inc
11. Wellington Management Co LLP 12. Deutsche Bank
AG 13. Franklin Resources Inc 14. Credit Suisse Group 15.
Walton Enterprises LLC 16. Bank of New York Mellon
Corp 17. Natixis 18. Goldman Sachs Group Inc 19. T Rowe
Price Group Inc 20. Legg Mason Inc 21. Morgan Stanley 22.
Mitsubishi UFJ Financial Group Inc 23. Northern Trust
Corporation 24. Société Générale 25. Bank of America
Corporation 26. Lloyds TSB Group plc 27. Invesco plc 28.
Allianz SE 29. TIAA
29. TIAA 30. Old Mutual Public Limited Company 31. Aviva
plc 32. Schroders plc 33. Dodge & Cox 34. Lehman
Brothers Holdings Inc* 35. Sun Life Financial Inc 36.
Standard Life plc 37. CNCE 38. Nomura Holdings Inc 39.
The Depository Trust Company 40. Massachusetts Mutual
Life Insurance 41. ING Groep NV 42. Brandes Investment
Partners LP 43. Unicredito Italiano SPA 44. Deposit
Insurance Corporation of Japan 45. Vereniging Aegon 46.
BNP Paribas 47. Affiliated Managers Group Inc 48. Resona
Holdings Inc 49. Capital Group International Inc 50. China
Petrochemical Group Company
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
11. Making the economy fragile
• Failure of one node causes similar failures in linked
nodes that propagate throughout the
system, creating large scale collective failures.
• The global banking network's activities are directly
responsible for the majority of the financial woes
that have befallen the global community, especially
since the 2008 events that have put the financial
system into meltdown mode.
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
12. Making an economy fragile
• Connecting hundreds of unconnected
networks.
• Few nodes in control of entire network.
• Many nodes connected to 2nd or 3rd order
nodes resulting in auditors nightmare.
• Amplifying fraud through networks.
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
13. The UID Initiative
• Multiple ID’s linked by UID.
• Few foreign companies control all nodes.
• Many sub-registrars and even more enrolling
agencies with no accountability resulting in
auditors nightmare.
• Fraudulent ID’s propagate through the system.
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
15. Issues of UID Registration
• Who certifies each UID, KYC?
• Who audits each UID, UID
enrollers, registrars?
• Who owns the UID?
• Who is responsible for privacy?
• Who is responsible for security?
• Who has legal liability?
• Who is responsible for frauds?
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
17. Issues of UID Bank AC
• Who certifies each Bank AC?
• Who audits each Bank AC?
• Who owns the Bank AC?
• Who is responsible for privacy?
• Who is responsible for security?
• Who has legal liability?
• Who is responsible for frauds, fake ACs?
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
19. Issues of UID Cash Transfers
• Who certifies each Transfer?
• Who audits each Transfer?
• Who owns the Money?
• Who is responsible for privacy?
• Who is responsible for security?
• Who has legal liability?
• Who is responsible for frauds, money
laundering?
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
21. Issues with UID Authentication
• Who certifies each Authentication?
• Who audits each Authentication logs?
• Who owns the the Logs?
• Who is responsible for privacy?
• Who is responsible for security?
• Who has legal liability?
• Who is responsible for frauds, fake
ids, identity theft?
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
22. The UID issues
• Assumption: Uniqueness of UID.
• Assumption: Any UID corresponds to only one real person.
• Private party “verification” and “KYC” in UID numbers.
• No verification in cash transfers.
• More than 1.2 billion UIDs on completion.
• Assumption: UID or identity will result in financial inclusion.
• UID solves the gap of 18,950 rural branches to service 593,731 villages or
31 villages to a branch.
• UID will accomplish what banks have failed to do in 66 years: 40,000
persons per rural branch if they were reachable.
• UID will solves the gap of 38,592 branches to serve 5,161 cities and towns.
• UID will accomplish what banks have failed to do in 66 years:
7,500 persons per urban branch if they were evenly distributed.
• Assumption: Fraud free transfer of trillions of Rupees in subsidies per year.
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/
23. The Future of Banking
• Propagating extremely high risk to banks.
• Creating a very fragile economy.
• Making India vulnerable to financial terrorism.
(c)2013AnupamSaraph.ThisworkislicensedundertheCreativeCommonsAttribution-NonCommercial-ShareAlike3.0UnportedLicense.Toviewacopyofthislicense,visithttp://creativecommons.org/licenses/by-nc-sa/3.0/