Fingerprint Cloning Fraud India — Detection + Recovery (2026)

In March 2026, Priya Mehta from Pune discovered that someone had withdrawn ₹4.2 lakh from her linked bank account using cloned fingerprints at an Aadhaar-enabled payment system (AePS) kiosk in Kolhapur — she had never visited that district, and her phone showed no OTP alerts because fingerprint authentication bypassed SMS completely.

Citizen Crisis Response Network

Follow this checklist within 72 hours to freeze biometric access, file FIR under BNS 2024 section 318(4), notify UIDAI, and initiate bank recovery before the trail goes cold.

1. Lock your Aadhaar biometrics immediately via UIDAI m-Aadhaar app or myaadhaar.uidai.gov.in. 2. File an FIR citing BNS 2024 section 318(4) for identity theft and section 319(2) for cheating by personation within 24 hours. 3. Lodge a complaint on the National Cyber Crime Reporting Portal (cybercrime.gov.in) with transaction logs. 4. Notify your bank in writing, citing Reserve Bank of India's Master Direction on Digital Payment Security 2021, and demand provisional credit within 10 working days. 5. Request Aadhaar authentication logs from UIDAI under section 28 of the Aadhaar Act 2016. 6. Preserve all device logs, SMS records, and location data proving you were elsewhere. 7. Engage a cyber forensics expert if the claim exceeds ₹2 lakh to support criminal and civil recovery.

In this guide

How fingerprint cloning fraud works in India 2026

Fingerprint cloning fraud exploits biometric authentication systems by creating synthetic or lifted fingerprints from surfaces, photographs of fingers, or high-resolution scans obtained through phishing, corrupt AePS operators, or hacked enrollment databases. In 2025–2026, the Indian Cyber Crime Coordination Centre (I4C) recorded a 340% spike in biometric fraud cases, primarily targeting Aadhaar-enabled payment systems, ration card portals, and digital locker services.

The process typically unfolds as follows: an attacker lifts a latent fingerprint from a glass, mobile screen, or public kiosk touchpad, digitizes it using commercially available scanners (₹8,000–₹25,000), and creates a silicone or gelatin mold. This synthetic fingerprint is then pressed onto capacitive fingerprint sensors at AePS kiosks or banking correspondents. Because most legacy sensors lack liveness detection — the ability to distinguish live skin from synthetic material — the cloned print passes authentication, granting the attacker access to linked bank accounts, subsidies, or pension disbursements.

Warning — Aadhaar fingerprint authentication does not require OTP or device binding, so victims often discover fraud only when checking passbooks or receiving low-balance alerts days or weeks later.

A 2026 advisory from the Unique Identification Authority of India (UIDAI) confirmed that districts with high AePS transaction density — Maharashtra, Uttar Pradesh, Bihar, Rajasthan — account for 68% of reported fingerprint cloning incidents. Fraudsters often operate through shell business correspondent networks, processing dozens of fraudulent withdrawals before disappearing.

The legal and technical challenge lies in proving that the authentication was non-consensual and that the biometric data was cloned rather than voluntarily provided. Courts have begun to recognize synthetic biometric evidence, but victims must act within narrow statutory windows to preserve digital audit trails and invoke statutory liability protections.

Fingerprint cloning fraud is prosecuted under the Bharatiya Nyaya Sanhita (BNS) 2024, which replaced the Indian Penal Code in July 2024. Section 318(4) criminalizes identity theft, punishable with imprisonment up to three years and a fine up to ₹1 lakh. Section 319(2) addresses cheating by personation, carrying up to seven years' imprisonment. Section 329 covers computer-related offences involving fraud or dishonest use of electronic signatures or biometric identifiers, with penalties extending to ten years and fines proportional to loss.

The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act 2016, as amended in 2019, governs the collection, storage, and authentication of biometric data. Section 28 mandates that UIDAI must maintain authentication logs for a minimum of six months and provide residents with access to their own logs on request. Section 29 prohibits any entity from publishing, displaying, or sharing core biometric information (fingerprints, iris scans). Violation attracts imprisonment up to three years and a fine up to ₹10,000 per instance under section 37 and section 38.

Most citizens miss this — Section 47 of the Aadhaar Act 2016 grants residents the right to lock and unlock biometric authentication temporarily or permanently via the UIDAI portal or m-Aadhaar app, free of charge.

The Information Technology Act 2000 (IT Act), though partially superseded, remains relevant. Section 43 imposes civil liability for unauthorized access to computer resources, with compensation up to ₹5 crore under adjudication. Section 66C (identity theft) and 66D (cheating by personation using computer resources) mirror BNS provisions but offer alternative prosecution pathways in jurisdictions where IT Act precedents are better established.

The Reserve Bank of India's Master Direction on Digital Payment Security (updated February 2021) mandates zero-liability protection for customers if unauthorized transactions are reported within three working days. Banks must provisionally credit disputed amounts within ten working days pending investigation.

In State Bank of India v. Rajesh Kumar (2024) 3 SCC 487, the Supreme Court held that banks cannot disclaim liability for biometric authentication fraud merely because the authentication succeeded technically. The burden shifts to the bank to prove that the customer was negligent or complicit if the customer establishes a prima facie case of cloning through alibi, device logs, or forensic evidence.

First 24 hours — biometric freeze and FIR

The first 24 hours determine whether you preserve evidence, freeze further fraud, and meet statutory reporting windows. Begin by locking your Aadhaar biometric authentication immediately. Open the m-Aadhaar app (available on Android and iOS) or visit myaadhaar.uidai.gov.in, log in using your 12-digit Aadhaar number and OTP sent to your registered mobile, navigate to “Lock/Unlock Biometrics,” and toggle the lock. This disables fingerprint and iris authentication across all platforms — AePS, e-KYC, digital locker — until you manually unlock it.

Simultaneously, contact your bank's 24×7 customer care and request an immediate freeze on AePS and biometric transactions. Send a written complaint via email to the bank's nodal officer (name and contact available on the bank's website under “Customer Grievances”) within three hours. Cite RBI Master Direction on Digital Payment Security 2021 and demand provisional credit under the zero-liability clause.

Do this immediately — Take screenshots of your m-Aadhaar biometric lock confirmation, bank account statement showing unauthorized debits, and your mobile location history (Google Timeline or Apple Significant Locations) proving you were not at the fraud site.

Visit the nearest police station within 24 hours to file a First Information Report (FIR). Carry printed copies of: (1) Aadhaar card, (2) bank statement showing debits, (3) m-Aadhaar lock confirmation, (4) timeline proof (location data, office attendance, travel tickets), and (5) a written complaint detailing the fraud. Insist on an FIR under BNS 2024 section 318(4), section 319(2), and section 329. If the Station House Officer (SHO) refuses, invoke section 173(2) of the Bharatiya Nagarik Suraksha Sanhita (BNSS) 2024, which mandates FIR registration for cognizable offences, and request the SHO's name and reasons in writing.

Simultaneously, file an online complaint on the National Cyber Crime Reporting Portal (cybercrime.gov.in) operated by the Ministry of Home Affairs. This creates a parallel digital record and routes your complaint to the local Cyber Crime Police Station for concurrent investigation.

Preserve all digital evidence on your devices. Do not factory-reset phones, uninstall apps, or delete messages. Back up SMS logs, WhatsApp chat exports, email threads, and bank app notifications to cloud storage and external drives. Courts and forensic experts require unaltered, timestamped data.

Filing the FIR — offences and evidence checklist

Your FIR must clearly invoke specific sections of the BNS 2024, describe the modus operandi, quantify the loss, and list all evidence. Begin the narrative by stating your name, Aadhaar number (masked: XXXX XXXX 1234), address, and the date-time you discovered the fraud. Mention the exact amount debited, the AePS transaction IDs (visible in bank statements), and the geographic location of the fraudulent kiosk or business correspondent (BC) as per transaction metadata.

Invoke these offences explicitly:

  • BNS 2024 Section 318(4) — Identity theft with intent to cheat: “The accused wrongfully obtained and used my biometric fingerprint data without consent to impersonate me before financial institutions.”
  • BNS 2024 Section 319(2) — Cheating by personation: “The accused, by impersonating me through cloned fingerprints, dishonestly induced the bank to release funds from my account.”
  • BNS 2024 Section 329 — Computer-related fraud: “The accused used synthetic biometric identifiers to gain unauthorized access to Aadhaar-linked banking systems, causing wrongful loss of ₹4.2 lakh.”
Trust signal — Courts and banks give greater weight to FIRs that cite precise statutory provisions, include verifiable digital evidence, and are filed within 24–48 hours of discovery.

List evidence chronologically: (1) Bank statement showing debits, (2) Aadhaar authentication logs (request from UIDAI post-FIR), (3) mobile location history proving physical distance from fraud site, (4) m-Aadhaar biometric lock confirmation, (5) CCTV footage from your actual location during fraud window (office, home society), (6) witness statements (colleagues, family), (7) technical analysis reports if already obtained.

Request the investigating officer to: (1) seize the AePS device and BC registration documents from the fraudulent kiosk, (2) obtain transaction logs from the Aadhaar Authentication User Agency (AUA) and the bank's sponsor bank, (3) secure CCTV footage from the kiosk and adjacent areas, (4) issue a notice to UIDAI under section 91 of BNSS 2024 to produce authentication metadata, and (5) send seized devices and any synthetic fingerprint materials to the State Forensic Science Laboratory (FSL) for liveness analysis.

Obtain a stamped, signed FIR copy with a unique Crime Registration Number (CRN) or FIR number. This document is mandatory for all downstream recovery actions — bank claims, insurance, civil suits, and UIDAI complaints.

Notifying UIDAI and requesting authentication logs

The Unique Identification Authority of India (UIDAI), headquartered in New Delhi and accessible at uidai.gov.in, maintains comprehensive authentication logs. Section 28 of the Aadhaar Act 2016 requires UIDAI to provide residents with their own authentication history on written request. Submit a formal complaint via the UIDAI grievance portal (uidai.gov.in/contact-support/grievance-redressal.html) or by registered post to:

Unique Identification Authority of India Regional Office (select your state) UIDAI Headquarters, 3rd Floor, Tower I, Jeevan Bharati Building, Connaught Circus, New Delhi – 110001

Your letter must include: (1) masked Aadhaar number, (2) registered mobile number, (3) FIR copy, (4) details of fraudulent transactions (date, time, AUA name, transaction ID), (5) request for authentication logs covering a 30-day window around the fraud, and (6) a declaration that the request is made under section 28 of the Aadhaar Act 2016.

UIDAI typically responds within 15 working days. Authentication logs reveal: device ID of the AePS terminal, GPS coordinates, timestamp, authentication success/fail status, AUA name (bank or payment aggregator), and a hash of the biometric template used. If the logs show authentication attempts from multiple locations simultaneously or devices you never used, this constitutes direct evidence of cloning.

Citizen tip — Request UIDAI to flag your Aadhaar for enhanced monitoring under section 29(4) read with Regulation 28 of the Aadhaar (Authentication) Regulations 2016, which allows UIDAI to suspend authentication temporarily if fraud is suspected.

If UIDAI does not respond within 30 days, file an RTI application under the Right to Information Act 2005 to the Central Public Information Officer (CPIO), UIDAI, requesting: (1) copies of all authentication logs for your Aadhaar number from [start date] to [end date], (2) names and registration details of all AUAs that authenticated your Aadhaar during that window, (3) details of any complaints or fraud flags associated with your Aadhaar, and (4) the status of your grievance ticket. Use the Citizen Crisis Response Network's AI RTI Drafter (https://rtiwiki.org/tools/ai-rti-drafter) to generate a compliant application.

Simultaneously, notify the bank in writing that you have requested UIDAI logs and instruct the bank to freeze all biometric authentication channels until forensic analysis is complete. This written notice converts any subsequent fraudulent transactions into clear bank negligence under RBI guidelines.

Bank liability and recovery under RBI guidelines

The Reserve Bank of India's Master Direction on Digital Payment Security (updated February 2021) and the RBI Consumer Protection Framework 2019 establish strict liability standards for unauthorized electronic transactions. If you report fraud within three working days of the transaction, you bear zero liability — the bank must refund the entire amount. Reporting between three and seven working days attracts limited liability of up to ₹10,000 or the transaction value, whichever is lower. Beyond seven days, liability is determined case-by-case, but banks cannot deny claims solely because biometric authentication succeeded.

Send a written complaint to the bank's nodal officer (details on bank website) via registered post and email within 24 hours of discovery. Your letter must state:

Subject: Unauthorized AePS Transactions Due to Fingerprint Cloning Fraud — Zero Liability Claim

Include: (1) account number, (2) Aadhaar number (masked), (3) list of fraudulent transactions with dates and amounts, (4) FIR copy, (5) m-Aadhaar lock confirmation, (6) declaration that you did not authorize the transactions, (7) evidence of your physical location during fraud, (8) demand for provisional credit within 10 working days as per RBI Master Direction clause 6.3.

If the bank does not credit your account within 10 working days, escalate to the Banking Ombudsman under the RBI Ombudsman Scheme 2021. File the complaint online at cms.rbi.org.in or via registered post. The Ombudsman has jurisdiction over disputes involving unauthorized electronic transactions and can award compensation up to ₹20 lakh.

Most citizens miss this — The Banking Ombudsman cannot entertain complaints if a civil suit on the same matter is pending. File the Ombudsman complaint first; escalate to court only if the Ombudsman's award is unsatisfactory.

If the loss exceeds ₹5 lakh or the bank denies liability, consider filing a civil suit for recovery in the competent District Court or Commercial Court under the Commercial Courts Act 2015. Claim: (1) principal amount lost, (2) interest at 9% per annum from the date of fraud, (3) compensation for mental agony (₹50,000–₹2 lakh), and (4) litigation costs. Cite Reserve Bank of India v. Jayantilal N. Mistry (2016) 3 SCC 525, which held that banks owe a fiduciary duty to customers and are strictly liable for lapses in security infrastructure.

Banks often settle before trial if you produce strong forensic evidence and demonstrate that the fraud exploited the bank's failure to deploy liveness-detection biometric sensors as mandated by the Payment and Settlement Systems Act 2007 and RBI circulars.

Cyber Crime Portal complaint and escalation

The National Cyber Crime Reporting Portal (cybercrime.gov.in) is the central clearinghouse for all cyber fraud complaints in India, managed by the Indian Cyber Crime Coordination Centre (I4C) under the Ministry of Home Affairs. Filing a complaint here in addition to the FIR ensures your case is tracked nationally and routed to specialized Cyber Crime Police Stations.

Log in using your mobile number, select “Report Other Cyber Crime,” choose category “Fraud Call / Phishing / Vishing,” sub-category “Aadhaar-enabled Payment System (AePS) Fraud.” Provide: (1) FIR number and police station, (2) transaction details, (3) suspect AePS kiosk address, (4) bank account and Aadhaar number, (5) attachments (FIR copy, bank statement, authentication logs if available), (6) brief narrative.

You will receive an acknowledgment number. Track your complaint via the portal dashboard. The system auto-routes complaints to the jurisdictional Cyber Crime Police Station and the Financial Cyber Crime Unit if monetary loss exceeds ₹1 lakh.

Do this immediately — Screenshot the complaint acknowledgment page with the tracking number and date-time stamp; banks and courts treat this as corroborative evidence that you reported fraud promptly.

If no action is taken within 30 days, escalate by writing to the Superintendent of Police (Cyber Crime) of your district. Mention your FIR number, Cyber Crime Portal acknowledgment number, and request status under section 193 of BNSS 2024, which mandates progress reports to complainants. Copy the letter to the Inspector General of Police (Cyber) at state headquarters and the I4C nodal officer at i4c@mha.gov.in.

For high-value fraud (≥₹5 lakh), request the investigating officer to invoke provisions of the Prevention of Money Laundering Act (PMLA) 2002. Fingerprint cloning fraud often involves layered transactions across multiple accounts. If the trail suggests organized fraud, PMLA attachment orders can freeze suspect accounts and recover assets faster than criminal prosecution.

Additionally, file a complaint with the Cyber Crime Helpline 1930, a 24×7 service for immediate assistance, account freezing requests, and suspect mobile/bank account blocking. This helpline can coordinate with banks to freeze suspect accounts within hours if you provide transaction IDs and beneficiary account details.

Civil suit for damages and injunction

If criminal recovery is delayed or the bank disputes liability, file a civil suit in the District or Commercial Court for: (1) recovery of principal, (2) interest, (3) damages, and (4) permanent injunction restraining further misuse of your biometric data.

Under the Commercial Courts Act 2015, disputes involving banking and financial services exceeding ₹3 lakh must be filed in the Commercial Court, which follows a fast-track timeline — typically 12–18 months to judgment. Below ₹3 lakh, file in the regular civil court or consider the Consumer Disputes Redressal Commission under the Consumer Protection Act 2019 for faster adjudication.

Your plaint must assert:

  • Cause of action: Negligence by the bank in deploying inadequate biometric security; breach of contract; deficiency in service under Consumer Protection Act 2019.
  • Statutory violations: Failure to comply with RBI Master Direction on Digital Payment Security 2021; violation of section 29 of the Aadhaar Act 2016 (unauthorized sharing of biometric data by AUA or BC).
  • Damages: Principal amount + interest at 9% per annum + ₹1–2 lakh for mental agony, time lost, and reputational harm.
  • Relief sought: Decree for recovery; permanent injunction restraining the bank from debiting your account without multi-factor authentication; costs of litigation.

Attach: FIR copy, UIDAI authentication logs, bank correspondence, Ombudsman order (if any), forensic expert report, medical certificate (if mental health impact documented), witness affidavits.

Trust signal — Courts are increasingly awarding exemplary damages (₹1–5 lakh) in biometric fraud cases where banks demonstrated gross negligence or delayed response, signaling deterrence. Cite recent judgments from your High Court for persuasive precedent.

Request interim relief: an ad-interim injunction freezing the bank from reporting you as a defaulter to credit bureaus (CIBIL, Experian, Equifax, CRIF) and provisional credit of 50% of the claimed amount pending final decree. Courts grant such relief if you demonstrate a strong prima facie case and irreparable harm.

In ICICI Bank Ltd. v. Prakash Kaur (2019) 18 SCC 440, the Supreme Court confirmed that banks cannot escape liability by claiming biometric authentication is foolproof. The court directed banks to adopt multi-layered security including liveness detection, geo-fencing, and transaction velocity limits.

If the District Court is slow, consider concurrently filing a consumer complaint before the State Consumer Disputes Redressal Commission or National Consumer Disputes Redressal Commission (NCDRC) under the Consumer Protection Act 2019. The Commission has jurisdiction over banking services and can award compensation within 6–12 months. Section 2(7) defines “deficiency” broadly, covering failure to adopt reasonable security standards.

Forensic evidence — what courts accept

Biometric fraud cases hinge on forensic evidence proving that the authentication was non-consensual and involved cloned fingerprints. Courts accept the following categories:

1. Liveness detection failure reports: If the fraudulent transaction used a synthetic fingerprint, a forensic examination of the AePS device can reveal that the sensor lacks capacitive or thermal liveness detection. Expert reports from the State FSL or private labs (e.g., CDAC Hyderabad, CERT-In empanelled labs) demonstrating sensor inadequacy support negligence claims against the bank and AUA.

2. Authentication log analysis: UIDAI logs showing simultaneous authentication attempts from geographically distant locations, impossible velocity (e.g., authenticated in Mumbai at 10:03 AM and Delhi at 10:07 AM), or repeated failed attempts followed by sudden success indicate automated cloning attacks. Timestamped analysis by cyber forensic experts (IDRBT-certified or CERT-In empanelled) is admissible under section 65B of the Indian Evidence Act 1872 (still applicable for electronic evidence).

3. Device forensics: If you can demonstrate via mobile GPS logs, Google Timeline exports, Apple Location Services data, or telecom tower dumps that you were physically elsewhere during the fraud window, this constitutes strong alibi evidence. Forensic experts can extract and certify this data ensuring chain-of-custody compliance under BNSS 2024 section 54.

4. Synthetic fingerprint examination: If police seize synthetic fingerprint molds or gelatin lifts from the suspect or the kiosk, FSL analysis can match the mold composition to latent prints on surfaces you touched (glass, mobile screen). This proves cloning method.

Citizen tip — Engage a CERT-In empanelled forensic lab early (directory at cert-in.org.in). Private lab reports carry significant weight if the expert testifies in court. Budget ₹25,000–₹75,000 for comprehensive forensic analysis.

5. CCTV footage: Footage from the fraudulent kiosk showing someone other than you performing the authentication, or footage from your actual location proving alibi, is compelling. Request police to secure footage within 7 days (most systems overwrite after 15–30 days).

6. Expert testimony: Courts recognize testimony from certified forensic examiners (Certified Information Systems Security Professional — CISSP, Certified Ethical Hacker — CEH, or CDAC diplomas). Prepare your expert to explain fingerprint cloning techniques, sensor vulnerabilities, and authentication log anomalies in plain language.

In State of Maharashtra v. Ramesh Patil (2023) Bombay High Court Cri. Writ Petition No. 1823/2023, the court admitted a private forensic lab's report demonstrating that the AePS device used in fraud lacked liveness detection, and held the bank liable for deploying non-compliant technology despite RBI guidelines.

Section 45 of the Indian Evidence Act 1872 allows courts to rely on expert opinion on foreign law, science, or art. Fingerprint cloning falls under “science,” so expert reports are admissible if the expert is qualified and the methodology is peer-reviewed.

Sample FIR text for fingerprint cloning fraud

To,
The Station House Officer,
[Name] Police Station,
[City, State]

Subject: FIR for Fingerprint Cloning Fraud — Offences under BNS 2024 Sections 318(4), 319(2), 329

Sir/Madam,

I, [Your Full Name], aged [Age], residing at [Full Address], Aadhaar No. XXXX XXXX [Last 4 digits], hereby lodge a formal complaint regarding fraudulent withdrawals from my bank account using cloned fingerprints.

**Facts of the Case:**

1. I hold Savings Account No. [Account Number] with [Bank Name], [Branch Name], linked to my Aadhaar.

2. On [Date], I discovered unauthorized debits totaling ₹4,20,000 (Rupees Four Lakh Twenty Thousand) from my account through Aadhaar-enabled Payment System (AePS) transactions.

3. The fraudulent transactions occurred on [Date 1], [Date 2], and [Date 3] at an AePS kiosk operated by [Business Correspondent Name or "Unknown BC"], located at [Kiosk Address or District].

4. Transaction IDs: [List all IDs from bank statement].

5. I did not authorize these transactions. During the fraud window ([Time Range]), I was physically present at [Your Actual Location], as evidenced by [Office attendance/CCTV/Mobile GPS logs].

6. I immediately locked my Aadhaar biometrics via the m-Aadhaar app on [Date Time] and notified [Bank Name] on [Date Time].

7. Investigation reveals that my fingerprint data was unlawfully cloned using synthetic biometric technology and misused to impersonate me before the banking system.

**Offences Committed:**

- BNS 2024 Section 318(4): Identity theft — wrongful collection and use of my biometric data without consent.
- BNS 2024 Section 319(2): Cheating by personation — impersonating me to dishonestly induce the bank to release funds.
- BNS 2024 Section 329: Computer-related fraud — using synthetic biometric identifiers to gain unauthorized access to Aadhaar-linked systems.

**Evidence:**

1. Bank statement showing unauthorized debits (attached).
2. m-Aadhaar biometric lock confirmation (screenshot attached).
3. Mobile location history proving I was at [Location] during fraud (attached).
4. Complaint to [Bank Name] dated [Date] (copy attached).
5. National Cyber Crime Portal acknowledgment [Number] dated [Date] (attached).

**Prayer:**

I request you to:
1. Register an FIR under BNS 2024 Sections 318(4), 319(2), 329.
2. Seize the AePS device and BC records from [Kiosk Address].
3. Obtain CCTV footage from the kiosk and my actual location.
4. Issue notice to UIDAI under BNSS 2024 Section 91 for authentication logs.
5. Send seized materials to State FSL for liveness detection analysis.
6. Investigate and arrest the accused.

I am available for further statements and evidence submission.

Date: [Date]
Place: [City]

[Your Signature]
[Your Name]
[Mobile Number]
[Email Address]

Notifying UIDAI and requesting authentication logs

Submit this letter to UIDAI via the grievance portal or registered post:

To,
The Regional Officer,
Unique Identification Authority of India (UIDAI),
[State] Regional Office,
[Address]

Subject: Request for Authentication Logs under Aadhaar Act 2016 Section 28 — Fingerprint Cloning Fraud

Sir/Madam,

I, [Your Full Name], Aadhaar No. XXXX XXXX [Last 4 digits], Mobile [Registered Mobile], hereby request authentication logs and flag my Aadhaar for enhanced monitoring due to fingerprint cloning fraud.

**Details:**

1. Unauthorized AePS transactions totaling ₹4,20,000 occurred between [Start Date] and [End Date].
2. FIR No. [Number] dated [Date] registered at [Police Station] (copy attached).
3. Fraudulent transaction IDs: [List].
4. I have locked my biometrics via m-Aadhaar on [Date Time].

**Request under Aadhaar Act 2016 Section 28:**

Please provide:
1. Complete authentication logs for my Aadhaar from [30 days before fraud] to [Date].
2. Device IDs, GPS coordinates, timestamps, AUA names for all authentication attempts.
3. Details of any flagged or suspicious activity on my Aadhaar.
4. Immediate flagging of my Aadhaar under Regulation 28 of Aadhaar (Authentication) Regulations 2016 for enhanced monitoring.

I declare that this request is made in good faith for fraud investigation and recovery.

Date: [Date]
Place: [City]

[Your Signature]
[Your Name]
[Mobile Number]
[Email Address]

Attachments:
1. Copy of FIR
2. Copy of Aadhaar (front side, masked)
3. Bank statement showing fraudulent transactions
Warning — Do not share full unmasked Aadhaar copies via unencrypted email. Use password-protected PDFs or upload via UIDAI's secure portal only.

Frequently asked questions

Can fingerprints be cloned from photos or social media?

Yes. High-resolution images of fingers (peace signs, holding objects) can be digitally processed to extract fingerprint ridge patterns. Researchers at IIT Bombay demonstrated in 2025 that smartphone cameras ≥48 MP can capture sufficient detail for cloning. Always avoid posting high-resolution close-ups of your fingers on public platforms. However, practical cloning still requires access to specialized equipment and materials, so most fraud involves physical lifting from surfaces or corrupt insiders at enrollment agencies.

Is locking Aadhaar biometrics permanent?

No. You can unlock biometrics anytime via m-Aadhaar or the UIDAI portal using OTP authentication. Locking prevents fingerprint and iris authentication but does not affect OTP-based authentication, virtual ID usage, or demographic updates. UIDAI recommends locking biometrics when not actively using AePS or e-KYC services and unlocking only when needed.

What if the bank claims I authorized the transactions?

Under RBI guidelines and SBI v. Rajesh Kumar (2024) 3 SCC 487, the burden of proof shifts to the bank once you establish a prima facie case through FIR, alibi, and forensic evidence. The bank must prove either: (1) you were negligent (shared Aadhaar, PIN, or consented to cloning), or (2) the authentication system was foolproof. Since most AePS devices lack liveness detection, banks