<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2101 to 2115.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tehelka-june-15-2013-pranesh-prakash-on-us-snooping-into-indian-cyber-space"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/section-66-it-act.txt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/section-43-it-act.txt"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner">
    <title>Interview with Mr. Billy Hawkes - Irish Data Protection Commissioner</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner</link>
    <description>
        &lt;b&gt;Maria Xynou recently interviewed Mr. Billy Hawkes, the Irish Data Protection Commissioner, at the CIS´ 4th Privacy Round Table meeting. View this interview and gain an insight on recommendations for data protection in India!&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The Irish Data Protection Commissioner was asked the following questions:&lt;/p&gt;
&lt;p&gt;1. What powers does the Irish Data Commissioner´s office have? In your opinion, are these sufficient? Which powers have been most useful? If there is a lack, what would you feel is needed?&lt;/p&gt;
&lt;p&gt;2. Does your office differ from other EU data protection commissioner offices?&lt;/p&gt;
&lt;p&gt;3. What challenges has your office faced? What is the most common type of privacy violation that your office has faced?&lt;/p&gt;
&lt;p&gt;4. Why should privacy legislation be enacted in India?&lt;/p&gt;
&lt;p&gt;5. Does India need a Privacy Commissioner? Why? If India creates a Privacy Commissioner, what structure / framework would you suggest for the office?&lt;/p&gt;
&lt;p&gt;6. How do you think data should be regulated in India? Do you support the idea of co-regulation or self-regulation?&lt;/p&gt;
&lt;p&gt;7. How can India protect its citizens´ data when it is stored in foreign servers?&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;video  &lt;iframe frameborder="0" height="250" src="http://blip.tv/play/AYOTmT4A.html?p=1" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner'&gt;https://cis-india.org/internet-governance/blog/interview-with-irish-data-protection-commissioner&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:06:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation">
    <title>Open Letter to "Not" Recognize India as Data Secure Nation till Enactment of Privacy Legislation</title>
    <link>https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation</link>
    <description>
        &lt;b&gt;India shouldn't be granted the status of "data secure nation" by Europe until it enacts a suitable privacy legislation, points out the Centre for Internet and Society in this open letter.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This letter is with regards to both the request from the Confederation of Indian Industry that the EU recognize India as a data secure nation made on April 29th 2013, &lt;a href="https://cis-india.org/accessibility/blog/#fn1" name="fr1"&gt;[1]&lt;/a&gt; and the threat from India to stall  negotiations on the Free Trade Agreement with the EU unless recognized  as data secure nation made on May 9th 2013.&lt;a href="https://cis-india.org/accessibility/blog/#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On behalf of the Centre for Internet and Society, we request that you  urge the European Parliament and the EU ambassador to India to reject  the request, and to not recognize India as a data secure nation until a  privacy legislation has been enacted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society believes that if Europe were to  grant India status as a data secure nation based only on the protections  found in the “Information Technology (Reasonable Security Practices and  Procedures and Sensitive Personal Data or Information) Rules 2011”, not  only will India be protected through inadequate standards, but the government will not have an incentive to enact a legislation that  recognizes privacy as a comprehensive and fundamental human right. Since 2010 India has been in the process of realizing a privacy  legislation.  In 2011 the “Draft Privacy Bill 2011” was leaked.&lt;a href="https://cis-india.org/accessibility/blog/#fn3" name="fr3"&gt;[3]&lt;/a&gt; In   2012 the “Report of the Group of Experts on Privacy” was released. The  Report recommends a comprehensive right to privacy for India, nine  national privacy principles, and a privacy framework of co-regulation  for India to adopt. &lt;a href="https://cis-india.org/accessibility/blog/#fn4" name="fr4"&gt;[4]&lt;/a&gt; In 2013 the need for a stand alone privacy  legislation was highlighted by the Law Minister.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; The Centre for Internet and Society has recently drafted the “Privacy  Protection Bill 2013” - a citizen's version of a possible privacy  legislation for India.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Currently, we are hosting a series of six  “Privacy Roundtables” across India in collaboration with FICCI and DSCI  from April 2013 - August 2013.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; The purpose of the roundtables is to  gain public feedback to the text of the “Privacy Protection Bill 2013”,  and other possible frameworks for privacy in India. The discussions and  recommendations from the meeting will be published into a compilation  and presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Center for Internet and Society will also be submitting the  “Privacy Protection Bill 2013” and the public feedback to the Department  of Personnel and Training (DoPT) with the hope of contributing to and  informing a privacy legislation in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been researching privacy since  2010 and was a member of the committee which compiled the “Report of the  Group of Experts on Privacy”. We have also submitted comments on the  “Information Technology (Reasonable Security Practices and Procedures  and Sensitive Personal Data or Information) Rules 2011” to the Committee  on Subordinate Legislation  of the 15th Lok Sabha.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We hope that you will consider our request and urge the European  Parliament and the EU ambassador to India to not recognize India as a  data secure nation until a privacy legislation has been enacted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. CII asks EU to accept India as 'Data Secure' nation: &lt;a class="external-link" href="http://bit.ly/15Z77dH"&gt;http://bit.ly/15Z77dH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. India threatens to stall trade talks with EU: &lt;a class="external-link" href="http://bit.ly/1716aF1"&gt;http://bit.ly/1716aF1&lt;/a&gt;&lt;a class="moz-txt-link-freetext" href="http://www.business-standard.com/article/economy-policy/india-threatens-to-stall-trade-talks-with-eu-113050900020_1.html"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. New privacy Bill: Data Protection Authority, jail term for  offence: &lt;a class="external-link" href="http://bit.ly/emqkkH"&gt;http://bit.ly/emqkkH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The Report of the Group of Experts on Privacy &lt;a class="external-link" href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Law Minister Seeks stand along privacy legislation, writes PM: &lt;a class="external-link" href="http://bit.ly/16hewWs"&gt;http://bit.ly/16hewWs&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The Privacy Protection Bill 2013 drafted by CIS: &lt;a class="external-link" href="http://bit.ly/10eum5d"&gt;http://bit.ly/10eum5d&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Privacy Roundtable: &lt;a class="external-link" href="http://bit.ly/12HYoj5"&gt;http://bit.ly/12HYoj5&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data Information) Rules, 2011: &lt;a class="external-link" href="http://bit.ly/Z2FjX6"&gt;http://bit.ly/Z2FjX6&lt;/a&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt;﻿&lt;b&gt;Note: CIS sent the letters to Data Protection Commissioners across Europe.&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation'&gt;https://cis-india.org/internet-governance/blog/open-letter-to-not-recognize-india-as-data-secure-nation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:07:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tehelka-june-15-2013-pranesh-prakash-on-us-snooping-into-indian-cyber-space">
    <title>Pranesh Prakash on the US snooping into Indian cyber space</title>
    <link>https://cis-india.org/news/tehelka-june-15-2013-pranesh-prakash-on-us-snooping-into-indian-cyber-space</link>
    <description>
        &lt;b&gt;Pranesh Prakash, Policy Director, Center for Internet and Society, talks about the ramifications of US incursion into the privacy of Indians through cyber space. He says that Indian laws on privacy and free speech shall be applied to the web companies in India so that they actually not surrender the privacy of Indian citizens just because American law requires them to.&lt;/b&gt;
        &lt;p&gt;The interview conducted by &lt;a class="external-link" href="http://www.tehelka.com/pranesh-prakash-on-the-us-snooping-into-indian-cyber-space/"&gt;Tehelka&lt;/a&gt; can be seen here&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/sw4ytEdi5zU" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tehelka-june-15-2013-pranesh-prakash-on-us-snooping-into-indian-cyber-space'&gt;https://cis-india.org/news/tehelka-june-15-2013-pranesh-prakash-on-us-snooping-into-indian-cyber-space&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-02T16:19:11Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule">
    <title>World Wide Rule</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule</link>
    <description>
        &lt;b&gt;Nishant Shah's review of  Schmidt and Cohen's book was published in the Indian Express on June 14, 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/world-wide-rule/1129208/0"&gt;Click to read the original published in the Indian Express here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Book: The New Digital Age&lt;/b&gt;&lt;b&gt;&lt;br /&gt;Author: Eric Schmidt &amp;amp; Jared Cohen&lt;br /&gt;&lt;/b&gt;&lt;b&gt;Publisher: Hachette&lt;/b&gt;&lt;b&gt;&lt;br /&gt;Price: Rs 650&lt;br /&gt;Pages: 315&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;When I first heard that Eric Schmidt the chairman of Google and Jared  Cohen, the director of the techno-political think-tank Google Ideas,  are co-authoring a book about our future and how it is going to be  re-shaped with the emergence of digital technologies, I must confess I  was sceptical. When people who do things that you like start writing  about those things, it is not always a pretty picture. Or an easy read.  However, like all sceptics, I am only a romantic waiting to be  validated. So, when I picked up The New Digital Age I was hoping to be  entertained, informed and shaken out of my socks as the gurus of the  interwebz spin science fiction futures for our times. Sadly, I have been  taught my lesson and have slid back into hardened scepticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here is the short version of the book: Technology is good.  Technology is going to be exciting. There are loads of people who  haven't had it yet. There are not enough people who have figured out how  things work. Everybody needs to go online because no matter what,  technologies are here to stay and they are going to be the biggest  corpus of power. They write, "There is a canyon dividing people who  understand technology and people charged with addressing the world's  toughest geopolitical issues, and no one has built a bridge…As global  connectivity continues its unprecedented advance, many old institutions  and hierarchies will have to adapt or risk becoming obsolete, irrelevant  to modern society." So the handful who hold the reigns of the digital  (states, corporates, artificial intelligence clusters) are either going  to rule the world, or, well, write books about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The long version is slightly more nuanced, even though it fails  to give us what we have grown to expect of all things Google — the  bleeding edge of back and beyond. For a lay person, observations that  Schmidt and Cohen make about the future of the digital age might be  mildly interesting in the way title credits to your favourite movie can  be. Once they have convinced us, many, many times, that the internet is  fast and fluid and that it makes things fast and fluid and hence the  future we imagine is going to be fast and fluid, the authors tell us  that the internet is spawning a new "caste system" of haves, have-nots,  and wants-but-does-not-haves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Citing the internet as "the largest experiment involving anarchy  in history" they look at the new negotiations of power around the  digital. Virulent viruses from the "Middle East" make their appearance.  Predictably wars of censorship and free information in China get due  attention. Telcos get a big hand for building the infrastructure which  can sell Google phones to people in Somalia. The book offers a  straightforward (read military) reading of drones and less-than-expected  biased views on cyberterrorism, which at least escapes the jingoism  that the USA has been passing off in the service of a surveillance  state. And more than anything else, the book shows politicos and  governments around the world, that the future is messy, anarchy is at  hand, but as long as they put their trust in Big Internet Brothers, the  world will be a manageable place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So while you can clearly see where my review for the book is heading, I must give it its due credit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are three things about this book that make it interesting.  The first is how Schmidt and Cohen seem to be in a seesaw dialogue with  themselves. They realise that five billion people are going to get  connected online. They gush a little about what this net-universality is  going to mean. And then immediately, they also realise that we have to  prepare ourselves for a "Brave New World," which is going to be  infinitely more messy and scary. They recognise that the days of  anonymity on the Web are gone, with real life identities becoming our  primary digital avatars. However, they also hint at a potential future  of pseudonymity that propels free speech in countries with authoritarian  regimes. This oscillation between the good, the bad, the plain and the  incredible, keeps their writing grounded without erring too much either  on the side of techno-euphoria or dystopic visions of the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, and perhaps justly so, the book doles out a lot of useful  information not just for the techno-neophytes but also the amateur  savant. There are stories about "Currygate" in Singapore, or of what  Vodaphone did in Egypt after the Arab Spring, or of the "Human Flesh  Search Engine" in China, which offer a comprehensive, if not critical,  view of the way things are. Schmidt and Cohen have been everywhere on  the ether and they have cyberjockeyed for decades to tell us stories  that might be familiar but are still worth the effort of writing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, it is a readable book. It doesn't require you to Telnet  your way into obscure meaning sets in the history of computing. It is  written for people who are still mystified not only about the past of  the Net but also its future, and treads a surprisingly balanced ground  in both directions. It is a book you can give to your grandmother, and  she might be inspired to get herself a Facebook (or maybe a Google +)  account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But all said and done, I expected more. It is almost as if  Schmidt and Cohen are sitting on a minefield of ideas which they want to  hint at but don't yet want to share because they might be able to turn  it into a new app for the Nexus instead. It is a book that could have  been. It wasn't. It is ironic how silent the book is about the role that  big corporations play in shaping our techno-futures, and the fact that  it is printed on dead-tree books with closed licensing so I couldn't get  a free copy online. For people claiming to build new and political  futures, the fact that this wisdom could not come out in more accessible  forms and formats, speaks a lot about how seriously we can take their  views of the future.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule'&gt;https://cis-india.org/internet-governance/blog/indian-express-june-14-2013-nishant-shah-world-wide-rule&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-01T10:26:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us">
    <title>Indian surveillance laws &amp; practices far worse than US</title>
    <link>https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us</link>
    <description>
        &lt;b&gt;Explosive would be just the word to describe the revelations by National Security Agency (NSA) whistleblower Edward Snowden. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash's column was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-06-13/news/39952596_1_nsa-india-us-homeland-security-dialogue-national-security-letters"&gt;published in the Economic Times&lt;/a&gt; on June 13, 2013. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Now, with the American Civil Liberties Union suing the Obama  administration over the NSA surveillance programme, more fireworks could  be in store. Snowden's expose provides proof of what many working in  the field of privacy have long known. The leaks show the NSA (through  the FBI) has got a secret court order requiring telecom provider Verizon  to hand over "metadata", i.e., non-content data like phone numbers and  call durations, relating to millions of US customers (known as dragnet  or mass surveillance); that the NSA has a tool called Prism through  which it queries at least nine American companies (including Google and  Facebook); and that it also has a tool called Boundless Informant (a  screenshot of which revealed that, in February 2013, the NSA collected  12.61 billion pieces of metadata from India).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Nothing Quite Private &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The outrage in the US  has to do with the fact that much of the data the NSA has been granted  access to by the court relates to communications between US citizens,  something the NSA is not authorised to gain access to. What should be of  concern to Indians is that the US government refuses to acknowledge  non-Americans as people who also have a fundamental right to privacy, if  not under US law, then at least under international laws like the  Universal Declaration of Human Rights and the ICCPR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;US companies  such as Facebook and Google have had a deleterious effect on privacy.  In 2004, there was a public outcry when Gmail announced it was using an  algorithm to read through your emails to serve you advertisements.  Facebook and Google collect massive amounts of data about you and  websites you visit, and by doing so, they make themselves targets for  governments wishing to snoop on you, legally or not.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Worse, Indian-Style &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, Google and Twitter have at least challenged a few of the  secretive National Security Letters requiring them to hand over data to  the FBI, and have won. Yahoo India has challenged the authority of the  Controller of Certifying Authorities, a technical functionary under the  IT Act, to ask for user data, and the case is still going on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To  the best of my knowledge, no Indian web company has ever challenged the  government in court over a privacy-related matter. Actually, Indian law  is far worse than American law on these matters. In the US, the NSA  needed a court order to get the Verizon data. In India, the licences  under which telecom companies operate require them to provide this. No  need for messy court processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law we currently have â€” sections 69 and 69B of the Information  Technology Act â€” is far worse than the surveillance law the British  imposed on us. Even that lax law has not been followed by our  intelligence agencies.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Keeping it Safe &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recent reports reveal  India's secretive National Technical Research Organisation (NTRO) â€”  created under an executive order and not accountable to Parliament â€”  often goes beyond its mandate and, in 2006-07, tried to crack into  Google and Skype servers, but failed. It succeeded in cracking  Rediffmail and Sify servers, and more recently was accused by the  Department of Electronics and IT in a report on unauthorised access to  government officials' mails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government argues systems like the Telephone Call  Interception System (TCIS), the Central Monitoring System (CMS) and the  National Intelligence Grid (Natgrid) will introduce restrictions on  misuse of surveillance data, it is a flawed claim. Mass surveillance  only increases the size of the haystack, which doesn't help in finding  the needle. Targeted surveillance, when necessary and proportional, is  required. And no such systems should be introduced without public debate  and a legal regime in place for public and parliamentary  accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government should also encourage the usage of  end-to-end encryption, ensuring Indian citizens' data remains safe even  if stored on foreign servers. Merely requiring those servers to be  located in India will not help, since that information is still  accessible to American agencies if it is not encrypted. Also, the  currently lax Indian laws will also apply, degrading users' privacy even  more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indians need to be aware they have virtually no privacy  when communicating online unless they take proactive measures. Free or  open-source software and technologies like Open-PGP can make emails  secure, Off-The-Record can secure instant messages, TextSecure for  SMSes, and Tor can anonymise internet traffic.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt;http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us&lt;/a&gt; &lt;/span&gt; &lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us'&gt;https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T11:09:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance">
    <title>India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis — It is Now Officially Confirmed</title>
    <link>https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance</link>
    <description>
        &lt;b&gt;As of last week, it is officially confirmed that the metadata of everyone´s communications is under the NSA´s microscope. In fact, the leaked data shows that India is one of the countries which is under NSA surveillance the most! &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC. This blog was &lt;a class="external-link" href="http://www.medianama.com/2013/06/223-what-does-nsa-prism-program-mean-to-india-cis-india/"&gt;cross-posted in Medianama&lt;/a&gt; on 24th June 2013. &lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-5905db2c-6115-80fb-3332-1eaa5155c762"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;¨Does the NSA collect any type of data at all on millions or hundreds of millions of  Americans?”, the democratic senator, &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;Ron Wyden, asked James Clapper&lt;/a&gt;&lt;span&gt;, the director of national intelligence a few months ago. “No sir”, replied Clapper.&lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;True, the National Security Agency (NSA) does not collect data on millions of Americans. Instead, it collects data on billions of &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Americans, Indians, Egyptians, Iranians, Pakistanis and others&lt;/span&gt;&lt;/a&gt;&lt;span&gt; all around the world.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Leaked NSA surveillance&lt;/h2&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Verizon Court Order&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recently, the &lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;Guardian released&lt;/a&gt; a top secret order of the secret Foreign Intelligence Surveillance Court (FISA) requiring Verizon on an “ongoing, daily basis” to hand over information to the NSA on all telephone calls in its systems, both within the US and between the US and other countries. Verizon is one of America's largest telecoms providers and under a top secret court order issued on 25 April 2013, the communications records of millions of US citizens are being collected indiscriminately and in bulk supposedly until 19 July 2013. In other words, data collection has nothing to do with whether an individual has been involved in a criminal or terrorist activity or not. Literally everyone is potentially subject to the same type of surveillance.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;a href="http://yahoo.usatoday.com/news/washington/2006-05-10-nsa_x.htm"&gt;&lt;span&gt;USA Today reported in 2006&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that the NSA had been secretly collecting the phone call records of millions of Americans from various telecom providers. However, the &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;&lt;span&gt;April 25 top secret order&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is proof that the Obama administration is continuing the data mining programme begun by the Bush administration in the aftermath of the 09/11 terrorist attacks. While content data may not be collected, this dragnet surveillance includes &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;&lt;span&gt;metadata &lt;/span&gt;&lt;/a&gt;&lt;span&gt;such as the numbers of both parties on a call, location data, call duration, unique identifiers, the International Mobile Subscriber Identity (IMSI) number and the time and duration of all calls.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Content data may not be collected, but metadata can also be adequate to discover an individual's network of associations and communications patterns. &lt;/span&gt;&lt;a href="https://www.privacyinternational.org/blog/top-secret-nsa-program-spying-on-millions-of-us-citizens"&gt;&lt;span&gt;Privacy and human rights concerns&lt;/span&gt;&lt;/a&gt;&lt;span&gt; rise from the fact that the collection of metadata can result in a highly invasive form of surveillance of citizens´ communications and lives.&lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;&lt;span&gt; Metadata records can enable the US government to know the identity of every person with whom an individual communicates electronically&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, as well as the time, duration and location of the communication. In other words, metadata is aggregate data and it is enough to spy on citizens and to potentially violate their right to privacy and other human rights.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;PRISM&lt;/span&gt;&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;Recently, a secret NSA surveillance programme, code-named PRISM, was leaked by &lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;The Washington Post&lt;/a&gt;. Apparently, not only is the NSA gaining access to the meta data of all phone calls through the Verizon court order, but it is also tapping directly into the servers of nine leading Internet companies: Microsoft, Skype, Google, Facebook, YouTube, Yahoo, PalTalk, AOL and Apple. However, following these allegations, Google, Microsoft and Facebook recently asked the U.S. government to allow them to &lt;a href="http://www.bbc.co.uk/news/business-22867185"&gt;disclose the security requests&lt;/a&gt; they receive for handing over user data. It remains unclear to what extent the U.S. government is tapping into these servers.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Yet it appears that the &lt;/span&gt;&lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;&lt;span&gt;PRISM online surveillance programme&lt;/span&gt;&lt;/a&gt;&lt;span&gt; enables the NSA to extract personal material, such as audio and video chats, photographs, emails and documents. The &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/09/prism-gchq-william-hague-statement"&gt;&lt;span&gt;Guardian reported&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that PRISM appears to allow GCHQ, Britain's equivalent of the NSA, to secretly gather intelligence from the same internet companies. Following allegations that GCHQ tried to circumvent UK law by using the PRISM computer network in the US, the British foreign secretary, William Hague, stated that it is “fanciful nonsense” to suggest that GCHQ would work with an agency in another country to circumvent the law. Most notably, William Hague emphasized that reports that GCHQ are gathering intelligence from photos and online sites should not concern people who have nothing to hide! However, this implies that everyone is guilty until proven innocent...when actually, democracy mandates the opposite.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;James R. Clapper, the US Director of National Intelligence, &lt;/span&gt;&lt;a href="http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html"&gt;&lt;span&gt;stated&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;“&lt;/span&gt;&lt;span&gt;Information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats. The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”&lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;So essentially, Clapper stated that in the name of US national security, the personal data of billions of citizens around the world is being collected. By having access to data stored in the servers of some of the biggest Internet companies in the world, the NSA ultimately has access to the private data of almost all the Internet users in the world. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;And once the NSA has access to tons of data through the Verizon court order and the PRISM surveillance programme, how does it create patterns of intelligence and generally mine huge volumes of data? &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The Guardian released top secret documents about the NSA data mining tool, called &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/a&gt;&lt;span&gt;; this tool is used to detail and map by country the volumes of information collected from telephone and computer networks. The focus of the Boundless Informant is to count and categorise the records of communication, known as metadata, and to record and analyse where its intelligence comes from. One of the leaked documents states that the tool is designed to give NSA officials answers to questions like: “What type of coverage do we have on country X”. According to the Boundless Informant documents, the NSA has been collecting 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. During the same month, 97 billion pieces of intelligence from computer networks were collected worldwide. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The following &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;“global heat map”&lt;/span&gt;&lt;/a&gt;&lt;span&gt; reveals how much data is being collected by the NSA from around the world:&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;img src="https://cis-india.org/BoundlessInformantmap.jpg" alt="Boundless Informant: &amp;quot;Global Heat Map&amp;quot;" class="image-inline" title="Boundless Informant: &amp;quot;Global Heat Map&amp;quot;" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;The colour scheme of the above map ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). India is notably orange and is thus subject to some of the highest levels of surveillance by the NSA in the world.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;During a mere 30-day period, the largest amount of intelligence was gathered from Iran with more than 14 billion reports, while Pakistan, Jordan and Egypt were next in line in terms of intelligence gathering. Unfortunately, India ranks 5th worldwide in terms of intelligence gathering by the NSA. According to the map above, 6.3 billion pieces of intelligence were collected from India by the NSA from February to March 2013. In other words, India is currently one of the top countries worldwide which is under the US microscope, with &lt;/span&gt;&lt;a href="http://epaper.timesofindia.com/Default/Scripting/ArticleWin.asp?From=Archive&amp;amp;Source=Page&amp;amp;Skin=ETNEW&amp;amp;BaseHref=ETBG/2013/06/12&amp;amp;PageLabel=20&amp;amp;ForceGif=true&amp;amp;EntityId=Ar02002&amp;amp;ViewMode=HTML"&gt;&lt;span&gt;15% of all information&lt;/span&gt;&lt;/a&gt;&lt;span&gt; being tapped by the NSA coming from India during February-March 2013. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance"&gt;&lt;span&gt;Edward Snowden&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is the 29-year-old man behind the NSA leaks...who is responsible for one of the most important leaks in US (and one may argue, global) history.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt; 
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="350" width="425"&gt;
&lt;param name="src" value="http://www.youtube.com/v/5yB3n9fu-rM"&gt;&lt;embed height="350" width="425" src="http://www.youtube.com/v/5yB3n9fu-rM" type="application/x-shockwave-flash"&gt; &lt;/embed&gt;
&lt;/object&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;So what does this all mean for India?&lt;/span&gt;&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In his &lt;/span&gt;&lt;a href="http://www.youtube.com/watch?v=Wl5OQz0Ko8c"&gt;&lt;span&gt;keynote speech at the 29th Chaos Communications Congress&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Jacob Appelbaum stated that surveillance should be an issue which concerns “everyone´s department”, especially in light of the NSA spying on citizens all over the world. True, the U.S. appears to have &lt;/span&gt;&lt;a href="http://space.jpl.nasa.gov/msl/Programs/corona.html"&gt;&lt;span&gt;a history in spying on civilians&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, and the Corona, Argon, and Lanyard satellites used by the U.S. for photographic surveillance from the late 1950s is proof of that. But how does all this affect India?&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;By &lt;/span&gt;&lt;a href="http://www.nytimes.com/2013/06/09/us/revelations-give-look-at-spy-agencys-wider-reach.html?_r=1&amp;amp;"&gt;&lt;span&gt;tapping into the servers of some of the biggest Internet companies in the world,&lt;/span&gt;&lt;/a&gt;&lt;span&gt; such as Google, Facebook and Microsoft, the NSA does not only gain access to the data of American users, but also to that of Indian users. In fact, the “global heat map” of the controversial &lt;/span&gt;&lt;a href="http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining"&gt;&lt;span&gt;Boundless Informant&lt;/span&gt;&lt;/a&gt;&lt;span&gt; data mining tool clearly shows that India ranked 5th worldwide in terms of intelligence gathering, which means that not only is the NSA spying on Indians, but that it is also spying on India more than most countries in the world. Why is that a problem?&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;India has no privacy law. India lacks privacy legislation which could safeguard citizens from potential abuse by different types of surveillance. But the worst part is that, even if India did have privacy laws, that would still not prevent the NSA from tapping into Indians´ data through the servers of Internet companies, such as Google. Moreover, the fact that India lacks a Privacy Commissioner means that the country lacks an expert authority who could address data breaches. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Recent reports that the NSA is tapping into these servers ultimately means that the U.S. government has access to the data of Indian internet users. However, it remains unclear how the U.S. government is handling Indian data, which other third parties may have access to it, how long it is being retained for, whether it is being shared with other third parties or to what extent U.S. intelligence agencies can predict the behaviour of Indian internet users through pattern matching and data mining. &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Many questions remain vague, but one thing is clear: through the NSA´s total surveillance programme, the U.S. government can potentially control the data of billions of internet users around the world, and with this control arises the possibility of oppression. It´s not just about the U.S. government having access to Indians´ data, because access can lead to control and according to security expert, &lt;/span&gt;&lt;a href="http://www.wired.com/politics/security/commentary/securitymatters/2008/05/securitymatters_0515"&gt;&lt;span&gt;Bruce Schneier&lt;/span&gt;&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;span&gt; “Our data reflects our lives...and those who control our data, control our lives”. &lt;/span&gt;&lt;/blockquote&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;How are Indians supposed to control their data, and thus their lives, when it is being stored in foreign servers and the U.S. has the “right” to tap into that data? The NSA leaks mark a significant point in our history, not only because they are resulting in &lt;/span&gt;&lt;a href="http://www.bbc.co.uk/news/business-22867185"&gt;&lt;span&gt;corporations seeking data request transparency&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, but also because they are unveiling a major global issue: surveillance is a fact and can no longer can be denied. The massive, indiscriminate collection of Indians´ data, without their prior knowledge or consent, and without the provision of guarantees in regards to how such data is being handled, poses major threats to their right to privacy and other human rights. The potential for abuse is real, especially since &lt;/span&gt;&lt;a href="http://www.statsoft.com/textbook/data-mining-techniques/"&gt;&lt;span&gt;the larger the database, the larger the probability for error&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Mining more data does not necessarily increase security; on the contrary, it increases the potential for abuse, especially since &lt;/span&gt;&lt;a href="http://dspace.flinders.edu.au/xmlui/bitstream/handle/2328/26269/wahlstrom%20on%20the%20impact.pdf;jsessionid=D948EDED21805D871C18E6E4B07DAE14?sequence=1"&gt;&lt;span&gt;technology is not infallible &lt;/span&gt;&lt;/a&gt;&lt;span&gt;and data trails are not always accurate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;What does this mean? Well, probably the best case scenario is that an individual is targeted. The worst case scenario is that an individual is imprisoned (or maybe even &lt;/span&gt;&lt;a href="http://www.time.com/time/world/article/0,8599,2097899,00.html"&gt;&lt;span&gt;murdered - remember the drones&lt;/span&gt;&lt;/a&gt;&lt;span&gt;?) because his or her data “says” that he or she is guilty. Is that the type of world we want to live in?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;What can we do now?&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Let´s start from the basics. India needs privacy legislation. India needs privacy legislation now. India needs privacy legislation now, more than ever.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Privacy legislation would regulate the collection, access to, sharing of, retention and disclosure of all personal data within India. Such legislation could also regulate surveillance and the interception of communications, in compliance with the right to privacy and other human rights. A Privacy Commissioner would also be established through privacy legislation, and this expert authority would be responsible for overseeing the enforcement of the Privacy Act and addressing data breaches. But clearly, privacy legislation is not enough. The various privacy laws of European countries have not prevented the NSA from tapping into the servers of some of the biggest Internet companies in the world and from gaining access to the data of millions of citizens around the world. Yet, privacy legislation in India should be a basic prerequisite to ensure that data is not breached within India and by those who may potentially gain access to Indian national databases.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;As a next- but immediate- step, the Indian government should demand answers from the NSA to the following questions:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;What type of data is collected from India and which parties have access to it?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;How long is such data retained for? Can the retention period be renewed and if so, for how long?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Is data collected on Indian internet users shared with third parties? If so, which third parties can gain access to this data and under what conditions? Is a judicial warrant required?&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;In addition to the above questions, the Indian government should also request all other information relating to Indians´ data collected through the PRISM programme, as well as proceed with a dialogue on the matter. Governments are obliged to protect their citizens from the abuse of their human rights, especially in cases when such abuse may occur from foreign agencies. Thus, the Indian government should ensure that the future secret collection of Indians´ data is prevented and that Internet companies are transparent and accountable in regards to who has access to their servers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;On an individual level, Indians can protect their data by using encryption, such as &lt;/span&gt;&lt;a href="http://www.gnupg.org/"&gt;&lt;span&gt;GPG encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for their emails and &lt;/span&gt;&lt;a href="https://www.encrypteverything.ca/index.php/Setting_up_OTR_and_Pidgin"&gt;&lt;span&gt;OTR encryption&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for instant messaging. &lt;/span&gt;&lt;a href="https://www.torproject.org/"&gt;&lt;span&gt;Tor&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is free software and an open network which enables online anonymity by bouncing communications around a distributed network of relays run by volunteers all around the world. Tor is originally short for “The Onion Router” and “onion routing” refers to the layers of encryption used. In particular, data is encrypted and re-encrypted multiple times and is sent to randomly selected Tor relays. Each relay decrypts a “layer” of encryption to reveal it only to the next relay in the circuit and the final relay decrypts the last “layer” of encryption. Essentially, Tor reduces the possibility of original data being understood in transit and conceals the routing of it.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;To avoid surveillance, the use of &lt;/span&gt;&lt;a href="https://www.eff.org/https-everywhere"&gt;&lt;span&gt;HTTPS-Everywhere&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the &lt;/span&gt;&lt;a href="https://www.torproject.org/download/download-easy.html"&gt;&lt;span&gt;Tor Browser&lt;/span&gt;&lt;/a&gt;&lt;span&gt; is recommended, as well as the use of combinations of additional software, such as &lt;/span&gt;&lt;a href="https://addons.mozilla.org/en-us/thunderbird/addon/torbirdy/"&gt;&lt;span&gt;TorBirdy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.enigmail.net/home/index.php"&gt;&lt;span&gt;Enigmail&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, OTR and &lt;/span&gt;&lt;a href="https://joindiaspora.com/"&gt;&lt;span&gt;Diaspora&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;a href="https://blog.torproject.org/blog/prism-vs-tor"&gt;&lt;span&gt;Tor hidden services are communication endpoints &lt;/span&gt;&lt;/a&gt;&lt;span&gt;that are resistant to both metadata analysis and surveillance, which is why they are highly recommended in light of the NSA´s surveillance. An XMPP client that ships with an XMPP server and a Tor hidden service is a good example of how to avoid surveillance.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Protecting our data is more important now than ever. Why? Because global, indiscriminate, mass data collection is no longer a hypothesis: it´s a fact. And why is it vital to protect our data? Because if we don´t, we are ultimately sleepwalking into our control and oppression where basic human rights, such as freedom, would be a myth of the past.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://necessaryandproportionate.net/"&gt;&lt;span&gt;principles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; formulated by the Electronic Frontier Foundation and Privacy International on communication surveillance should be taken into consideration by governments and law enforcement agencies around the world. In short, these &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights"&gt;&lt;span&gt;principles&lt;/span&gt;&lt;/a&gt;&lt;span&gt; are:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Limitations to the right to privacy must be prescribed by law&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Legitimate purpose&lt;/b&gt;: Access to communications or communications metadata should be restricted to authorised public authorities for investigative purposes and in pursuit of a legitimate purpose&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Access to communications or communications metadata by authorised public authorities should be restricted to strictly and demonstrably necessary cases&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Public authorities should be restricted from adopting or implementing measures that allow access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Competent authority&lt;/b&gt;: Authorities must be competent when making determinations relating to communications or communications metadata&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Governments must respect and guarantee an individual's human rights, that may interference with such rights must be authorised in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: An independent oversight mechanism should be established to ensure transparency of lawful access requests&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: Service providers are responsible for the secure transmission and retention of communications data or communications metadata&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: Mutual legal assistance processes between countries and how they are used should be clearly documented and open to the public&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: Governments should ensure that authorities and organisations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress&lt;/p&gt;
&lt;/li&gt;
&lt;li dir="ltr" style="list-style-type: disc; "&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of providing access to user data should be borne by the public authority undertaking the investigation&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Applying these above principles is a prerequisite, but may not be enough. Now is the time to resist unlawful and non-transparent surveillance. Now is the time for &lt;/span&gt;&lt;span&gt;everyone &lt;/span&gt;&lt;span&gt;to fight for their right to be free.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Is a world without freedom worth living in?&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance'&gt;https://cis-india.org/internet-governance/blog/india-subject-to-nsa-dragnet-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-06T10:20:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook">
    <title>Govt mulls advisory on privacy issues related to Google, Facebook</title>
    <link>https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook</link>
    <description>
        &lt;b&gt;The Government is set to harden its stand against foreign Internet firms in asking them to comply with Indian laws. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by Thomas K Thomas was &lt;a class="external-link" href="http://www.thehindubusinessline.com/industry-and-economy/info-tech/govt-mulls-advisory-on-privacy-issues-related-to-google-facebook/article4800901.ece?ref=wl_industry-and-economy"&gt;published in the Hindu Business Line&lt;/a&gt; on June 10, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to a top Government source, an advisory may be issued in the  interest of general public to make them aware of the privacy issued  while using services offered by foreign Internet companies such as  Google and Facebook.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This follows an international media expose on how US agencies were  getting access to user data from Internet companies such as Google and  Facebook.&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Final Strategy Soon&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Top official in the Ministry of Telecom and IT told &lt;i&gt;Business Line&lt;/i&gt; that the National Security Advisor, under the Prime Minister’s Officer,  is discussing the issue and will outline the final strategy on  Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key concern is that the US security agencies may have collected data  from key Indian accounts using services from any of the Internet  companies. A number of Government officials also use email service from  Google and MS Outlook, which may have been accessed by the US agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other major concern is that Indian security agencies have also been  seeking access to data from these foreign companies but so far they have  not obliged on grounds that they do not come under the purview of  Indian laws.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“If the US Government can get access to data from these companies, why  can’t the Indian Government be given access,” posed a top functionary of  the telecom ministry.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While Google and other companies have denied knowledge to how the US  agencies got access to their networks, industry experts said that it’s  time India starts taking concrete steps to address the issue.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;B.K. Syngal, Former Chairman, Videsh Sanchar Nigam Ltd, said, “If we  believed that our privacy is sacred then we would have taken effective  domestic measures, years ago, to ensure that the information of our  citizens remains private. To now say that multiple US companies have  betrayed our trust is meaningless.”&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Double Standards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Syngal said that there are double standards in the way organisations and  Government is handling the issue. “As a start, lets stop giving too  much time and space to the so called “Foreign Funded NGOs” teaching us  on privacy. Our problem is that we are not China. We are so ill equipped  that the third party interests aided and abetted by these NGOs would  prevail,” said Syngal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Sunil Abraham, Executive Director, Centre for Internet and  Society, companies such as Google and Facebook are foes when it comes to  privacy issues and friends when it comes to freedom of speech. “An  Indian consumer using any of these foreign websites has no privacy  rights whatsoever. The Indian Government also cannot force these  companies to follow Indian laws,” said Abraham.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook'&gt;https://cis-india.org/news/hindu-businessline-thomas-k-thomas-june-10-2013-govt-mulls-advisory-on-privacy-issues-related-to-google-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-02T14:31:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access">
    <title>Facebook, Google deny spying access</title>
    <link>https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access</link>
    <description>
        &lt;b&gt;The CEOs of Facebook and Google on Saturday categorically denied that the US National Security Agency had "direct access" to their company servers for snooping on Gmail and Facebook users. But both acknowledged that the companies complied with the 'lawful' requests made by the US government and shared user data with sleuths.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Javed Anwer was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-09/internet/39849496_1_facebook-ceo-mark-zuckerberg-user-data-ceo-larry-page"&gt;published in the Times of India&lt;/a&gt; on June 9, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a post titled "What the ...?" Google's official blog, CEO &lt;a href="http://timesofindia.indiatimes.com/topic/Larry-Page"&gt;Larry Page&lt;/a&gt; wrote, "We have not joined any program that would give the US  governmentâ€”or any other governmentâ€”direct access to our servers. We  had not heard of a program called PRISM until yesterday."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few hours later, Facebook CEO &lt;a href="http://timesofindia.indiatimes.com/topic/Mark-Zuckerberg"&gt;Mark Zuckerberg&lt;/a&gt; responded. "Facebook is not and has never been part of any program to  give the US or any other government direct access to our servers... We  hadn't even heard of PRISM before yesterday," he wrote on his page at  the social media site.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a few PowerPoint slides  allegedly leaked by an NSA official, nine technology companies - Google,  AOL, Apple, Yahoo, Microsoft, Skype, Facebook, YouTube and PalTalk -  are providing the US government easy access to user data. While all  companies have denied being part anything called PRISM, Facebook and  Google have been most vocal about it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few hours after Facebook  and Google statements, the New York Times said in a report that  technology companies had "opened discussions with national security  officials about developing technical methods to more efficiently and  securely share the personal data of foreign users".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"In some cases, they (companies) changed their computer systems to do so," noted the NYT report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statements by the CEOs have done little to allay privacy fears.  "The denials from the companies look highly coordinated, including  similar phrases in all their responses. I don't think they are lying  outright, though the NYT report suggests that they are telling a  half-truth. They may not provide the US government 'direct access' to  all their servers, but may be providing indirect access, or may just be  responding to very broad FISA orders," said Pranesh Prakash, a policy  director with Centre for Internet and Society in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Friday US president &lt;a href="http://timesofindia.indiatimes.com/topic/Barack-Obama"&gt;Barack Obama&lt;/a&gt; had tacitly acknowledged NSA surveillance programmes aimed at non-US  citizens. "You can't have a hundred per cent security and also then have  a hundred per cent privacy and zero inconvenience. You know, we're  going to have to make some choices as a society," he told reporters in  the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Page and Zuckerberg also called on the governments to be  more open about surveillance programmes. "The level of secrecy around  the current legal procedures undermines the freedoms we all cherish,"  wrote Page.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Added Zuckerberg, "We strongly encourage all  governments to be much more transparent about all programs aimed at  keeping the public safe. It's the only way to protect everyone's civil  liberties and create the safe and free society we all want over the long  term."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access'&gt;https://cis-india.org/news/times-of-india-javed-anwer-june-9-2013-facebook-google-deny-spying-access&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-07-02T10:18:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism">
    <title>Internet firms deny existence of PRISM</title>
    <link>https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism</link>
    <description>
        &lt;b&gt;Nothing is private anymore. According to a leak in the US, which revealed the wide reach of a mass surveillance programme by intelligence agencies, messages, posts, chats on your computer or phone are all vulnerable to interception, thanks to direct access to servers of major tech companies.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Javed Anwer and Ishan Srivastava was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-08/internet/39833419_1_assistance-treaty-user-data-personal-data"&gt;published in the Times of India&lt;/a&gt; on June 8, 2013. Sunil Abraham and Pranesh Prakash are quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The existence of the programme, called Prism, was first reported by the  Washington Post and the Guardian newspaper after they received a tip-off  from a whistleblower in &lt;a href="http://timesofindia.indiatimes.com/topic/National-Security-Agency"&gt;National Security Agency&lt;/a&gt; in the US. The whistleblower claimed that NSA has direct access to all  the data that flows through the servers of Google, Facebook, Microsoft,  Apple, Sykpe, &lt;a href="http://timesofindia.indiatimes.com/topic/YouTube"&gt;Youtube&lt;/a&gt;, AOL and Paltalk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Later, the NSA reportedly acknowledged the existence of the  programme but said that it collected data only from foreign nationals.  While it may come as a relief to the US citizens, it underscores the  fact that people not residing in the US, including Indians, are fair  game. What is even more alarming is the fact that US authorities are  using the technology companies headquartered in the country to spy on &lt;a href="http://timesofindia.indiatimes.com/topic/The-Rest-%28musician%29"&gt;the rest&lt;/a&gt; of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All companies named in the leaks have denied the existence of Prism. A  Yahoo spokesperson said on Friday, ""Yahoo! takes users' privacy very  seriously. We do not provide the government with direct access to our  servers, systems, or network."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy International, a privacy  watchdog organisation, said it is possible that companies would not be  aware of the government tapping into their servers. "Until we know  whether this information was obtained through filters, interception, or  some another method, it is difficult to know how the breadth of access  the NSA has."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Indian users would seem to have no way to defend themselves if the &lt;a href="http://timesofindia.indiatimes.com/topic/US-Government"&gt;US government&lt;/a&gt; wants to access their data. Pavan Duggal, a specialist in cyber law,  said, "Indian users don't have any protection against the US authorities  seeking their data from the US companies."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technology companies said they comply with local laws while dealing  with issues related to personal data of a user. In response to queries  from TOI, both Google and Facebook said that they used "mutual legal  assistance treaty" to handle international requests for data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mutual legal assistance treaty is understood to have governed by actual  treaties that two nations may have between them for sharing of user  data. A Facebook official said that if a US agency wanted to access the  data belonging to an Indian citizen, the sleuths would have to follow  the diplomatic channels and get the data only when Indian authorities  have approved it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google too talked "mutual legal assistance  treaty" but it didn't clarify how it worked. Google officials pointed  out the company guidelines which noted that any non-US government agency  would have to use mutual legal assistance treaty to access user data.  But the company public guidelines don't make any mention of the  procedure followed in the cases where a US agency requests data on  non-US users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft directed TOI to its official statement  denying the existence of Prism. It refused to discuss how it handled the  requests from US authorities seeking data of foreigners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a policy director with Centre for Internet and Society (CIS), said that it was high time the &lt;a href="http://timesofindia.indiatimes.com/topic/Indian-Government"&gt;Indian government&lt;/a&gt; stood up for its citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Indian government needs to come with a strong and clear law to protect  the privacy of Indian users. The law has to make it clear to companies  operating in India that they need to respect the privacy of Indian  users, even when they are dealing with the governments outside India,"  he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, providing direct access to servers to an agency like NSA  may not necessarily be a breach of agreement between the users of  websites like Google and Facebook and its owners. Sunil Abraham,  executive director at CIS said, "I have not studied end-user agreements  carefully, but usually they have provisions for communication  interception and data access in accordance with legal procedure."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"But more importantly, this is a violation of US data access and  interception law. The US government has been going around the world  preaching Internet freedom to authoritarian regimes. And now it turns  out that their practices are worse that many of the regimes they have  been criticizing. That is why it is a complete &lt;a href="http://timesofindia.indiatimes.com/topic/Scandal"&gt;scandal&lt;/a&gt;," Abraham said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, the surveillance may run contrary to a whole range of  international legal instruments. For example, the ICCPR, ratified by the  USA, says that "no one shall be subject to arbitrary or unlawful  interference with his private life, family, home or correspondence,"  said Joe McNamee, executive director of European Digital Rights, a  privacy watchdog based in Europe.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism'&gt;https://cis-india.org/news/times-of-india-javed-anwer-ishan-srivastava-june-8-2013-internet-firms-deny-existence-of-prism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-02T07:47:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system">
    <title>Indian Government Quietly Brings In Its 'Central Monitoring System': Total Surveillance Of All Telecommunications</title>
    <link>https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system</link>
    <description>
        &lt;b&gt;There's a worrying trend around the world for governments to extend online surveillance capabilities to encompass all citizens -- often justified with the usual excuse of combatting terrorism and/or child pornography.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.techdirt.com/articles/20130508/09302923002/indian-government-quietly-brings-its-central-monitoring-system-total-surveillance-all-communications.shtml"&gt;published in &lt;b&gt;tech dirt&lt;/b&gt;&lt;/a&gt; on June 8, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The latest to join this unhappy club is India, which has put in place what sounds like &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms"&gt;a massively intrusive system&lt;/a&gt;, as this article from The Times of India makes clear:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;The government last month quietly began rolling out a  project that gives it access to everything that happens over India's  telecommunications network -- online activities, phone calls, text  messages and even social media conversations. Called the Central  Monitoring System, it will be the single window from where government  arms such as the National Investigation Agency or the tax authorities  will be able to monitor every byte of communication.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;This project has been under development for two years, but in almost total secrecy:  &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;"In the absence of a strong privacy law that promotes  transparency about surveillance and thus allows us to judge the utility  of the surveillance, this kind of development is very worrisome," warned  Pranesh Prakash, director of policy at the Centre for Internet and  Society. "Further, this has been done with neither public nor  parliamentary dialogue, making the government unaccountable to its  citizens."&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt; That combination of total surveillance and zero transparency is a  dangerous one, providing the perfect tool for monitoring and controlling  political and social dissent.  If India wishes to maintain its claim to  be "the world's largest democracy", its government would do well to  introduce some safeguards against abuse of the new system, such as  strong privacy laws, as well as engaging the Indian public in an open  debate about &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;what exactly such extraordinary surveillance powers might be used for&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system'&gt;https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-02T09:12:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta">
    <title>Governance in the Age of the Internet and Free Trade Agreements</title>
    <link>https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at this event organized by Thai Netizen Network on June 8, 2013 at Queen Sirikit National Convention Center. The Ministry of Information and Communication  and the National Science and Technology Development Agency were co-hosts for the event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://internetsociety.org/inet-bangkok/"&gt;Click to read the details of the event published on Internet Society website&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the age of accelerated international trade and the promotion of free  flowing cross-border data transactions, countries and regions are  working towards forming a commonly agreed modus operandi and protocols.  These protocols seek to facilitate the growth of e-trade, ensure a  secure data flow(economic transactions) and protection of its data in  the network. In the recent, there has been strong attention by consumers  and businesses with the growing scope and content of these agreements  addressing Intellectual Property (IP). Emerging trend studies show that  there is a growing practices to incorporate mutually exclusive  arrangements without involving other stakeholders which happens in  closed door negotiations i.e. government to government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, the European’s Anti-Counterfeiting Trade Agreement  (ACTA) proposal and the U.S. Trans-Pacific Partnership Agreement (TPP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bigger concern raised by other stakeholders has been the secrecy  of these arrangements and the insufficient protection of consumers and  citizens rights in its consideration. So far, the lack of legitimacy and  proportionality of legal policy measures has created unintended  consequences and collateral damages in far reaching manners whether  socially, economically or technologically. Citing practices of filtering  technology, deep packet inspection, and Internet cut-off, are  introduced by internet service providers to meet legal requirements.  Activities in question may vary from country to country, some focus on  violations of intellectual property, some on the control of political  voices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notably, list of concerns have been raised explicitly by UN Special  Rapporteur to adhere to the promotion and protection of the right to  freedom of opinion and expression were recommended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This workshop is aim to create discussion on the related topics among  stakeholders both in Thailand and in the region of the direct and  indirect implications of various developments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Target:&lt;/b&gt; Regulators, consumer rights, human rights activities, Lawyers&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Expected Outcomes&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Understanding the dynamics of free trade agreements (i.e. APEC, TPP,  and    ACTA) and its implications on Internet regulations, national  sovereignty, and civil rights from various perspectives. (Big picture)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Basic understanding of how various policy and technology related  measures or solutions (i.e. digital rights management technology and  deep-packet inspection) are used to address Intellectual Property (IP)  and how it directly impacts freedom of expression and individual  privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Looking Ahead: The developments and upcoming legislations/regulation  challenges in both Thailand and the region i.e. new draft of  Computer-related Crime Act, new draft of Copyright Act, and the Personal  Data Protection Bill.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li&gt;Konstantinos Komaitis, Policy Advisor, Internet Society, Geneva&lt;/li&gt;
&lt;li&gt;Nakorn Serirak, Policy Advisor, Thai Netizen Network, Bangkok&lt;/li&gt;
&lt;li&gt;Sawatree Suksri, Lecturer, Faculty of Law, Thammasat University, Bangkok&lt;/li&gt;
&lt;li&gt;Lokman Tsui, Policy Advisor, Google Asia Pacific, Hong Kong&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Moderator&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Mike Hayes, Chair, International MA Program in Human Rights, Mahidol University&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click the PDFs below to download the full details and the presentation:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/governance-in-the-age-of-internet-and-fta.pdf" class="internal-link"&gt;Governance in the Age of the Internet and Free Trade Agreements&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/internet-and-open-public-data-ppp.pdf" class="internal-link"&gt;Internet and Open Public Data&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta'&gt;https://cis-india.org/news/inet-bangkok-june-8-2013-governance-in-the-age-of-internet-and-fta&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-07-03T05:04:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/section-66-it-act.txt">
    <title>Computer Related Offences</title>
    <link>https://cis-india.org/internet-governance/resources/section-66-it-act.txt</link>
    <description>
        &lt;b&gt;If any person, dishonestly or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to three years or with fine which may extend to five lakh rupees or with both.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;Explanation&lt;br /&gt;&lt;/b&gt;For the purposes of this section,&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;the word “dishonestly” shall have the meaning assigned to it in section 24 of the Indian Penal Code;&lt;/li&gt;
&lt;li&gt;the word “fraudulently” shall have the meaning assigned to it in section 25 of the Indian Penal Code.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/section-66-it-act.txt'&gt;https://cis-india.org/internet-governance/resources/section-66-it-act.txt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-07T10:47:36Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/section-43-it-act.txt">
    <title>Section 43 of the Information Technology Act</title>
    <link>https://cis-india.org/internet-governance/resources/section-43-it-act.txt</link>
    <description>
        &lt;b&gt;Given below is the text of section 43 of the IT Act:&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;43. &lt;b&gt;Penalty and compensation for damage to computer, computer system, etc&lt;/b&gt;.&lt;br /&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network, or computer resource —&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;accesses or secures access to such computer, computer system or computer network; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;disrupts or causes disruption of any computer, computer system or computer network; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;denies or causes the denial of access to any person authorised to access any computer, computer system or computer network by any means; (g) provides any assistance to any person to facilitate access to a computer, computer system or computer network in contravention of the provisions of this Act, rules or regulations made thereunder; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;charges the services availed of by a person to the account of another person by tampering with or manipulating any computer, computer system, or computer network, he shall be liable to pay damages by way of compensation to the person so affected. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;steel, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;i&gt;Explanation&lt;/i&gt;.&lt;br /&gt;For the purposes of this section:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;"computer contaminant" means any set of computer instructions that are designed —&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or&lt;/li&gt;
&lt;li&gt;by any means to usurp the normal operation of the computer, computer system, or computer network;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"computer data base" means a representation of information, knowledge, facts, concepts or instructions in text, image, audio, video that are being prepared or have been prepared in a formalised manner or have been produced by a computer, computer system or computer network and are intended for use in a computer, computer system or computer network;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"computer virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, daia or instruction is executed or some other event takes place in that computer resource;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"damage" means to destroy, alter, delete, add, modify or rearrange any computer resource by any means.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;"computer source code" means the listing of programmes, computer commands, design and layout and programme analysis of computer resource in any form.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/section-43-it-act.txt'&gt;https://cis-india.org/internet-governance/resources/section-43-it-act.txt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-07T10:37:04Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation">
    <title>‘Hacking’ sparks row over exam evaluation</title>
    <link>https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation</link>
    <description>
        &lt;b&gt;Over the past two days, Cornell University student Debarghya Das’ blog post on ‘Hacking the Indian Education System’ has kicked off a debate across the country over the security of data published online and the practice of moderation of marks obtained by school students in board examinations. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Vasudha Venugopal and Karthik Subramanian was &lt;a class="external-link" href="http://www.thehindu.com/news/national/hacking-sparks-row-over-exam-evaluation/article4788750.ece"&gt;published in the Hindu&lt;/a&gt; on June 7, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The 20-year-old Cornell student extracted large amounts of class X and  XII student results from a website that hosted the ICSE results using an  automated program. Over 1,760 schools are affiliated to the ICSE and  more than 1.2 lakh students took the board exams. Based on  interpretation of the data sets, he raised allegations of large-scale  “tampering” of marks by the authorities, ostensibly to maintain a  healthy graph on the results.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Information Security experts said what the student did could not be  viewed as a major security breach as much as it was exploiting a  loophole. “Anyone with basic programming skills will be able to pull it  off,” said Pranesh Prakash, policy director at the Bangalore-based  Center for Internet and Society. “There are add-ons available on popular  internet browers that allow users to read the embedded codes on a  website and run programs to mine data.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Government websites are most susceptible to loopholes because too many  people use them, says Nitesh Betala, Chennai coordinator of Null, a  community of programmers that meets regularly to explore these loopholes  in public domain websites. “We inform the system administrators  directly hoping that they would plug loopholes before others exploit  them.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Debarghya too explained on his blog (deedy.quora.com) on Thursday that  what he did was not illegal. “I did not illegally access any database  system. All I did was access information that was available to any  person who entered a number into the website could access. I simply  mined the data.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The ICSE council, on its part, said it does not publish the examination  results in an online manner on its website. Instead, hard copies of  results are despatched to schools. But the results are disseminated to  third parties such as media organisations.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Krupakar Manukonda, who runs a blog on education for the not-for-profit  organisation Takshashila, said: “The online results of all the boards  have serious privacy problems. I think the respective boards should  issue a passcode along with a hall ticket or entering Date of Birth,  First name and Last name should be made mandatory to access marks.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Das deduced after much data crunching and statistical analysis that the  “marks had been tampered with”. His claim is supported by graphs  purporting to show that nearly 33 scores, such as 91, 92, 86 and so on,  were never awarded to any student.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, teachers deny the allegation. “The word tampering is wrong.  There is moderation that happens across education boards,” explained a  teacher, who has worked with ICSE schools in Hyderabad and Chennai.  “After the first round of corrections, raw data is given to officials  and head examiners who analyse how students have performed. They try to  ensure the bell curve of the results does not look awkward. If it does,  the implication is that the checking has been either too liberal or very  strict.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;After the first moderation, there is a final moderation which is often  done by a different set of teachers. “There are some instructions given  to us earlier, and some changes made later, depending on analysis by the  board,” said a teacher. Teachers are not told about moderation methods  in both CBSE and ICSE boards.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The ICSE council says that it does follow the practice of moderation.  “In keeping with the practice followed by examination conducting bodies,  a process of standardisation is applied to the results, so as to take  into account the variations in difficulty level of questions over the  years (which may occur despite applying various norms and yardsticks),  as well as the marginal variations in evaluation of answer scripts by  hundreds of examiners (inter-examiner variability), for each subject.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Some teachers are however puzzled by the findings. “It is understandable  that there are many 35s because a student on the verge of passing, is  often pushed to the mark. But I don’t understand why there are no 85,  87, 89, 91 and 93. And, with cut throat competition for every single  mark in colleges, teachers are very careful, especially with top scoring  papers,” said another senior teacher.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation'&gt;https://cis-india.org/news/the-hindu-june-7-2013-vasudha-venugopal-karthik-subramanian-hacking-sparks-row-over-exam-evaluation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-02T08:58:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas">
    <title>Indian student in Cornell University hacks into ICSE, ISC database</title>
    <link>https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas</link>
    <description>
        &lt;b&gt;A 20-year-old Indian student from Cornell University hacked into the database of ICSE (Class X) and ISC (Class XII) school exam results, exposed glaring anomalies in the marking system and went on to merrily write about his exploits in an online post.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Kim Arora was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-06-06/security/39787770_1_cisce-icse-gerry-arathoon"&gt;published in the Times of India&lt;/a&gt; on June 6, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Kolkata-born Debarghya Das, majoring in computer science, says that all  he had to do was run a simple program that entered all roll numbers  after defining a range to get access to all the results. "It is shocking  they haven't implemented a more secure system," Das told TOI on phone  from New York.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the result's data was crunched, analysed and plotted in  graphs, Das discovered an interesting incongruity in the marking system:  there are 33 different scores unattained between the passing mark of 35  and the maximum of 100 by the nearly 1,50,000 who appeared for the ICSE  (Class X) exam. According to Das' findings, not a single student got  the following marks: 36, 37, 39, 41, 43, 45, 47, 49, 51, 53, 55, 56, 57,  59, 61, 63, 65, 67, 68, 70, 71, 73, 75, 77, 79, 81, 82, 84, 85, 87, 89,  91, 93. Similarly, in the case of ISC (Class XII exam) a set of 24  marks between 40 and 100 were found to be unattained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When  contacted, chairperson of the CI SCE (Council for the Indian School  Certificate Examinations) Gerry Arathoon, refused to comment on both  data security and the unattained marks. "I can't say anything until I  have had a look at things myself," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Das says that the  missing marks indicate that perhaps they were tampered with. He offers  mathematical and statistical arguments to defend his position in his  online post. He says that the ISC anomaly appears to be a case of  awarding "grace marks" and writes -- "Everything from 35 onwards, and  most things from 23 onward seem blindly promoted to a pass mark."&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/VirtualReality.png" alt="Virtual Reality" class="image-inline" title="Virtual Reality" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;Pranesh Prakash, policy director at the Center for Internet and Society,  says one needn't even be a techie to execute such a hack. "You don't  need real technical skills to do this. You just need to figure out the  ranges and feed them in. It is an interesting revelation that the  website does nothing to obfuscate the javascript for security, but one  can still retrieve data without that information. Once you have the  data, it requires two minutes of programming to get it in a spreadsheet," says Prakash. In his post, titled "Hacking into the Indian Education System", Das wrote that he was doing this to "demonstrate how few measures our education board takes to hide such sensitive information". &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The student also told the TOI that it wasn't possible to change any values in marks and upload fudged data again, and that he made any significant progress in this direction only about 3-4 days after the results were announced. His online post says he also has the data for CBSE class XII. Though he hasn't yet made it public, he does admit it was harder to crack than CISCE, though not altogether difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Schooled in Kolkata, Das is curren tly interning at Google, working on  YouTube's captioning system. He is also working on a tongue-controlled  game and has earlier been active in game and applet design. The idea to  hack the results came to him fo llowing a desire to help two close &lt;a href="http://timesofindia.speakingtree.in/topics/life/friends"&gt;friends&lt;/a&gt; who had recently taken the exams.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Das, nicknamed Deedy, told ToI that he worked on the ICSE and ISC  results off and on for a week, but it essentially took about 4-5 hours  to get all the data."It took me more time to write the blog post," says  Das, referring to his 19-page post with all the graphs, data and  explanations that is currently online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For Das, there was only one other takeaway from the whole exercise.  "Regardless of any tampering, it would be nice to see a transparent exam  scheme. SAT (Scholastic Assessment Test) publishes everything related  to the exam results every year. It is inconceivable that a national  level exam board doesn't do that," he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas'&gt;https://cis-india.org/news/the-times-of-india-kim-arora-june-6-2013-indian-student-in-cornell-university-hacks-icse-isc-databas&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-02T07:39:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
