<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1006 to 1020.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/training-programme-for-chairs-convenor-and-experts-for-international-standardization-work"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-january-16-2017-sanjay-kumar-singh-lost-your-phone-here-is-how-you-can-make-your-mobile-theft-proof"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ndtv-december-24-2016-demonetisation-cost-versus-benefit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-mj-antony-ayan-pramanik-apurva-venkat-supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/social-media-monitoring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-proposed-icann-community-anti-harassment-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017">
    <title>Seminar on Understanding Financial Technology, Cashless India, and Forced Digitalisation (Delhi, January 24)</title>
    <link>https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017</link>
    <description>
        &lt;b&gt;The Centre for Financial Accountability is organising a seminar on "Understanding Financial Technology, Cashless India, and Forced Digitalisation" on Tuesday, January 24, at YWCA, Ashoka Road, New Delhi. Sumandro Chattapadhyay will participate in the seminar and speak on the emerging architecture of FinTech in India, as being developed and deployed by UIDAI and NPCI.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Cross-posted from &lt;a href="https://letstalkfinancialaccountability.wordpress.com/2017/01/20/understanding-financial-technology-cashless-india-forced-digitalisation/"&gt;Centre for Financial Accountability&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Programme Schedule&lt;/h2&gt;
&lt;h4&gt;09.30 - Registration&lt;/h4&gt;
&lt;h4&gt;10:00 - Introduction to the Seminar &amp;amp; Setting the Context&lt;/h4&gt;
&lt;p&gt;Madhuresh Kumar, National Alliance of People’s Movements&lt;/p&gt;
&lt;h4&gt;10:15–11:30 - Session 1 - Understanding the Political Context of FinTech&lt;/h4&gt;
&lt;p&gt;B P Mathur, Former Dy CAG&lt;/p&gt;
&lt;p&gt;Prabir Purkayastha, Free Software Movement of India and Knowledge Commons&lt;/p&gt;
&lt;p&gt;C P Chandrasekhar, Centre for Economic Studies and Planning, JNU&lt;/p&gt;
&lt;h4&gt;11:30-11:45 – Tea / Coffee break&lt;/h4&gt;
&lt;h4&gt;11:45-13:15 - Session 2 - How will FinTech Impact the Poor, and Labour and Banking Sector?&lt;/h4&gt;
&lt;p&gt;Ashim Roy, New Trade Union of India&lt;/p&gt;
&lt;p&gt;Nikhil Dey, Mazdoor Kisan Shakti Sangathan&lt;/p&gt;
&lt;p&gt;Ravinder Gupta, General Secretary, State Bank of India Officers Association&lt;/p&gt;
&lt;h4&gt;13:15-14:00 – Lunch&lt;/h4&gt;
&lt;h4&gt;14:00-15:30 - Session 3 - Understanding the Economic Context of FinTech&lt;/h4&gt;
&lt;p&gt;Indira Rajaraman, Former Director, RBI&lt;/p&gt;
&lt;p&gt;Tony Joseph, Sr. Journalist&lt;/p&gt;
&lt;h4&gt;15:30-17:00 - Session 4 - Understanding the Architecture of FinTech: Linkages to Aadhaar, IndiaStack etc&lt;/h4&gt;
&lt;p&gt;Sumandro Chattapadhyay, the Centre for Internet and Society&lt;/p&gt;
&lt;p&gt;Gopal Krishna, ToxicsWatch&lt;/p&gt;
&lt;h4&gt;17:00 – Tea&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017'&gt;https://cis-india.org/internet-governance/news/seminar-on-understanding-financial-technology-cashless-india-and-forced-digitalisation-delhi-jan-24-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Unified Payments Interface</dc:subject>
    
    
        <dc:subject>Financial Technology</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Financial Inclusion</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    

   <dc:date>2017-01-23T13:17:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/training-programme-for-chairs-convenor-and-experts-for-international-standardization-work">
    <title>Training programme for Chairs, Convenor and Experts for International Standardization Work</title>
    <link>https://cis-india.org/internet-governance/news/training-programme-for-chairs-convenor-and-experts-for-international-standardization-work</link>
    <description>
        &lt;b&gt;Udbhav Tiwari attended this programme organized by National Institute of Training for Standardization, under the Bureau of India Standards on the 19 and 20 of January, 2017 in Nodia, New Delhi.&lt;/b&gt;
        &lt;p&gt;Udbhav was invited due to CIS's membership at the LITD 17 at BIS and WG5 under ISO JTC 1 SC 27. For full schedule of the training programme &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/training-programme-structure"&gt;click here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/training-programme-for-chairs-convenor-and-experts-for-international-standardization-work'&gt;https://cis-india.org/internet-governance/news/training-programme-for-chairs-convenor-and-experts-for-international-standardization-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-20T17:06:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes">
    <title>The Design &amp; Technology behind India’s Surveillance Programmes</title>
    <link>https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes</link>
    <description>
        &lt;b&gt;There has been an exponential growth in the pervasive presence of technology in the daily lives of an average Indian citizen over the past few years. While leading to manifold increase in convenience and connectivity, these technologies also allow for far greater potential for surveillance by state actors.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While the legal and policy avenues of  state surveillance in India have been analysed by various organisations, there is very little available information about the technology and infrastructure used to carry out this surveillance. This appears to be   largely, according to the government, due to reasons of national security and sovereignty.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; This blog post will attempt to paint a picture of the technological infrastructure being used to carry out state surveillance in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Background&lt;/b&gt;&lt;br /&gt; The revelations by Edward Snowden about mass surveillance in mid-2013 led to an explosion of journalistic interest in surveillance and user privacy in India.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; The reports and coverage from this period, leading up to early 2015, serve as the main authority for the information presented in this blog post. The lack of information from official government sources as well as decreasing public spotlight on surveillance since that point of time generally have both led to little or no new information turning up about India’s surveillance regime since this period. However, given the long term nature of these programmes and the vast amounts of time it takes to set them up, it is fairly certain that the programmes detailed below are still the primary bedrock of state surveillance in the country, albeit having become operational and inter-connected only in the past 2 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The technology being used to carry out surveillance in India over the past 5 years is largely an upgraded, centralised and substantially more powerful version of the  surveillance techniques followed in India since the advent of telegraph and telephone lines: the tapping &amp;amp; recording of information in transit.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt; The fact that all the modern surveillance programmes detailed below have not required any new legislation, law, amendment or policy that was not already in force prior to 2008 is the most telling example of this fact. The legal and policy implication of the programmes illustrated below have been covered in previous articles by the Centre for Internet &amp;amp; Society which can be found here,&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt; here&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt; and here.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt; Therefore, this post will solely concentrate on the  technological design and infrastructure being used to carry out surveillance along with any new developments in this field that the three source mentioned would not have covered from a technological perspective.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Technology Infrastructure behind State Surveillance in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The programmes of the Indian Government (in public knowledge) that are being used to carry out state surveillance are broadly eight in number. These exclude specific surveillance technology being used by independent arms of the government, which will be covered in the next section of this post.  Many of the programmes listed below have overlapping jurisdictions and in some instances are cross-linked with each other to provide greater coverage:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Central Monitoring System (CMS)&lt;/li&gt;
&lt;li&gt;National Intelligence Grid (NAT-GRID)&lt;/li&gt;
&lt;li&gt;Lawful Intercept And Monitoring Project (LIM)&lt;/li&gt;
&lt;li&gt;Crime and Criminal Tracking Network &amp;amp; Systems (CCTNS)&lt;/li&gt;
&lt;li&gt;Network Traffic Analysis System (NETRA)&lt;/li&gt;
&lt;li&gt;New Media Wing (Bureau of New and Concurrent Media)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The post will look at the technological underpinning of each of these programmes and their operational capabilities, both in theory and practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Central Monitoring System (CMS)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Central Monitoring System (CMS) is the premier mass surveillance programme of the Indian Government, which has been in the planning stages since 2008&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt; Its primary goal is to replace the current on-demand availability of analog and digital data from service providers with a “central and direct” access which involves no third party between the captured information and the government authorities.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/a&gt; While the system is currently operated by the Centre for Development of Telematics, the unreleased three-stage plan envisages a centralised location (physically and legally) to govern the programme. The CMS is primarily operated by Telecom Enforcement and Resource Monitoring Cell (TERM) within the Department of Telecom, which also has a larger mandate of ensuring radiation safety and spectrum compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The technological infrastructure behind the CMS largely consists of Telecom Service Providers (TSPs) and Internet Service Providers (ISPs) in India being mandated to integrate Interception Store &amp;amp; Forward (ISF) servers with their Lawful Interception Systems required by their licences. Once these ISF servers are installed they are then connected to the Regional Monitoring Centres (RMC) of the CMS, setup according to geographical locations and population. Finally, Regional Monitoring Centre (RMC) in India is connected to the Central Monitoring System (CMS) itself, essentially allowing the collection, storage, access and analysis of data collected from all across the country in a centralised manner. The data collected by the CMS includes voice calls, SMS, MMS, fax communications on landlines, CDMA, video calls, GSM and even general, unencrypted  data travelling across the internet using the standard IP/TCP Protocol.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With regard to the analysis of this data,  Call Details Records (CDR) analysis, data mining, machine learning and predictive algorithms have been allegedly implemented in various degrees across this network.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/a&gt; This allows state actors to pre-emptively gather and collect a vast amount of information from across the country, perform analysis on this data and then possibly even take action on the basis of this information by directly approaching the entity (currently the TERM under C-DOT) operating the system. &lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/a&gt; The system has reached full functionality in mid 2016, with over 22 Regional Monitoring Centres functional and the system itself being ‘switched on’ post trials in gradual phases.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Intelligence Grid (NATGRID)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Intelligence Grid (NATGRID) is a semi-functional&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/a&gt; integrated intelligence grid that links the stored records and databases of several government entities in order to collect data, decipher trends and provide real time (sometimes even predictive) analysis of  data gathered across law enforcement, espionage and military agencies. The programme intends to provide 11 security agencies real-time access to 21 citizen data sources to track terror activities across the country.  The citizen data sources include bank account details, telephone records, passport data and vehicle registration details, the National Population Register (NPR), the Immigration, Visa, Foreigners Registration and Tracking System (IVFRT), among other types of data, all of which are already present within various government records across the country.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data mining and analytics are used to process the huge volumes of data generated from the 21 data sources so as to analyse events, match patterns and track suspects, with big data analytics&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/a&gt; being the primary tool to effectively utilise the project, which was founded to prevent another instance of the September, 2011 terrorist attacks in Mumbai. The list of agencies that will have access to this data collection and analytics platform are the Central Board of Direct Taxes (CBDT), Central Bureau of Investigation (CBI), Defense Intelligence Agency (DIA), Directorate of Revenue Intelligence (DRI), Enforcement Directorate (ED), Intelligence Bureau (IB), Narcotics Control Bureau (NCB), National Investigation Agency (NIA), Research and Analysis Wing (RAW), the Military Intelligence of Assam , Jammu and Kashmir regions and finally the Home Ministry itself.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of late 2015, the project has remained stuck because of bureaucratic red tape, with even the first phase of the four stage project not complete. The primary reason for this is the change of governments in 2014, along with apprehensions about breach of security and misuse of information from agencies such as the IB, R&amp;amp;AW, CBI, and CBDT, etc.&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/a&gt; However, the office of the NATGRID is now under construction in South Delhi and while the agency claims an exemption under the RTI Act as a Schedule II Organisation, its scope and operational reach have only increased with each passing year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lawful Intercept And Monitoring Project&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawful Intercept and Monitoring (LIM), is a secret mass electronic surveillance program operated by the Government of India for monitoring Internet traffic, communications, web-browsing and all other forms of Internet data. It is primarily run by the Centre for Development of Telematics (C-DoT) in the Ministry of Telecom since 2011.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The LIM Programme consists of installing interception, monitoring and storage programmes at international gateways, internet exchange hubs as well as ISP nodes across the country. This is done independent of ISPs, with the entire hardware and software apparatus being operated by the government. The hardware is installed between the Internet Edge Router (PE) and the core network, allowing for direct access to all traffic flowing through the ISP.  It is the primary programme for internet traffic surveillance in India, allowing indiscriminate monitoring of all traffic passing through the ISP for as long as the government desires, without any oversight of courts and sometimes without the knowledge of ISPs.&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/a&gt; One of the most potent capabilities of the LIM Project are live, automated keyword searches which allow the government to track all the information passing through the internet pipe being surveilled for certain key phrases in both in text as well in audio. Once these key phrases are successfully matched to the data travelling through the pipe using advanced search algorithms developed uniquely for the project, the system has various automatic routines which range from targeted surveillance on the source of the data to raising an alarm with the appropriate authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;LIM systems are often also operated by the ISPs themselves, on behalf of the government. They operate the device, including hardware upkeep, only to provide direct access to government agencies upon requests. Reports have stated that the legal procedures laid down in law (including nodal officers and formal requests for information) are rarely followed&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/a&gt; in both these cases, allowing unfettered access to petabytes of user data on a daily basis through these programmes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Crime and Criminal Tracking Network &amp;amp; Systems (CCTNS)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Crime and Criminal Tracking Network &amp;amp; System (CCTNS) is a planned network that allows for the digital collection, storage, retrieval, analysis, transfer and sharing of information relating to crimes and criminals across India.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/a&gt; It is supposed to primarily operate at two levels, one between police stations and the second being between the various governance structures around crime detection and solving around the country, with access also being provided to intelligence and national security agencies.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CCTNS aims to integrate all the necessary data and records surrounding a crime (including past records) into a Core Application Software (CAS) that has been developed by Wipro.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/a&gt; The software includes the ability to digitise FIR registration, investigation and charge sheets along with the ability to set up a centralised citizen portal to interact with relevant information. This project aims to use this CAS interface across 15, 000 police stations in the country, with up to 5, 000 additional deployments. The project has been planned since 2009, with the first complete statewide implementation going live only in August 2016 in Maharashtra. &lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While seemingly harmless at face value, the project’s true power lies in two main possible uses. The first being its ability to profile individuals using their past conduct, which now can include all stages of an investigation and not just a conviction by a court of law, which has massive privacy concerns. The second harm is the notion that the CCTNS database will not be an isolated one but will be connected to the NATGRID and other such databases operated by organisations such as the National Crime Records Bureau, which will allow the information present in the CCTNS to be leveraged into carrying out more invasive surveillance of the public at large.&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Network Traffic Analysis System (NETRA)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NETRA (NEtwork TRaffic Analysis) is a real time surveillance software developed by the Centre for Artificial Intelligence and Robotics (CAIR) at the Defence Research and Development Organisation. (DRDO) The software has apparently been fully functional since early 2014 and is primarily used by Indian Spy agencies, the Intelligence Bureau (IB) and the Research and Analysis Wing (RAW) with some capacity being reserved for domestic agencies under the Home Ministry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The software is meant to monitor Internet traffic on a real time basis using both voice and textual forms of data communication, especially social media, communication services and web browsing. Each agency was initially allocated 1000 nodes running NETRA, with each node having a capacity to analyse 300GB of information per second, giving each agency a capacity of around 300 TB of information processing per second.&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/a&gt; This capacity is largely available only to agencies dealing with External threats, with domestic agencies being allocated far lower capacities, depending on demand. The software itself is mobile and in the presence of sufficient hardware capacity, nothing prevents the software from being used in the CMS, the NATGRID or LIM operations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There has been a sharp and sudden absence of public domain information regarding the software since 2014, making any statements about its current form or evolution mere conjecture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Analysis of the Collective Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Independent of the capacity of such programmes, their real world operations work in a largely similar manner to mass surveillance programmes in the rest of the world, with a majority of the capacity being focused on decryption and storage of data with basic rudimentary data analytics.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/a&gt; Keyword searches for hot words like 'attack', 'bomb', 'blast' or 'kill' in the various communication stream in real time are the only real capabilities of the system that have been discussed in the public domain,&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/a&gt; which along with the limited capacity of such programmes&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/a&gt; (300 TB) is indicative of basic level of analysis that is carried  on captured data. Any additional details about the technical details about how India’s surveillance programmes use their captured data is absent from the public domain but they can presumed, at best, to operate with similar standards as global practices.&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Capacitative Global Comparison &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As can be seen from the post so far, India’s surveillance programmes have remarkably little information about them in the public domain, from a technical operation or infrastructure perspective. In fact, post late 2014, there is a stark lack of information about any developments in the mass surveillance field. All of the information that is available about the technical capabilities of the CMS, NATGRID or LIM is either antiquated (pre 2014) or is about (comparatively) mundane details like headquarter construction clearances.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/a&gt; Whether this is a result of the general reduction in the attention towards mass surveillance by the public and the media&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/a&gt; or is the result of actions taken by the government under the “national security” grounds under as the Official Secrets Act, 1923&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/a&gt; can only be conjecture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, given the information available (mentioned previously in this article) a comparative points to the rather lopsided position in comparison to international mass surveillance performance. While the legal provisions in India regarding surveillance programmes  are among the most wide ranging, discretionary and opaque in the world&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/a&gt; their technical capabilities seem to be anarchic in comparison to modern standards. The only real comparative that can be used is public reporting surrounding the DRDO NETRA project around 2012 and 2013.  The government held a competition between the DRDO’s internally developed software “Netra” and NTRO’s “Vishwarupal” which was developed in collaboration with Paladion Networks.&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/a&gt; The winning software, NETRA, was said to have a capacity of 300 GB per node, with a total of 1000 sanctioned nodes.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/a&gt; This capacity of 300 TB for the entire system, while seemingly powerful, is a miniscule fragment of 83 Petabytes traffic that is predicted to generated in India per day.&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/a&gt; In comparison, the PRISM programme run by the National Security Agency in 2013 (the same time that the NETRA was tested) has a capacity of over 5 trillion gigabytes of storage&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/a&gt;, many magnitudes greater than the capacity of the DRDO software. Similar statistics can be seen from the various other programmes of NSA and the Five Eyes alliance,&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/a&gt; all of which operated at far greater capacities&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/a&gt; and were held to be minimally effective.&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/a&gt; The questions this poses of the effectiveness, reliance and  proportionality of the Indian surveillance programme can never truly be answered due to the lack of information surrounding capacity and technology of the Indian surveillance programmes, as highlighted in the article. With regard to criminal databases used in surveillance, such as the NATGRID, equivalent systems both domestically (especially in the USA) and internationally (such as the one run by the Interpol)&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/a&gt; are impossible due to the NATGRID not even being fully operational yet.&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if we were to ignore the issues in principle with mass surveillance, the pervasive, largely unregulated and mass scale surveillance being carried in India using the tools and technologies detailed above have various technical and policy failings. It is imperative that transparency, accountability and legal scrutiny be made an integral part of the security apparatus in India. The risks of security breaches, politically motivated actions and foreign state hacking only increase with the absence of public accountability mechanisms. Further, opening up the technologies used for these operations to regular security audits will also improve their resilience to such attacks.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"&gt;http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/"&gt;http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.privacyinternational.org/node/818"&gt;https://www.privacyinternational.org/node/818&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf"&gt;http://cis-india.org/internet-governance/blog/state-of-cyber-security-and-surveillance-in-india.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf"&gt;http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf"&gt;http://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=54679"&gt;http://pib.nic.in/newsite/PrintRelease.aspx?relid=54679&lt;/a&gt; &amp;amp; &lt;a href="http://www.dot.gov.in/sites/default/files/English%20annual%20report%202007-08_0.pdf"&gt;http://www.dot.gov.in/sites/default/files/English%20annual%20report%202007-08_0.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://ijlt.in/wp-content/uploads/2015/08/IJLT-Volume-10.41-62.pdf"&gt;http://ijlt.in/wp-content/uploads/2015/08/IJLT-Volume-10.41-62.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.thehindu.com/scitech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt;http://www.thehindu.com/scitech/technology/in-the-dark-about-indias-prism/article4817903.ece&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/india-centralmonitoring-system-something-to-worry-about"&gt;http://cis-india.org/internet-governance/blog/india-centralmonitoring-system-something-to-worry-about&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.justice.gov/sites/default/files/pages/attachments/2016/07/08/ind195494.e.pdf"&gt;https://www.justice.gov/sites/default/files/pages/attachments/2016/07/08/ind195494.e.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.datacenterdynamics.com/content-tracks/security-risk/indian-lawful-interception-data-centers-are-complete/94053.fullarticle"&gt;http://www.datacenterdynamics.com/content-tracks/security-risk/indian-lawful-interception-data-centers-are-complete/94053.fullarticle&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://natgrid.attendance.gov.in/"&gt;http://natgrid.attendance.gov.in/&lt;/a&gt; [Attendace records at the NATGRID Office!]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-nationalintelligence-grid-databases"&gt;http://articles.economictimes.indiatimes.com/2013-09-10/news/41938113_1_executive-order-nationalintelligence-grid-databases&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.business-standard.com/article/current-affairs/natgrid-to-use-big-data-analytics-to-track-suspects-1"&gt;http://www.business-standard.com/article/current-affairs/natgrid-to-use-big-data-analytics-to-track-suspects-1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf"&gt;http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://indiatoday.intoday.in/story/natgrid-gets-green-nod-but-hurdles-remain/1/543087.html"&gt;http://indiatoday.intoday.in/story/natgrid-gets-green-nod-but-hurdles-remain/1/543087.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece"&gt;http://www.thehindu.com/news/national/govt-violates-privacy-safeguards-to-secretly-monitor-internet-traffic/article5107682.ece&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;ibid&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.thehoot.org/story_popup/no-escaping-the-surveillance-state-8742"&gt;http://www.thehoot.org/story_popup/no-escaping-the-surveillance-state-8742&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://ncrb.gov.in/BureauDivisions/CCTNS/cctns.htm"&gt;http://ncrb.gov.in/BureauDivisions/CCTNS/cctns.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;ibid&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://economictimes.indiatimes.com/news/politics-and-nation/ncrb-to-connect-police-stations-and-crime-data-across-country-in-6-months/articleshow/45029398.cms"&gt;http://economictimes.indiatimes.com/news/politics-and-nation/ncrb-to-connect-police-stations-and-crime-data-across-country-in-6-months/articleshow/45029398.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://indiatoday.intoday.in/education/story/crime-criminal-tracking-network-system/1/744164.html"&gt;http://indiatoday.intoday.in/education/story/crime-criminal-tracking-network-system/1/744164.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.dailypioneer.com/nation/govt-cctns-to-be-operational-by-2017.html"&gt;http://www.dailypioneer.com/nation/govt-cctns-to-be-operational-by-2017.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://articles.economictimes.indiatimes.com/2012-03-10/news/31143069_1_scanning-internet-monitoring-system-internet-data"&gt;http://articles.economictimes.indiatimes.com/2012-03-10/news/31143069_1_scanning-internet-monitoring-system-internet-data&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/a&gt; Surveillance, Snowden, and Big Data: Capacities, consequences, critique: &lt;a href="http://journals.sagepub.com/doi/pdf/10.1177/2053951714541861"&gt;http://journals.sagepub.com/doi/pdf/10.1177/2053951714541861&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.thehindubusinessline.com/industry-and-economy/info-tech/article2978636.ece"&gt;http://www.thehindubusinessline.com/industry-and-economy/info-tech/article2978636.ece&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/a&gt; See previous section in the article “NTRO”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/a&gt; Van Dijck, José. "Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology." &lt;i&gt;Surveillance &amp;amp; Society&lt;/i&gt; 12.2 (2014): 197.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.dailymail.co.uk/indiahome/indianews/article-3353230/Nat-Grid-knots-India-s-delayed-counter-terror-programme-gets-approval-green-body-red-tape-stall-further.html"&gt;http://www.dailymail.co.uk/indiahome/indianews/article-3353230/Nat-Grid-knots-India-s-delayed-counter-terror-programme-gets-approval-green-body-red-tape-stall-further.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cacm.acm.org/magazines/2015/5/186025-privacy-behaviors-after-snowden/fulltext"&gt;http://cacm.acm.org/magazines/2015/5/186025-privacy-behaviors-after-snowden/fulltext&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://freedomhouse.org/report/freedom-press/2015/india"&gt;https://freedomhouse.org/report/freedom-press/2015/india&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://blogs.wsj.com/indiarealtime/2014/06/05/indias-snooping-and-snowden/"&gt;http://blogs.wsj.com/indiarealtime/2014/06/05/indias-snooping-and-snowden/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://articles.economictimes.indiatimes.com/2012-03-10/news/31143069_1_scanning-internet-monitoring-system-internet-data"&gt;http://articles.economictimes.indiatimes.com/2012-03-10/news/31143069_1_scanning-internet-monitoring-system-internet-data&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://economictimes.indiatimes.com/tech/internet/government-to-launch-netra-for-internet-surveillance/articleshow/27438893.cms"&gt;http://economictimes.indiatimes.com/tech/internet/government-to-launch-netra-for-internet-surveillance/articleshow/27438893.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://trak.in/internet/indian-internet-traffic-8tbps-2017/"&gt;http://trak.in/internet/indian-internet-traffic-8tbps-2017/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.economist.com/news/briefing/21579473-americas-national-security-agency-collects-more-information-most-people-thought-will"&gt;http://www.economist.com/news/briefing/21579473-americas-national-security-agency-collects-more-information-most-people-thought-will&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.washingtonsblog.com/2013/07/the-fact-that-mass-surveillance-doesnt-keep-us-safe-goes-mainstream.html"&gt;http://www.washingtonsblog.com/2013/07/the-fact-that-mass-surveillance-doesnt-keep-us-safe-goes-mainstream.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/"&gt;http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra Note 35&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.papillonfoundation.org/information/global-crime-database/"&gt;http://www.papillonfoundation.org/information/global-crime-database/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.thehindu.com/opinion/editorial/Revive-NATGRID-with-safeguards/article13975243.ece"&gt;http://www.thehindu.com/opinion/editorial/Revive-NATGRID-with-safeguards/article13975243.ece&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes'&gt;https://cis-india.org/internet-governance/blog/the-design-technology-behind-india2019s-surveillance-programmes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>udbhav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-20T15:56:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation">
    <title>Sunil Abraham on Aadhaar's misuse during demonetisation</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation</link>
    <description>
        &lt;b&gt;Sunil Abraham spoke to Economic Times on the misuse of Aadhaar during demonetisation. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham said:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We saw Aadhaar being misused at large-scale during the demonetization, criminals had created a black market in Aadhaar identity cards and photocopies of Aadhaar. Those interested in converting black money were purchasing these photocopies from the black market and giving them to bank officials so that they could maintain fake records that tried to prove that ordinary people came in photos' cash transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whenever we try to introduce technological measures we must always think of the human systems that are at work and the human procedures that are at work. Another example is today telcos giving sim cards based on Aadhaar authentication to meet their sales targets some of these telcos are giving multiple sim  cards for a single Aadhaar based KYC. Those sim cards are often resold into black market or given to persons that are not familiar with the aadhaar number holder and this has only makes the security situation in the country worse. It has not improved." Watch the &lt;b&gt;&lt;a class="external-link" href="http://economictimes.indiatimes.com/et-now/experts/sunil-abraham-on-aadhaars-misuse-during-demonetisation/videoshow/56544492.cms"&gt;Video&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation'&gt;https://cis-india.org/internet-governance/news/economic-times-january-14-2017-sunil-abraham-on-aadhaar-misuse-during-demonetisation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-19T01:35:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-january-16-2017-sanjay-kumar-singh-lost-your-phone-here-is-how-you-can-make-your-mobile-theft-proof">
    <title>Lost your phone? Here's how you can make your mobile theft-proof </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-january-16-2017-sanjay-kumar-singh-lost-your-phone-here-is-how-you-can-make-your-mobile-theft-proof</link>
    <description>
        &lt;b&gt;Losing a phone has become even more costly after the government's push for a cashless society. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sanjay Kumar Singh was published in the &lt;a class="external-link" href="http://www.business-standard.com/article/pf/lost-your-phone-here-s-how-you-can-make-your-mobile-theft-proof-117011600015_1.html"&gt;Business Standard&lt;/a&gt; on January 16, 2017. Udbhav Tiwari was quoted. Read the full article on &lt;a class="external-link" href="https://www.pressreader.com/india/business-standard/20170116/281556585522622"&gt;Press Reader&lt;/a&gt;. Udbhav Tiwari was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister Narendra Modi, while pitching for cashless transactions, has coined a new phrase — your mobile is a bank. If you really want to use your mobile phone as a bank, remember the costs of losing it are much higher. Earlier, if you lost your mobile phone, there was the risk of misuse of personal data. Now, with most gadgets also carrying mobile wallet apps, there is the added risk of serious financial loss. A number of security solutions, available in the form of external security software or in-built into the phone, can help you track the device, lock it and minimise the probability of misuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;First, it should give you some satisfaction  that if your device is of recent vintage, someone stealing your phone  will not be able to use it. Earlier, thieves would wipe the data on the  phone (if it had a pin), set up a new account, and use it. But if it is  an Apple phone that came out after 2014 or a phone with Android 6.0  Marshmallow or higher operating system (OS), the server will ask for  login information of the first account (with which the owner had  initially set up the phone). Only then will it allow someone to set up a  second account on the same device. Since that information is not likely  to be available to the thief, the phone will be of little use to  him. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Track your device &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Both  Apple and Android have in-built features that allow you to track your  device if it gets lost. In Apple it is called 'Find my phone' and on  Android, 'Android device manager'. When you log in through your Apple or  Google account while setting up the phone, this feature gets enabled by  default. After your phone is stolen, go online and type 'Find my phone'  or 'Android device manager'. Use your account credentials to log in. As  long as your phone is on and is connected to the Internet, it will  broadcast its location. If it has been switched off or can't connect to  the Internet, you will only be able to see the last location from where  it transmitted.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Antivirus software for mobile phones  also offer tracking features. "Using our mobile security software, users  can locate their lost device on a map or receive the location  coordinates through an SMS," says Ritesh Chopra, country manager, Norton  by Symantec. These software also enable you to lock the lost device  remotely either from the antivirus software's web site or by sending an  SMS. Chopra informs that you can also remotely delete all the data  stored either on the device or its memory card. Users can also trigger  an alarm if they think their device is still in the vicinity. "Some  antivirus software also allow you to take snapshots of the illegal user  once the original user has reported it as stolen," says Udbhav Tiwari,  policy officer at the Centre for Internet and Society, Bengaluru.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Take preventive security measures&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;How  well your phone and the data on it are protected after theft will,  however, depend on the security measures you adopt proactively while the  phone is in your possession. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Install a password: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;The  first stage of protection you should adopt is a pin, pattern lock, or  password for your mobile phone. If you don't set up a pin, everything  that doesn't require a second level of authentication is available to  anyone who gets possession of your device. If you lose your laptop but  have logged out of your email or social networking account, the thief  can't access them. But on mobile phones most of these services don't  require a second level of authentication.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Most  alarming from a financial standpoint is the fact that most mobile  wallets don't ask for a password before allowing you to transact (Paytm  has introduced one recently). "If you have a mobile wallet and don't  have a pin on your phone and it gets stolen, the thief can easily  transfer money from your wallet to another," says Tiwari. Most mobile  and net banking apps, however, require a login and password every time  you want to access them, and are hence safer.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Set a  pin promptly--a strong one that can't be easily guessed. Numbers  associated with you, such as your birthday, are a strict no-no. If your  phone carries especially sensitive or important data, eschew pins  altogether and use a detailed password with a diverse combination of  characters.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Nowadays you can also deploy  fingerprint-based unlocking feature on your phone. "By using Fonetastic  for the Android platform, you can set the fingerprint unlock feature on  your phone," informs Sanjay Katkar, managing director and chief  technology officer, Quick Heal Technologies. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Encrypt data on your device: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Even  if you set up a pin or password, the data on your mobile phone is not  protected. Hackers can bypass it and gain access to your files. To  protect data, OS developers like Google and Apple encrypt data. The  device encryption feature works using something unique on your device,  such as its serial number, and your pin. Even if someone gets access to  your files via a computer, they will not be able to open them. These  files will open only on your phone, and for that they will need your  pin, password or pattern lock (presuming you have set one).&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In  all iOS phones, the moment you set your pin, all files get  automatically encrypted. In any Android phone purchased within the last  one year (that runs on Android 6.0 Marshmallow by default), the same  holds true. But if you have an older Android phone or OS version, you  need to enable this feature manually. Go to Settings, then to Security,  find an option called 'Encrypt phone' and click on it.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Install an app lock: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Some  security apps allow you to lock the apps on your phone and also encrypt  the files produced by those apps. When you start an app, the security  app will ask for a pin. And when you exit an app, it will encrypt the  files stored within the app. Go to Google Play or iStore and type  'encrypted file storage' to get the most popular lock-and-encrypt apps.  "If you use device-level encryption, you may not need these apps, as the  former locks and encrypts the entire device," says Tiwari&lt;/span&gt;&lt;/p&gt;
&lt;div dir="auto" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div dir="auto" style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-january-16-2017-sanjay-kumar-singh-lost-your-phone-here-is-how-you-can-make-your-mobile-theft-proof'&gt;https://cis-india.org/internet-governance/news/business-standard-january-16-2017-sanjay-kumar-singh-lost-your-phone-here-is-how-you-can-make-your-mobile-theft-proof&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-19T02:40:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ndtv-december-24-2016-demonetisation-cost-versus-benefit">
    <title>Demonetisation: Cost Vs Benefit</title>
    <link>https://cis-india.org/internet-governance/news/ndtv-december-24-2016-demonetisation-cost-versus-benefit</link>
    <description>
        &lt;b&gt;Sunil Abraham took part in a discussion on Demonetisation in NDTV's Big Fight programme aired on December 24, 2016. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Prime Minister's big post-demonetisation deadline of 50 days is coming  to a close. Does this mean that people's ordeal with the currency ban  will also come to an end? Will the government continue to have people's  support and patience through its big bang reforms if they fail to  achieve their original aim of retrieving black money? We ask, what lies  ahead for India? How long will it take for India to become a cashless  economy? What are the pitfalls? With a high bank dormancy rate of 43%,  most Indians still prefer to make transactions through cash. Even if we  are able to make that journey to becoming a cashless economy by 2020,  does the government have the infrastructure to make online payments  safe?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Sunil Abraham said that the trouble with the design of the Aadhaar project is that it makes citizens transparent to the state and does not make state transparent to the citizen. With every generation of corruption busting technology we see new ways of corruption being introduced into our society&lt;/i&gt;. For more &lt;a class="external-link" href="http://www.ndtv.com/video/news/the-big-fight/demonetisation-cost-vs-benefit-443536?site=full"&gt;&lt;b&gt;watch the video&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ndtv-december-24-2016-demonetisation-cost-versus-benefit'&gt;https://cis-india.org/internet-governance/news/ndtv-december-24-2016-demonetisation-cost-versus-benefit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-17T16:04:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality">
    <title>India’s Digital ID Rollout Collides With Rickety Reality</title>
    <link>https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality</link>
    <description>
        &lt;b&gt;India’s new digital identification system, years in the making and now being put into widespread use, has yet to deliver the new era of modern efficiency it promised for shop owner Om Prakash and customer Daya Chand.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gabriele Parussini was published in the &lt;a class="external-link" href="http://www.wsj.com/articles/snags-multiply-in-indias-digital-id-rollout-1484237128?mod=e2fb"&gt;Wall Street Journal&lt;/a&gt; on January 13, 2017. Hans Varghese Mathews was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;At first, it drove both men up a tree.&lt;br /&gt;&lt;br /&gt;The system, which relies on fingerprints and eye scans to eventually provide IDs to all 1.25 billion Indians, is also expected to improve the distribution of state food and fuel rations and eventually facilitate daily needs such as banking and buying train tickets.&lt;br /&gt;&lt;br /&gt;But Mr. Prakash couldn’t confirm his customers’ identities until he dragged them to a Java plum tree in a corner of his village near New Delhi’s international airport. That was the only place to get the phone signal needed to tap into the government database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I hopped on a chair and put my finger in the machine,” said Mr.  Chand, a 60-year-old taxi driver. Getting his state food ration “used to  be much easier,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a class="none icon" href="http://blogs.wsj.com/briefly/2017/01/13/indias-massive-aadhaar-biometric-identification-program-the-numbers/"&gt;a system so vast&lt;/a&gt;, even small glitches can leave millions of people empty-handed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="none icon" href="http://blogs.wsj.com/indiarealtime/2012/10/03/getting-indias-id-project-back-on-track/"&gt;The government began building the system&lt;/a&gt;,  called Aadhaar, or “foundation,” with great fanfare in 2009, led by a  team of pioneering technology entrepreneurs. Since then, almost 90% of  India’s population has been enrolled in what is now the world’s largest  biometric data set.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prime Minister Narendra Modi, who set aside  early skepticism about the Aadhaar project after taking power in 2014,  is betting that it can help India address critical problems such as  poverty and corruption, while also saving money for the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the technology is colliding with the rickety reality of India,  where many people live off the grid or have fingerprints compromised by  manual labor or age.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Panna Singh, a 55-year-old day laborer in  the northwestern state of Rajasthan who breaks stones used to build  walls, says the machine recognized his scuffed-up fingerprints only a  couple of times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I’ve come twice today,” he said at a ration shop in the village of Devdungri. “That’s a full day of work, gone.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Iris scans are meant to resolve situations where fingerprints don’t work, but shops don’t yet have iris scanners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay Bhushan Pandey, chief executive of the government agency that  oversees Aadhaar, said kinks will be ironed out as the system is used,  as is the case with software rollouts. It works 92% of the time, and  that will rise to 95%, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“On the scale of what [Aadhaar]  has achieved, the rollout has been remarkably smooth,” said Nandan  Nilekani, the Infosys co-founder who spearheaded the project. “I don’t  see any issues that are disproportionate to the size of project.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An  Aadhaar ID is intended to be a great convenience, replacing the  multitude of paperwork required by banks, merchants and government  agencies. The benefits are only just beginning, backers say, as the  biometric IDs are linked to programs and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in rural  areas, home to hundreds of millions of impoverished Indians dependent on  subsidies, the impact of technical disruptions has already been  evident.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After walking for two hours across rough underbrush in  Rajasthan to get kerosene for the month, Hanja Devi left empty-handed  because the machine couldn’t match her fingerprint with her Aadhaar  number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s always so difficult” using the system, said Ms. Devi, who lives  with her husband and a nephew on 1,500 rupees ($22) a month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ranjit  Singh, who operates the shop, said five of the 37 customers before Ms.  Devi also left the shop empty-handed, a failure rate of over 15%.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A shop manager in a neighboring village said identification had failed for a similar portion of his 500 customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any biometric recognition system of Aadhaar’s size is bound to show  duplicates, meaning some people’s biometric identifiers will match  someone else’s when they try to enroll.The new system hasn’t eliminated  attempts at fraud. In August, police in Rajasthan accused two shop  managers of linking their fingerprints to a multitude of cards and  stealing for months the rations of dozens of clients.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hans Varghese Mathews, a mathematician at the Bangalore-based Center for  Internet and Society, used the results of a test run by Aadhaar  officials on a sample of 84 million people to extrapolate the figure for  India’s total population. The error level is less than 1%, but in the  world’s second-most populous country, the snag would still affect about  11 million people, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government officials disputed the calculation, saying the number of  duplicates would be much smaller—and that it would take only seven  analysts to manage the error caseload.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As for trouble connecting to the registry, better infrastructure,  including steadier internet connections, will eventually also help, Mr.  Pandey said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For now, Mr. Prakash has found a way to cope without  climbing trees. After scouring the village, he set up a shack in a spot  with enough bandwidth for his fingerprint scanner to work. It is hardly  efficient. He issues receipts in the morning at the shack, then goes  back to his shop to hand out the grains. Customers have to line up  twice, sometimes for hours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Prakash has applied to the  government to operate without biometric identification, but his request  was turned down, he said. “They said: ‘You have to keep trying.’ ”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality'&gt;https://cis-india.org/internet-governance/news/wall-street-journal-gabriele-parussini-january-13-2017-indias-digital-id-rollout-collides-with-rickety-reality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-17T15:35:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-mj-antony-ayan-pramanik-apurva-venkat-supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy">
    <title>Supreme Court issues notice to WhatsApp, Centre on data privacy </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-mj-antony-ayan-pramanik-apurva-venkat-supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy</link>
    <description>
        &lt;b&gt;Analysts said India lacked data protection laws.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by MJ Antony, Ayan Pramanik and Apurva Venkat was &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy-117011601108_1.html"&gt;published in the Business Standard&lt;/a&gt; on January 17, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Supreme+Court" target="_blank"&gt;Supreme Court &lt;/a&gt;on Monday issued notices to the Centre and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;over  an appeal alleging the instant messaging service did not ensure the  privacy of its users and seeking regulations to protect personal  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chief Justice J S Khehar granted urgent hearing when Harish Salve,  counsel for the petitioner, submitted that the service provided free by  the platform to 155 million subscribers violated constitutional  provisions protecting privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;would file their replies within two weeks, the court directed after Salve sought its intervention to protect consumer &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Data" target="_blank"&gt;data &lt;/a&gt;till India enacted &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Data" target="_blank"&gt;data &lt;/a&gt;protection laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Supreme+Court" target="_blank"&gt;Supreme Court &lt;/a&gt;heard the petition after the Delhi High Court in September directed &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;not to share its users’ &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Data" target="_blank"&gt;data &lt;/a&gt;with its parent &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;and  asked it to provide users with the option to opt out. The court was  hearing a public interest litigation over a change in WhatsApp’s user  policies that explicitly allowed &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;to access to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp &lt;/a&gt;users’ data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;spokesperson said the company could not comment immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Analysts said India lacked &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Data" target="_blank"&gt;data &lt;/a&gt;protection laws that prohibit global Internet firms from harvesting user &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Data" target="_blank"&gt;data &lt;/a&gt;for  their business. “We used to think that we had some privacy  jurisprudence in the country. If you asked a lawyer 1.5 years ago, he  would say privacy in India was a constitutionally guaranteed right,”  said Sunil Abraham, director of the Centre for Internet Society. “It is  not explicitly referenced into the law.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saroj Kumar Jha, partner, SRGR Law Offices, said, “Along with the lack  of policies and laws, there are very few judgments on privacy issues  based on constitutional rights. Thus, it makes it very difficult to  judge a case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Salve argued that till the government enacted legislation to protect  user data, the court should provide protection. The Telecom Regulatory  Authority of India should introduce a clause in telecom licences that if  calls were intercepted the licence would be cancelled, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court sought the assistance of Attorney-General Mukul Rohatgi to sort out the issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohatgi, while arguing an earlier case related to alleged violation of  privacy, had taken the stand that the Constitution did not protect the  right to privacy. According to him, neither the fundamental rights nor &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Supreme+Court" target="_blank"&gt;Supreme Court &lt;/a&gt;judgments  recognises a citizen’s right to privacy. The bench hearing that case  referred the question to a constitution bench last year.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-mj-antony-ayan-pramanik-apurva-venkat-supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy'&gt;https://cis-india.org/internet-governance/news/business-standard-mj-antony-ayan-pramanik-apurva-venkat-supreme-court-issues-notice-to-whatsapp-centre-on-data-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-01-17T15:06:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about">
    <title>The Dangers Of Aadhaar-Based Payments That No One Is Talking About</title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about</link>
    <description>
        &lt;b&gt;Less than three months ago, India’s banking sector was hit by a data breach which compromised 32 lakh debit cards and led to fraudulent transactions worth Rs 1.3 crore.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Mayank Jain was &lt;a class="external-link" href="http://www.bloombergquint.com/business/2017/01/17/the-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about"&gt;published by Bloomberg&lt;/a&gt; on January 17, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The incident started a debate around security of payment systems. But the debate had just about begun when the government’s demonetisation decision dragged attention away from it. Now as the dust settles and as the government starts to push newer means of digital payments, the focus is back on the security of systems being seen as an alternative to cash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One such system is Aadhaar-based payments which could potentially allow citizens to pay anytime anywhere with the tap of a finger.&lt;br /&gt;&lt;br /&gt;In theory, it sounds simple.&lt;br /&gt;&lt;br /&gt;The Aadhaar-based payment system runs on the existing Aadhaar infrastructure through which a person’s biometrics are used to authenticate the user. Once authenticated, the user can transfer funds directly from one bank account to another without going through a mobile wallet or a card.&lt;br /&gt;&lt;br /&gt;The payment system requires a smartphone, a working internet connection and a biometric authentication device with the merchant. The customer needn’t have a card or a phone as long as he or she has an Aadhaar-seeded bank account.&lt;br /&gt;&lt;br /&gt;National Payments Corporation of India has developed this payments infrastructure over the existing Aadhaar-Enabled Payments System, the railroad on which the public distribution system has been functioning for years now.&lt;br /&gt;&lt;br /&gt;Amitabh Kant, chief executive officer of the government policy think tank NITI Aayog said, earlier this month, that all cards and point-of-sale machines will become redundant in the country in the next two-and-a-half years as Aadhaar-based payments become popular.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="lazy" src="http://images.assettype.com/bloombergquint%2F2017-01%2Ff3e25ea3-f10b-4059-a95d-412cd4f32caf%2FKey%20Facts%20About%20Aadhaar%20Payments%20Payments%20Payments01.png?auto=format&amp;amp;q=60&amp;amp;w=1024&amp;amp;fm=pjpeg" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A Double-Edged Sword&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While payments authenticated by biometrics sound like a good idea in a country where less than one in three people actually own a smartphone, there are fears that integrating biometrics with digital payments could prove to be a security headache.&lt;br /&gt;&lt;br /&gt;The first part of the problem is that Aadhaar, while effective, is not a fool-proof method of authentication and identification failures are not uncommon. Building a payment system atop the Aadhaar system will simply transfer some of these vulnerabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img class="lazy" src="http://images.assettype.com/bloombergquint%2F2017-01%2F12a47aa6-10f1-4687-a471-a463f876e6d2%2FHow%20Aadhaar%20Payment%20Works.png?auto=format&amp;amp;q=60&amp;amp;w=1024&amp;amp;fm=pjpeg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The possibility of transaction failures due to a biometric mismatch are real, admitted a former high-ranking official from the Unique Identification Authority of India (UIDAI) who spoke to BloombergQuint on the condition of anonymity.&lt;br /&gt;&lt;br /&gt;Officially, the false reject rate – rejection of a biometric when it’s actually correct – is set at a maximum of 2 percent for devices that get certified from the UIDAI. On the ground, however, failure rates vary widely, said the official quoted above.&lt;br /&gt;&lt;br /&gt;According to the official statistics on UIDAI, more than 16 lakh Aadhaar-authentication requests failed in the past week. The type of errors encountered ranged from the biometric data not matching the database to demographic details not checking out.&lt;br /&gt;&lt;br /&gt;The failure rates on Aadhaar Enabled Payment System for interbank transactions (which is a part of all Aadhaar authentication requests) were found to be as high as 60 percent by the Watal Committee on digital payments which published its report in December.&lt;br /&gt;&lt;br /&gt;Additionally, newer security threats may also emerge if the scope of Aadhaar is widened. These include identity theft if a person’s biometrics are compromised from the payment system, phishing attempts, and the difficulty in revoking access once biometric information is compromised.&lt;br /&gt;&lt;br /&gt;Biometrics aren’t an exact science, the official quoted above said, while adding that possible glitches have to be weighed against the benefits of offering a widely accessible non-cash mode of payment to citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How Easy Is It To Beat The System?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of Bangalore based research organisation Center for Internet and Society (CIS) said that one way to assess how secure a system is to understand the cost and effort that goes into breaching it.&lt;br /&gt;&lt;br /&gt;In the case of Aadhaar-based payment systems, the costs may not be high.&lt;br /&gt;&lt;br /&gt;“There’s the gummy finger method which essentially requires some Fevicol or gum to duplicate someone’s fingerprint which can be enough to transact on someone’s behalf without them being there,” said Abraham in a phone conversation with BloombergQuint. “An average person can’t clone a smart card. Just fevicol and glue can help you make a gummy finger. The biometric lobby will say that advanced scanners defeat the gummy finger attack but more advanced scanners are also more expensive.”&lt;br /&gt;&lt;br /&gt;Also, using more sensitive devices could push up the instance of false rejection of transactions, said Abraham.&lt;br /&gt;&lt;br /&gt;There are other concerns. Like the fact that devices used for Aadhaar identification could store personal information, which, in turn, could be susceptible to a breach.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;There are five main components in an Aadhaar app transaction – the customer, the vendor, the app, the back-end validation software, and the Aadhaar system itself. There are also two main external concerns – the security of the data at rest on the phone and the security of the data in transit. At all seven points, the customer’s data is vulnerable to attack. &lt;br /&gt;Bhairav Acharya, Program Fellow, New America&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Acharya, who works at a U.S.-based think tank called New America and focuses on cyber-law, said the key concern is that Aadhaar data can be stolen and misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The app and validation software are insecure, the Aadhaar system  itself is insecure, the network infrastructure is insecure, and the laws  are inadequate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biometric data collected on the  authentication device at a merchant location can potentially be stored  on the device as well as the smartphone of a merchant for a long time.  Abraham added that there is a possibility that non-certified devices  will enter the market, which can store data and use it in the future to  do fraudulent transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The concerns over potential misuse of  biometric data by private agencies has also been highlighted by the  Supreme Court of India. Earlier this month, the apex court refused to  expedite the hearing on a petition regarding Aadhaar being utilised for  multiple use cases by private companies. It, however, &lt;a href="http://economictimes.indiatimes.com/articleshow/56352843.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst" target="_blank"&gt;&lt;ins&gt;observed&lt;/ins&gt;&lt;/a&gt; that private agencies collecting biometric data “is not a great idea”.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Deficient Privacy Laws&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apar Gupta, a Delhi-based lawyer working on cyber security, says that  the lack of strong privacy protecting provisions is another concern  that should be kept in mind while moving towards an Aadhaar-based  payment system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The data stays for a long time with the  stakeholders in the system. The requesting agency can keep it for seven  years and the UIDAI can store it for five years. There are insufficient  safeguards and there’s an absence of privacy law and an independent  privacy regulator,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Acharya agreed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India does not  have the necessary laws to deal with a decentralised,  biometrically-authenticated, mobile payments system, according to  Acharya.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Moreover, current laws and policies regarding the  Aadhaar project, particularly the centralised database, are inadequate  from the point of view of data security and end-user privacy,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham of CIS said the issue is wider than Aadhaar. The problem is the lack of a strong data security law.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;We only have a minimal data security law under the Section 43A of the Information and Technology Act which only applies to the private sector. There’s no law that applies to the government. Even 43A has not been applied consistently. There’s no place for you to go and complain if your identity has been compromised.&lt;br /&gt;Sunil Abraham, Executive Director, Centre for Internet &amp;amp; Society&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Gupta noted that, in the event of an identity threat, avenues of recourse are also limited. He said the best option is an appeal in the civil court, which is a long drawn out process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In final analysis, according to Abraham, credit and debit cards are easier to secure as access can be revoked quickly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The trouble with biometrics is that the chain of trust is harder to  establish because too many people can get access to biometrics and then  you need to devise these convoluted solutions like hardware secure  zones,” Abraham said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“So the advantage of going with a smart card  is that it can be easily re-secured, but with biometrics, once I  compromise it, it’s lifelong.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about'&gt;https://cis-india.org/internet-governance/news/bloomberg-mayank-jain-january-17-2017-dangers-of-aadhaar-based-payments-that-no-one-is-talking-about&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-01-17T14:39:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint">
    <title>The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint</link>
    <description>
        &lt;b&gt;Paying for your groceries and other goods by using your biometrics instead of an e-wallet, debit card or cash seems to be the next phase in the Centre’s ambitious push to shift the country to a “less cash” economy, as its mandarins term it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Indulekha Aravind was &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/economy/policy/the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint/articleshow/56542475.cms"&gt;published in the Economic Times&lt;/a&gt; on 15 January 2017. Sunil Abraham was &lt;a class="external-link" href="http://economictimes.indiatimes.com/et-now/experts/sunil-abraham-on-aadhaars-misuse-during-demonetisation/videoshow/56544492.cms"&gt;consulted for this&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajay  Bhushan Pandey, CEO of the Unique Identification Authority of India  (UIDAI), says it will be rolling out Aadhaar-enabled payment system, or  Aadhaar Pay, for merchants in the next few weeks. This will be an app  for merchants that enables them to receive payments through biometric  authentication of the customer, provided their bank accounts are linked  to their Aadhaar number. "A pilot is under way in fair price shops in  Andhra Pradesh where shopkeepers are accepting payments from PDS  beneficiaries. The results are very encouraging," says Pandey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The idea takes off from the existing Aadhaar-enabled payment system (AEPS) used by bank business correspondents (BCs) in rural areas to disburse and accept cash, using micro ATMs. "We are trying to tweak this so that a similar device can be used by a local merchant," says Pandey. Adoption will depend on two factors: merchants’ acceptance of it and whether they can use an app rather than a micro ATM. The biggest advantage through this method of payment, says Pandey, is that the customer will not need a credit or debit card, or even a smartphone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" class="gwt-Image" src="http://img.etimg.com/photo/56542603/page-19-1.jpg" title="The soon-to-be launched Aadhaar Pay will let you make purchases using your fingerprint" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  limits for transactions using AEPS, such as the number of daily  transactions, will be left to the discretion of the banks. In the long  term, the AEPS will be migrated to the BHIM (Bharat Interface for Money)  platform but the rollout of Aadhaar Pay will happen before that. Post  demonetisation, banking BC’s number of transactions using AEPS has leapt  from 4-5 lakh to 14-15 lakh, says Pandey. According to Reserve Bank of  India data on electronic payment systems, the total volume of such  transactions  jumped from 671 million in November 2016 to 957 million in December. USSD-based payments, which can be done using a basic feature phone, are among the biggest beneficiaries: the volume rose from just 7,000 in November to 1,02,000 in December, and value of transactions from over Rs 7,000 to over Rs 1 lakh. Prepaid payment instruments — mainly mobile wallets — rose from 59 million to 88 million in the same period (and value from Rs 1,300 crore to Rs 2,100 crore).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Aadhaar Pay is likely to ride the demonetisation wave if it is launched soon, certain concerns remain, as the list is how secure such a payment system will be. The UIDAI CEO says it is a paramount concern for the organisation, too. "We are using the latest technology to ensure the information stays encrypted end to-end, so that information is not leaked or misused. In the months to come, we will strengthen the security."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wary About Security&lt;/b&gt; &lt;br /&gt; Sunil Abraham, executive director of the Centre for Internet and  Society, a think tank that has been analysing the Aadhaar project for  six years, outlines several reasons why Aadhaar-based biometrics is  inappropriate for authentication in payments, unlike card-based payments  that use cryptography.  &lt;br /&gt; &lt;br /&gt; "With biometrics, there is always  an error ratio. It is imprecise matching, whereas with cryptography  (smart cards), there is no false positive or  negative. You either have the key (PIN) or you don’t. It is also very  cheap to defeat biometric authentication — even an unlettered person can  do it," says Abraham. It would be easy enough, he says, to replicate  someone else’s fingerprint by pressing it against lukewarm wax and  filling the mould with glue to get a dummy finger. In contrast,  compromising a smart card requires more cost and effort, from  tech-savviness to machines such as a skimmer that will read the card.  "And once you are compromised,you are compromised forever. You can’t change it, like a debit card PIN."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Using  Aadhaar for authentication had proved to be a failure during the  exchange of currency notes following demonetisation, he adds, pointing  to how the poor and the middle class stood in queues for money while  stacks of new currency were recovered from the homes of businessmen and  bureaucrats. "When you have bank officials who are corrupt, giving them  your biometrics is giving them more ammunition for corruption." To catch  the criminals, law enforcement agencies had to resort to CCTV footage,a  relatively older technology, he says. Others point out that while it  may be secure, certain factors stand in the way of making  biometrics-based payment authentication a large-scale success. Amrish  Rau, CEO of PayU India, a payment gateway provider, cites a list of  reasons why it would inevitably take off but only in 5-10 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"For  one, the technology is not yet good enough. There are also bandwidth  and data constraints in sending biometric data," says Rau. Even in more  mature markets, it has yet to find widespread acceptance, he says,  pointing to the slow adoption of Apple Pay and Samsung Pay in the US.  "It’s not the answer today.” This is in contrast to NITI Aayog CEO  Amitabh Kant’s recent remarks that cards and PoS machines would become  redundant by 2020 because Indians would be making payments using their  thumb (biometrics).  "... my view is that in the next two and a half years, India will make  all its debit cards, credit cards, all ATM machines, all PoS machines  totally irrelevant,” Kant had said at a Pravasi Bharatiya Divas session  in Bengaluru.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;UIDAI’s Pandey is more circumspect. “I wouldn’t say who would replace  what. But from the government’s side we are encouraging all modes of  digital payment. India has a diverse population and some people might  prefer using a card, others a wallet. Collectively, they will contribute  to a less-cash society.”&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint'&gt;https://cis-india.org/internet-governance/news/economic-times-indulekha-aravind-january-15-2017-the-soon-to-be-launched-aadhaar-pay-will-let-you-make-purchases-using-your-fingerprint&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2017-01-16T03:14:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments">
    <title>Millions of Indians move from cash to digital payments. But some ask whether it’s safe</title>
    <link>https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments</link>
    <description>
        &lt;b&gt;Minutes after Indian Prime Minister Narendra Modi began an ambitious new mobile-phone-payment application in December, several clones of the app popped up at Android smartphone stores.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rama Lakshmi was &lt;a class="external-link" href="https://www.washingtonpost.com/world/asia_pacific/millions-of-indians-move-from-cash-to-digital-payments-but-some-ask-whether-its-safe/2017/01/13/e807ebf0-ae9b-488b-9eb1-1dcba80ba984_story.html?utm_term=.fc710ade922b"&gt;published by Washington Post&lt;/a&gt; on 14 January 2017, Sunil Abraham was quoted. Annie Gowen contributed to this report.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In the first few days, users were flooded with &lt;a href="http://www.livemint.com/Industry/Q1z2di95uWbhcSMUKcx1SK/BHIM-app-users-raise-security-concerns-within-first-week.html"&gt;spam&lt;/a&gt; requests for money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bhim app sponsored by the government was rushed out after Modi’s abrupt &lt;a href="https://www.washingtonpost.com/world/asia_pacific/india-invalidates-large-bank-notes-in-crackdown-on-crime/2016/11/08/cc705ee2-a5c6-11e6-ba46-53db57f0e351_story.html?tid=a_inl&amp;amp;utm_term=.1e0d0920f753"&gt;withdrawal&lt;/a&gt; of large currency bills two months ago. More than 10 million people  downloaded it in just 10 days, but in a country where awareness and  regulation of &lt;a href="https://www.washingtonpost.com/world/asia_pacific/privacy-concerns-grow-in-india/2012/01/26/gIQAyM0UmQ_story.html"&gt;privacy&lt;/a&gt;, data protection and digital &lt;a href="http://timesofindia.indiatimes.com/business/india-business/None-of-mobile-payment-apps-in-India-fully-secure-warns-Qualcomm/articleshow/55967778.cms"&gt;security&lt;/a&gt; are low, the number of cyberattacks is rising.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  are rushing toward launching and using these plethora of financial tech  apps without the exhaustive security testing and education that is  needed,” said Sunil Abraham, executive director of the Center for  Internet and Society. “We are operating in a bit of a regulatory  vacuum.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi’s ambitious move to swap old bills for new was intended to fight the hoarding of &lt;a href="https://www.washingtonpost.com/world/asia_pacific/india-targets-tax-evaders-who-hide-black-money-at-home-and-abroad/2015/09/04/2532b7c2-50c4-11e5-b225-90edbd49f362_story.html?utm_term=.6a8c7baf45d0"&gt;illicit&lt;/a&gt; cash reserves. But it was derailed by shoddy implementation, left citizens in Asia’s third-largest economy without &lt;a href="https://www.washingtonpost.com/world/panic-anger-and-scramble-to-stash-cash-amid-indias-black-money-squeeze/2016/11/10/32cb222a-565a-4c6f-8d40-59257c042109_story.html?utm_term=.6316c5fcb192"&gt;cash&lt;/a&gt; for weeks, slowed &lt;a href="https://www.washingtonpost.com/world/indias-currency-crisis-is-stalling-small-industries-and-sending-workers-home/2016/12/24/5a2d3aea-c7b2-11e6-acda-59924caa2450_story.html?utm_term=.ad60424e45f2"&gt;manufacturing&lt;/a&gt; and sent workers home, and is now likely to significantly affect the  country’s economic growth this year, economists say. It was acutely  painful for a country where 80 percent of transactions were conducted  with cash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modi quickly responded by turning the adversity into a call for Indians to kick their overwhelming dependence on &lt;a href="https://www.washingtonpost.com/world/asia_pacific/indians-like-to-pay-cash-the-government-is-now-forcing-them-to-swipe-cards/2016/12/16/58a5a42c-c0a6-11e6-b527-949c5893595e_story.html"&gt;cash&lt;/a&gt; and opt for digital payments overnight. The Bhim app is just one of  many available. But in this leap, experts say, security concerns are  being overlooked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The new payment apps and e-wallet companies are governed by India’s  outdated information technology law of 2008 and central bank guidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“India  urgently needs a new digital payment law that regulates all these  mobile payment apps that have sprung up overnight,” said Pavan Duggal, a  cyber-law expert. “We are right now in a completely uncharted and  unsupervised territory legally. The norms for wallet companies are  undefined. If I lose my money due to a fraud, I can go round and round  in circles with no remedy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The central bank recently issued  guidelines asking payment banks to carry out security audits, but Duggal  said “there is no penalty or punishment for noncompliance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  problem is compounded by the fact that education about security risks  online is abysmally sparse, especially in India’s small towns and  villages. Indians are complacent about cyber risks in their online  behavior, according to the Norton Cyber Security Insights &lt;a href="http://indianexpress.com/article/technology/tech-news-technology/indian-users-complacent-when-it-comes-to-cyber-security-norton-report/"&gt;Report&lt;/a&gt;. India does not have a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India reported more than 39,000 incidents of cyberattacks in the first nine months of 2016, &lt;a href="http://164.100.47.190/loksabhaquestions/annex/10/AS16.pdf"&gt;according&lt;/a&gt; to the government, including phishing, scanning and probing, website  intrusions, defacements, virus and malicious code, and denial-of-service  attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Pentagon got hacked, right? You haven’t closed  down the Pentagon as yet,” said Piyush Goyal, a minister. “These things  will happen, and we have to be one step ahead of the hackers and the  so-called security breaches and continuously improving and improvising  as they do in America or other developed economies.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October,  top banks had to fix the security codes of about 3.2 million debit cards  in one of the biggest data breaches in India. Some users complained  that their cards had been used in China.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, &lt;a href="https://www.washingtonpost.com/news/worldviews/wp/2016/12/12/the-man-hacking-indias-rich-and-powerful-talks-motives-music-drugs-and-next-targets/?utm_term=.33bc426ae67a"&gt;hackers&lt;/a&gt; attacked Twitter and email accounts of prominent politicians and  journalists and defaced the website of the National Security Guard, an  elite commando force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The focus of global hackers has shifted to  India. The cyber risk is a direct fallout of the growth in the number  of digital users,” said Saket Modi, the chief executive of Lucideus  Tech, the firm that conducted the security audit of the government’s  Bhim app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the cash crunch began, the largest private e-wallet company, Paytm, has experienced a 400 percent jump in new downloads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But only &lt;a href="http://gadgets.ndtv.com/telecom/news/mobile-internet-subscribers-in-india-reached-34265-million-in-march-sinha-863186" shape="rect"&gt;342 million people&lt;/a&gt; access the Internet on their mobile phones. The government has  introduced dial-in service for those who have basic cellphones to make  digital payments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government is airing radio jingles telling  citizens not to share their personal identification numbers and has a  toll-free helpline to teach people how to make online payments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Officials  understand how security worries can be a big dampener in their campaign  to get people to go digital,” said Vinayak Godse, senior director at  the Data Security Council of India, an industry body that advises the  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in a trade-off between convenience and security, the central bank recently &lt;a href="http://tech.economictimes.indiatimes.com/news/internet/payment-firms-applaud-rbis-move-to-relax-2-factor-authentication-for-small-value-transactions/55858515"&gt;waived&lt;/a&gt; the mandatory two-factor authentication for transactions less than $30 online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some cybersecurity experts say that Indians are not ready for this step.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  police recently arrested a gang in the eastern state of Jharkhand;  operators were calling people posing as bank executives and tricking  them into sharing their card details. They used the cards to do online  shopping and transferred money into their e-wallet accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“People  are gullible and can be threatened or lured to part with their bank  details easily. We need as many safeguards as we can have,” said  Surendra Kumar, a senior police officer in New Delhi who busted the  gang.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the biggest problem people face is that police in one  state get very little cooperation from those in another state in  digital-crime complaints, said Rakshit Tandon, a cybersecurity expert  who trains police, military members and school students.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Only in  big-ticket frauds will police departments from different states  coordinate their investigations,” Tandon said. “If a person loses a  relatively smaller amount digitally, the case won’t go far. Even though  that amount may mean a lot in that person’s life.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments'&gt;https://cis-india.org/internet-governance/news/washington-post-january-14-2017-rama-lakshmi-millions-of-indians-move-from-cash-to-digital-payments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Money</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    

   <dc:date>2017-01-16T02:52:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi">
    <title>Global Governance Futures 2027 - Session 3, New Delhi</title>
    <link>https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi</link>
    <description>
        &lt;b&gt;The Global Governance Futures program (GGF) initiated by Global Public Policy Institute and supported by Robert Bosch Stiftung brings together young professionals to look ahead ten years and recommend ways to address global challenges. Sumandro Chattapadhyay will join Ankhi Das (Facebook) and Arun Mohan Sukumar (Observer Research Foundation) on Tuesday, January 17, to discuss the "data governance" scenarios developed by the GGF 2027 Fellows.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;About the Programme: &lt;a href="http://www.ggfutures.net/about/ggf-program/"&gt;External Link&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;GGF 2027 Fellows: &lt;a href="http://www.ggfutures.net/current-fellows/"&gt;External Link&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;GGF 2027 Session 3, New Delhi - Agenda: &lt;a href="http://cis-india.org/internet-governance/files/ggf-2027-session-3-new-delhi-agenda/at_download/file"&gt;Download&lt;/a&gt; (PDF).&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi'&gt;https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2017-01-15T11:46:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/social-media-monitoring">
    <title>Social Media Monitoring</title>
    <link>https://cis-india.org/internet-governance/blog/social-media-monitoring</link>
    <description>
        &lt;b&gt;We see a trend of social media and communication monitoring and surveillance initiatives in India which have the potential to create a chilling effect on free speech online and raises question about the privacy of individuals. In this paper, Amber Sinha looks at social media monitoring as a tool for surveillance, the current state of social media surveillance in India, and evaluate how the existing regulatory framework in India may deal with such practices in future.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Social Media Monitoring: &lt;a href="http://cis-india.org/internet-governance/files/social-media-monitoring/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;In 2014, the Government of India launched the much lauded and popular citizen outreach website called MyGov.in. A press release by the government announced that they had roped in global consulting firm PwC to assist in the data mining exercise to process and filter key points emerging from debates on Mygov.in. While this was a welcome move, the release also mentioned that the government intended to monitor social media sites in order to gauge popular opinion. Further, earlier this year, the government set up National Media Analytics Centre (NMAC) to monitor blogs, media channels, news outlets and social media platforms. The tracking software used by NMAC will generate tags to classify post and comments on social media into negative, positive and neutral categories, paying special attention to “belligerent” comments, and also look at the past patterns of posts. A project called NETRA has already been reported in the media a few years back which would intercept and analyse internet traffic using pre-defined filters. Alongside, we see other initiatives which intend to use social media data for predictive policing purposes such as CCTNS and Social Media Labs.&lt;/p&gt;
&lt;p&gt;Thus, we see a trend of social media and communication monitoring and surveillance initiatives announced by the government which have the potential to create a chilling effect on free speech online and raises question about the
privacy of individuals. Various commentators have raised concerns about the legal validity of such programmes and whether they were in violation of the fundamental rights to privacy and free expression, and the existing surveillance laws in India. The lack of legislation governing these programmes often translates into an absence of transparency and due procedure. Further, a lot of personal communication now exists in the public domain which
renders traditional principles which govern interception and monitoring of personal communications futile. In the last few years, the blogosphere and social media websites in India have also changed and become platforms for more dissemination of political content, often also accompanied by significant vitriol, ‘trolling’ and abuse. Thus, we see greater policing of public or semi-public spaces online. In this paper, we look at social media monitoring as a
tool for surveillance, the current state of social media surveillance in India and evaluate how the existing regulatory framework in India may deal with such practices in future.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/social-media-monitoring'&gt;https://cis-india.org/internet-governance/blog/social-media-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2017-01-16T14:23:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-proposed-icann-community-anti-harassment-policy">
    <title>Comments on the Proposed ICANN Community Anti-Harassment Policy </title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-proposed-icann-community-anti-harassment-policy</link>
    <description>
        &lt;b&gt;ICANN sought community input on the Proposed ICANN Community Anti-Harassment Policy on 7 November 2016. In response to this the Centre for Internet &amp; Society (CIS) submitted its comments.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at CIS are grateful for the opportunity to comment on the proposed ICANN Community Anti-Harassment Policy (“Policy”). We provide our specific comments to the Policy below, in three sections. The first section addresses the&lt;i&gt; Terms of &lt;/i&gt;​&lt;i&gt;Participation&lt;/i&gt;, the second deals with the &lt;i&gt;Reporting&lt;/i&gt;​&lt;i&gt; and Complaint&lt;/i&gt;​&lt;i&gt; Procedure&lt;/i&gt;, and the third places on record our observations on questions and issues for further consideration which have not been covered by the Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides various other observations, CIS broadly submitted:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The attempt to provide an exhaustive definition of “Specified Characteristics” results in its meaning being unclear and exclusionary.&lt;/li&gt;
&lt;li&gt;CIS strongly supports the phrase “including, but not limited to” that is followed by a bulleted list of inappropriate conduct.&lt;/li&gt;
&lt;li&gt;The word “consent” is entirely missing from the draft policy even though the deciding factor in the “appropriateness” of an act or conduct is active and explicit consent to the act by both/ all individuals involved.&lt;/li&gt;
&lt;li&gt;There is a need for clarity of communication platforms. The current Policy fails to specify instances of face-to-face and online communications.&lt;/li&gt;
&lt;li&gt;The policy fails to account for a body of persons (as is provided for in the IETF policy) for the redressal of harassment complaints.&lt;/li&gt;
&lt;li&gt;The provision for an informal resolution of a harassment issue is problematic as it could potentially lead to negative consequences for the complainant. &lt;/li&gt;
&lt;li&gt;The Ombudsperson’s discretion in the determination of remedial action is detrimental to transparency and accountability.&lt;/li&gt;
&lt;li&gt;The Policy in its current form lacks provisions for ensuring privacy and confidentiality of the complainant as well as interim relief while the Ombudsperson is looking into the complaint&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Read the Complete Submission &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comments-on-icann-anti-harassment-policy.pdf"&gt;here&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-proposed-icann-community-anti-harassment-policy'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-proposed-icann-community-anti-harassment-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padma Venkataraman, Rohini Lakshané, Sampada Nayak and Vidushi Marda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-13T15:56:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016">
    <title>Comments on  the Report of the Committee on Digital Payments (December 2016)</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016</link>
    <description>
        &lt;b&gt;The Committee on Digital Payments constituted by the Ministry of Finance and chaired by Ratan P. Watal, Principal Advisor, NITI Aayog, submitted its report on the "Medium Term Recommendations to Strengthen Digital Payments Ecosystem" on December 09, 2016. The report was made public on December 27, and comments were sought from the general public. Here are the comments submitted by the Centre for Internet and Society.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; in response to the report of the Committee on Digital Payments, chaired by Mr. Ratan P. Watal, Principal Advisor, NITI Aayog, and constituted by the Ministry of Finance, Government of India (“the report”) &lt;strong&gt;[2]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; CIS is not an expert organisation in the domain of banking in general and payments in particular. Our expertise is in matters of internet and communication governance, data privacy and security, and technology regulation. We deeply appreciate and are most inspired by the Ministry of Finance’s decision to invite entities from both the sectors of finance and information technology. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the citizens and the users. CIS is thankful to the Ministry of Finance for this opportunity to provide a general response on the report.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; CIS observes that the decision by the Government of India to withdraw the legal tender character of the old high denomination banknotes (that is, Rs. 500 Rs. 1,000 notes), declared on November 08, 2016 &lt;strong&gt;[3]&lt;/strong&gt;, have generated &lt;strong&gt;unprecedented data about the user base and transaction patterns of digital payments systems in India, when pushed to its extreme use due to the circumstances&lt;/strong&gt;. The majority of this data is available with the National Payments Corporation of India and the Reserve Bank of India. CIS requests the authorities concerned to consider &lt;strong&gt;opening up this data for analysis and discussion by public at large and experts in particular, before any specific policy and regulatory decisions are taken&lt;/strong&gt; towards advancing digital payments proliferation in India. This is a crucial opportunity for the Ministry of Finance to embrace (open) data-driven regulation and policy-making.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.&lt;/strong&gt; While the report makes a reference to the European General Data Protection Directive, it does not make a reference to any substantive provisions in the Directive which may be relevant to digital payments. Aside from the recommendation that privacy protections around the purpose limitation principle be relaxed to ensure that payment service providers be allowed to process data to improve fraud monitoring and anti-money laundering services, the report is silent on significant privacy and data protection concerns posed by digital payments services. &lt;strong&gt;CIS strongly warns that the existing data protection and security regulations under Information Technology (Reasonable security practices and procedures and sensitive personal data or information), Rules are woefully inadequate in their scope and application to effectively deal with potential privacy concerns posed by digital payments applications and services.&lt;/strong&gt; Some key privacy issues that must be addressed either under a comprehensive data protection legislation or a sector specific financial regulation are listed below. The process of obtaining consent must be specific, informed and unambiguous and through a clear affirmative action by the data subject based upon a genuine choice provided along with an option to opt out at any stage. The data subjects should have clear and easily enforceable right to access and correct their data. Further, data subjects should have the right to restrict the usage of their data in circumstances such as inaccuracy of data, unlawful purpose and data no longer required in order to fulfill the original purpose.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.&lt;/strong&gt; The initial recommendation of the report is to “[m]ake regulation of payments independent from the function of central banking” (page 22). This involves a fundamental transformation of the payment and settlement system in India and its regulation. &lt;strong&gt;We submit that a decision regarding transformation of such scale and implications is taken after a more comprehensive policy discussion, especially involving a wider range of stakeholders&lt;/strong&gt;. The report itself notes that “[d]igital payments also have the potential of becoming a gateway to other financial services such as credit facilities for small businesses and low-income households” (page 32). Thus, a clear functional, and hence regulatory, separation between the (digital) payments industry and the lending/borrowing industry may be either effective or desirable. Global experience tells us that digital transactions data, along with other alternative data, are fast becoming the basis of provision of financial and other services, by both banking and non-banking (payments) companies. We appeal to the Ministry of Finance to adopt a comprehensive and concerted approach to regulating, enabling competition, and upholding consumers’ rights in the banking sector at large.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.&lt;/strong&gt; The report recognises “banking as an activity is separate from payments, which is more of a technology business” (page 154). Contemporary banking and payment businesses are both are primarily technology businesses where information technology particularly is deployed intimately to extract, process, and drive asset management decisions using financial transaction data. Further, with payment businesses (such as, pre-paid instruments) offering return on deposited money via other means (such as, cashbacks), and potentially competing and/or collaborating with established banks to use financial transaction data to drive lending decisions, including but not limited to micro-loans, it appears unproductive to create a separation between banking as an activity and payments as an activity merely in terms of the respective technology intensity of these sectors. &lt;strong&gt;CIS firmly recommends that regulation of these financial services and activities be undertaken in a technology-agnostic manner, and similar regulatory regimes be deployed on those entities offering similar services irrespective of their technology intensity or choice&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.&lt;/strong&gt; The report highlights two major shortcomings of the current regulatory regime for payments. Firstly “the law does not impose any obligation on the regulator to promote competition and innovation in the payments market” (page 153). It appears to us that the regulator’s role should not be to promote market expansion and innovation but to ensure and oversee competition. &lt;strong&gt;We believe that the current regulator should focus on regulating the existing market, and the work of the expansion of the digital payments market in particular and the digital financial services market in general be carried out by another government agency, as it creates conflict of interest for the regulator otherwise.&lt;/strong&gt; Secondly, the report mentions that Payment and Settlement Systems Act does not “focus the regulatory attention on the need for consumer protection in digital payments” and then it notes that a “provision was inserted to protect funds collected from customers” in 2015 (page 153). &lt;strong&gt;This indicates that the regulator already has the responsibility to ensure consumer protection in digital payments. The purview and modalities of how this function of course needs discussion and changes with the growth in digital payments&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.&lt;/strong&gt; The report identifies the high cost of cash as a key reason for the government’s policy push towards digital payments. Further, it mentions that a “sample survey conducted in 2014 across urban and rural neighbourhoods in Delhi and Meerut, shows that despite being keenly aware of the costs associated with transacting in cash, most consumers see three main benefits of cash, viz. freedom of negotiations, faster settlements, and ensuring exact payments” (page 30). It further notes that “[d]igital payments have significant dependencies upon power and telecommunications infrastructure. Therefore, the roll out of robust and user friendly digital payments solutions to unelectrified areas/areas without telecommunications network coverage, remains a challenge.” &lt;strong&gt;CIS much appreciates the discussion of the barriers to universal adoption and rollout of digital payments in the report, and appeals to the Ministry of Finance to undertake a more comprehensive study of the key investments required by the Government of India to ensure that digital payments become ubiquitously viable as well as satisfy the demands of a vast range of consumers that India has&lt;/strong&gt;. The estimates about investment required to create a robust digital payment infrastructure, cited in the report, provide a great basis for undertaking studies such as these.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.7.&lt;/strong&gt; CIS is very encouraged to see the report highlighting that “[w]ith the rising number of users of digital payment services, it is absolutely necessary to develop consumer confidence on digital payments. Therefore, it is essential to have legislative safeguards to protect such consumers in-built into the primary law.” &lt;strong&gt;We second this recommendation and would like to add further that financial transaction data is governed under a common data protection and privacy regime, without making any differences between data collected by banking and non-banking entities&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.&lt;/strong&gt; We are, however, very discouraged to see the overtly incorrect use of the word “Open Access” in this report in the context of a payment system disallowing service when the client wants to transact money with a specific entity &lt;strong&gt;[4]&lt;/strong&gt;. This is not an uncommon anti-competitive measure adopted by various platform players and services providers so as to disallow users from using competing products (such as, not allowing competing apps in the app store controlled by one software company). &lt;strong&gt;The term “Open Access” is not only the appropriate word to describe the negation of such anti-competitive behaviour, its usage in this context undermines its accepted meaning and creates confusion regarding the recommendation being proposed by the report.&lt;/strong&gt; The closest analogy to the recommendation of the report would perhaps be with the principle of “network neutrality” that stands for the network provider not discriminating between data packets being processed by them, either in terms of price or speed.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.&lt;/strong&gt; A major recommendation by the report involves creation of “a fund from savings generated from cash-less transactions … by the Central Government,” which will use “the trinity of JAM (Jan Dhan, Adhaar, Mobile) [to] link financial inclusion with social protection, contributing to improved Social and Financial Security and Inclusion of vulnerable groups/ communities” (page 160-161). &lt;strong&gt;This amounts to making Aadhaar a mandatory ID for financial inclusion of citizens, especially the marginal and vulnerable ones, and is in direct contradiction to the government’s statements regarding the optional nature of the Aadhaar ID, as well as the orders by the Supreme Court on this topic&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.10.&lt;/strong&gt; The report recommends that “Aadhaar should be made the primary identification for KYC with the option of using other IDs for people who have not yet obtained Aadhaar” (page 163) and further that “Aadhaar eKYC and eSign should be a replacement for paper based, costly, and shared central KYC registries” (page 162). &lt;strong&gt;Not only these measures would imply making Aadhaar a mandatory ID for undertaking any legal activity in the country, they assume that the UIDAI has verified and audited the personal documents submitted by Aadhaar number holders during enrollment.&lt;/strong&gt; A mandate for &lt;em&gt;replacement&lt;/em&gt; of the paper-based central KYC agencies will only remove a much needed redundancy in the the identity verification infrastructure of the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.11.&lt;/strong&gt; The report suggests that “[t]ransactions which are permitted in cash without KYC should also be permitted on prepaid wallets without KYC” (page 164-165). This seems to negate the reality that physical verification of a person remains one of the most authoritative identity verification process for a natural person, apart from DNA testing perhaps. &lt;strong&gt;Thus, establishing full equivalency of procedure between a presence-less transaction and one involving a physically present person making the payment will only amount to removal of relatively greater security precautions for the former, and will lead to possibilities of fraud&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; In continuation with the previous point, the report recommends promotion of “Aadhaar based KYC where PAN has not been obtained” and making of “quoting Aadhaar compulsory in income tax return for natural persons” (page 163). Both these measures imply a replacement of the PAN by Aadhaar in the long term, and a sharp reduction in growth of new PAN holders in the short term. &lt;strong&gt;We appeal for this recommendation to be reconsidered as integration of all functionally separate national critical information infrastructures (such as PAN and Aadhaar) into a single unified and centralised system (such as Aadhaar) engenders massive  national and personal security threats&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.&lt;/strong&gt; The report suggest the establishment of “a ranking and reward framework” to recognise and encourage for the best performing state/district/agency in the proliferation of digital payments. &lt;strong&gt;It appears to us that creation of such a framework will only lead to making of an environment of competition among these entities concerned, which apart from its benefits may also have its costs. For example, the incentivisation of quick rollout of digital payment avenues by state government and various government agencies may lead to implementation without sufficient planning, coordination with stakeholders, and precautions regarding data security and privacy&lt;/strong&gt;. The provision of central support for digital payments should be carried out in an environment of cooperation and not competition.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.14.&lt;/strong&gt; CIS welcomes the recommendation by the report to generate greater awareness about cost of cash, including by ensuring that “large merchants including government agencies should account and disclose the cost of cash collection and cash payments incurred by them periodically” (page 164). It, however, is not clear to whom such periodic disclosures should be made. &lt;strong&gt;We would like to add here that the awareness building must simultaneously focus on making public how different entities shoulder these costs. Further, for reasons of comparison and evidence-driven policy making, it is necessary that data for equivalent variables are also made open for digital payments - the total and disaggregate cost, and what proportion of these costs are shouldered by which entities&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.15.&lt;/strong&gt; The report acknowledges that “[t]oday, most merchants do not accept digital payments” and it goes on to recommend “that the Government should seize the initiative and require all government agencies and merchants where contracts are awarded by the government to provide at-least one suitable digital payment option to its consumers and vendors” (page 165). This requirement for offering digital payment option will only introduce an additional economic barrier for merchants bidding for government contracts. &lt;strong&gt;We appeal to the Ministry of Finance to reconsider this approach of raising the costs of non-digital payments to incentivise proliferation of digital payments, and instead lower the existing economic and other barriers to digital payments that keep the merchants away&lt;/strong&gt;. The adoption of digital payments must not lead to increasing costs for merchants and end-users, but must decrease the same instead.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.16.&lt;/strong&gt; As the report was submitted on December 09, 2016, and was made public only on December 27, 2016, &lt;strong&gt;it would have been much appreciated if at least a month-long window was provided to study and comment on the report, instead of fifteen days&lt;/strong&gt;. This is especially crucial as the recently implemented demonetisation and the subsequent banking and fiscal policy decisions taken by the government have rapidly transformed the state and dynamics of the payments system landscape in India in general, and digital payments in particular.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://finmin.nic.in/reports/Note-watal-report.pdf"&gt;http://finmin.nic.in/reports/Note-watal-report.pdf&lt;/a&gt; and &lt;a href="http://finmin.nic.in/reports/watal_report271216.pdf"&gt;http://finmin.nic.in/reports/watal_report271216.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://finmin.nic.in/cancellation_high_denomination_notes.pdf"&gt;http://finmin.nic.in/cancellation_high_denomination_notes.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Open Access refers to “free and unrestricted online availability” of scientific and non-scientific literature. See: &lt;a href="http://www.budapestopenaccessinitiative.org/read"&gt;http://www.budapestopenaccessinitiative.org/read&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-report-of-the-committee-on-digital-payments-dec-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sumandro Chattapadhyay and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Data Revolution</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-01-12T12:32:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
