<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 521 to 535.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-megha-mandavia-july-19-2018-srikrishna-panel-upset-at-timing-of-trai-suggestions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-july-18-2018-surabhi-agarwal-and-gulveen-aulakh-trai-recommendations-on-data-privacy-raises-eyebrows"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submitted-a-response-to-a-notice-of-enquiry-by-the-us-government-on-international-internet-policy-priorities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ietf-102-montreal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ieee-sa-indita-conference-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/icann-diversity-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-july-15-2018-nishant-shah-digital-native-the-citys-watching"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffington-post-july-5-2018-government-gives-nod-to-bill-for-building-dna-databases-in-india-for-criminal-investigation-and-justice-delivery"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-july-12-2018-indias-latest-data-leak-is-so-basic-that-peoples-aadhaar-number-bank-account-and-fathers-name-are-just-one-google-search-away"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/death-by-social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-july-6-2018-hope-for-such-swift-crackdowns-for-everyone"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-contributes-to-the-research-and-advisory-group-of-the-global-commission-on-the-stability-of-cyberspace-gcsc"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/indian-express-july-1-2018-nishant-shah-digital-native-bigger-picture"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann">
    <title>DIDP #31 Diversity of employees at ICANN</title>
    <link>https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann</link>
    <description>
        &lt;b&gt;We have requested ICANN to disclose information pertaining to the diversity of employees based on race and citizenship.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;This data is being requested to verify ICANN’s claim of being an equal opportunities employer. ICANN’s employee handbook states that they “...provide equal opportunities and are committed to the principle of equality regardless of race, colour, ethnic or national origin, religious belief, political opinion or affiliation, sex, marital status, sexual orientation, gender reassignment, age or disability.” The data on the diversity of employees based on race and nationality of their employees will depict how much they have stuck to their commitment to delivering equal opportunities to personnel in ICANN and potential employees.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The request filed by CIS can be &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/didp-request"&gt;accessed here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann'&gt;https://cis-india.org/internet-governance/blog/didp-31-diversity-of-employees-at-icann&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Akash Sriram</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-21T09:26:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-megha-mandavia-july-19-2018-srikrishna-panel-upset-at-timing-of-trai-suggestions">
    <title>Srikrishna panel upset at timing of Trai suggestions</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-megha-mandavia-july-19-2018-srikrishna-panel-upset-at-timing-of-trai-suggestions</link>
    <description>
        &lt;b&gt;The Justice BN Srikrishna Committee, which is drafting a model data protection and privacy law for India, is upset by the timing of recommendations made by the country’s telecom regulator this week, according to a senior member of the panel, as it fears this will delay the submission of its own report, due later this month.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Megha Mandavia was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/industry/telecom/telecom-policy/srikrishna-panel-upset-at-timing-of-trai-suggestions/printarticle/65047472.cms"&gt;Economic Times&lt;/a&gt; on July 19, 2018. Swaraj Paul Barooah was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Monday, Telecom Regulatory Authority of India (Trai) in a surprise move recommended rules that give users control of their data and personal information while severely restricting ways in which telecom and internet firms can use customer data. Its rules are applicable for apps, browsers, operating systems and handset makers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Next week somebody will make some recommendations and that will have to be merged, then again somebody will make some other recommendations,” the person told ET. He added that the committee will look into Trai’s submissions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, ET reported that officials of ministry of electronics and information technology (MeitY), besides industry groupings such as Internet and Mobile Association of India (IAMAI) and the Indian Cellular Association (ICA) were unhappy with Trai’s move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Like any other sector, the data protection Act will be the final thing. In respect of telecom matters, there will be a role for Trai as sectoral regulator but the basics of privacy will be governed by the data protection Act,” a MeitY official told ET.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legal experts and industry analysts also questioned the need for the regulatory announcement just before the Justice Srikrishna committee releases its report, after a year of deliberations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The high-powered group — consisting of jurists, academicians and policymakers — was formed last July with a brief to suggest principles for data privacy and a draft data protection bill for the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Infocus.png" alt="In focus" class="image-inline" title="In focus" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Why is Trai then pre-empting the law?” said Kartik Maheshwari, leader for technology companies at law firm Nishith Desai Associates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Now that Trai has published its recommendations in public domain, the government may not be able to completely ignore them. But it’s so late in the day that it may not have any real impact on the final recommendations of the Justice Srikrishna committee,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ten-member panel may incorporate some of Trai’s suggestions even as it submits its report to the union government next week. Trai chairman RS Sharma said the regulatory body has jurisdiction to tackle data protection under consumer interest, and those who feed off the industry — content providers, or apps, browsers, operating systems, and devices — were only custodians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We will send these recommendations to the committee, but we did not time it to coincide. We’re not dependent on the committee and we had issued this suo moto, since we felt the need to rigorously deliberate on the issue,” Sharma told ET on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There could be sector-specific laws within the general data protection framework for the telecom sector, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Analysts say that regulators making public their recommendations before the data framework only adds to the confusion. “Industry was looking forward to a common primary framework. There are many independent suggestions coming from various regulators. It is creating confusion and chaos. I do expect considerable delay in finalising the law. Once the draft is out, there will be public consultation; all regulators will also have a say,” said Vidur Gupta, partner, government and public sector, EY India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others say that while there is clarity on what Trai is expecting, it has to be bound by the panel’s recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is good that a regulator has an eye on the market. It gives us an idea about what Trai has on its mind. The Reserve Bank of India also had not waited for Srikrishna Committee report before issuing a directive on data localisation,” said Swaraj Paul Barooah, policy director at Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But the major point is that Trai’s recommendations are not binding; the data privacy law will be influenced by Justice Srikrishna committee only.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-megha-mandavia-july-19-2018-srikrishna-panel-upset-at-timing-of-trai-suggestions'&gt;https://cis-india.org/internet-governance/news/economic-times-megha-mandavia-july-19-2018-srikrishna-panel-upset-at-timing-of-trai-suggestions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-07-19T14:17:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-july-18-2018-surabhi-agarwal-and-gulveen-aulakh-trai-recommendations-on-data-privacy-raises-eyebrows">
    <title>TRAI recommendations on data privacy raises eyebrows</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-july-18-2018-surabhi-agarwal-and-gulveen-aulakh-trai-recommendations-on-data-privacy-raises-eyebrows</link>
    <description>
        &lt;b&gt;The telecom regulator’s recommendations on data privacy have raised eyebrows over jurisdiction and timing, with IT ministry officials as well as companies questioning the need for it at a time when the government appointed Justice BN Srikrishna committee is in the final stages of drafting the data protection law. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal and Gulveen Aulakh was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/industry/telecom/telecom-policy/trai-recommendations-on-data-privacy-raises-eyebrows/printarticle/65033263.cms"&gt;Economic Times&lt;/a&gt; on July 18, 2018. Swaraj Paul Barooah was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Telecom Regulatory Authority of India (TRAI) Chairman RS Sharma though countered that the sectoral watchdog has the jurisdiction to protect consumer interest in the sector, and those who feed off the industry - content providers, or apps, browsers, operating systems, and devices - need to be accountable as far as data protection is concerned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI Monday released its recommendations on the subject titled ‘Privacy, Security and Ownership of Data in the Telecom Sector’ which are applicable for apps, browsers, operating systems and handset makers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official of the Ministry of electronics and IT, which is tasked with drafting the data protection law, said that the Act will “prevail” over everything else. “Like any other sector, the data protection Act will be the final thing. In respect of telecom matters, there will be a role for TRAI as sectoral regulator but the basics of privacy will be governed by the data protection Act.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The official also added that TRAI saying that their recommendations will be applicable till the data protection law comes into force "doesn't make sense since it won't have a legal mandate."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Industry bodies such as Internet and Mobile Association of India (IAMAI) and the Indian Cellular Association (ICA) have also criticised TRAI, saying the recommendations were “illegal” and akin to “jumping the gun” ahead of the release of the Srikrishna committee report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the clauses such as no use of metadata to identify individuals coupled with data minimisation will be detrimental to building the data business in the country, they said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Sharma was argued Trai was well within its rights to protect telecom consumers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Do I not have the jurisdiction to protect the interest of consumers in the telecom sector? I have that. And data protection of consumers in the telecom sector is an issue which is certainly related to the interest of consumers. I have deliberated on that issue, and I’m not saying that bring all those entities under my jurisdiction,” Sharma said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that there is a regulatory imbalance because entities such as devices, OS, browsers and apps are not following any law. “So, the government can come up with a broad framework but till that time let the telecom rules apply on them too."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its recommendations, TRAI said that individual users owned their data, or personal information, and entities such as devices were "mere custodians” and do not have primary rights over that information. It also said that the current framework for protection of personal information is “not sufficient” and suggested expanding the ambit of licence conditions governing telcos to all entities handling customer information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its statement, IAMAI, which represents companies such as Facebook and Google, called TRAI’s assertion that the existing framework is not sufficient to protect telecom consumers “contradictory.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The TRAI recommendations on privacy are premised on a voice and SMS regime. It is not meant for data driven business, which the app companies are. App companies use pseudo anonymous data and app companies do not give Call Detail Records. Incidentally, the Sri Krishna Committee under the Ministry of IT, which is the nodal body for apps as well as for handset manufacturers, is deeply, looking into this issue of consent, which is a fair thing to do.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Voicing similar concerns, the ICA, which represents most of India’s top handset makers, said that the telecom watchdog has absolutely no powers to begin regulating on issues of privacy and ownership of data, leave alone having jurisdiction over devices, operating systems, browsers and applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The industry rejects TRAI's attempts to expand its powers and usurp government's jurisdiction.” It added that TRAI “jumped the gun” by seeking to regulate the digital ecosystem without waiting for the data protection law under consideration by the Justice Srikrishna Committee. “This piecemeal approach is dangerous and unproductive.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Handset makers such as Intex and Karbonn added they should be kept out of the ambit of the proposed regulations because they don't use customer data or monetise from it, which is mostly what apps do. Any additional pressure on indirect costs will lead to wafer-thin margins getting eroded further and consumers will have to bear the brunt, as it will lead to increase in prices of mobile phones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Trai’s recommendations have been sent to the Department of Telecommunications (DoT) which has to take a final call on whether they will be adopted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An official spokesperson for Zomato said that they have not been contacted by any of the regulatory bodies on this, as of now. “Our country is still undergoing the process of setting up a regulatory framework, and what happens between the TRAI recommendations and the B N Srikrishna's committee's draft for Data Protection bill will eventually help set up a much required benchmark.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its suggestions, Trai said that as with telcos, all user data flows through smart devices, putting the device manufacturers, browsers, operating systems, and applications etc. in a prime position to collect and process the personal information of users. Since all user data passes through telcos and devices, appropriate steps must be taken to protect user privacy vis-a-vis these entities. “This will ensure, in prevailing circumstances, that the privacy of users is protected and maintained”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Swaraj Paul Barooah, policy director at Center for Internet and Society, said that the recommendations is worrying at one level since “There is nothing in the telecom sector that requires interim urgent intervention and it may mean that the privacy framework maybe further delayed.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-july-18-2018-surabhi-agarwal-and-gulveen-aulakh-trai-recommendations-on-data-privacy-raises-eyebrows'&gt;https://cis-india.org/internet-governance/news/economic-times-july-18-2018-surabhi-agarwal-and-gulveen-aulakh-trai-recommendations-on-data-privacy-raises-eyebrows&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-07-19T13:33:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submitted-a-response-to-a-notice-of-enquiry-by-the-us-government-on-international-internet-policy-priorities">
    <title>CIS submitted a response to a Notice of Enquiry by the US Government on International Internet Policy Priorities</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submitted-a-response-to-a-notice-of-enquiry-by-the-us-government-on-international-internet-policy-priorities</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society drafted a response to a Notice of Inquiry (NOI) issued by the U.S. Commerce Department's National Telecommunications and Information Administration (NTIA) on "International Internet Policy Priorities." &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The notice was based on different areas 
and we commented on the following three areas; The Free Flow of Information 
and Jurisdiction, The Multi-stakeholder Approach to Internet Governance,
 Privacy and Security. The submission was made by Swagam Dasgupta and Akriti Bopanna. &lt;strong&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comments-on-internet-priorities"&gt;Read the submission here&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The submission broadly covered the following aspects:&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;The Free Flow of Information and Jurisdiction&lt;/h3&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;What are the challenges to the free flow of information online?&lt;/li&gt;&lt;li&gt;Which foreign laws and policies restrict the free flow of 
information online? What is the impact on U.S companies and users in 
general?&lt;/li&gt;&lt;li&gt;Have courts in other countries issued internet-related judgments 
that apply national laws to the global internet? What have the effects 
been on users?&lt;/li&gt;&lt;li&gt;What are the challenges to freedom of expression online?&lt;/li&gt;&lt;li&gt;What should be the role of all stakeholders globally—governments, 
companies, technical experts, civil society and end users — in ensuring 
free expression online?&lt;/li&gt;&lt;li&gt;What role can NTIA play in helping to reduce restrictions on the 
free flow of information over the internet and ensuring free expression 
online?&lt;/li&gt;&lt;li&gt;In which international organizations or venues might NTIA most 
effectively advocate for the free flow of information and freedom of 
expression? What specific actions should NTIA and the U.S. Government 
take?&lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;Multistakeholder Approach to Internet Governance&lt;/h3&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;Does the multistakeholder approach continue to support an 
environment for the internet to grow and thrive? If so, why? If not, why
 not?&lt;/li&gt;&lt;li&gt;Are there public policy areas in which the multistakeholder approach
 works best? If yes, what are those areas and why? Are there areas in 
which the multistakeholder approach does not work effectively? If there 
are, what are those areas and why?&lt;/li&gt;&lt;li&gt;Should the IANA Stewardship Transition be unwound? If yes, why and how? If not, why not?&lt;/li&gt;&lt;li&gt;What should be NTIA’s priorities within ICANN and the GAC?&lt;/li&gt;&lt;li&gt;Are there barriers to engagement at the IGF? If so, how can we lower these barriers?&lt;/li&gt;&lt;li&gt;Are there improvements that can be made to the IGF’s structure?&lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;Privacy and Security&lt;/h3&gt;
&lt;ul style="text-align: justify;"&gt;&lt;li&gt;In what ways are cybersecurity threats harming international 
commerce? In what ways are the responses to those threats harming 
international commerce?&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submitted-a-response-to-a-notice-of-enquiry-by-the-us-government-on-international-internet-policy-priorities'&gt;https://cis-india.org/internet-governance/blog/cis-submitted-a-response-to-a-notice-of-enquiry-by-the-us-government-on-international-internet-policy-priorities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Akriti Bopanna and Swagam Dasgupta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-08-24T07:05:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ietf-102-montreal">
    <title>IETF 102 Montreal</title>
    <link>https://cis-india.org/internet-governance/news/ietf-102-montreal</link>
    <description>
        &lt;b&gt;The Internet Engineering Task Force (IETF) organized IETF 102 Montreal at Fairmont Queen Elizabeth Montreal in Canada from July 14 - 20, 2018. Gurshabad Grover participated remotely in the meetings of several Working Groups.
&lt;/b&gt;
        &lt;ul&gt;
&lt;li&gt;Meeting agenda of IETF102: &lt;a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/meeting/agenda"&gt;https://datatracker.ietf.org/meeting/agenda&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;On July 19, in the meeting of the Human Rights Protocol Considerations (HRPC) Research Group, Gurshabad presented a review of the human rights considerations in the drafts of the Software Update for IoT Devices (SUIT) Working Group. His presentation was based on the review written by him and Sandeep Kumar, which is &lt;a class="external-link" href="https://mailarchive.ietf.org/arch/msg/suit/vH6PL5czghj5eLohdZgLysCwElc"&gt;archived here&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Agenda of the HRPC session @ IETF102: &lt;a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/meeting/102/materials/agenda-102-hrpc-05"&gt;https://datatracker.ietf.org/meeting/102/materials/agenda-102-hrpc-05&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ietf-102-montreal'&gt;https://cis-india.org/internet-governance/news/ietf-102-montreal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-08-01T22:42:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ieee-sa-indita-conference-2018">
    <title>IEEE-SA InDITA Conference 2018</title>
    <link>https://cis-india.org/internet-governance/news/ieee-sa-indita-conference-2018</link>
    <description>
        &lt;b&gt;Gurshabad Grover participated in the IEEE-SA InDITA Conference 2018 organized by IEEE Standards Association held IIIT-Bangalore on July 10 and 11, 2018.&lt;/b&gt;
        &lt;p&gt;Gurshabad gave a brief presentation on how we could apply or reject 'Trust Through Technology' principles in the design of public biometric authentication. The agenda for the event can be &lt;a class="external-link" href="https://ieee-dita.org/indita18/agenda/"&gt;accessed here&lt;/a&gt;. More details on event &lt;a class="external-link" href="https://ieee-dita.org/indita18/"&gt;website here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ieee-sa-indita-conference-2018'&gt;https://cis-india.org/internet-governance/news/ieee-sa-indita-conference-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-01T23:04:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/icann-diversity-analysis">
    <title>ICANN Diversity Analysis </title>
    <link>https://cis-india.org/internet-governance/blog/icann-diversity-analysis</link>
    <description>
        &lt;b&gt;The by-laws of The Internet Corporation for Assigned Names and Numbers (ICANN) state that it is a non-profit public-benefit corporation which is responsible at the overall level, for the coordination of the “global internet's systems of unique identifiers, and in particular to ensure the stable and secure operation of the internet's unique identifier systems”. As key stakeholders of ICANN are spread across the world, much of the communication discussing the work of ICANN takes place over email. This analysis of the diversity of participation at the ICANN processes, through a study of their mailing lists, was undertaken by  Paul Kurian and Akriti Bopanna.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The by-laws of The Internet Corporation for Assigned Names and Numbers (ICANN) state that it is a non-profit public-benefit corporation which is responsible at the overall level, for the coordination of the “global internet's systems of unique identifiers, and in particular to ensure the stable and secure operation of the internet's unique identifier systems”.&lt;a href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Previously, this was overseen by the Internet Assigned Number Authority (IANA) under a US Government contract but in 2016, the oversight was handed over to ICANN, as a global multi-stakeholder body.&lt;a href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Given the significance of the multistakeholder nature of ICANN, it is imperative that stakeholders continue to question and improve the inclusiveness of its processes. The current blog post seeks to focus on the diversity of participation at the ICANN process.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As stakeholders are spread across the world, much of the communication discussing the work of ICANN takes place over email. Various [or X number of ] mailing lists inform members of ICANN activities and are used for discussions between them from policy advice to organizational building matters. Many of these lists are public and hence can be subscribed to by anyone and also can be viewed by non-members through the archives.&lt;/p&gt;
&lt;p&gt;CIS analysed the five most active mailing lists amongst the working group mailing lists from January 2016 to May 2018, namely:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Outreach &amp;amp; Engagement,&lt;/li&gt;
&lt;li&gt;Technology,&lt;/li&gt;
&lt;li&gt;At-Large Review 2015 - 2019,&lt;/li&gt;
&lt;li&gt;IANA Transition &amp;amp; ICANN Accountability, and&lt;/li&gt;
&lt;li&gt;Finance &amp;amp; Budget mailing lists.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;We looked at the diversity among these active participants by focusing on their gender, stakeholder grouping and region. In order to arrive at the data, we referred to public records such as the Statement of Interests which members have to give to the Generic Names Supporting Organization(GNSO) Council if they want to participate in their working groups. We also used, where available, ICANN Wiki and the LinkedIn profiles of these participants. Given below are some of the observations we made subsequent to surveying the data. We acknowledge that there might be some inadvertent errors made in the categorization of these participants, but are of the opinion that our inference from the data would not be drastically affected by a few errors.&lt;/p&gt;
&lt;h4&gt;The following findings were observed:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;A total of 218 participants were present on the 5 mailing lists that were looked at.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Of these,, 92 were determined to be active participants (participants who had sent more than the median number of mails in their working group) out of which 75 were non-staff members. &lt;/li&gt;&lt;/ul&gt;
&lt;h4&gt;Among the active non-staff participants:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Out of the 75 participants, &lt;strong&gt;56&lt;/strong&gt; (&lt;strong&gt;74.7%&lt;/strong&gt;) were male and &lt;strong&gt;19&lt;/strong&gt; (&lt;strong&gt;25.3%&lt;/strong&gt;) were female.&lt;br /&gt;&lt;img src="https://cis-india.org/home-images/Gender.png" alt="null" class="image-inline" title="Gender" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src="https://cis-india.org/home-images/StakeholderGroup.png" alt="null" class="image-inline" title="Stakeholder Group" /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;57.3%&lt;/strong&gt; were identified to be members of the industry and technological community and 1.3% were identified as government representatives. 8.0% were representatives from Academia, 25.3% represented civil society and the remaining 8.0% were from fields that were uncategorizable with respect to the above, but were related to law and consultancy.&lt;br /&gt;&lt;img src="https://cis-india.org/home-images/Region.png" alt="null" class="image-inline" title="Region" /&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Only 14.7% of the participants were from Asia while the majority belonged to Africa and then North America with 24% and 22.7% participation respectively&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Within Asia, we identified only one active participant from China.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Concerns&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;The vast number of the people participating and as an extension, influencing ICANN work are male constituting three fourth of the participants.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The mailing list are dominated by individuals from industry.. This coupled with the relative minority presence of the other stakeholders creates an environment where concerns emanating from other sections of the society could be overshadowed.&lt;/li&gt;
&lt;li&gt;Only 14.7% of the participants were from Asia, which is concerning since 48.7% of internet users worldwide belong to Asia.&lt;a href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;China which has the world’s largest population of internet users (700 million people)&lt;a href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; had only one active participant on these mailing lists.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;ICANN being a global multistakeholder organization should ideally have the number of representatives from each region be proportionate to the number of internet users in that region. In addition to this, participation of women on these mailing lists need to increase to ensure that there is inclusive contribution in the functioning of the organization. We did not come across any indication of participation of individuals of non binary genders.&lt;/p&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;p&gt;&lt;a href="#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://cis-india.org/telecom/knowledge-repository-on-internet-access/icann&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.icann.org/news/announcement-2016-10-01-en&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.internetworldstats.com/stats.htm&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.internetworldstats.com/stats3.htm&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/icann-diversity-analysis'&gt;https://cis-india.org/internet-governance/blog/icann-diversity-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akriti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-29T11:19:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-july-15-2018-nishant-shah-digital-native-the-citys-watching">
    <title>Digital Native: How smart cities can make criminals out of denizens</title>
    <link>https://cis-india.org/raw/indian-express-july-15-2018-nishant-shah-digital-native-the-citys-watching</link>
    <description>
        &lt;b&gt;People download information and share it without knowing about the intellectual property rights. On social media bullying, harassment and hate speech find easy avenues.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://indianexpress.com/article/express-sunday-eye/digital-native-the-citys-watching-5258165/"&gt;Indian Express&lt;/a&gt; on July 15, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I first heard about smart cities in 2003. Sitting in India, it seemed to  be a very strange concept being developed in the Netherlands, where the  planners were trying to arm an entire city with smartness. The idea was  that if we deploy enough cameras, devices that see, machines that hear,  and data connectivity that envelopes the city in a seamless cloud, it  might lead to more order, discipline, and control. To me that felt like a  strange experiment because under all of those different imaginations of  the city as a neat, organised, controlled environment, were assumptions  that were alien to my Indian sensibilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was strange to look at all the promises that “smartness” would deliver — it would make human life easier. It would increase safety and create order out of chaos. It would build new lifestyles that are filled with assistive technologies. In all of these, was the imagination of the city as a laboratory — controlled and efficient, as opposed to riotous and serendipitous. The cities were positioned as filled with intention, so that the interruptions of people, animals, festivals, traffic and crowds would be removed through the deployment of these digital devices and networks. What needed to be preserved was the city and its infrastructure, rather than the individuals and communities that make the city alive and exciting. We wanted our infrastructure to be smart, taking decisions on our behalf, and shaping our lives through the algorithmic protocols that they were coded to embody.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In that faraway time, these had felt like idle speculations. Fifteen  years on, I have now come to realise that the biggest motivation for  building smart cities was not really facilitating human movement,  habitation and habits. Indeed, at the heart of the smart city project  was the setting up of a massive surveillance apparatus that would  clinically diagnose the unwanted people and processes in the city, and  surgically remove them — with the assistance of predictive technologies  that would be implemented in policing and planning these city spaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Smart cities were not constructed to make people’s lives easier. They  were constructed because, increasingly, all the people in a city are  imagined as “users”, who need to be instructed through terms of  services, how they must behave and live in these city spaces. One of the  biggest cultural turns in the massification of the digital web was that  almost all users were imagined as potential criminals by the very  virtue of them being connected. Internet service providers and  regulators knew that if people are connected, they will be violating the  law at some point or another, sometimes unknowingly. People download  information and share it without knowing about the intellectual property  rights. On social media bullying, harassment and hate speech find easy  avenues. The largest traffic on the internet is for pornographic and  often banned material which finds its audiences on the connected web.  Spammers, viruses, hijacked machines, and, often, searches for  unexpected items lead people onto the dark web where the questionable  human interactions happen frequently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The introduction of the digital terms of services was essentially to  presume that the user was a potential criminal who leases hardware and  software, and, platforms from proprietary companies and governments  could then control and discipline the user through comprehensive  surveillance practices. Construction of smart cities performs a similar  function in the physical space. Instead of thinking about citizens as  co-owners who shape city spaces, smart cities establish a service level  agreement with its occupants, and reduces them to users. Any deviation  results in punitive action or devaluation, often curbing the movement,  and the rights of belonging to the city spaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is true that smart technologies can facilitate certain  aspects of human life, they depend on unfettered data collection,  predictive profiling, correlative algorithms and conditions of extreme  invasion and control — which are all predicated on the idea that you  will falter. And when you do, the technologies will be there to witness,  record, archive, and punish you for the daily transgressions till you  are wiped into becoming a predictable, controlled, cleaned up drone that  travels in docility across the networked edges of the city. We will be  assimilated. Resistance will be futile.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-july-15-2018-nishant-shah-digital-native-the-citys-watching'&gt;https://cis-india.org/raw/indian-express-july-15-2018-nishant-shah-digital-native-the-citys-watching&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2018-08-01T00:19:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffington-post-july-5-2018-government-gives-nod-to-bill-for-building-dna-databases-in-india-for-criminal-investigation-and-justice-delivery">
    <title>Government Gives Nod To Bill For Building DNA Databases In India, For 'Criminal Investigation And Justice Delivery'</title>
    <link>https://cis-india.org/internet-governance/news/huffington-post-july-5-2018-government-gives-nod-to-bill-for-building-dna-databases-in-india-for-criminal-investigation-and-justice-delivery</link>
    <description>
        &lt;b&gt;The bill will be introduced in Parliament in the Monsoon session.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://www.huffingtonpost.in/2018/07/05/government-gives-nod-to-bill-for-building-dna-databases-in-india-for-criminal-investigation-and-justice-delivery_a_23474995/"&gt;Huffington Post&lt;/a&gt; on July 5, 2018. Elonnai Hickok was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government has set the path for  creating a DNA bank storing citizen's profiles, as the Union Cabinet  cleared a bill for the regulation and use of DNA for policing. The bill  is meant to regulate the use of DNA for criminal investigation and  justice delivery, and has provisions for the storage of genetic  information. The DNA Technology (Use and Application) Regulation Bill  2018 was passed in a cabinet meeting, chaired by Prime Minister Narendra  Modi, and seeks to expand the use of DNA to help solve crimes, identify  missing persons, and determine biological relationships between people.  It will be introduced in Parliament during the Monsoon Session  beginning July 18.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the bill includes safeguards on how this data is meant to be  used, it's worth pointing out that India still does not have any laws  regarding data protection and privacy. The Justice BN Srikrishna  Committee on data protection, which was formed in August 2017, was  expected to present its report months ago, and there were strong leaks  that it would come out in June. However, the report remains under wraps,  and there there is no clarity about its recommendations. That's also  only the first step, as it has to then be taken up by the government and  made into a law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Scientists who had helped draft the DNA Technology bill &lt;a href="https://www.telegraphindia.com/india/cabinet-clears-dna-database-on-crime-242578" target="_blank"&gt;told&lt;/a&gt; &lt;i&gt;The Telegraph&lt;/i&gt; that expanding the use of DNA in criminal investigations could lead to  higher conviction rates, especially in cases of murder, rape or human  trafficking, among other crimes involving the human body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We rely on DNA for two things - it helps establish beyond doubt the  biological identity of an individual and it helps beyond doubt to  determine whether there is any biological relationship between two  persons," said Jayaraman Gowrishankar, former director and now an Indian  National Science Academy senior scientist at the Centre for DNA  Fingerprinting and Diagnostics in Hyderabad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://www.ndtv.com/india-news/india-could-have-dna-banks-to-store-profiles-as-cabinet-clears-bill-1878017" target="_blank"&gt;According&lt;/a&gt; to &lt;i&gt;NDTV&lt;/i&gt;,  there is also a provision for a jail term of up to three years for  anyone who leaks information from one of the DNA databases being  created, along with a fine of up to Rs 1 lakh. People seeking this  information through illegal means face the same punishment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In other countries, DNA profiles are also used for a number of  businesses such as health care, ancestry information, and even DNA-based  custom diet plans. However, the draft DNA bill states that the data  collected can only be used for the identification of a person, and not  other uses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the accuracy of DNA testing in crime scenes has also been  called into question over time. The possibility of cross contamination  is incredibly high, and has led to innocent people &lt;a href="https://www.theguardian.com/science/2017/oct/02/dna-in-the-dock-how-flawed-techniques-send-innocent-people-to-prison" target="_blank"&gt;going to prison&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Writing on the subject for &lt;i&gt;The Hindustan Times&lt;/i&gt;, Elonnai Hickok, Director, Internet Governance at the Centre for Internet and Society &lt;a href="https://www.hindustantimes.com/analysis/here-s-why-we-need-a-lot-more-discussion-on-india-s-new-dna-profiling-bill/story-CojTDv2vfMMMBsW0CaLxIP.html" target="_blank"&gt;added&lt;/a&gt;:  "Policy needs to evolve past protections that are limited to process  oriented legal privacy provisions, but instead to protections that are  comprehensive — accounting for process and enabling the individual to  control and know how her/ his data is being used and by whom. Other  countries have recognised this and are taking important steps to empower  the individual. India needs to do the same for its citizens."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffington-post-july-5-2018-government-gives-nod-to-bill-for-building-dna-databases-in-india-for-criminal-investigation-and-justice-delivery'&gt;https://cis-india.org/internet-governance/news/huffington-post-july-5-2018-government-gives-nod-to-bill-for-building-dna-databases-in-india-for-criminal-investigation-and-justice-delivery&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-07-13T15:25:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-july-12-2018-indias-latest-data-leak-is-so-basic-that-peoples-aadhaar-number-bank-account-and-fathers-name-are-just-one-google-search-away">
    <title>India's Latest Data Leak: People's Aadhaar Number And Bank Account Are Just One Google Search Away </title>
    <link>https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-july-12-2018-indias-latest-data-leak-is-so-basic-that-peoples-aadhaar-number-bank-account-and-fathers-name-are-just-one-google-search-away</link>
    <description>
        &lt;b&gt;Even Truecaller doesn't reveal this much.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gopal Sathe was published in &lt;a class="external-link" href="https://www.huffingtonpost.in/2018/07/11/indias-latest-data-leak-is-so-basic-that-peoples-aadhaar-number-bank-account-and-fathers-name-are-just-one-google-search-away_a_23479694/"&gt;Huffington Post&lt;/a&gt; on July 12, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Imagine being able to hack someone's personal data simply by entering  their mobile phone number into a Google search. There is a website of  the Andhra Pradesh government that's leaking people's phone numbers,  Aadhaar numbers, father's names, passbook and bank account numbers, and  the district and &lt;i&gt;mandal&lt;/i&gt; where they live - all the link to all  this information is the first result you get when you search for the  phone numbers of people in the database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Andhra government has been leaking the personal data of more than  23,000 farmers who have received subsidies from the Andhra Pradesh  Medicinal and Aromatic Plants Board, and organisation that encourages  the growth of Ayurvedic medicines in the state. The subsidies are  offered to farmers and tribals in the state, and all their personal data  is available on an open database on an Andhra Government website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information is not behind any access control, and you can see all  the records, click on them to get the details of anyone, or download  everything as an Excel sheet. But what's perhaps worse is that simply by  searching for the phone numbers of many of these farmers, we were able  to find the detailed information about them. &lt;i&gt;HuffPost India &lt;/i&gt;randomly chose a dozen farmers, and in each case, this database was the first result for their phone number on Google.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That's the most concerning part - in most cases, even when the  information has leaked, it isn't readily apparent to people. You have to  know the website address, or at the very least spend some time poring  through dashboards. In the case of this latest leak, all you need is the  person's phone number, and all their information is made visible. &lt;i&gt;HuffPost India &lt;/i&gt;has  reported this issue to the AP government, much like earlier leaks,  although at the time of writing the data is still available online.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Who's held responsible?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is just the latest in a long line of leaks from AP - in just the  last few months, we've reported on a website that let you geo-locate  homes on the &lt;a href="https://www.huffingtonpost.in/2018/04/25/aadhaar-seeding-fiasco-how-to-geo-locate-every-minority-family-in-ap-with-one-click_a_23419643/" target="_blank"&gt;basis of caste and religion&lt;/a&gt;; while another tracked all the medicines people buy, &lt;a href="https://www.huffingtonpost.in/2018/06/17/andhra-pradesh-tracked-you-as-you-bought-viagra-then-put-your-name-and-phone-number-on-the-internet-for-the-world-to-see_a_23459943/" target="_blank"&gt;such as generic viagra&lt;/a&gt;, along with their phone numbers; and one that tracked &lt;a href="https://www.huffingtonpost.in/2018/06/18/ap-government-website-lets-anyone-track-patients-in-ambulances_a_23461912/" target="_blank"&gt;pregnant women in ambulances&lt;/a&gt; in real time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A government official we spoke to in AP Secretariat said that while all the departments have been digitised, an &lt;a href="https://www.huffingtonpost.in/2018/07/08/the-ap-government-has-a-new-security-hub-to-guard-your-data-but-tech-isnt-the-problem_a_23476310/" target="_blank"&gt;understanding of security&lt;/a&gt; - and privacy - is yet to come. "Even if you tell them, 'this data is  not something you can publish', they disagree and say that it is needed  for the beneficiaries to be able to access their own information," he  explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Karan Saini, a security analyst and consultant who writes on issues  of web security and privacy, told HuffPost that the various government  departments are generally unresponsive when breaches like this are  brought up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Lack of outreach is an issue with all of these organisations," said  Saini. "NCIIPC is the only one that can even be found by someone looking  at the surface. [These organisations] are hard to get a response from."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One reason for this, said Srinivas Kodali, a security researcher who  has revealed a tremendous amount of leaks in the AP system, is that  there is no official system of accountability in the government when it  comes to data leaks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In May 2017, the AP government passed the &lt;a href="https://apit.ap.gov.in/Other%20Docs/GoAP_Part_IV-B.pdf" target="_blank"&gt;Andhra Pradesh Core Digital Data Authority Act&lt;/a&gt;,  under which in section 37 it states that no legal proceeding shall lie  against any officer or employee for anything which is in good faith  done. What this means is that leaks and breaches are not something any  official in the government can be held responsible for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This act came out less than a month after the Centre for Internet and Society in Bengaluru published a &lt;a href="https://thewire.in/tech/aadhaar-card-details-leaked" target="_blank"&gt;report&lt;/a&gt; stating that 13 crore Aadhaar numbers were leaked - of which 2 crore were from Andhra Pradesh.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A lack of (human) resources&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;AP officials do acknowledge the problem. "There is a major shortage  of cybersecurity professionals, and hiring them is a challenge," &lt;a href="https://www.huffingtonpost.in/2018/07/08/the-ap-government-has-a-new-security-hub-to-guard-your-data-but-tech-isnt-the-problem_a_23476310/" target="_blank"&gt;said&lt;/a&gt; V Premchand, head of the Andhra Pradesh Technology Service, who is in  charge of the ongoing security work in the state. AP has seen a major  security audit in May this year, and a privacy audit was announced last  month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The work is ongoing but it is not something that can happen  overnight," Premchand explained. However, others argue that the  government isn't doing enough to make use of existing manpower. Unlike  other countries, the Indian government does not have any real bug bounty  program, where security researchers are incentivised to report  weaknesses to organisations for cash rewards and recognition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sai Krishna Kothapalli, a student at IIT Guwahati and a security  researcher, told HuffPost that the government actively discourages  security experts from providing their support, rather than encouraging  them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The US Department of Defense and others have a responsible  disclosure program and a lot of people from India take part in that," he  said. "Our talent is being used by them instead because the government  here does not reply at all."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"India's top hackers are being employed by people outside the  country, even though we have the talent here, because will you spend the  time and effort to be ignored here, or report issues to a US company  and make thousands of dollars instead?"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, security audits in India are only being carried out by  agencies that have been empaneled, and most of the hackers active here  don't have the certification, he added. "They're too busy actually doing  the work, while these big companies do audits, and leave all kinds of  security issues behind."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-july-12-2018-indias-latest-data-leak-is-so-basic-that-peoples-aadhaar-number-bank-account-and-fathers-name-are-just-one-google-search-away'&gt;https://cis-india.org/internet-governance/news/huffington-post-gopal-sathe-july-12-2018-indias-latest-data-leak-is-so-basic-that-peoples-aadhaar-number-bank-account-and-fathers-name-are-just-one-google-search-away&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-07-13T15:18:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that">
    <title>Child-lifting rumours caused 69 mob attacks, 33 deaths in last 18 months</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that</link>
    <description>
        &lt;b&gt;45 persons were killed in 40 cases of mob lynching across nine states between 2014 and 3 March 2018 according to data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="https://www.business-standard.com/article/current-affairs/69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that-118070900081_1.html"&gt;Business Standard&lt;/a&gt; on July 9, 2018. Swaraj Paul Barooah was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Two incidents of mob violence reported from Dima Hasao in Assam and  Mangaluru in Karnataka on July 6, 2018, take to 61 the number of &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=mob+attacks" target="_blank"&gt;mob attacks &lt;/a&gt;sparked by rumours of child-lifting circulated on social media since beginning of the year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So far this year, 24 persons have been killed in such mob attacks, an &lt;b&gt;IndiaSpend&lt;/b&gt; &lt;a href="http://bit.ly/attacks-childlifting"&gt;analysis&lt;/a&gt; of news reports from across India shows. This is more than 4.5 times  rise in attacks and two-fold rise in deaths of this kind over 2017, when  11 persons were killed in eight separate attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between January 1, 2017, and July 5, 2018, 33 persons have been killed  and at least 99 injured in 69 reported cases. In the first six days of  July alone, there have been nine cases of mob violence over &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;rumours and five deaths, which amounts to more than one attack recorded every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In all cases, the victims were assaulted on mere suspicion and no evidence of &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;was  found later. So far, police across states have arrested at least 181  persons in connection with 21 cases, according to information from the  news reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On July 5, 2018, the central home ministry had &lt;a href="https://www.firstpost.com/india/mha-asks-states-uts-to-check-mob-lynching-incidents-tells-them-to-detect-child-lifting-rumours-early-4672261.html/amp?__twitter_impression=true"&gt;directed&lt;/a&gt; all states and union territories to contain mob-lynchings fuelled by  rumours of child-lifting on social media. Nevertheless, two attacks were  reported on July 6, 2018–a father travelling with his own son in  Karnataka, and three &lt;i&gt;sadhus&lt;/i&gt; or ‘holy men’ travelling in Assam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to 2017, one mob &lt;a class="storyTags" href="https://www.business-standard.com/topic/lynching" target="_blank"&gt;lynching &lt;/a&gt;was  recorded in August 2012, in which a driver was killed in Patna, Bihar,  on suspicion of kidnapping a minor, according to our database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The spike in these lynchings over the past year follows a rise in bovine-related hate violence, as recorded in &lt;b&gt;IndiaSpend&lt;/b&gt;’s &lt;a href="http://data.indiaspend.com/"&gt;database&lt;/a&gt; on cow-related hate crime. Incidents of &lt;a class="storyTags" href="https://www.business-standard.com/search?type=news&amp;amp;q=mob+attacks" target="_blank"&gt;mob attacks &lt;/a&gt;on persons suspected of killing cows have become deadlier during this period, with more deaths reported in attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social and political commentators have blamed this violence on a rise  in socio-political and religious cleavages, a rise of vigilantism and an  apparent atmosphere of impunity for attackers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The violence started with cow-related vigilantism but it is now  building up more violent behaviour–from small to big reasons anything  could be the trigger,” psychologist Upneet Lalli, deputy director of the  Institute of Correctional Administration in Chandigarh, told &lt;b&gt;IndiaSpend&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Videos of people tied and beaten, begging mobs to spare their lives,  have been circulating on WhatsApp groups and other social media,  affecting people everywhere, she said, adding, “Once set off for any  reason, mob hysteria is extremely difficult to control.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media is aiding and abetting the process, criminologist Vijay  Raghavan, dean of the social protection office at the Tata Institute of  Social Sciences, told &lt;b&gt;IndiaSpend&lt;/b&gt;, adding that the growing violence is “clearly being orchestrated by vested interests”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A rumour starts in one part of the country and travels to other parts  like wildfire–first it was beef, now it is child lifting,” he said. In  most cases, the victims and the attackers belong to communities  historically pitted against each other, he said, “This changing  narrative has a clear pattern of violence that is basically preying on  traditional insider-outsider perceptions.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our analysis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To analyse instances of mob violence related to child-lifting rumours,  our team collected, studied and cross-verified print and online news  reports in the English media, which tend to have the widest nationwide  coverage, since 2010. All reported incidents were cross-referenced to  eliminate discrepancies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://bit.ly/attacks-childlifting"&gt;dataset&lt;/a&gt; thus  created includes the number of mob attacks, the severity of each attack  and details of the victims. Most entries include the names of districts,  towns and villages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since each observation is based on a newspaper report of the crime,  availability of details such as the severity of crime, the number of  victims and their identities and ethnicities varies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before 2017, only one incident was reported in 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jharkhand, Maharashtra deadliest&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among all states and union territories, Jharkhand and Maharashtra, with  seven and five deaths, respectively, reported the highest death toll.  The chances of death in such attacks in these states stood at 350% and  167%, respectively, meaning every reported incident led to more than one  death.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Odisha, under the Biju Janata Dal government, reported the most number  of attacks, 15, which resulted in one death. Tamil Nadu, run by the All  India Anna Dravida Munnetra Kazhagam (AIADMK), followed with nine cases  and four deaths.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One-third or 30% of attacks were reported from states ruled by the  Bharatiya Janata Party, which also runs the central government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the 19 months since January 2017, 10 districts across 16 states have  reported more than one case of mob violence. Jeypore, Mayurbhanjh and  Rayagada in Odisha and Visakhapatnam in Andhra Pradesh have reported  three separate incidents each.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than half or 56% of the attacked victims were men, 22% women, 3%  transgender, and for the remaining 18%, the gender was not mentioned in  the news reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among those killed, 14 were Hindus, 3 Muslims, and in 16 cases the religious/ethnic identity was not reported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;No correlation between rise in reported child kidnappings and spread of mob violence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Except in Maharashtra, these incidents of violence do not reflect an increase in child kidnapping cases recorded in &lt;a class="storyTags" href="https://www.business-standard.com/category/current-affairs-news-national-1150106.htm" target="_blank"&gt;National &lt;/a&gt;Crime Records Bureau (NCRB) &lt;a href="http://ncrb.gov.in/StatPublications/CII/CII2016/pdfs/Table%202C.2.pdf"&gt;data&lt;/a&gt; from 2014 to 2016.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the two years from 2014, India recorded a 41% rise in kidnapping and  abduction of children–from 38,555 in 2014 to 54,328 in 2016–primarily  in Uttar Pradesh (9,678), Maharashtra (8,260) and Delhi (6,254), NCRB  data show.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of 2016, Maharashtra, the second-most populous state in India,  reported the second-highest number of child abductions. It has also  reported the second-highest toll from mob lynchings over child-lifting  rumours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there was no such correlation in Uttar Pradesh and Delhi,  which the NCRB ranked first and third for the number of reported child  abductions and kidnappings (which are defined differently in law but  basically involve seizing by force and against the victim’s will).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jharkhand, which reported the highest death toll from mob lynchings,  ranked 19 across India for reported child abductions in 2016, as per  NCRB data. Tripura, where five people were killed, ranked 24.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This may suggest that fears of &lt;a class="storyTags" href="https://www.business-standard.com/topic/child-lifting" target="_blank"&gt;child lifting &lt;/a&gt;are  unfounded and exaggerated. “There is no correlation because the  instigators of this violence are not prompted by a genuine fear of  kidnapping,” Raghavan said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the data do not account for cases that go unreported–families  are hesitant to approach the police, who are seen to be unsympathetic  and intimidating–or cases lost in communication between states and NCRB.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The violence is also indicative of how people have lost faith in law  enforcement and criminal justice systems to act decisively against child  lifting, Lalli said, adding, “Losing faith in the law of the land is a  serious threat to society.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mob psyche is different from individual psyche, she said, “When an  individual acts, there is a sense of responsibility, but in a mob, there  is a dispersion of responsibility and guilt.” The mob justifies its act  as heroism to save the community, their identity, their children,  themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the children kidnapped or abducted in 2016, 73% were female and 27%  male, NCRB data show. Of the total child victims, 31% (16,938) were  kidnapped or abducted for the purpose of marriage, of which only one  victim was male; 3% (1,562 female and 26 male) for illicit intercourse;  and 1% each for other unlawful activity and adoption. No purpose was  mentioned in fully 62% of cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;77% attacks attributed to fake news&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the 69 mob violence cases related to rumours of child lifting that  have been reported, 77% were eventually attributed to fake news spread  through social media. Mobile messenger application Whatsapp, in  particular, featured as the rumour source in 28% or 19 of the cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry of electronics and information technology on July 2, 2018,  issued a warning to Whatsapp, observing that “instances of &lt;a class="storyTags" href="https://www.business-standard.com/topic/lynching" target="_blank"&gt;lynching &lt;/a&gt;of  innocent people because of large number of irresponsible and explosive  messages filled with rumours and provocation are being circulated on  WhatsApp”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Such a platform cannot evade accountability and responsibility  especially when good technological inventions are abused by some  miscreants who resort to provocative messages which lead to spread of  violence,” the ministry said subsequently in a &lt;a href="http://www.pib.nic.in/PressReleseDetail.aspx?PRID=1537502"&gt;press release&lt;/a&gt; on July 3, 2018, stating clearly that “WhatsApp must take immediate  action to end this menace and ensure that their platform is not used for  such malafide activities”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 13% or 200 million of WhatsApp’s 1.5 billion users are Indian, &lt;i&gt;The Financial Express &lt;/i&gt;&lt;a href="https://www.financialexpress.com/industry/technology/whatsapp-now-has-1-5-billion-monthly-active-users-200-million-users-in-india/1044468/"&gt;reported&lt;/a&gt; on February 1, 2018. This is 42% of India’s 481 million internet users &lt;a href="https://timesofindia.indiatimes.com/business/india-business/number-indian-internet-users-will-reach-500-million-by-june-2018-iamai-says/articleshow/62998642.cms"&gt;recorded&lt;/a&gt; as of December 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a letter to the ministry shared with &lt;b&gt;IndiaSpend&lt;/b&gt;,  the WhatsApp management said it was “horrified by these terrible acts of  violence” and listed out the steps it has taken to curb the spread of  fake news but emphasised that the challenge “requires government, civil  society and technology companies to work together”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It maintained, however, that messages would continue to have end-to-end  encryption to protect users’ privacy and security, encryption being key  to WhatsApp’s messaging service. It added that no more than a quarter  of WhatsApp users are part of groups; that the majority of groups are  small (with fewer than 10 members); and nine in 10 messages are sent  from just one person to another.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber privacy experts caution against overreacting against WhatsApp and  other social media platforms, arguing in favour of free speech and  privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In June, after two cases of mob lynching in Tripura, the government  tried to control the situation by shutting down the internet in the  area, reports included in our database said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is “a slippery slope to quell dissent”, Swaraj Barooah, director  at the Centre for Internet and Society, a Bengaluru-based  not-for-profit, said, adding, “There are indications that marginalised  groups tend to be affected more strongly than others when there are  internet shutdowns.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lynchings point to a much larger issue than the ubiquitous presence of  social media, experts said. “Everyone is focusing on these being  rumours–and of course the platform’s ability to exponentially magnify  the speed and reach of a message being sent is very relevant–but when  and why did we normalise vigilante justice in the first place?” said  Barooah. “For instance, would this type of action be okay if these were  not rumours, but had actually been true?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The root problem is those exploiting historical animosities between  communities. We need to properly investigate on a national-level who are  the instigators and what are they after–merely arresting people after  an incident is not enough,” professor Raghavan said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Barooah also warned against attempts to force WhatsApp to provide security agencies with decrypted data, as the government had &lt;a href="https://economictimes.indiatimes.com/industry/telecom/government-blackberry-end-dispute-over-interception-of-bb-devices/articleshow/20995830.cms"&gt;forced&lt;/a&gt; the Canadian smartphone maker Blackberry to do in 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Given that it is already unsure of the extent to which WhatsApp shares  metadata with governments, it is important to ensure that its  end-to-end encryption facility is not weakened,” Barooah said. “There  are certain delicate trade-offs that can be made, but if they are, they  should not be made as a knee-jerk reaction to ongoing events but after  careful consideration of all the pitfalls. This is especially important  in India, given the lack of a privacy law as well as concerns of  chilling effects on free speech that are present.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some solutions he suggested include making it mandatory that WhatsApp  forwards and memes contain originator details, and that a “fact check  this” option be inserted at the user end to allow a message to be  decrypted. He also suggested that a database of ‘reported hashes’ be  created, which all users could download, and which would automatically  rate messages on ‘trust’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also important to help people identify fake news and question the  information they receive, experts say, pointing out that while India  has low literacy and education levels, even highly literate people are  not free from confirmation bias.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We really need to educate people–people naively believe everything  they read as true. We’re not doing anything about critical thinking and  critical inquiry–we’ve stopped being questioning and that’s a very  important part of countering fake news,” Lalli said, adding, “We don’t  even respond to information, we’re only reacting.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How recent attacks tie in with bovine-related vigilantism and violence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IndiaSpend &lt;/b&gt;has been maintaining a &lt;a href="http://data.indiaspend.com/"&gt;database&lt;/a&gt; of bovine-related violence since 2010, which shows a spurt in violence  since the BJP and Prime Minister Narendra Modi assumed power in May  2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A preponderant majority of bovine-related hate crimes–98% of the 85  incidents–have occurred since May 2014, our database shows. Only one  incident each was reported in 2012 and 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around 56% of the persons attacked by these groups were Muslim, who  accounted for 88% of those killed in this violence. In 2018, 100% of  victims attacked in these hate crimes were Muslim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There is a clear increase in aggression by one group against the other  and a growing inability to empathise and understand those different  from ourselves,” Lalli said, “This has essentially made us revert to  behaving like tribalistic societies with animalistic instincts–where,  when for survival, when you perceive an animal to be a threat, you  attack it to kill it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In more than a third–28 of 85 incidents–mobs or groups of people were  spurred into violence on the mere suspicion of cow slaughter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our database also shows that the attacks have become deadlier–the  percentage chance of such mob-violence resulting in death has more than  doubled from 30% in 2017–regarded as the deadliest year since 2010 (11  deaths in 37 cases)–to 66% in 2018 (four deaths in six cases).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Society has an innate capacity for violence and it’s very easy to  encourage this. Right from Twitter trolling–which is basically extreme  verbal aggression–we are unleashing and encouraging violence in  different ways and contexts,” Lalli said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What the government says&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many commentators have remarked that the absence of a strict and prompt  response from the government has encouraged such violence. “What action  is taken when such cases occur has an important bearing on the  continuation of such violence,” Raghavan said, “By not taking strong  action, the state is complicit in its orchestration.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While we hear about more incidents of violence, we are yet to hear  full recognition or condemnation of these acts from the important  leaders–in a way it sends out a message that does not discourage the  mob,” Lalli agreed, “When you don’t speak out about it and come down on  it strongly, it sends out a signal to society that it’s alright to  resort to violence for these reasons since nobody gets punished.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NCRB “does not maintain specific data with respect to mob lynching  incidents (involving minorities) in the country”, the home ministry &lt;a href="http://164.100.47.190/loksabhaquestions/annex/14/AS242.pdf"&gt;told&lt;/a&gt; Parliament on March 13, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry did furnish some data on mob lynchings recorded by states  from 2014 to 2017, but did not provide information on the motive–whether  cow vigilantism, communal or caste hatred, or rumours of child-lifting,  etc. The data also did not disclose the identity of the victims.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These data said 45 persons were killed in 40 cases of mob lynching  across nine states between 2014 and March 3, 2018. At least 217 persons  have been arrested.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, &lt;b&gt;IndiaSpend&lt;/b&gt;’s two databases on mob  violence–due to child-lifting rumours and bovine-related hate  violence–record 80 cases and 41 deaths during the same period. This is  without counting other instances of mob violence related to caste, moral  policing and so on.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that'&gt;https://cis-india.org/internet-governance/news/business-standard-july-9-2018-69-mob-attacks-on-child-lifting-rumours-since-jan-17-only-one-before-that&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-07-13T14:53:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/death-by-social-media">
    <title>Death by Social Media</title>
    <link>https://cis-india.org/internet-governance/news/death-by-social-media</link>
    <description>
        &lt;b&gt;The victims of WhatsApp forwards are outsiders, the political class is silent, the state is helpless. There are clear patterns behind the recent mob lynchings.&lt;/b&gt;
        &lt;p&gt;The article by Pretika Khanna, Abhiram Ghadyalpatil and Shaswati Das was published in &lt;a class="external-link" href="https://www.livemint.com/Politics/jkSPTSf6IJZ5vGC1CFVyzI/Death-by-Social-Media.html"&gt;LiveMint&lt;/a&gt; on July 9, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Maharashtra state administration is still trying to come to terms with the shocking lynching on 1 July in Dhule district in northern Maharashtra, where a restive mob of 3,500-plus villagers gathered outside the gram panchayat office in Rainpada village, broke open the locks, and killed five agricultural labourers on the suspicion that they were ‘child-lifters’. There have been 14 incidents of mob lynching and vigilante justice—fuelled by rumours spread on social media—in Maharashtra alone in less than a month since 8 June.&lt;br /&gt;&lt;br /&gt;In fact, a police officer, who spoke on the condition of anonymity as he is part of the investigating team, says the police machinery was clueless as “no police station in the areas where the mob attacks have occurred has received a formal complaint about kidnappings or children missing before the attacks”. Now, of course, everybody has swung into action. In Maharashtra, at prominent public locations across cities and towns, the state government have put up large boards cautioning people against believing social media rumours.&lt;/p&gt;
&lt;p&gt;&lt;img alt="(Right) an angry mob lynched a hawker on suspicion of being a child-lifter at the Tripura State Rifles camp in Agartala on 29 June. Photo: AFP" class="img-responsive" src="https://www.livemint.com/r/LiveMint/Period2/2018/07/09/Photos/Processed/WhatsApp-2-kjkB--414x621@LiveMint.jpg" title="(Right) an angry mob lynched a hawker on suspicion of being a child-lifter at the Tripura State Rifles camp in Agartala on 29 June. Photo: AFP" /&gt;&lt;br /&gt;(Right) an angry mob lynched a hawker on suspicion of being a  child-lifter at the Tripura State Rifles camp in Agartala on 29 June.  Photo: AFP&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the last year, there have been a number of deaths fuelled by  rumours which spread like lightning via  WhatsApp, the messaging  platform owned by Facebook Inc. Horrific incidents have been reported  from the states of Assam, Tripura, Karnataka, Jharkhand among others. A  common rumour—that gangs of children-lifters are out to pick up  children—has triggered almost all of these incidents of mob frenzy.  Those being targeted include migrants, mentally challenged people,  nomadic and denotified tribes and other vulnerable sections of society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Over  20 people have been killed. It’s unprecedented not just in India but  globally. It is as serious as a breakout of an epidemic. Misinformation  has been weaponized to target minorities, individuals, activists…,” says  Pratik Sinha  co-founder &lt;i&gt;AltNews&lt;/i&gt;, a fact-checking website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Complicating matters is that there are multiple reasons behind this shocking breakdown in law and order. Is the villain of the piece WhatsApp, which has 200 million monthly users, and did it do enough to stop the spread of rumours? Did the all-powerful, all-seeing local administration and police do its best to catch the societal discord before it erupted? What role did an overall, environment play, at a time when society has internalized lynching to such an extent that a Harvard-educated union minister Jayant Sinha recently honoured and garlanded eight people convicted of lynching a coal trader Alimuddin Ansari in Ramgarh, Jharkhand, last June?&lt;/p&gt;
&lt;blockquote class="pullquote" style="text-align: justify; "&gt;&lt;b&gt;Over 20 people have been killed. It’s unprecedented not just in  India but globally. It is as serious as a breakout of an epidemic.  Misinformation has been weaponized to target minorities, individuals,  activists…&lt;/b&gt;- Pratik Sinha, co-founder of AltNews, a fact-checking website&lt;/blockquote&gt;
&lt;h3 style="text-align: justify; "&gt;Fear of the outsider&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Not only have most of the victims been strangers, there are clear patterns behind most mob lynchings in recent times. In 2012, for instance, a rumour that spread like wildfire on social media had the north-eastern people in Bengaluru fleeing the city overnight. “These were not just random rumours, these are targeted. For example, the messages circulated in Bengaluru targeted Hindi-speaking migrants,” said Pranesh Prakash, fellow at the Centre for Internet and Society, a Bengaluru-based think tank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts point out that victims are usually outsiders as they are not seen as being rooted in society. “There is a structural marginalization based on caste, class which is usually attributed with such rumours. Invariably the attack is against those who already have a reputation,” said T.K. Oommen, sociologist and professor emeritus at the Centre for the Study of Social Systems, JNU.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take the Dhule incident. According to the police official cited earlier, “In Maharashtra particularly there has been a method to this madness against some tribes like the Nath Gosavi tribe, to which the victims in Dhule belonged, and the Phase Pardhis. These communities are routinely identified as of criminal bent and have been on the receiving end much before social media emerged.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;There is a structural marginalization based on caste, class  which is usually attributed with such rumours. Invariably the attack is  against those who already have a reputation&lt;/b&gt;- T.K. Oommen, sociologist and professor emeritus at the Centre for the Study of Social Systems, JNU&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Changes in society&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;“Rumours are not a one-time event. They emerge due to unrest in society. This is usually the situation in a society characterized by fear. The general tendency in society is that they are unreliable. That leads to consequences which are usually bad,” says Oommen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as the Union home ministry has no official record of mob lynching, social media has become the primary catalyst for self-styled cow vigilantes, as well, to bring to book those who have reportedly been indulging in cow slaughter. On 1 April 2017, Pehlu Khan, along with six others, was returning from Jaipur to his village in Nuh, Haryana, carrying cows and calves for the purpose of dairy farming. They were stopped at the Jaipur-Delhi national highway by 200 cow vigilantes, who beat Khan to death.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since 2014, there have been numerous such incidents of mob violence that have normalized the brutal act. The fact that political leaders have not been openly and quickly condemning such instances sets out a signal to the administration and people at large. All this comes at a time when sociologists and mental health experts point out that there has been a change in the societal set-up. They say that unlike older times, there is no folklore anymore. There is also a breakdown of the traditional society set-up along with a speed up of technology which gives a boost to the spread of such rumours.&lt;/p&gt;
&lt;blockquote class="pullquote" style="text-align: justify; "&gt;Social media has become the primary catalyst for self-styled cow vigilantes, as well, to bring to book those who have reportedly been indulging in cow slaughter&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Mental health experts say that people tend to believe messages sent through platforms like WhatsApp as they usually are sent by a trusted source. “As a result, doubts regarding the credibility of the source of the messages tend to get diluted. And therefore, we are inherently more likely to not think of rejecting the content of the message as being false or inauthentic,” said Samir Parikh, director of department of mental health and behavioural sciences at Fortis Healthcare.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The role of WhatsApp&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 8 June, two men, who had gone to Kangthilangso waterfall in Karbi Anglong district in Assam were beaten to death by villagers at Panjuri Kachari on suspicion of being child-lifters.&lt;br /&gt;&lt;br /&gt;While the police immediately sprung into action, they are still heavily dependent on the response mechanism of the social media companies. “WhatsApp circulation has increased exponentially and we are now thinking of ways to control the flip side of it. When we are faced with specific cases pertaining to social media we write to the platforms separately, but their response time is long,” said Pallab Bhattacharya, special director general of police (special branch), Assam.&lt;/p&gt;
&lt;p&gt;Pranesh Prakash, fellow at the Centre for Internet and Society, a Bengaluru-based think tank.&lt;/p&gt;
&lt;blockquote class="pullquote" style="text-align: justify; "&gt;There is no literacy training on the fact that the platform has rumours and misinformation, how to spot them and avoid becoming a source of it &lt;br /&gt;- Pranesh Prakash, fellow at the Centre for Internet and Society, a Bengaluru-based think tank&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;According to Prakash, while WhatsApp keeps reminding users that their messages are encrypted, it does not remind its users to not forward unverified information or misinformation, as is prohibited by its acceptable use policy. The acceptable use policy is available only in English, and there is no user conditioning about what kind of messages aren’t acceptable. “Also, there is no literacy training on the fact that the platform has rumours and misinformation, how to spot them and avoid becoming a source of it,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, Akash Tomar, superintendant of police-city (Ghaziabad) found it challenging to handle the rumours spread through social media platforms during Dera Sacha Sauda riots that took place not very far away from the state and other similar sensitive incidents. “At one point, WhatsApp can help the police in disseminating important and useful information for citizens but off late we have witnessed that such social media platforms have a potential to trigger riots, lynching and other crimes,” Tomar said.&lt;/p&gt;
&lt;p&gt;While WhatsApp says it will take appropriate measures to curtail the spread of fake news , simply shooting the messenger is not going to be enough. These murders have not taken place in a digital vacuum.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;pretika.k@livemint.com&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;i&gt;Komal Gupta and Neetu Chandra Sharma in New Delhi contributed to this story.&lt;/i&gt;&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/death-by-social-media'&gt;https://cis-india.org/internet-governance/news/death-by-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-07-10T01:44:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-july-6-2018-hope-for-such-swift-crackdowns-for-everyone">
    <title>'Hope for such swift crackdowns for everyone'</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-july-6-2018-hope-for-such-swift-crackdowns-for-everyone</link>
    <description>
        &lt;b&gt;The prompt arrest has impressed cybercrime experts, but some are sceptical whether this case will serve as a deterrent for trolls or spell hope for citizens at the receiving end of online abuse. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://timesofindia.indiatimes.com/city/mumbai/hope-for-such-swift-crackdowns-for-everyone/articleshow/64876887.cms"&gt;published in the Times of India&lt;/a&gt; on July 6, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"I don't think this serves as sufficient deterrent for the everyday  user. The victim here was a high-profile individual and action was taken  after specific instructions from the Union home ministry towards both  the police and Twitter," said Pranav MB of the Centre for Internet and  Society, a non-profit whose focus areas include digital privacy and  cybersecurity. &lt;br /&gt; &lt;br /&gt; Pavan Duggal, chairman of the International Commission of Cyber  Security Law, too felt the "high-profile stature" of the complainant  means this could be an example of "customised justice" and not "generic  justice". "The police invariably give step-motherly treatment to the  common man whose issues are low priority to them," he said.  &lt;br /&gt; &lt;br /&gt;Duggal stressed on the need to adopt a  "holistic approach" to deter anonymous trolls as a matter of "de facto  routine". "We need to come up with strong legal provisions to deal with  trolls," he said. &lt;br /&gt; &lt;br /&gt;Such steps are becoming imperative  given that a recent study by a global cybersecurity firm showed that  eight out of 10 persons in India reported some form of online abuse.  Another study by a Delhi NGO detailed how vocal women often have to deal  with violent threats and &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/sexual-remarks"&gt;sexual remarks&lt;/a&gt;.  After the arrest, Priyanka Chaturvedi herself pointed out that "they  like to target women who have a different opinion" and stressed the need  to send a strong message. &lt;br /&gt; &lt;br /&gt; "Threatening the &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/rape"&gt;rape&lt;/a&gt; of a child is the lowest thing. It's disgusting," said women's rights  lawyer Flavia Agnes. Pointing out the vicious trolling of foreign  minister Sushma Swaraj over her ministry's clearance to the passport of a  Hindu-Muslim couple, Agnes said: "This has been happening again and  again and it is getting out of hand. Arresting is one thing but we need  to put an end to this menace."  &lt;br /&gt; &lt;br /&gt; The swift police action has impressed  Mumbai cybercrime investigator Ritesh Bhatia. "It is not too difficult  to catch trolls using fake ID these days since &lt;a class="key_underline" href="https://timesofindia.indiatimes.com/topic/social-media"&gt;social media&lt;/a&gt; platforms are ready to provide the police with user logs that help  track their IP address. I am glad Twitter responded quickly," said  Bhatia. "I also hope that such speedy action is taken for all those who  are threatened and abused, irrespective of their profession, status and  political affiliations."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-july-6-2018-hope-for-such-swift-crackdowns-for-everyone'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-july-6-2018-hope-for-such-swift-crackdowns-for-everyone&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-07-07T08:52:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-contributes-to-the-research-and-advisory-group-of-the-global-commission-on-the-stability-of-cyberspace-gcsc">
    <title>CIS contributes to the Research and Advisory Group of the Global Commission on the Stability of Cyberspace (GCSC)</title>
    <link>https://cis-india.org/internet-governance/blog/cis-contributes-to-the-research-and-advisory-group-of-the-global-commission-on-the-stability-of-cyberspace-gcsc</link>
    <description>
        &lt;b&gt;The Global Commission on the Stability of Cyberspace (GCSC) is an initiative of the Hague Centre for Strategic Studies and the East West Institute that seeks to promote mutual awareness and understanding among various cyberspace communities. It seeks to develop norms and policies that advance the stability and security of cyberspace.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Chaired by Marina Kaljurand, and Co-Chaired by Michael Chertoff and Latha Reddy, the Commission comprises 26 prominent Commissioners who are experts hailing from a wide range of  geographic regions representing multiple communities including academia industry, government, technical and civil society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a part of their efforts, the GCSC sent out a call for proposals for papers that sought to analyze and advance various aspects of the cyber norms debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok and Arindrajit Basu’s paper ‘ Conceptualizing an International Security Architecture for Cyberspace’ was selected by the Commissioners  and published as a part of the Briefings of the Research and Advisory Group.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arindrajit Basu represented CIS at the Cyberstability Hearings held by the GCSC at the sidelines of the &lt;a href="https://www.globsec.org/projects/globsec-2018/"&gt;GLOBSEC forum &lt;/a&gt;in Bratislava-a multilateral conference seeking to advance dialogue on various issues of international peace and security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The published paper and the Power Point may be accessed &lt;a href="https://cyberstability.org/research/issue-brief-2-bratislava/"&gt;here.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The agenda for the hearings is reproduced below&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;GCSC HEARINGS, 19 MAY 2018&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HEARINGS: TOWARDS INTERNATIONAL CYBERSTABILITY&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Venue: “Habsburg” room, Grand Hotel River Park 15:00-15:15&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Welcome Remarks by Marina Kaljurand, Chair of the Global Commission on the Stability of Cyberspace (GCSC) and former Foreign Minister of Estonia 15:15-16:45&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hearing I: Expert Hearing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;This session focuses on the topic Cyberstability and the International Peace and Security Architecture and includes scene settings, food-for-thought presentations on the new GCSC commissioned research, briefings and open statements by government and nongovernmental&lt;/i&gt; speakers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Scene setting: ”Cyber Diplomacy in Transition” by Carl Bildt, former Prime Minister of Sweden&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Commissioned Research I: Lessons learned from three historical case studies on establishing international norms” by Arindrajit Basu, Centre for Internet and Society, India&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commission Research II: The “pre-normative” framework and options for cyber diplomacy” by Elana Broitman, New America Foundation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Some Remarks on current thinking within the United Nations”, by Renata Dwan, Director United Nations Institute for Disarmament Research (UNIDIR)  (Registered Statements by Government Advisors)  (Statements by other experts)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(Open floor discussion) 16:45-17:15&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Coffee Break&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-contributes-to-the-research-and-advisory-group-of-the-global-commission-on-the-stability-of-cyberspace-gcsc'&gt;https://cis-india.org/internet-governance/blog/cis-contributes-to-the-research-and-advisory-group-of-the-global-commission-on-the-stability-of-cyberspace-gcsc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    

   <dc:date>2018-07-05T16:00:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/indian-express-july-1-2018-nishant-shah-digital-native-bigger-picture">
    <title>Digital Native: The bigger picture</title>
    <link>https://cis-india.org/raw/indian-express-july-1-2018-nishant-shah-digital-native-bigger-picture</link>
    <description>
        &lt;b&gt;For all our sleek machines, we are slaves to the much larger Internet of Things.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://indianexpress.com/article/technology/social/digital-native-the-bigger-picture-5239747/"&gt;Indian Express&lt;/a&gt; on July 1, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;There was a time, at the turn of the millennium, when we were trying  to cope with the fact that we live with sapient technologies. It was  new, to be thinking of cohabitation with things that speak, interact,  listen, and act in tandem with us. I still remember the time when the  first pagers and cellphones arrived — how difficult it was for people to  figure out the social etiquette for living with these devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From those early days, we have come a long way. Digital  things are everywhere — and we talk to them everywhere and everywhen. On  a regular day, our phones are on our dining tables, our devices are  buzzing with notifications silently in our pockets, and they are guiding  us in our everyday practices. They are not just bringing us information  but also listening to us, pre-empting our moves, doing things that we  have not even imagined yet. Living with technologies is old — the new  normal is living in technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I was recently reminded by a research team that the cars we drive are  giant super-computers with engines. That a new car on the roads has  more computational processing power than the land-rover on Mars. Our  cars are indeed computing devices and we sit in them, depending on a  variety of computational processes to keep us safe, as we are hurled at  high speeds ahead. Our smart homes, too, are slowly becoming sapient  surfaces with specific functions. Microwaves that remember meal times,  coffee machines that sense our proximity and start brewing or  refrigerators that keep track of our expired food — they are all very  basic computing devices that we are already used to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, our life is not just with the devices but the immense  networks of other devices that they connect with. I got reminded of this  very starkly on a recent trip to India, when I realised that the SIM  card that I had bought the last time has been deactivated for non-use.  At the same time, procuring a new SIM was going to need patience, time  and &lt;a href="https://indianexpress.com/article/what-is/what-is-aadhaar-card-and-where-is-it-mandatory-4587547/"&gt;Aadhaar&lt;/a&gt; authentication, which won’t happen at the airport. Additionally, there  were no wifi hotspots to use in the middle of the night. Thus started  the longest night of my life. In that four-hour digital blackout, I  found myself thinking of my condition as a state of disconnectedness, of  paralysis. I was surrounded by my two phones (don’t ask), my iPad, my  laptop, and, armed to the teeth with charging cords and power-banks.  Yet, none of them were of any use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once disconnected from the cloud that caters to my entertainment and  the services that keep me talking, it was as if all my devices were  useless. I scrolled through multiple screens and then gave up, resigning  myself to looking at others with data, with malignant longing. It was  with great shock that I realised that my devices are only gateway  machines. Despite all the money and effort I have spent in selecting  specific hardware combinations and care equipment, without their  capacity to speak to other machines-servers, controllers, nodes — they  are almost entirely pointless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So used am I to instant interaction, reciprocation and feedback with  my devices, I forgot that I am actually in conversation with an Internet  of Things that far exceeds my immediate intimacy with my personalised  screen. Somewhere in there is a powerful reminder of why data protection  and security are so critical, but also fragile in the connected Web.  Because we can do almost anything that we like to keep our individual  devices secure, but the large networks that give them life and animate  them are completely out of our control. In the face of this  uncontrollable void, the best we can do is hope that things will be  safe. And that illusion is not going to last long — in these moments of  disconnection, one realises it. Thankfully, before the head got filled  with the dark side of digital connectivity, I chanced upon an old movie I  had saved on my laptop to show in a class once. It was Wall-E. I  decided to just watch that film about a world where the only live thing  was a robot, and in some strange way, found it very comforting.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/indian-express-july-1-2018-nishant-shah-digital-native-bigger-picture'&gt;https://cis-india.org/raw/indian-express-july-1-2018-nishant-shah-digital-native-bigger-picture&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2018-08-01T00:11:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
