<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1106 to 1120.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/litd-17-committee-bureau-of-indian-standards-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/litd-17-committee-bureau-of-indian-standards-meeting">
    <title>LITD 17 Committee, Bureau of Indian Standards Meeting </title>
    <link>https://cis-india.org/internet-governance/news/litd-17-committee-bureau-of-indian-standards-meeting</link>
    <description>
        &lt;b&gt;Vanya Rakesh attended the LITD-17 committee meeting (committee on Information Systems Security and Biometrics) organised by the Bureau of Indian Standards on 23 September 2016 in Bengaluru. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The agenda for the meeting included presentation of the draft data privacy standard for India which was proposed before the BIS and its members. Elonnai Hickok and Vanya are a part of the drafting committee for the same. The draft standard was accepted by BIS and would now be circulated for further comments. &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/litd-17-committee-agenda.pdf"&gt;Click here&lt;/a&gt; to read the Agenda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/litd-17-committee-bureau-of-indian-standards-meeting'&gt;https://cis-india.org/internet-governance/news/litd-17-committee-bureau-of-indian-standards-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-07T01:38:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016">
    <title>Young Scholars' Programme, CPRSouth 2016</title>
    <link>https://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016</link>
    <description>
        &lt;b&gt;Rohini Lakshané took part in the Young Scholars' Programme organized by Communication Policy Research South from September 6 to 7, 2016 in Zanzibar.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;CPRsouth 2016 Young Scholar Awards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Following highly successful joint Afro-Asian CPR conferences in Mauritius in 2012, and India in 2013, CPRafrica and CPRsouth formally merged under the banner of CPRsouth in 2014. Since then, CPRsouth has hosted conferences in the Cradle of Humankind in South Africa (2014), and at the Innovation Center for Big Data and Digital Convergence at Yuan Ze University, Taiwan (2015).&lt;br /&gt;&lt;br /&gt;This year’s conference is co-hosted by COSTECH and TCRA in Zanzibar from 8-10 September. It will include sessions on cutting-edge developments in ICT policy and regulation in the South and discussion of the research-policy interface.&lt;br /&gt;&lt;br /&gt;As part of the capacity building initiative, 30 Young Scholars from Africa and the Asia-Pacific region have been selected to participate in a tutorial programme. They will be taught by recognised scholars and practitioners from Africa and Asia, and will be attending the main conference thereafter.  Congratulations to the Young Scholars of 2016. See the &lt;a class="external-link" href="http://researchictafrica.net/ria_rap/2016/05/24/cprsouth-2016-young-scholar-awards/"&gt;list here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016'&gt;https://cis-india.org/internet-governance/news/young-scholars-programme-cpr-south-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2016-09-23T01:03:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs">
    <title>Internet Rights and Wrongs</title>
    <link>https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs</link>
    <description>
        &lt;b&gt;With a rise in PIL's for unwarranted censorship, do we need to step back and inspect if it's about time unreasonable trends are checked?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in India Today on September 1, 2016. The original piece &lt;a class="external-link" href="http://indiatoday.intoday.in/story/internet-isp-websites-censorship/1/754038.html"&gt;can be read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Over the last few weeks, there have been a number of cases of egregious censorship of websites in India. Many people started seeing notices that (incorrectly) gave an impression that they may end up in jail if they visited certain websites. However, these notices weren't an isolated phenomenon, nor one that is new. Worryingly, the higher judiciary has been drawn into these questionable moves to block websites as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since 2011, numerous torrent search engines and communities have been blocked by Indian internet service providers (ISPs). Torrent search engines provide the same functionality for torrents that Google provides for websites. Are copyright infringing materials indexed and made searchable by Google? Yes. Do we shut down Google for this reason? No. However, that is precisely what private entertainment companies have done over the past five years in India. Companies hired by the producers of Tamil movies Singham and 3 managed to get video-sharing websites like Vimeo, Dailymotion and numerous torrent search engines blocked even before the movies released, without showing even a single case of copyright infringement existed on any of them. During the FIFA World Cup, Sony even managed to get Google Docs blocked. In some cases, these entertainment companies have abused 'John Doe' orders (generic orders that allow copyright enforcement against unnamed persons) and have asked ISPs to block websites. The ISPs, instead of ignoring such requests as instances of private censorship, have also complied. In other cases (like Sony's FIFA World Cup case), courts have ordered ISPs to block hundreds of websites without any copyright infringement proven against them. High court judges haven't even developed a coherent theory on whether or how Indian law allows them to block websites for alleged copyright infringement. Still they have gone ahead and blocked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, hackers got into Reliance Communications servers and released a list of websites blocked by them. The list contained multiple links that sought to connect Satish Seth-a group MD in Reliance ADA Group-to the 2G scam: a clear case of secretive private censorship by RCom. Further, visiting some of the YouTube links which pertained to Satish Seth showed that they had been removed by YouTube due to dubious copyright infringement complaints filed by Reliance BIG Entertainment. Did the department of telecom, whose licences forbid ISPs from engaging in private censorship, take any action against RCom? No. Earlier this year, Tata Sky filed a complaint against YouTube in the Delhi High Court, noting that there were videos on it that taught people how to tweak their set-top boxes to get around the technological locks that Tata Sky had placed. The Delhi HC ordered YouTube "not to host content that violates any law for the time being in force", presuming that the videos in question did in fact violate Indian law. They cite two sections: Section 65A of the Copyright Act and Section 66 of the Information Technology Act. The first explicitly allows a user to break technological locks of the kind that Tata Sky has placed for dozens of reasons (and allows a person to teach others how to engage in such breaking), whereas the second requires finding of "dishonesty" or "fraud" along with "damage to a computer system, etc", and an intention to violate the law-none of which were found. The court effectively blocked videos on YouTube without any finding of illegality, thus once again siding with censorial corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2013, Indore-based lawyer Kamlesh Vaswani filed a PIL in the Supreme Court calling for the government to undertake proactive blocking of all online pornography. Normally, a PIL is only admittable under Article 32 of the Constitution, on the basis of a violation of a fundamental right (which are listed in Part III of our Constitution). Vaswani's petition-which I have had the misfortune of having read carefully-does not at any point complain that the state is violating a fundamental right by not blocking pornography. Yet the petition wants to curb the fundamental right to freedom of expression, since the government is by no means in a position to determine what constitutes illegal pornography and what doesn't.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The larger problem extends to the now-discredited censor board (headed by the notorious Pahlaj Nihalani), as also the self-censorship practised on TV by the private Indian Broadcasters Federation (which even bleeps out words and phrases like 'Jesus', 'period', 'breast cancer' and 'beef'). 'Swachh Bharat' should not mean sanitising all media to be unobjectionable to the person with the lowest outrage threshold. So who will file a PIL against excessive censorship?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs'&gt;https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-09-22T23:36:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data">
    <title>The Future of Privacy in the Age of Big Data</title>
    <link>https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data</link>
    <description>
        &lt;b&gt;A study tour on privacy and big data was organised by Friedrich Naumann Foundation for Freedom from September 3 to 10, 2016 in Berlin and Hamburg. Vanya Rakesh was one of the participants from South Asia who went for the tour.&lt;/b&gt;
        &lt;h3&gt;List of Participants&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Shahid Ahmad, Deputy Director, Digital Empowerment Foundation&lt;/li&gt;
&lt;li&gt;Shahzad Ahmad, Country Director, Bytes for All&lt;/li&gt;
&lt;li&gt;Shivam Satnani, Senior Analyst, Data Security Council of India&lt;/li&gt;
&lt;li&gt;Vanya Rakesh, Senior Policy Officer, Centre for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;Anja Kovacs, Director, Internet Democracy Project&lt;/li&gt;
&lt;li&gt;Tshering Cigay Dorji, CEO, Thimphu Tech Park&lt;/li&gt;
&lt;li&gt;Vrinda Bhandari, Lawyer and Journalist, Chambers of Trideep Pais (Anwaltskanzlei)&lt;/li&gt;
&lt;li&gt;Tahsin Ifnoor Sayeed, Head of Business Intelligence, DNet&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/study-tour-big-data-privacy.pdf"&gt;Click to see the Agenda&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data'&gt;https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-22T23:24:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks">
    <title>Is India Prepared for a Cyber Attack? Suckfly And Other Past Responses Say No</title>
    <link>https://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks</link>
    <description>
        &lt;b&gt;From mandatory disclosures to improving CERT-IN’s functioning and transparency, there is much to be done in the event of future cyber attacks.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sushil Kambampati was &lt;a class="external-link" href="http://thewire.in/67398/india-is-unprepared-for-future-cyber-attacks/"&gt;published in the Wire&lt;/a&gt; on September 21, 2016. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In early September, details about India’s top secret Scorpene submarine program were published online. This presumed data breach brought the issue of cyber security into the headlines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However, earlier this year, news of potentially catastrophic breaches of Indian networks barely made a blip. On &lt;/span&gt;&lt;span&gt;May 17, the cyber-security firm Symantec &lt;/span&gt;&lt;a href="http://www.symantec.com/connect/blogs/indian-organizations-targeted-suckfly-attacks" rel="external nofollow" target="_blank" title="stated"&gt;&lt;span&gt;stated&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in a blog post that it had traced breaches of several Indian  organisations to a cyber-espionage group called Suckfly. The targeted  systems belonged to the central government, a large financial  institution, a vendor to the largest stock exchange and an e-commerce  company. The espionage activity began in April 2014 and continued  through 2015, Symantec said. Based on the targets that were penetrated,  Symantec speculated that the espionage was targeted at the economic  infrastructure of India. Such allegations should be ringing alarm bells  inside the government and amongst private businesses across the country.  And yet, from the official public response, one would think nothing was  amiss.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A week later, another cyber-security firm, Kaspersky Lab, &lt;/span&gt;&lt;a href="http://www.kaspersky.co.in/about/news/virus/2016/Danti-and-Co" rel="external nofollow" target="_blank" title="announced"&gt;&lt;span&gt;announced&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that it too had tracked at least one cyberespionage group, called  Danti, that had penetrated Indian government systems through India’s  diplomatic entities. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Breaches of corporate and government networks are nothing new. Usually, these breaches come to light if the perpetrators &lt;/span&gt;&lt;a href="http://arstechnica.com/security/2016/04/how-hacking-team-got-hacked-phineas-phisher/" rel="external nofollow" target="_blank" title="reveal"&gt;&lt;span&gt;reveal&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the attack, the target of the attack &lt;/span&gt;&lt;a href="http://www.forbes.com/sites/davelewis/2014/10/14/sears-owned-kmart-discloses-data-breach/#3755df43540d" rel="external nofollow" target="_blank" title="discloses"&gt;&lt;span&gt;discloses&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the breach, or because the leaked data &lt;/span&gt;&lt;a href="https://www.washingtonpost.com/news/the-intersect/wp/2015/08/19/how-to-see-if-you-or-your-spouse-appear-in-the-ashley-madison-leak/" rel="external nofollow" target="_blank" title="shows"&gt;&lt;span&gt;shows&lt;/span&gt;&lt;/a&gt;&lt;span&gt; up on the Internet. The Suckfly and Danti breaches are unusual because  they were reported by a third party while the targets (in this case,  Indian organisations and the government) themselves have remained  silent. The breaches reported by Symantec and Kaspersky of Indian  organisations &lt;/span&gt;&lt;a href="http://tech.firstpost.com/biztech/cyberespionage-group-suckfly-targeted-indian-govt-e-commerce-organisations-symantec-315538.html" rel="external nofollow" target="_blank" title="received"&gt;&lt;span&gt;received&lt;/span&gt;&lt;/a&gt;&lt;span&gt; tepid &lt;/span&gt;&lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Cyber-spy-group-Suckfly-to-continue-targeting-Indian-government-Symantec/articleshow/52326126.cms" rel="external nofollow" target="_blank" title="coverage"&gt;&lt;span&gt;coverage&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in India. A few news organisations &lt;/span&gt;&lt;a href="http://www.hindustantimes.com/tech/cyber-spy-group-suckfly-to-keep-targeting-indian-government-symantec/story-F50rNLT2zYhkG90o7DGKaN.html" rel="external nofollow" target="_blank" title="published"&gt;&lt;span&gt;published&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the same wire &lt;/span&gt;&lt;a href="http://economictimes.indiatimes.com/tech/ites/government-units-top-it-firm-among-cyber-espionage-targetssymantec/articleshow/52312952.cms" rel="external nofollow" target="_blank" title="story"&gt;&lt;span&gt;story&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that basically &lt;/span&gt;&lt;a href="http://tech.firstpost.com/biztech/kaspersky-reports-cyber-espionage-attacks-on-indian-government-in-2016-317107.html" rel="external nofollow" target="_blank" title="rewrote"&gt;&lt;span&gt;rewrote&lt;/span&gt;&lt;/a&gt;&lt;span&gt; information in the original posts, but there was very little follow-up  as there was not much follow-up investigation to determine the targets  or an analysis to gauge how much damage the leaks could cause. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Part of the reason there was no  fallout may have to do with the reluctance of the parties involved to  provide information. Symantec, in response to multiple requests for more  details, kept referring to the original blog post. The government made  no statement either confirming or denying the report. Several banks,  e-commerce companies and government agencies were asked whether they  were aware of Suckfly, whether they had been breached by the  organisation and whether Symantec had contacted them. Only Yatra, Axis  Bank and Flipkart responded, denying that they had been penetrated by  Suckfly. The National Stock Exchange also said it had not been  penetrated, although the questions asked were about whether any of the  stock exchange’s vendors had been penetrated and if they had been,  whether the NSE knew about such a breach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;This collective lack of response  across the board indicates a mindset that shows unpreparedness for the  cyber threats that are very real, existent and ongoing. Compare the  Suckfly reaction to the threat of a terrorist infiltration. In that  scenario, the government &lt;/span&gt;&lt;a href="http://zeenews.india.com/news/gujarat-on-high-alert-after-intelligence-input-on-infiltration-of-terrorists_1862830.html" rel="external nofollow" target="_blank" title="goes"&gt;&lt;span&gt;goes&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on high alert, resources are &lt;/span&gt;&lt;a href="http://timesofindia.indiatimes.com/india/Additional-BSF-battalion-on-Pakistan-border-to-avert-infiltration/articleshow/42081166.cms" rel="external nofollow" target="_blank" title="mobilised"&gt;&lt;span&gt;mobilised&lt;/span&gt;&lt;/a&gt;&lt;span&gt; and the public is &lt;/span&gt;&lt;a href="http://timesofindia.indiatimes.com/city/ahmedabad/IB-warns-Gujarat-about-possible-infiltration-bid-at-Kutch/articleshow/50495655.cms" rel="external nofollow" target="_blank" title="warned"&gt;&lt;span&gt;warned&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. The government then tries to identify the threat and stop it from doing any harm. Citizens &lt;/span&gt;&lt;a href="http://idsa.in/idsacomments/IndiasCounterTerrorismPoliciesareMiredinSystemicWeaknesses_gkanwal_140512" rel="external nofollow" target="_blank" title="demand"&gt;&lt;span&gt;demand&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that in the future the government take proactive steps to catch infiltrators and prevent any future threats.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Weak government response&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One method that Suckfly uses to gain  access, according to Symantec, is by signing its malware with stolen  digital certificates. This is the same method that was &lt;/span&gt;&lt;a href="http://bits.blogs.nytimes.com/2015/10/14/deadline-to-disclose-data-breaches-raises-concerns-in-europe/" rel="external nofollow" target="_blank" title="used"&gt;&lt;span&gt;used&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to infect and sabotage the Iranian nuclear centrifuges with the Stuxnet  virus, so the potential for harm of these breaches cannot be  understated. Several security experts confirmed the plausibility of such  doomsday scenarios as two-factor authentication being turned off for  credit card transactions, unauthorised money transfers, leakage of  credit card details, stolen password hashes or personal information,  massive numbers of fake e-commerce orders and the manipulation of the  stock exchange. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;All the targets taken together, the  potential for economic damage that the Suckfly breach poses is immense.  If another country or malevolent group wanted to wreak havoc in India,  it could trigger banking panic by emptying accounts or a stock-market  collapse by dumping stocks at fractional values. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Even more disturbing, though, is that  if a foreign entity has access to government networks, it has the  potential to collect passwords to critical systems using key-loggers and  password scanners. From there the entity could steal national security  data, &lt;/span&gt;&lt;a href="http://www.idsa.in/system/files/book/book_indiacybersecurity.pdf" rel="external nofollow" target="_blank" title="disrupt"&gt;&lt;span&gt;disrupt&lt;/span&gt;&lt;/a&gt;&lt;span&gt; control systems of electrical grids or nuclear facilities and gain access to everything the government &lt;/span&gt;&lt;a href="https://incometaxindiaefiling.gov.in/e-Filing/Services/KnowYourPanLink.html" rel="external nofollow" target="_blank" title="knows"&gt;&lt;span&gt;knows&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about its citizens, including personal details, financial information and &lt;/span&gt;&lt;a href="https://uidai.gov.in/beta/enrolment-update/aadhaar-enrolment.html" rel="external nofollow" target="_blank" title="identity information"&gt;&lt;span&gt;identity information&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. On an only slightly less dangerous level, the central bank’s funds could be stolen, like the recent &lt;/span&gt;&lt;a href="http://gizmodo.com/bangladesh-bank-hackers-created-malware-to-target-the-g-1772834299" rel="external nofollow" target="_blank" title="attempt"&gt;&lt;span&gt;attempt&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to heist $800 million from the central bank of Bangladesh.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A report on risks facing India, &lt;/span&gt;&lt;a href="https://home.kpmg.com/in/en/home/insights/2016/08/de-risking-india-in-the-new-age-of-technology.html" rel="external nofollow" target="_blank" title="published"&gt;&lt;span&gt;published&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in August by KPMG and the Confederation of Indian Industry said: “While  traditionally cyber attacks were largely used for causing financial and  reputational loss, today they have  a potential of posing a threat to  human life. While the perpetrators behind these attacks traditionally  were a few challenge loving ‘hackers’ with unbridled curiosity, we see  an increasing number of state sponsored cyber terrorists and organised  criminals behind the attacks today.” &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In light of such serious threats, the  government needs to take more action to mitigate the threat and  reassure the public that it is on top of the situation. Reports of  encounters between the armed forces and alleged terrorists are  frequently relayed to the press. Similarly, the National Informatics  Centre (NIC) or its parent organisation, the Department of Electronics  and Information Technology, needs to make a public statement when  breaches of government systems or of private organisations at this scale  come to light. The investigative agencies need to open an enquiry into  the matter.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Network.jpg" alt="Network" class="image-inline" title="Network" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In the Suckfly case, it took a right-to-information &lt;/span&gt;&lt;a href="https://yourti.in/document/gu9wgny7" rel="external nofollow" target="_blank" title="query"&gt;&lt;span&gt;query&lt;/span&gt;&lt;/a&gt;&lt;span&gt; from this author to get a response from the NIC. In the response, the  NIC stated that it was unaware of any breach of its systems by Suckfly,  that it did not use Symantec’s services and that Symantec had not  notified NIC of any breach. Of course, the response also raises many  more questions, which could be asked if the government took an attitude  of openness and disclosure.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The government also needs to step up its efforts of identifying and neutralising the threat. The Indian government’s &lt;/span&gt;&lt;a href="http://www.cert-in.org.in" rel="external nofollow" target="_blank" title="Computer Emergency Response Team"&gt;&lt;span&gt;Computer Emergency Response Team&lt;/span&gt;&lt;/a&gt;&lt;span&gt; (CERT-IN) is responsible, according to its website, for “responding to  computer security incidents as and when they occur” and also collecting  information on and issuing “guidelines, advisories, vulnerability notes  and whitepapers relating to information security practices, procedures,  prevention, response and reporting of cyber incidents.” Yet, as of  September 12, its website does not mention the Backdoor.Nidoran exploit  which Suckfly allegedly used to gain access during at least one of its  attacks. The CVE-2015-2545 vulnerability that Danti used, according to  Kaspersky, is also unlisted. Any organisation or person relying on  CERT-IN to get notifications of vulnerabilities would be in the dark and  exposed to a breach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;CERT-IN is a perfect example of where  the government could really do so much more, starting with some very  basic things. For example, by design, contact e-mail addresses listed on  the site cannot be clicked on or copied, and so have to be retyped.  Such a measure would barely stop even a novice hacker. E-mail messages  sent to one of the contact email address bounce back. While it laudably  posts its e-mail encryption hash on its contact page, one of the  identifiers does not match what is &lt;/span&gt;&lt;a href="http://pgp.mit.edu/pks/lookup?search=cert-in.org.in&amp;amp;op=index" rel="external nofollow" target="_blank" title="registered"&gt;&lt;span&gt;registered&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in the public KeyStores (usually that would be a sign of a hack). Most  glaringly, anyone searching for information on a vulnerability on the  site will have to click in and out of every document because the site  does not have a search function. Collectively, these flaws give the  impression that while the government has thought about cyber-security,  it is not putting enough resources and effort into making that a  credible initiative. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The government’s regulatory agencies  also need to get into the fray. For example, one of the organisations  that Suckfly allegedly breached is a large financial institution. It  makes sense, therefore that the Reserve Bank of India (RBI), which  oversees all financial institutions, should make it mandatory that a  bank notify the RBI whenever there is a security breach. The RBI did  just that in a notification &lt;/span&gt;&lt;a href="https://rbidocs.rbi.org.in/rdocs/notification/PDFs/LBS300411F.pdf" rel="external nofollow" target="_blank" title="issued"&gt;&lt;span&gt;issued&lt;/span&gt;&lt;/a&gt;&lt;span&gt; on &lt;/span&gt;&lt;span&gt;June  2, 2016, after the Suckfly breach. However, the notification does not  address the need to inform the public. The RBI itself also needs to be  more forthcoming. In the Suckfly instance the RBI has not made any  statements about whether financial institutions under its supervision  are secure. It took an &lt;/span&gt;&lt;a href="https://yourti.in/document/ien8cd4r" rel="external nofollow" target="_blank" title="RTI query "&gt;&lt;span&gt;RTI query &lt;/span&gt;&lt;/a&gt;&lt;span&gt;to get a statement from the RBI, and there it responded that it had no information on the matter. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Securities and Exchange Board of  India (SEBI), which oversees the country’s stock exchanges, initially  did not respond directly as to whether it knew of the breach at any IT  firm that supplies an Indian stock exchange. However, SEBI reacted to an  RTI query by asking all the stock exchanges under its mantle to verify  with each of their IT vendors whether there had been any breach. They  all denied it. If any of them are being untruthful, they have made a  false statement to SEBI. However, if  taken at their word, the public  can take comfort in the fact that the stock market was not compromised  by this attack. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;SEBI also &lt;/span&gt;&lt;a href="about:blank" target="_blank"&gt;&lt;span&gt;issued&lt;/span&gt;&lt;/a&gt;&lt;span&gt; a cyber-security policy framework for its stock exchanges in July 2015,  around the time when Suckfly may have been actively attacking systems.  Where the RBI asks financial institutions to report breaches within six  hours of detection, SEBI requires the reports to be quarterly. Given how  fast information travels and how many transactions can be done in mere  minutes, that seems like too much time for SEBI to take any effective  action. SEBI’s policy also does not address the need to inform the  public.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;What is needed is a coordinated,  comprehensive and unified policy that applies to stock exchanges,  financial institutions, government organisations and private companies.  It doesn’t matter from where the data is being stolen, what matters is  how quickly the organisation learns of it and lets people know so that  they too can take any action they need to.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Right or wrong?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The across-the-board denials of any  breach raise the question whether Symantec was mistaken. Skeptics could  even wonder whether the company exaggerated the situation to increase  sales of its products and services. For its part, Symantec refuses to  provide any further information about the breach beyond what is in its  initial post; crucial information in this regard would include more  forensic details, which could identify whether the breach actually took  place. Symantec also would not confirm whether it had notified the  targets of the attacks, though the government says it has not been  alerted by Symantec. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On the other hand, according to  Sastry Tumuluri, a former Chief Information Security Officer for the  state of Haryana, Symantec probably did correctly identify the breaches.  Symantec collects vast amounts of information at every point where it  has a presence, such as on individual computers, at internet  interconnection points and web hosts globally. All that data can give a  fairly accurate and reliable indication of systems being penetrated.  Depending on their capabilities and level of sophistication, the target  organisations could also truthfully say that they have not detected a  breach. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;If Symantec’s is correct in  conjecturing that the Suckfly breach targeted India’s economic sector,  its lack of further action is disturbing. India &lt;/span&gt;&lt;a href="http://money.cnn.com/news/economy/world_economies_gdp/index.html" rel="external nofollow" target="_blank" title="is one"&gt;&lt;span&gt;is one&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of the world’s ten largest economies and instability here would have  ripple effects globally. Then there is the potential of catastrophic  cyberterrorism. It is in everyone’s interest that Symantec reach out to  the government and to let the public know which organisations may be  compromised.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to Pranesh Prakash, Policy  Director at the Centre for Internet and Society and Bruce Schneier, a  globally recognised security expert, the lack of knowledge regarding  which organisations were targeted reduces people’s trust in the Internet  across the board. In an email response, Schneier wrote, “Symantec has  an obligation to disclose the identities of those attacked. By leaving  this information out, Symantec is harming us all. We all have to make  decisions on the Internet all the time about who to trust and who to  rely on. The more information we have, the better we can make those  decisions.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Looking at it in the other direction,  it is not apparent whether the government has asked Symantec and  Kaspersky for more information and a disclosure of who the targets were.  After all, if government systems were breached, it is a matter of  national security. If the government has indeed reached out and received  more information, it has an obligation to let the public know. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;What other governments and private  companies are belatedly learning is that it is better to proactively  disclose the breaches before the information gets out through other  parties. When US retailer Target came under attack, its  data breach was  first &lt;/span&gt;&lt;a href="http://krebsonsecurity.com/2013/12/sources-target-investigating-data-breach/" rel="external nofollow" target="_blank" title="revealed"&gt;&lt;span&gt;revealed&lt;/span&gt;&lt;/a&gt;&lt;span&gt; by security reporter Michael Krebs. Target was &lt;/span&gt;&lt;a href="http://mashable.com/2014/01/17/retailers-security-breach-timing/#XN.TRtygnEqf" rel="external nofollow" target="_blank" title="criticised"&gt;&lt;span&gt;criticised&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for not coming forth itself and &lt;/span&gt;&lt;a href="https://topclassactions.com/lawsuit-settlements/lawsuit-news/32647-target-data-breach-class-action-lawsuit-trial-set-april-2016/" rel="external nofollow" target="_blank" title="faced"&gt;&lt;span&gt;faced&lt;/span&gt;&lt;/a&gt;&lt;span&gt; several lawsuits. In the US, most states and jurisdictions &lt;/span&gt;&lt;a href="http://www.reuters.com/article/us-target-data-notification-idUSBREA0F1LO20140116" rel="external nofollow" target="_blank" title="have"&gt;&lt;span&gt;have&lt;/span&gt;&lt;/a&gt;&lt;span&gt; laws that require companies to disclose data breaches, although  transparency advocates point out that there is great variation on how  long companies can wait to disclose and what events trigger a mandatory  disclosure. In Europe, telecoms and Internet Service Providers must &lt;/span&gt;&lt;a href="http://bits.blogs.nytimes.com/2015/10/14/deadline-to-disclose-data-breaches-raises-concerns-in-europe/" rel="external nofollow" target="_blank" title="report"&gt;&lt;span&gt;report&lt;/span&gt;&lt;/a&gt;&lt;span&gt; a breach within 24 hours and other organisations have 72 hours.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;India has no mandatory disclosure law  in the case of data breaches at government or private organisations,  Prakash said. It is something that CIS supports and had proposed since  2011, he added. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to Schneier, a mandatory  disclosure law would also be valuable if confidentiality agreements  would otherwise prevent a security firm such as Symantec from disclosing  names of targets.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Finally, private companies need to  understand that they are not doing themselves any favours by remaining  silent on the matter. Even if Suckfly or its clients do not use the  information they may have gained, the lack of disclosure by the targets  will weaken trust in online commerce and financial transactions, says  Prakash. For example, looking at e-commerce, while it is true that  e-commerce has &lt;/span&gt;&lt;a href="http://www.assocham.org/newsdetail.php?id=5669" rel="external nofollow" target="_blank" title="grown"&gt;&lt;span&gt;grown&lt;/span&gt;&lt;/a&gt;&lt;span&gt; rapidly in India, a study in 2014 by &lt;i&gt;YourStory&lt;/i&gt; and Kalaari Capital &lt;/span&gt;&lt;a href="http://yourstory.com/2014/06/infographic-indian-e-commerce-consumers-want-2014/" rel="external nofollow" target="_blank" title="found"&gt;&lt;span&gt;found&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that lack of trust and doubt about online security were hurdles for 80% of people who had never made an online purchase. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;When an organisation lets the public  know that it has been breached, users of the service or site can  evaluate what action they need to take. For example if a person uses the  same password across multiple sites, they would know they needed to  change the password at the other sites. Depending on the breach they  would also be able to alert credit card companies as well as friends and  family.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As the KPMG report states, cyber attacks are only going to become more common. Despite &lt;/span&gt;&lt;a href="http://thediplomat.com/2014/06/india-scrambles-on-cyber-security/" rel="external nofollow" target="_blank" title="multiple"&gt;&lt;span&gt;multiple&lt;/span&gt;&lt;/a&gt; &lt;a href="http://www.firstpost.com/business/danger-india-faces-shortage-lakh-cyber-security-pros-2482958.html" rel="external nofollow" target="_blank" title="warnings"&gt;&lt;span&gt;warnings&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,  the response on the part of the Indian government and private  organisations has been quite underwhelming. The government needs to  proactively monitor and respond to attacks. Lawmakers need to pass laws  establishing privacy policies and mandatory disclosures. Companies will  also need to invest in better security practices as well as gain public  trust by reacting to breaches promptly and letting the public know what  they are doing to recover from them.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks'&gt;https://cis-india.org/internet-governance/news/the-week-sushil-kambampati-september-21-2016-india-is-unprepared-for-future-cyber-attacks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-22T00:57:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016">
    <title>Workshop on Big Data in India: Benefits, Harms, and Human Rights (Delhi, October 01)</title>
    <link>https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016</link>
    <description>
        &lt;b&gt;CIS welcomes you to participate in the workshop we are organising on Saturday, October 01 at India Habitat Centre, Delhi, to discuss benefits, harms, and human rights implications of big data technologies, and explore potential research questions. A quick RSVP will be much appreciated.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Workshop invitation: &lt;a href="http://cis-india.org/internet-governance/files/big-data-in-india-invitatation-to-workshop/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;Workshop agenda: &lt;a href="http://cis-india.org/internet-governance/files/big-data-in-india-workshop-agenda/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;In the last few years, there has been an emergence of the discourse of big data viewing it as an instrument not just for ensuring efficient, targeted and personalised services in the private sector, but also for development, social and policy research, and formalising and monetising various sections of the economy. This possibility is premised upon the idea that there is great knowledge that resides in both traditional and new forms of data made possible by our digital selves, and that we may now have the capability to tap into that knowledge for insights across diverse sectors like healthcare, finance, e-governance, education, law enforcement and disaster management, to name but a few. Alongside, various commentators have also pointed to the new problems and risks that big data could create for privacy of individuals through greater profiling, for free speech and economic choice by strengthening monopolistic tendencies, and for socio-economic inequalities by making existing disparities more acute and facilitating algorithmic bias and exclusion.&lt;/p&gt;
&lt;p&gt;From a regulatory perspective, big data technologies pose fundamental challenges to the national data regulatory frameworks that have existed since many years. The nature of collection and utilisation of big data, which is often not driven by immediate purpose of the collected data, conflict with the principles of data minimisation and collection limitation that have been integral to data protection laws globally. This compels us to revisit existing theories of data governance. Additionally, use of big data in public decision-making highlights the question of how algorithmic control and governance must be regulated. This raises concerns around taking determining a balanced position that recognises the importance of big data, including for development actions, and ensures unhindered innovation with simultaneous focus on greater transparency and anonymisation to protect individual privacy, and various big data risks faced by population groups. In order to answer these questions, we need to begin with identifying the different harms and benefits of big data that could arise through its use across sectors and disciplines, especially in the context of human rights.&lt;/p&gt;
&lt;p&gt;This workshop is designed around an extensive study of current and potential future uses of big data for governance in India that CIS has undertaken over the last year. The study focused on key central government projects and initiatives like the UID project, the Digital India programme, the Smart Cities Challenge, etc.&lt;/p&gt;
&lt;p&gt;We will initiate the workshop with a detailed presentation of our findings and key concerns, which will then shape the discussion agenda of the workshop. We look forward to discuss aspects of big data technologies through the entry points of harms, opportunities, and human rights.&lt;/p&gt;
&lt;p&gt;The final session of the workshop will focus on identifying key research questions on the topic, and exploring potential alliances of scholars and organisations that can drive such research activities.&lt;/p&gt;
&lt;p&gt;We look forward to making this a forum for knowledge exchange for our friends and colleagues attending the discussion and discuss the opportunity to for potential collaboration.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;RSVP:&lt;/strong&gt; Please send an email to Ajoy Kumar at &amp;lt;&lt;a href="mailto:ajoy@cis-india.org"&gt;ajoy@cis-india.org&lt;/a&gt;&amp;gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Organisers:&lt;/strong&gt; Amber Sinha &amp;lt;&lt;a href="mailto:amber@cis-india.org"&gt;amber@cis-india.org&lt;/a&gt;&amp;gt; and Sumandro Chattapadhyay &amp;lt;&lt;a href="mailto:sumandro@cis-india.org"&gt;sumandro@cis-india.org&lt;/a&gt;&amp;gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016'&gt;https://cis-india.org/internet-governance/events/big-data-in-india-benefits-harms-and-human-rights-oct-01-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Security</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2016-09-28T05:53:55Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw">
    <title>Glaring Errors in UIDAI's Rebuttal</title>
    <link>https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw</link>
    <description>
        &lt;b&gt;This response note by Pranesh Prakash questions Unique Identification Authority of India’s reply to Hans Verghese Mathews' article titled “Flaws in the UIDAI Process” (EPW, March 12, 2016), which found “serious mathematical errors” in the article.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;published in Economic &amp;amp; Political Weekly&lt;/a&gt; Vol. 51, Issue No. 36, September 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;While I am not a statistician, I have followed the technical debate between Hans Verghese Mathews and the UIDAI closely, and see a number of glaring errors in the latter’s so-called rebuttal in EPW (March 12, 2016).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The UIDAI alleges Mathews to have ignored the evidence that the Receiver Operating Characteristic (ROC) "flattens" with more factors. However, Mathews cannot be accused of ignorance if the flattening of the ROC is not relevant to his argument. To explain this in simple terms, the ROC curve is used to choose the appropriate "threshold distance" which determines false positives and false negatives, and belongs to a stage which precedes the estimation of the false positive identification rates (FPIR).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, Mathews has used the FPIR estimates provided by the UIDAI (based on evidence from the enrolment of 84 million persons), and calculated how the FPIR changes when extrapolated for a population of 1.2 billion persons. In other words, he did not need to look at the ROC curve as that factor is not relevant to his argument, since he has used UIDAI data (which has presumably been estimated on the basis of all 12 factors : 10 fingerprints and 2 irises). &lt;br /&gt;&lt;br /&gt;Further, UIDAI asks why Mathews has assumed a linear curve for his extrapolation. Mathews has done no such thing. In fact, in their paper "Role of Biometric Technology in Aadhaar Enrollment," the UIDAI states: "FPIR rate grows linearly with the database size" (nd, 19). Thus, this is an assumption formerly made by them (without providing rationale for it to be a linear curve as opposed to anything else).&amp;nbsp; Mathews mathematically derives bounds for the FPIR in his paper, that is, the range within which the FPIR lies. One gets a linear curve only if they use the upper bound and not on the usage of anything else. So while Mathews does, as he explains, provide the results of the calculation based on the upper bound for the sake of simplicity, he nowhere asserts nor assumes a linear curve.&lt;br /&gt;&lt;br /&gt;If, as the UIDAI claims, one cannot perform such an extrapolation and needs to depend on “empirical evidence” instead, the question arises as to how the UIDAI decided to scale up the programme to 1.3 billion people given the error rates. One could also ask if the machines being used to capture biometrics are good enough for the enlargement. Surely they would have performed some extrapolations to decide this.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In their paper they note that "although it [FPIR] is expected to grow as the database size increases, it is not expected to exceed manageable values even at full enrolment of 120 crores" (UIDAI nd, 13). They do not illustrate the extent to which the FPIR is expected to grow—neither in their initial paper, nor in their rebuttal to Mathews—whereas Mathews provides a method of estimating the increase of FPIR. Even if UIDAI is correct in its appraisal of FPIR and that it will not exceed "manageable values," they need to either exemplify their calculations or release the latest data. They have done neither, and that is quite unfortunate.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;
&lt;div id="stcpDiv" style="text-align: justify;"&gt;UIDAI  (nd): “Role of Biometric Technology in Aadhaar Enrollment,” Unique  Identification Authority of India, Government of India, New Delhi,  viewed on 18 August 2016,  &lt;a class="external-link" href="https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology"&gt;https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Related Links&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div id="stcpDiv"&gt;
&lt;ol&gt;
&lt;li&gt;Flaws in the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html"&gt;http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Erring on Aadhaar &lt;a href="http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html"&gt;http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Request for Specifics &lt;a href="http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-uidai.html"&gt;http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-u...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Glaring Errors in UIDAI's Rebuttal &lt;a href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebutt...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Overlooking the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathews-and-pranesh-prakashs-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathe...&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw'&gt;https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-18T03:22:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms">
    <title>India's Aadhaar mandate for smartphone makers may rile global firms</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms</link>
    <description>
        &lt;b&gt;They are unlikely to oblige to request to make changes in their operating system and devices to ensure Aadhaar authentication is done securely on smartphones. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Alnoor Peermohammed was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/india-s-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms-116091401083_1.html"&gt;published in the Business Standard&lt;/a&gt; on September 14, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India is asking global&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Smartphone" target="_blank"&gt;smartphone&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;makers         such as&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Apple" target="_blank"&gt;Apple&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;and&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google" target="_blank"&gt;Google&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;to         adopt locally designed standards on their devices or operating         systems that would allow use of biometric scanners for&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;/a&gt;authentication, a move that could face         resistance from global firms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apple, the world’s largest&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Smartphone" target="_blank"&gt;smartphone&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;maker         runs its own&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Ios" target="_blank"&gt;iOS&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;closed         ecosystem and mandates apps built by developers to be certified         by the company. Its closest rival Google, which owns the Android         operating software that runs on nine out of ten smartphones in         India, has directives for device makers to comply with. Firms         such as Samsung, Lenovo and Micromax build smartphones on the         Android OS that are sold in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most global companies are         unlikely to oblige India’s request that would require to make         changes in their operating system and devices to ensure&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;/a&gt;authentication is done securely on         smartphones, say analysts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There is no clarity so far.         As of now, it is impossible that they (global&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Smartphone" target="_blank"&gt;smartphone&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;makers)         would oblige for a hardware safe zone baked on the sensors,”         says Sunil Abraham, executive director at Centre for Internet         and Society, a Bengaluru-based  researcher that works on         emerging technologies. “Because the biometrics contain sensitive         personal information, they (UIDAI)  don’t want anybody —         vmobile  manufacturer, OS vendor, telco or ISP — to intercept         it”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is hoping that global         firms would accept the country’s plea considering that most of         India’s population use a mobile phone as their only computing         device and need them to authenticate on&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;for         using government and banking services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Right now we’re in         consultation with all these device manufacturers as well as the         operating system vendors,” said Ajay Bhushan Pandey, Director         General of the Unique Identification Authority of India (UIDAI)         in a phone interview. “Basically we’re trying to evolve our         system wherein a manufacturer or the devices where those         operating systems are being used will have a facility where&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;authentication         can be made possible in a secure manner.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has over 105 crore         people or 98% of adult population with Aadhaar. Most government         and private organisations use&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;authentication         to issue services or products such as opening a bank account,         getting a ration card or buying a mobile connection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reliance plans to reduce         paperwork and issue connections in less than an hour using&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar" target="_blank"&gt;Aadhaar&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;and         try to get its 100 million target market sooner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over a fifth of India’s one         billion users own smartphones and as the country sees better         mobile internet access, more people are expected to upgrade to         smartphones and use apps to access their banks to transfer         funds, do online shopping and access government services.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms'&gt;https://cis-india.org/internet-governance/news/business-standard-alnoor-peermohammed-september-14-2016-indias-aadhaar-mandate-for-smartphone-makers-may-rile-global-firms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-15T02:25:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content">
    <title>SpaceX Explosion Slows Facebook &amp; Israeli Efforts To Control Online Content</title>
    <link>https://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content</link>
    <description>
        &lt;b&gt;In their ‘space race’ to expand internet access to remote, impoverished areas of the world, Facebook and Google are actually vying for control o fthe online experiences of millions of people. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kit O' Connell &lt;a href="https://www.mintpressnews.com/spacex-explosion-slows-facebook-israeli-efforts-control-content-online/220289/"&gt;published by Mint Press News&lt;/a&gt; on September 13, 2016 has quoted Pranesh Prakash.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;When a rocket operated           by space startup SpaceX burned up on the launch pad, it was a           setback to the prospects of commercial space travel, as well           as efforts by Facebook to control the online experiences of           millions of rural internet users.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Facebook’s project,           Internet.org, is described by founder Mark Zuckerberg in           charitable terms, but critics have accused it of spreading           “techno-colonialism.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="https://youtu.be/UKUz5ZUPqM8" target="_blank"&gt;&lt;span&gt;Sept. 1 fire&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in Cape Canaveral, Florida,           destroyed &lt;/span&gt;&lt;a href="http://www.orlandosentinel.com/news/space/go-for-launch/os-spacex-spacecom-answers-20160906-story.html" target="_blank"&gt;&lt;span&gt;a $200 million satellite owned by             SpaceCom&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, an           Israeli communications satellite firm, and co-leased by           Facebook. The satellite, Amos-6, was built by &lt;/span&gt;&lt;a href="http://www.haaretz.com/israel-news/business/1.740167" target="_blank"&gt;&lt;span&gt;Israel Aerospace Industries&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a government-owned aviation and           aerospace manufacturer.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Facebook’s partnership           with SpaceCom is another sign of the corporation’s deepening           ties with Israel. In June, Facebook appointed &lt;/span&gt;&lt;a href="http://www.mintpressnews.com/amid-anti-bds-pressure-facebook-israel-appoints-long-time-netanyahu-advisor-policy-post/217631/"&gt;&lt;span&gt;Jordana Cutler&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, a close advisor to Israeli Prime           Minister Benjamin Netanyahu, as head of policy and           communications at Facebook’s Israeli office.&lt;/span&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Another setback for Facebook’s Internet.org&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“Facebook was counting           on [the satellite] to beam internet service to sub-Saharan           Africa as part of its ambitious Internet.org project,” noted &lt;/span&gt;&lt;a href="http://www.slate.com/blogs/future_tense/2016/09/01/spacex_blew_up_facebook_s_first_internet_satellite.html" target="_blank"&gt;&lt;span&gt;Will Oremus&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Slate’s senior technology writer. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://www.latimes.com/business/la-fi-spacex-explosion-live-total-loss-is-a-blow-to-satellite-1472749648-htmlstory.html" target="_blank"&gt;&lt;span&gt;Los             Angeles Times&lt;/span&gt;&lt;/a&gt;&lt;span&gt; reported that SpaceCom’s stock fell 9 percent on the Tel Aviv           Stock Exchange after the explosion. &lt;/span&gt;&lt;a href="https://www.facebook.com/zuck/posts/10103074463098101" target="_blank"&gt;&lt;span&gt;Zuckerberg&lt;/span&gt;&lt;/a&gt;&lt;span&gt; shared his dismay in a post on his           facebook page, writing: &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;“As I’m here in Africa, I’m deeply             disappointed to hear that SpaceX’s launch failure destroyed             our satellite that would have provided connectivity to so             many entrepreneurs and everyone else across the continent.”&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Internet.org would           help users get online in areas lacking conventional internet           access, and the service, which works in partnership with local           mobile phone companies, has launched, at least provisionally,           in &lt;/span&gt;&lt;a href="https://info.internet.org/en/story/where-weve-launched/" target="_blank"&gt;&lt;span&gt;48 countries&lt;/span&gt;&lt;/a&gt;&lt;span&gt; in Africa, Asia, and Latin America.           In addition to satellites, Internet.org plans to use &lt;/span&gt;&lt;a href="https://www.facebook.com/notes/mark-zuckerberg/the-technology-behind-aquila/10153916136506634/" target="_blank"&gt;&lt;span&gt;cutting edge solar-powered drones&lt;/span&gt;&lt;/a&gt;&lt;span&gt; to expand internet access in remote           parts of the world. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The service is not           without controversy, though. An offering called “Free Basics”           would provide users who can’t afford full internet access with           a curated selection of websites, tailored for use on low           bandwidth devices such as older smartphones. &lt;/span&gt;&lt;a href="http://www.bbc.com/news/technology-32795270" target="_blank"&gt;&lt;span&gt;Free Basics generated international protests&lt;/span&gt;&lt;/a&gt;&lt;span&gt; after it was rolled out in India,           and was eventually blocked by the Telecom Regulatory Authority           of India in March 2015 for violating the principle of &lt;/span&gt;&lt;a href="https://www.aclu.org/feature/what-net-neutrality" target="_blank"&gt;&lt;span&gt;net neutrality&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In a May 12 analysis           for The Guardian, Mumbai-based journalist &lt;/span&gt;&lt;a href="https://www.theguardian.com/technology/2016/may/12/facebook-free-basics-india-zuckerberg" target="_blank"&gt;&lt;span&gt;Rahul Bhatia&lt;/span&gt;&lt;/a&gt;&lt;span&gt; suggested the failure of Free           Basics was also due to Zuckerberg’s dismissive attitude toward           the Indian government and people.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;An unnamed Facebook           executive told Bhatia that Zuckerberg made the “mistake of           thinking that a third-world country is a banana republic. So           institutions, the public, the press — they can be bypassed.” &lt;/span&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Colonialism or philanthropy?&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_FB.jpg/@@images/fc86d0fb-84fb-4a34-b73e-a6e129d5ca25.jpeg" alt="FB" class="image-inline" title="FB" /&gt;&lt;/p&gt;
&lt;div class="alignnone wp-caption" id="attachment_220294" style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Indian  students gather for a protest against Facebook’s “Free Basics” in  Hyderabad, India. A central element of Facebook’s Internet.org campaign  was controversial even before it was shut down in a key market this  month. Indian regulators banned one of the pillars of the campaign, a  service known as Free Basics, because it provided access only to certain  pre-approved services – including Facebook – rather than the full  Internet&lt;/i&gt;&lt;/b&gt;.&lt;/div&gt;
&lt;div class="alignnone wp-caption" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Google and its parent company,  Alphabet, also intend to spread internet to rural, underserved areas  through the unique balloon-based &lt;/span&gt;&lt;a href="https://www.solveforx.com/loon/" target="_blank"&gt;&lt;span&gt;Project Loon&lt;/span&gt;&lt;/a&gt;&lt;span&gt;. Tech site &lt;/span&gt;&lt;a href="http://www.pocket-lint.com/news/131699-the-internet-space-race-is-on-google-loon-vs-facebook-drones-vs-spacex-satellites" target="_blank"&gt;&lt;span&gt;Pocket-Lint&lt;/span&gt;&lt;/a&gt;&lt;span&gt; reported in March 2015 that SpaceX hoped to offer internet service  through its satellites, in what reporter Luke Edwards called an  “internet space race.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Pranesh Prakash, a representative of the &lt;/span&gt;&lt;a href="http://cis-india.org/" target="_blank"&gt;&lt;span&gt;Centre for Internet &amp;amp; Society&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, an NGO based in Bangalore, India, questioned the company’s motivation in a June 2015 interview with &lt;/span&gt;&lt;a href="http://www.aljazeera.com/news/2015/06/critics-fear-tech-giant-dominance-airborne-internet-150610095035742.html" target="_blank"&gt;&lt;span&gt;Al-Jazeera&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“They’re doing it out of their self-interest,” Prakash told Tarek Bazley, Al-Jazeera’s science and technology editor. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;“They are not doing it because they  are charities, because they believe in altruism etc. They’re doing it  because having more people online benefits them.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;And Aral Balkan, a human rights activist, told Bazley, “I wouldn’t call it philanthropy I would call it colonialism.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In an August 2013 post on his homepage, &lt;/span&gt;&lt;a href="https://ar.al/notes/beware-of-geeks-bearing-gifts/" target="_blank"&gt;&lt;span&gt;Balkan went into more detail&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about his “strong reservations about why Google and Facebook want to be the ones providing this service.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Noting that both tech corporations profit primarily from collecting and selling information about their users, he continued:&lt;/span&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;“Google  and Facebook want to give everyone access to the Internet because they  need more raw materials. More data. Your data. So they can cultivate  more Digital Serfs to sell to their customers.”&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content'&gt;https://cis-india.org/internet-governance/news/mint-pressnews-september-13-2016-kit-o-connell-spacex-explosion-slows-facebook-israeli-efforts-to-control-online-content&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-14T11:24:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases">
    <title>How does the government track all its legal cases?</title>
    <link>https://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases</link>
    <description>
        &lt;b&gt;The Legal Information Management and Briefing System , an integral part of the digital India initiative, aims to be a database of all the ongoing cases with the government. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shreeja Sen &lt;a href="http://www.livemint.com/Politics/e8NH6lBlIFbBss0cP54hrJ/How-does-the-government-track-all-its-legal-cases.html"&gt;published by Livemint&lt;/a&gt; on September 13, 2016 has quoted Sunil         Abraham.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;More than one lakh cases         currently exist on a law ministry platform curated in the last         13 months.The Legal Information Management and Briefing System         (LIMBS), aimed to be a database of all the ongoing cases with         the government as a party, is part of the government’s push         towards digital India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law secretary Suresh Chandra         said this is a big step under the Digital India project,         intended to monitor and ultimately reduce spending on government         litigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The aim is to conduct cases         properly. If our system works, along with the national         litigation policy, we will be able to prevent 50% cases before         they are even filed,” Chandra said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the government, the         project will help reduce delays in filing responses in cases ,         contempt notices because of such delays and consequent monetary         penalties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The website has also undergone         the required security audit under the NIC (national informatics         centre), to ensure the data is safe and protected. However, a database like this on         the internet comes with its challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“To ensure client         confidentiality, communication should be bilateral between         lawyer and client and should be encrypted and even watermarked.         If this project allows access to documents by multiple         stakeholders without encrypting it for the recipient, then if         there is any leak, the documents cannot be traced back to the         person who was responsible,” said Sunil Abraham, executive         director at Centre for Internet and Society, a non-profit         research organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The LIMBS project began         internally at the ministry of railway sometime in 2013, but was         soon expanded as a single platform across ministries. In July         2015, it was hosted on the NIC server. The law ministry, by a         gazette notification on 8 February, formally launched LIMBS to         monitor cases filed against the Union government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of now, there is no special         budget allocated for this project, which is being handled in         house with a team of eight people – four developers on the         technology side and four implementers for the case details. The         development of the website is being handled by Ajay Gupta,         deputy chief vigilance officer, northern railway. From the law         ministry, Spriha Johari is the project director responsible for         the website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As of 12 September, the five         ministries with the most uploads on the website were railways         (69,469 cases), communications and information technology         (7,830), finance (4452), environment (3,189) and defence         (2,565).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Every day, nearly 400-500 cases         are added to the portal. In all 58 ministries and their 202         departments have been brought under the LIMBS project.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases'&gt;https://cis-india.org/internet-governance/news/livemint-september-13-2016-shreeja-sen-how-does-govt-track-all-its-legal-cases&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-14T10:17:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition">
    <title>CYFY 2016 - The India Conference on Cyber Security and Internet Governance</title>
    <link>https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition</link>
    <description>
        &lt;b&gt;Sunil Abraham will participate as a panelist at CYFY 2016 event organized by Observer Research Foundation in New Delhi from September 28 to 30, 2016. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Into  its  fourth  edition  this  year,  CyFy:  The  India  Conference  on  Cyber  Security  and  Internet Governance  has  emerged  as  a global platform to discuss, debate and  deliver digital policy solutions. CyFy  2015   featured  nearly   110  participants  from  over  33  countries,  with  nearly  800   delegates  in attendance.  Prominently,  the  conference  sessions  featured  several  experts  from Africa  and  the  Asia Pacific, who addressed  the  policy  priority of connecting  the next  billion. The 2016 iteration of CyFy will highlight the political, economic and strategic questions that underpin this imperative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyfy-2016-agenda/view"&gt;Download the Agenda &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;See the announcement on &lt;a class="external-link" href="http://cyfy.org/"&gt;CYFY website&lt;/a&gt; or write to Samir Saran at &lt;a class="mail-link" href="mailto:ssaran@orfonline.org?subject=CyFy 2016"&gt;ssaran@orfonline.org&lt;/a&gt; or Arun at &lt;a class="mail-link" href="mailto:arun.sukumar@orfonline.org?subject=CyFy 2016"&gt;arun.sukumar@orfonline.org&lt;/a&gt; for more details on the conference.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition'&gt;https://cis-india.org/internet-governance/news/cyfy-2016-the-india-conference-on-cyber-security-and-internet-governance-4th-edition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-13T15:23:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork">
    <title>The DigiLocker was supposed to cut down paperwork but less than 0.1% of Indians are using it</title>
    <link>https://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork</link>
    <description>
        &lt;b&gt;The official data shows that the platform has not enthused as many users as the government expected. &lt;/b&gt;
        &lt;div class="article-body" style="text-align: justify; "&gt;
&lt;p&gt;The blog post by Mayank Jain was &lt;a class="external-link" href="http://scroll.in/article/816076/the-digilocker-was-supposed-to-cut-down-paperwork-but-less-than-0-1-of-indians-are-using-it"&gt;published by Scroll.in&lt;/a&gt; on September 12, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The government has  been working hard to make all of India go digital – but its initiatives  don't seem to be having the desired effect. Not yet anyway.&lt;/p&gt;
&lt;p&gt;DigiLocker  was launched in July last year as a secure platform for Indian citizens  to store and access their documents on an electronic repository  provided by the government of India. This is one of the major planks of  the Digital India programme – which aims to take government services  online and make the entire country digitally literate – but it does not  seem to have enthused too many so far.&lt;/p&gt;
&lt;p&gt;To popularise it further, the government on Wednesday &lt;a class="link-external" href="http://economictimes.indiatimes.com/magazines/panache/with-digilocker-app-spare-yourself-the-horror-of-carrying-licences-vehicle-papers-on-the-go/articleshow/54168368.cms" rel="nofollow" target="_blank"&gt;integrated it&lt;/a&gt; with the Ministry of Road Transport and Highways to allow people to  store a digital version of their driving licence and vehicle documents  on the DigiLocker, sparing them the trouble of having to keep the hard  copies on them at all times.&lt;/p&gt;
&lt;p&gt;More than a year since its release,  the platform has about 1.1 million people signed up as users, according  to the official statistics on the DigiLocker website.&lt;/p&gt;
&lt;p&gt;This might  seem like an impressive number – but compare it to the country’s  population of about 1.21 billion, or even its internet-using population  of 350 million – and it becomes a drop in the ocean.&lt;/p&gt;
&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="http://d1u4oo4rb13yy8.cloudfront.net/bonpfhvhxg-1473530052.png" /&gt;&lt;/figure&gt;
&lt;p&gt;As  this chart shows, only 0.09% of Indians are on DigiLocker – this is  less than one user per 1,000 people in the country. DigiLocker is being  used by 0.33% of the online population in the country, which implies  that there are 33 users per 10,000 people on the internet from India.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;Digital dreams&lt;/h3&gt;
&lt;p&gt;When  it was launched by the Department of Electronics and Information  Technology, the government had envisaged a cloud-based and secure  storage platform that would cover the entire population, make it easier  to procure and access important documents – including mark sheets,  degrees and tax papers – and reduce paperwork as well as save time.&lt;/p&gt;
&lt;p&gt;“In  effect Digital Locker will touch every citizen's life by bringing in  lot of convenience and therefore fulfilling the government's vision of a  citizen centric governance model of providing services at the door-step  of citizens,” the government &lt;a class="link-external" href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=122091" rel="nofollow" target="_blank"&gt;said&lt;/a&gt; in a press release when the locker reached one lakh users in the first 100 days of its launch.&lt;/p&gt;
&lt;p&gt;While the &lt;a class="link-external" href="https://digilocker.gov.in/" rel="nofollow" target="_blank"&gt;official website&lt;/a&gt; claims that the number of users is now about 2.1 million, the &lt;a class="link-external" href="https://digilocker.gov.in/public/dashboard" rel="nofollow" target="_blank"&gt;state-wise&lt;/a&gt; figures add up to only 1.1 million people on the platform.&lt;/p&gt;
&lt;p&gt;Among  the states, Maharashtra has most DigiLocker users in absolute numbers  (more than 1 lakh), while Arunachal, Nagaland and Mizoram have less than  1,000 users each.&lt;/p&gt;
&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="http://d1u4oo4rb13yy8.cloudfront.net/ypegwtfpnx-1473418789.png" /&gt;&lt;/figure&gt;
&lt;p&gt;When  the population of each state is taken into account, however, the  picture changes. When adjusted for population, a mere 0.7% Sikkim’s  population uses the service – and this is the highest percentage among  Indian states. Maharashtra, with the highest number of DigiLocker users,  has a much lower percentage of those on the service – 0.12%. The  national capital, meanwhile, has just 0.17% of its population on the  service.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Lock up&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Citizens can use DigiLocker to store up to 10 megabytes of personal documents online.&lt;/p&gt;
&lt;p&gt;Since  the 10MB storage isn’t enticing enough, considering that internet users  can avail themselves of at least 1GB of storage for free through  private services such as Google Drive or Dropbox, the government is  trying to push usage by integrating several departments with the service  and allowing users to access more documents in real time from anywhere.&lt;/p&gt;
&lt;p&gt;Among  those enrolled so far include the road transport ministry,  Maharashtra’s department of registry and stamps and educational bodies  such as the Central Board of Secondary Education, which is now trying to  release mark sheets and results of competitive exams online.&lt;/p&gt;
&lt;p&gt;Though  the government hoped that these initiatives would increase its usage,  technical glitches have prevented several people from using the service.&lt;/p&gt;
&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="http://d1u4oo4rb13yy8.cloudfront.net/ftfomdrrld-1473418804.png" /&gt;&lt;/figure&gt;
&lt;p&gt;A student who gave her National Engineering Entrance Exam this year spoke to &lt;i&gt;Scroll.in &lt;/i&gt;about why she didn't sign up for DigiLocker even though her results were released on the platform.&lt;/p&gt;
&lt;p&gt;“They  allowed us to access results instantly on the platform but it required a  sign up using the Aadhaar number,” a student, said on the condition of  anonymity. “I tried signing up thrice using my phone number but never  received the one-time password and then my Aadhaar verification didn’t  go through so I could never sign up.”&lt;/p&gt;
&lt;p&gt;The service is linked to the  government's biometric-based Aadhaar identification system, but it is  not mandatory to have an Aadhaar number, according to the website.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Privacy concerns&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Another  reason why people are hesitant to sign up for the service are privacy  concerns about storing important and private documents on a central  repository.&lt;/p&gt;
&lt;p&gt;“Any large linked database with personal information  is a serious threat to citizen’s data,” G Nagarjuna, a researcher at the  Homi Bhabha Centre for Science Education in Mumbai told &lt;i&gt;Scroll.in&lt;/i&gt; earlier. “There exists no agency that could secure their data till date without any possibilities of data theft.”&lt;/p&gt;
&lt;p&gt;Experts  said storing private information, such as biometric and passport data,  on the service could pose security and privacy concerns.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director of the Bangalore-based Centre for Internet and Society told &lt;i&gt;Scroll.in&lt;/i&gt; over email that the project can have serious consequences if it is not encrypted well.&lt;/p&gt;
&lt;p&gt;“Unless  the cryptography and architecture is organised in such a manner that  only the citizens will have access, there can be very serious  consequences for the individual’s right to privacy,” he said.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Internal resistance&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Those  working for the project said the usage of the locker is going to go up  if more government departments start issuing documents digitally to the  locker, instead of handing over hard copies, as this will prompt users  to sign up.&lt;/p&gt;
&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="http://d1u4oo4rb13yy8.cloudfront.net/amgwlpowce-1473418827.png" /&gt;&lt;/figure&gt;
&lt;p&gt;If  the usage has to be increased, more departments need to come on board  and start releasing documents digitally, said Debabrata Nayak,  additional director of the National E-Governance Division, which  implemented the project.&lt;/p&gt;
&lt;p&gt;“It’s only when more departments start  implementing digitisation and issuing digital documents that we will see  a jump in the number of users because Digital Locker is pushed like  that,” Nayak said, adding that National E-Governance Division is facing a  fair bit of resistance from the departments.&lt;/p&gt;
&lt;p&gt;“But not all  departments are doing it yet because it requires a massive change in  their work processes and we are trying to get them on board.”&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;Aadhaar woes&lt;/h3&gt;
&lt;p&gt;DigiLocker  is designed as a push as well as pull service, which means that it  should allow departments to issue as well as request documents from  users. For this, users need to link their Aadhaar numbers to the locker.  This is proving to be a problem, because most departments are not  linking the documents they release to Aadhaar just yet, and not all  users are registered with the unique identification system.&lt;/p&gt;
&lt;p&gt;Moreover, the validity of Aadhaar is under question in the Supreme Court over &lt;a class="link-external" href="http://www.rediff.com/money/report/uid-an-assault-on-individual-liberty/20100906.htm" rel="nofollow" target="_blank"&gt;privacy concerns&lt;/a&gt; voiced by the civil society.&lt;/p&gt;
&lt;p&gt;An  activist had moved the Supreme Court last year over the government  making the Aadhaar number mandatory to sign up for DigiLocker. While the  petition was &lt;a class="link-external" href="http://www.telegraphindia.com/1150929/jsp/nation/story_45159.jsp#.V8_v6_l97IU" rel="nofollow" target="_blank"&gt;quashed &lt;/a&gt;on  procedural grounds, the government quickly moved to allow users to sign  up without their Aadhaar numbers. However, the usability of the locker  is restricted for such users.&lt;/p&gt;
&lt;p&gt;Nayak said that non-Aadhaar-linked  users can only upload their own documents on the system, without being  able to use any other facility that DigiLocker claims to provide.&lt;/p&gt;
&lt;p&gt;“Earlier  Aadhaar was necessary but we changed it because people demanded access,  but for most services, like getting government documents or requesting  documents, it’s [Aadhaar] necessary,” he said. Nayak said this is  because Aadhaar is the only way the government can identify the person  who is being issued documents.&lt;/p&gt;
&lt;p&gt;So what can one do without an Aadhaar on the DigiLocker?&lt;/p&gt;
&lt;p&gt;“Without  Aadhaar you can dump your garbage in it, which means you can upload  your own files on the digital locker system,” Nayak said, “but why would  you do that if you have Google Drive and Dropbox-like services?”&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork'&gt;https://cis-india.org/internet-governance/news/scroll.in-mayank-jain-september-12-2016-the-digilocker-was-supposed-to-cut-down-paperwork&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DIGILocker</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-12T01:59:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act">
    <title>Despite SC order, thousands booked under scrapped Sec 66A of IT Act</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act</link>
    <description>
        &lt;b&gt;College student Danish Mohammed’s arrest this March under the scrapped Section 66A of the Information Technology Act for allegedly sharing a morphed picture of RSS chief Mohan Bhagwat wasn’t an exception.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aloke Tikku was published in the &lt;a href="http://www.hindustantimes.com/india-news/despite-sc-order-thousands-booked-under-scrapped-section-66a-of-it-act/story-DisRxFDBJTXvkz6ZW4fRHK.html"&gt;Hindustan         Times&lt;/a&gt; on September 7, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Police arrested more than 3,000 people under the section in 2015, triggering concerns that the law was abused well after it was struck down by the Supreme Court in March last year. The top court had ruled Section 66A violated the constitutional freedom of speech and expression.&lt;br /&gt;&lt;br /&gt;The exact number of people arrested after it was scrapped is not available. But the National Crime Records Bureau’s (NCRB) Crime in India report released last month shows 3,137 arrests under the section in 2015 against 2,423 the previous year.&lt;br /&gt;&lt;br /&gt;On an average, four people were arrested every 12 hours in 2015 as compared to three in 2014.&lt;br /&gt;&lt;br /&gt;“I am shocked,” said Supreme Court lawyer Karuna Nundy, who represented the People’s Union for Civil Liberties, among the petitioners in Supreme Court seeking removal of Section 66A.&lt;br /&gt;&lt;br /&gt;“Making sure that our guardians of law know their law is absolutely basic... Whether it is training or notifying every police officer, we need action on it immediately,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://www.hindustantimes.com/rf/image_size_800x600/HT/p2/2016/09/07/Pictures/_7befc902-7467-11e6-86aa-b218fe1cd668.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unlikely that all 3,000-plus arrests were made before the provision was struck down in March. Sunil Abraham, executive director of the Bengaluru-headquartered advocacy group Centre for Internet and Society, said it was obvious that the police had not made these arrests before the SC ruling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawyer Manali Singhal said once the Supreme Court struck off a provision of law, “any arrest under that provision would be per se illegal and void”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Police also appeared to be on an overdrive to file charge sheets against people booked before the SC verdict – in 1,500 cases last year, almost twice the 2014 figure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;NCRB statistics suggest that trials too did not end.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were 575 people still in jail on January 1, 2016, twice as many as the 275 in prison when the law was in force a year earlier. In 2015, the courts also convicted accused in 143 cases.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act'&gt;https://cis-india.org/internet-governance/news/hindustan-times-aloke-tikku-september-7-2016-despite-sc-order-thousands-booked-under-scrapped-sec-66a-of-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-07T15:31:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime">
    <title>Indians Ask: Is Visiting a Torrent Site Really A Crime? </title>
    <link>https://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime</link>
    <description>
        &lt;b&gt;India has banned various large-scale torrent sites for a long time — this is old news. But under a new federal policy in India, one can be jailed for three years and fined 300,000 Indian Rupees (~US $4464) for downloading content on any of these blocked websites.&lt;/b&gt;
        &lt;p&gt;The blog post was first published in &lt;a class="external-link" href="https://globalvoices.org/2016/09/05/indians-ask-is-visiting-a-torrent-site-really-a-crime/"&gt;Global Voices&lt;/a&gt; on September 5, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Screenshot of a Bittorent client. Image by Carl Sagan via Wikimedia Commons. CC BY-SA 3.0" class="wp-image-584603 size-featured_image_large" height="444" src="https://globalvoices.org/wp-content/uploads/2016/08/bittorent-800x444.jpg" width="800" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Netizens who regularly use these and similar services have become anxious about what the rule may mean for them. Last week, a new legal notice concerning copyright violations sparked widespread rumors that users could be penalized for simply viewing torrent sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notice now appears when one visits any of the banned websites. It reads:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;This URL has been blocked under the instructions of the Competent Government Authority or in compliance with the orders of a Court of competent jurisdiction. Viewing, downloading, exhibiting or duplicating an illicit copy of the contents under this URL is punishable as an offence under the laws of India, including but not limited to under Sections 63, 63-A, 65 and 65-A of the Copyright Act, 1957 which prescribe imprisonment for 3 years and also fine of upto Rs. 3,00,000/-. Any person aggrieved by any such blocking of this URL may contact at urlblock@tatacommunications.com who will, within 48 hours, provide you the details of relevant proceedings under which you can approach the relevant High Court or Authority for redressal of your grievance.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Soon after news of the notice began to circulate, the &lt;a href="https://en.wikipedia.org/wiki/Chennai_High_Court"&gt;Chennai High Court &lt;/a&gt;– one of the oldest courts in India — issued a John Doe &lt;a href="http://indiatoday.intoday.in/technology/story/830-more-websites-blocked-in-india-many-torrent-links-in-list/1/748565.html"&gt;order&lt;/a&gt; to block as many as 830 websites, including several &lt;a href="http://delhihighcourt.nic.in/dhcqrydisp_o.asp?pn=119642&amp;amp;yr=2014"&gt;torrent websites &lt;/a&gt;such as thepiratebay.se, torrenthound.com, and kickasstorrents.come.in.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Indian  tech news portal Medianama published a blog post arguing that it is the  downloading of pirated content from certain banned websites and not  accessing those website that should lead to the legal issues. The  problem, it seems, lies in the poor wording of the notice. Medianama  described this as “bizarre by any rational standard” and noted that,  taken literally, it does not comply with the Indian Copyright Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://mhrd.gov.in/sites/upload_files/mhrd/files/upload_document/CprAct.pdf"&gt;Digital piracy legislation&lt;/a&gt; in India has been modified quite a lot in the recent times in general and over &lt;a href="http://indianexpress.com/article/blogs/torrent-ban-long-term-anti-piracy-strategy-or-just-scare-tactics-2990790/"&gt;last five years&lt;/a&gt; in particular (Sections 63, 63A and 65 of the &lt;a href="http://mhrd.gov.in/sites/upload_files/mhrd/files/upload_document/CprAct.pdf"&gt;Indian Copyright Act of 1957&lt;/a&gt; in particular.) But it has not been implemented with such force in the past.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;
&lt;h3&gt;What is a torrent?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a href="https://en.wikipedia.org/wiki/Torrent_file"&gt;torrent&lt;/a&gt; is part of a system that enables &lt;a href="https://en.wikipedia.org/wiki/Peer-to-peer_file_sharing" title="Peer-to-peer file sharing"&gt;peer-to-peer file sharing&lt;/a&gt; (“P2P”) that is used to distribute data and electronic files over the &lt;a href="https://en.wikipedia.org/wiki/Internet" title="Internet"&gt;Internet&lt;/a&gt;. Known as &lt;a href="http://www.bittorrent.org/beps/bep_0003.html"&gt;BitTorrent&lt;/a&gt;, this file distribution system is one of the most common technical protocols for transferring large files, such as &lt;a href="https://en.wikipedia.org/wiki/Digital_audio" title="Digital audio"&gt;digital audio&lt;/a&gt; files containing &lt;a class="mw-redirect" href="https://en.wikipedia.org/wiki/TV_show" title="TV show"&gt;TV shows&lt;/a&gt; or &lt;a href="https://en.wikipedia.org/wiki/Video_clip" title="Video clip"&gt;video clips&lt;/a&gt; or &lt;a href="https://en.wikipedia.org/wiki/Digital_audio" title="Digital audio"&gt;digital audio&lt;/a&gt; files containing &lt;a href="https://en.wikipedia.org/wiki/Song" title="Song"&gt;songs&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within this system, files labeled with the .torrent extension contain  meta data about files — e.g. file names, their sizes, folder structure  and cryptographic hash value for integrity verification. They do not  contain the content to be distributed, but without them, the system does  not work. (via &lt;a href="https://en.wikipedia.org/wiki/Torrent_file"&gt;Wikipedia&lt;/a&gt;)&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This is not the first time India has put a blanket ban on such sites. In  December 2014, 32 websites — including including code repository &lt;a href="http://github.com" target="_blank"&gt;Github&lt;/a&gt;, video streaming sites &lt;a href="http://vimeo.com" target="_blank"&gt;Vimeo &lt;/a&gt;and &lt;a href="http://dailymotion.com" target="_blank"&gt;Dailymotion&lt;/a&gt;, online archive &lt;a href="http://archive.org" target="_blank"&gt;Internet Archive&lt;/a&gt;, free software hosting site &lt;a href="http://sourceforge.net" target="_blank"&gt;Sourceforge&lt;/a&gt; — were &lt;a href="https://globalvoices.org/2015/01/06/indian-netizens-criticize-online-censorship-of-jihadi-content/"&gt;banned&lt;/a&gt; in India. They were later unblocked after agreeing to remove some ISIS-related content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As they have in the past, tech-savvy netizens began &lt;a href="http://www.best-bittorrent-vpn.com/torrents-in-india-2.html?utm_expid=67369992-5.J37bjQyhR4O_JO3YAkii3g.1&amp;amp;utm_referrer=https%3A%2F%2Fwww.google.co.in%2F"&gt;suggesting hacks&lt;/a&gt; to mask or fake one's IP address. Sumiteshwar Choudhary, a practicing  criminal and matrimony lawyer, described on Quora how the law had  existed for quite some time but the government had never fully enforced  it:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;[..] The only reason that India has not been able to successfully ban these services is because the servers rest outside India and we don’t have any law to extend our jurisdiction to that extent today. As an end user if you download a pirated version of things you are not entitled to, you can be booked criminally under this Act and can face prison for up to 2 years…&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Twitter user Prisma Mama Thakur criticized the ban, arguing that it  should be a low priority in a moment when India has many other important  problems to solve:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet.jpg" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;div class="alignright factbox"&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime'&gt;https://cis-india.org/internet-governance/blog/global-voices-september-5-2016-subhashish-panigrahi-indians-ask-is-visiting-a-torrent-site-really-a-crime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-06T14:09:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents">
    <title>Talking Point: Futile Battle Against Torrents</title>
    <link>https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents</link>
    <description>
        &lt;b&gt;Sunil Abraham spoke to Deccan Herald to clear the air about rumours surrounding a jail threat for those logging on to Torrent sites. &lt;/b&gt;
        &lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/kdFsAXkbOxE" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;This was originally published by Deccan Herald on August 30, 2016&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents'&gt;https://cis-india.org/internet-governance/news/talking-point-futile-battle-against-torrents&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-09-01T14:36:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
