<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 126 to 140.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-november-6-2019-theres-sudeep-whatsapp-spy-attack-and-after"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-venkat-ananth-july-24-2018-whatsapp-races-against-time-to-fix-fake-news-mess-ahead-of-2019-general-elections"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomber-quint-may-19-2017-aayush-ailawadi-whats-hard-to-digest-about-the-zomato-hacking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-abhijit-ahaskar-february-12-2019-what-the-governments-draft-it-intermediary-guidelines-say"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-march-25-2015-what-the-experts-said-on-live-chat"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/what-is-the-problem-with-2018ethical-ai2019-an-indian-perspective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-january-20-2014-what-is-net-neutrality-and-why-is-it-important"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/what-is-dilligaf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital">
    <title>WhatsApps with fireworks, apps with diyas: Why Diwali needs to go beyond digital </title>
    <link>https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital</link>
    <description>
        &lt;b&gt;The idea of a 'digital' Diwali reduces our social relationships to a ledger of give and take. The last fortnight, I have been bombarded with advertisements selling the idea of a “Digital Diwali”. We have become so used to the idea that everything that is digital is modern, better and more efficient.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital/"&gt;published in the Indian Express&lt;/a&gt; on November 22, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I have WhatsApp messages with  exploding fireworks, singing greeting cards that chant mystic sounding  messages, an app that turns my smartphone into a flickering diya,  another app that remotely controls the imitation LED candles on my  windows, an invitation to Skype in for a puja at a friend’s house 3,000  km away, and the surfeit of last minute shopping deals, each one  offering a dhamaka of discounts.&lt;br /&gt;&lt;br /&gt;However, to me, the digitality  of Diwali is beyond the surface level of seductive screens and one-click  shopping, or messages of love and apps of light. Think of Diwali as  sharing the fundamental logic that governs the digital — the logic of  counting. As we explode with joy this festive season, we count our  blessings, our loved ones, the gifts and presents that we exchange. If  we are on the new Fitbit trend, we count the calories we consume and  burn as we make our way through parties where it is important to see and  be seen, compare and contrast, connect with all the people who could be  thought of as friends, followers, connectors, or connections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  there is no denying that there is a sociality that the festival brings  in, there is also a cruel algebra of counting that comes along with it.  It is no surprise that as we celebrate the victory of good over evil and  right over wrong, we also simultaneously bow our heads to the goddess  of wealth in this season.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Look  beyond the glossy surface of Diwali festivities, and you realise that it  is exactly like the digital. Digital is about counting. It is right  there in the name — digits refers to numbers. Or digits refer to fingers  — these counting appendages which we can manipulate and flex in order  to achieve desired results. At the core of digital systems is the logic  of counting, and counting, as anybody will tell us, is not a benign  process. What gets counted, gets accounted for, thus producing a ledger  of give and take which often becomes the measure of our social  relationships.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I remember, as a  child, my mother meticulously making a note of every gift or envelope  filled with money that ever came our way from the relatives, so that  there would be precise and exact reciprocation. I am certain that there  is now an app which can keep a track of these exchanges. I am not  suggesting that these occasions of gifting are merely mercenary, but  they are embodiments of finely calibrated values and worth of  relationships defined by proximity, intimacy, hierarchy and distance.  The digital produces and works on a similar algorithm, which is often as  inscrutable and opaque as the unspoken codes of the Diwali ledger.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There  is something else that happens with counting. The only things that can  have value are things that have value. I don’t know which ledger counts  the coming together of my very distributed family for an evening of  chatting, talking, sharing lives and laughter. I don’t know how anybody  would reciprocate that one late night when a cousin came to our home and  spent hours with my younger brother making a rangoli to surprise the  rest of us. I have no idea how they will ever reciprocate gifts that one  of the younger kids made at school for all the members of the family.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diwali  is about the things, but like the digital system, these are things that  cannot be counted. And within the digital system, things that cannot be  counted are things that get discounted. They become unimportant. They  become noise, or rubbish. Our social networks are counting systems that  might notice the low frequency of my connections with my extended family  but they cannot quantify the joy I hear in the voice of my grandmother  when I call her from a different time-zone to catch up with her. Digital  systems can only deal with things with value and not their worth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I  do want to remind myself that there is more to this occasion than  merely counting. And for once, I want to go beyond the digital, where my  memories of the past and the expectations of the future are not shaped  by the digital systems of counting and quantifying. Instead, I want  Diwali to be analogue. I shall still be mediating my collectivity with  the promises of connectivity, but I want to think of this moment as  beyond the logics and logistics of counting that codify our social  transactions and take such a central location in our personal  functioning. This Diwali, I am rooting for a post-digital Diwali, that  accounts for all those things that cannot be counted, but are sometimes  the only things that really count.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital'&gt;https://cis-india.org/internet-governance/blog/the-indian-express-nishant-shah-november-22-2015-whatsapps-with-fireworks-apps-with-diyas-why-diwali-needs-to-go-beyond-digital&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-23T13:27:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-november-6-2019-theres-sudeep-whatsapp-spy-attack-and-after">
    <title>WhatsApp spy attack and after</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-november-6-2019-theres-sudeep-whatsapp-spy-attack-and-after</link>
    <description>
        &lt;b&gt;Bengaluru experts analyse the Pegasus snooping scandal, and provide advice on what you can do about the gaping holes in your mobile phone security.&lt;/b&gt;
        &lt;p&gt;The article by Theres Sudeep was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-with-bengaluru/whatsapp-spy-attack-and-after-773955.html"&gt;Deccan Herald&lt;/a&gt; on November 6, 2019. Aayush Rathi was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Last week ended with a sensational piece of news: WhatsApp said spyware Pegasus was being used to hack into the phones of activists and journalists in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The software is the brainchild of the NSO Group, an Israeli company. WhatsApp has detected 1,400 instances of Pegasus being used in the latest wave of attacks between April 29 and May 10. WhatsApp has identified 100-plus cases targeting human rights defenders and journalists. About two dozen of these attacks were in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among those whose security was reportedly compromised is Congress leader Priyanka Gandhi.The first question is who ordered this snooping. NSO claims they sell their technology only to government agencies for lawful investigation into crime and terrorism. Speculation is rife that there is government involvement in the snooping.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vinay Srinivas, lawyer with Alternative Law Forum, Bengaluru, says,“The targets of the attack seem to be those who had critical things to say about the current government.”Referring to a tweet by journalist Arvind Gunasekar, Srinivas says there is clear proof that the government knew of the breach and its severity.The tweet includes a screenshot of a report from the CERT-IN (Indian Computer Emergency Response Team) website dated May 17.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It shows severity rating as “High”.WhatsApp says the vulnerability has now been patched and urged users to update the app. But a level of paranoia around smartphones and privacy has been created. Apar Gupta, executive director of the Internet Freedom Foundation, based in Delhi works towards internet freedom and privacy, says Pegasus,specially, is too expensive (it can cost up to eight million dollars a year to licence) to be used on ordinary citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not all spyware is expensive. “Multiple kinds are now commercially available and easy to procure. These can be used by an estranged lover or even a professional rival to find information about you,” he says. Jija Hari Singh, retired DGP and Karnataka’s first woman IPS officer, says Pegasus is one of the smaller players, and spyware akin to it has been around for three decades. “Monsters bigger than Pegasus are still snooping on us,” she says.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NOTHING TO HIDE?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Many people fall back on the narrative of ‘I have nothing to hide, so I’m not worried’.Aayush Rathi, Programme Officer at the Centre for Internet and Society, says that this is a flawed premise: “It is like saying free speech is not important for you because you have nothing useful to say.”Gupta breaks down this rationale: “If a person has ‘nothing to hide’ then they should just unlock their phone and hand it over to any person who asks for it. But the minute such a demand is made they would feel uncomfortable.”This discomfort, he says, doesn’t come because they are doing something illegal but because they fear social judgement.“There is a level of intimacy in their conversations that they’d rather not share with anyone else,” he says.Many people believe only illegal activity leads to surveillance, but that is not the case.“Even the most inconsequential actions are being logged on digital devices, and much of this information can be monetised,” he says.The most tangible risks are financial fraud and identity theft, and spyware is also commonly used for corporate espionage.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;UPDATE SECURITY&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;So what must one do if one’s phone is spied on? In the case of Pegasus, Rathi says, “You would have received a communication from WhatsApp if you were targeted. Irrespective, you should update the application immediately as the latest update fixes the vulnerability.”Srinivas says legally the recourse available is the fundamental right to privacy. “Since the government doesn’t have any regulation in place to deal with this, the National Human Rights Commission will have to take it up,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gupta advises precautions against preventable hacks. He advises a reading of online guides on surveillance self-defence, especially those by Electronic Frontier Foundation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-november-6-2019-theres-sudeep-whatsapp-spy-attack-and-after'&gt;https://cis-india.org/internet-governance/news/deccan-herald-november-6-2019-theres-sudeep-whatsapp-spy-attack-and-after&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Theres Sudeep</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-12-15T05:06:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law">
    <title>WhatsApp ruling: Experts seek privacy law</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law</link>
    <description>
        &lt;b&gt;On August 25, Whatsapp updated its policy to share user content with social network; the decision opened new monetisation models for the messaging app.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Apurva Venkat and Moulishree Srivastava         quoted Sunil Abraham. It was &lt;a href="http://www.business-standard.com/article/current-affairs/whatsapp-ruling-experts-seek-privacy-law-116092400750_1.html"&gt;published           in the Business Standard&lt;/a&gt; on September 24, 2016.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The recent&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Delhi+High+Court" target="_blank"&gt;Delhi High Court&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;&lt;span&gt;ruling           that&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Messaging+App" target="_blank"&gt;messaging app&lt;/a&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;Whatsapp&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;&lt;span&gt;cannot           share user data highlights the need for legislation on           privacy, according to experts.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;On           August 25, Whatsapp, a platform with 70 million users in India           that was acquired by Facebook in 2014, updated its policy to           share user content with the social network. The decision           opened new monetisation models for the messaging app.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In response to a PIL, the court           ordered&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;&lt;span&gt;to           delete data of users who chose to opt out of its policy           changes before September 25. It also ordered&lt;/span&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Whatsapp" target="_blank"&gt;WhatsApp&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;&lt;span&gt;not           to share data collected before September 25 with Facebook for           users who had not opted out.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"The           decision makes a strong statement on privacy," said Sunil           Abraham, executive director of the Centre for Internet           Society. According to him, a user trusts a platform and           provides access to his data. As another firm acquires the           platform, it gains access to the data.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"Facebook           owns Whatsapp. It has to look at ways of monetising it," said           Nikhil Pahwa, co-founder of SavetheInternet.in.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"With           so much digital data being generated, there is a need for a           privacy law in the country," said Pahwa.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"Facebook's           consent interface is confusing. It can make a person who wants           to opt out let the company access his data," said Abraham,           adding a law would take care of such intricacies. The           government is working on a privacy bill.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;Saroj           Kumar Jha, partner, SRGR Law Offices, said there were few           judgments on privacy in India based on constitutional rights.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"While           the Information Technology Act enables courts to pass           judgments on global companies on privacy, enforcing the orders           is difficult," he said.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span&gt;"What           is required is a privacy law that can protect user data and           uphold the individual's right to privacy," he added.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law'&gt;https://cis-india.org/internet-governance/news/business-standard-september-24-apurva-venkat-and-moulishree-srivastava-whasapp-ruling-experts-seek-privacy-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-27T02:35:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-venkat-ananth-july-24-2018-whatsapp-races-against-time-to-fix-fake-news-mess-ahead-of-2019-general-elections">
    <title>WhatsApp races against time to fix fake news mess ahead of 2019 general elections</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-venkat-ananth-july-24-2018-whatsapp-races-against-time-to-fix-fake-news-mess-ahead-of-2019-general-elections</link>
    <description>
        &lt;b&gt;On Friday, when WhatsApp announced that it would pilot a ‘five media-based forwards limit’ in India, the government came up with an unequivocal reminder.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Venkat Ananth was published in &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/whatsapp-races-against-time-to-fix-fake-news-mess-ahead-of-2019-general-elections/articleshow/65112280.cms"&gt;Economic Times&lt;/a&gt; on July 24, 2018. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“When rumours and fake news get propagated by mischief mongers, the medium used for such propagation cannot evade responsibility and accountability. If they remain mute spectators, they are liable to be treated as abettors and thereafter face consequent legal action,” noted a ministry of electronics and information technology (MeitY) statement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement also said there was a need for bringing in traceability and accountability, “when a provocative/inflammatory message is detected and a request is made by law enforcement agencies.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Significantly, MeitY took aim at WhatsApp’s core end-to-end encryptionbased product feature and its oft-quoted and reiterated commitment to privacy. It was specific, going beyond the usual “do more” requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The stand also poses an interesting dilemma for the messenger service. How can it act while protecting its privacy commitment?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It is practical ly impossible for WhatsApp to regulate content in the peer-to-peer encrypted environment it is set up in,” says Rahul Matthan, partner, Trilegal. “An encrypted platform is what we want. The government is trying to maintain a strict and difficult balance. The government tends to err on the side of violating civil liberties over offering privacy to innocent users. The WhatsApp case is going in that direction.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;No Longer Low-Key&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, its largest market, WhatsApp has benefitted from quietly operating in the shadows of its more popular parent, Facebook, growing to a currently active user base of 200 million.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the last six months, while it continues to be perceived as an asset by politicos for outreach and propaganda, WhatsApp is now increasingly being tapped by the bad guys to disseminate deliberate misinformation, rumour mongering and fake news. And not the Donald Trump kind either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is leading to loss of lives on the ground, through lynchings, kidnappings and related crimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp spokesperson Carl Woog says, “The recent acts of violence in India have been heartbreaking and reinforce the need for government, civil society and technology companies to work together to keep people safe.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“By focusing on solutions to fake news inside our smartphones, we are ignoring a tougher problem that requires several complementary solutions,” says Apar Gupta, a Delhi-based lawyer and cofounder of the Internet Freedom Foundation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Let us not forget that a platform is not responsible for policing.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the general public and government perception — and, to some extent, concern — remains that WhatsApp has been slow to react to these situations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;To Police or Not to Police&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, the government and ruling party realise WhatsApp could be pivotal to their fortunes in the next electoral cycle — in the run-up to Elections&lt;br /&gt;2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The government is coming under increased pressure to act on these lynchings, which is why it is taking a shootthe-messenger kind of an approach,” says Matthan. “An unsophisticated government would have advocated a blanket ban on the source. But here, the government, it appears, wants to regulate tech by having access to your device, through an app, in the case of the (telecom regulator) Trai DND app to battle spam.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is also why WhatsApp has intensified its outreach efforts. Over the past 10 days, a team of its US and India-based executives have been meeting key stakeholders in Delhi and Mumbai, including the Election Commission, political parties, the Reserve Bank of India, banks and civil society, as ET reported last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The team includes public policy manager Ben Supple, senior director, customer operations, Komal Lahiri and WhatsApp India communication manager Pragya Misra Mehrishi. They are now expected to meet key government officials from MeitY from Monday, sources say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The intense outreach efforts is essentially linked to WhatsApp wanting to protect its payments play in India,” says a Delhi-based public policy professional, who did not want to be named as he is not authorised to speak to the media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It (WhatsApp) is really worried about Google’s efforts with Tez and the gap that will only widen if the government delays grant of permission.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp is stressing some key points while reinforcing the steps it is taking to counter challenges. One, the best practices of using the platform. Two, the need to work together to prevent abuse of WhatsApp, and three, most importantly, to educate people about the best ways of using the platform. WhatsApp was primarily designed for private, oneon-one messaging or group chats among acquaintances, not for mass broadcast, which parties resort to during elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp says it is working on a warfooting to tackle the problems. It has introduced product changes to counter user behaviour. There’s more control, where a group ‘admin’ can restrict users who can send messages to the group, modify a group icon or edit description, a feature for which it has taken a leaf out of rival Telegram’s book. To counter fake news, it added a ‘forwarded’ label. And now, limited the forwarding to five in India, and 20 in the rest of the markets, a significant reduction from 250 prior to that.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the impact of these product tweaks is yet to be seen at an individual user level, the larger concern for WhatsApp today is the potential misuse of its platform to manipulate elections, a very real possibility next year.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tipping Point&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The company’s noticeable change of tack comes after it noticed certain trends during the recent Karnataka elections, during which one of its executives spent a week in Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the political parties, which a person aware of the developments in WhatsApp declined to name, was using “dozens of accounts to create thousands of groups,” as part of its campaign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The party, the source says, was adding random numbers (approximately 100) to the group during creation. By random numbers, he meant people who did not know each other, something WhatsApp can identify using the metadata it collects when a user gives it access to its phone book. WhatsApp deems this behaviour ‘organised spamming.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These were real people not necessarily known to each other,” says the person quoted above. “A specific account would be added to that group to be made the admin.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mostly, this admin was the number used to create these multiple groups or, in WhatsApp terms, the account that was not behaving the way private or group communication happens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, the users would be a mix of fake accounts, which is a major red flag for WhatsApp. “The group starts with some bulk added users and then the real ones get bulk-added,” says the source. WhatsApp deems this practice a violation of its terms of service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Company sources add that WhatsApp was able to detect these trends and proactively banned these users before they were able to add people. “In some cases, our systems didn’t catch this in time, but we were able to proactively prevent users from receiving such spam. That detection is now internalised and if someone tries to replicate that behaviour anywhere in the world, we will be able to detect them,” says another person familiar with developments at WhatsApp.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to several media reports, the BJP and the Congress too created over 30,000 groups for campaigning and organising efforts. To counter organised political spamming, WhatsApp has now begun using machine learning tools. WhatsApp can trace the last few messages in a group and block it entirely from the platform. At the detection level, WhatsApp checks for familiarity. “Do the persons know each other, or have they interacted before?” through metadata it possesses through phone numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second person quoted in the story says the company now focuses its detection “upstream,” that is, catching the user at the registration stage. “When you register on WhatsApp and immediately create a group, questions asked are, ‘Does this behaviour look like what a regular user does? Or does it look like users who have misused it in the past?’” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp, sources tell ET, is also using machine learning to detect sequential numbers that could be used to create these groups. “If they go and buy a phone number, they go to one carrier and its mostly sequential. If we notice 100 numbers with the same prefix have signed up, nearly 80 get automatically banned. What we do is feed these sequences, permutations and combinations to detect good/bad users,” the person quoted above says. “It learns millions of these combination signals on behaviour and help us make a decision.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Civil Society as a Key Layer&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;WhatsApp also sees an enabling role for civil society, especially for digital literacy. Its team has currently met seven non-governmental organisations, including digital literacy groups and others involved in the area of financial inclusion. This is part of its public policy efforts while also solidifying its payments play.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The level of responsibility for a platform is to not consciously cause — and, in fact, to take active measures to prevent — social harm,” says Gupta of IFF. “It has to be done without injury to end-to-end encryption, which offers safety and privacy to users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many products and product strategies can be adopted — from increasing media diversity on the platform to promoting auditing features that rely on partnerships with fact-checking organisations. We must demand accountability but resist the rhetorical attraction of technophobia.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As ET has reported, WhatsApp will adapt a fact-checking model, Verificado 2018, deployed during the recent Mexican presidential elections. Verificado proactively debunked fake news and misinformation on the platform. “The rumours were found to be very similar to India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Verificado was specifically focused on misinformation from candidates,” says the first person quoted in the story. “Plus, it helped effectively tackle misinformation during an earthquake in Mexico.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For WhatsApp, one of the key learnings from the Mexico elections was that it could look at the spam reports and categorise them as politics-related. The company, unsurprisingly, saw an increase in political spam in the buildup to election day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“They realised Verificado assists users to get help within the app. But it also aids news organisations, political parties, the government and users,” adds the person. The company is undertaking a similar exercise in Brazil, where 24 media outlets have come together under the Comprova initiative to fact-check viral content and rumours on WhatsApp.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Bengaluru-based Centre for Internet and Society believes WhatsApp can further tweak its product to enable real-time checks. “They can enable a ‘fact check this’ button for users to upload content to a fact-checking database. If the content has already been fact-checked, the score can be displayed immediately. Alternatively, the fact-checking service can return the score at a later date,” he explains.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-venkat-ananth-july-24-2018-whatsapp-races-against-time-to-fix-fake-news-mess-ahead-of-2019-general-elections'&gt;https://cis-india.org/internet-governance/news/economic-times-venkat-ananth-july-24-2018-whatsapp-races-against-time-to-fix-fake-news-mess-ahead-of-2019-general-elections&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-07-25T15:27:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp">
    <title>What’s up with WhatsApp?</title>
    <link>https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp</link>
    <description>
        &lt;b&gt;In 2016, WhatsApp Inc announced it was rolling out end-to-end encryption, but is the company doing what it claims to be doing?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aayush Rathi and Sunil Abraham was published in &lt;a class="external-link" href="http://www.atimes.com/article/whats-up-with-whatsapp/"&gt;Asia Times&lt;/a&gt; on April 20, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Back in April 2016, when WhatsApp Inc announced it was rolling out end-to-end encryption (E2EE) for its billion-plus strong user base as a default setting, the messaging behemoth signaled to its users it was at the forefront of providing technological solutions to protect privacy.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Emphasized in the security white paper explaining the implementation of the technology is the encryption of both forms of communication – one-to-one and group and also of all types of messages shared within such communications – text as well as media.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Simply put, all communication taking place over WhatsApp would be decipherable only to the sender and recipient – it would be virtual gibberish even to WhatsApp.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;This announcement came in the backdrop of &lt;a href="https://www.theguardian.com/us-news/2016/feb/17/apple-ordered-to-hack-iphone-of-san-bernardino-shooter-for-fbi"&gt;Apple locking horns with the FBI&lt;/a&gt; after being asked to provide a backdoor to unlock the San Bernardino mass shooter’s iPhone. This further reinforced WhatsApp Inc’s stand on the ensuing debate between the interplay of privacy and security in the digital age.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Kudos to WhatsApp, for there is &lt;a href="http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/CallForSubmission.aspx"&gt;growing discussion&lt;/a&gt; around how encryption and anonymity is central to enabling secure online communication which in turn is integral to essential human rights such as those of freedom of opinion and expression.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;WhatsApp may have taken encryption to the masses, but here we outline why WhatsApp’s provisioning of privacy and security measures needs a more granular analysis – is the company doing what it claims to be doing? Security issues with WhatsApp’s messaging protocol certainly are not new.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Man-in-the-middle attacks&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;A &lt;a href="https://eprint.iacr.org/2017/713.pdf"&gt;study&lt;/a&gt; published by a group of German researchers from Ruhr University highlighted issues with WhatsApp’s implementation of its E2EE protocol to group communications. Another &lt;a href="https://courses.csail.mit.edu/6.857/2016/files/36.pdf"&gt;paper&lt;/a&gt; points out how WhatsApp’s session establishment strategy itself could be problematic and potentially be targeted for what are called man-in-the-middle (MITM) attacks.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;An MITM attack takes the form of a malicious actor, as the term suggests, placing itself between the communicating parties to eavesdrop or impersonate. The Electronic Frontier Foundation also &lt;a href="https://www.eff.org/deeplinks/2016/10/where-whatsapp-went-wrong-effs-four-biggest-security-concerns"&gt;highlighted&lt;/a&gt; other security vulnerabilities, or trade-offs, depending upon ideological inclinations, with respect to WhatsApp allowing for storage of unencrypted backups, issues with WhatsApp’s web client and also with its approach to cryptographic key change notifications.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Much has been written questioning WhatsApp’s shifting approach to ensuring privacy too. Quoting straight from &lt;a href="https://www.whatsapp.com/legal/#privacy-policy-affiliated-companies"&gt;WhatsApp’s Privacy Policy:&lt;/a&gt; “We joined the Facebook family of companies in 2014. As part of the Facebook family of companies, WhatsApp receives information from, and shares information with, this family of companies.” Speaking of Facebook …&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Culling out larger issues with WhatsApp’s privacy policies is not the intention here. What we specifically seek to explore is right at the nexus of WhatsApp’s security and privacy provisioning clashing with its marketing strategy: the storage of data on WhatsApp’s servers, or ‘blobs,’ as they are referred to in the technical paper. Facebook’s rather. In WhatsApp’s words: “Once your messages (including your chats, photos, videos, voice messages, files and share location information) are delivered, they are deleted from our servers. Your messages are stored on your own device.”&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;In fact, this non-storage of data on their ‘blobs’ is emphasizes at several other points on the official website. Let us call this the deletion-upon-delivery model.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A simple experiment&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;While drawing up a rigorous proof of concept, made near-impossible thanks to WhatsApp being a closed source messaging protocol, a simple experiment is enough to raise some very pertinent questions about WhatsApp’s outlined deletion-upon-delivery model. It should, however, be mentioned that the Signal Protocol developed by Open Whisper Systems and pivotal in WhatsApp’s rolling out of E2EE is &lt;a href="https://github.com/signalapp"&gt;open source&lt;/a&gt;. Here is how the experiment proceeds:&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick sends Morty an attachment.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Morty then switches off the data on her mobile device.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick downloads the attachment, an image.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Subsequently, Rick deletes the image from his mobile device’s internal storage.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick then logs into a WhatsApp’s web client on his browser. (Prior to this experiment, both Rick and Morty had logged out from all instances of the web client)&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Upon a fresh log-in to the web client and opening the chat with Morty, the option to download the image is available to Rick.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The experiment concludes with bewilderment at WhatsApp’s claim of deletion-upon-delivery as outlined earlier. The only place from which Morty could have downloaded the image would be from Facebook’s ‘blobs.’ The attachment could not have been retrieved from Morty’s mobile device as it had no way of sending data and neither from Rick’s mobile device as it no longer existed in the device’s storage.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As per the Privacy Policy, the data is stored on the ‘blobs’ for a period of 30 days after transmission of a message only when it can’t be delivered to the recipient. Upon delivery, the deletion-upon-delivery model is supposed to kick in.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Another straightforward experiment that leads to a similar conclusion is seeing the difference in time taken for a large attachment to be forwarded as opposed to when the same large attachment is uploaded. Forwarding is palpably quicker than uploading afresh: non-storage of attachments on the ‘blob’ would entail that the same amount should be taken for both.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The plot thickens. WhatsApp’s Privacy Policy goes on to state: “To improve performance and deliver media messages more efficiently, such as when many people are sharing a popular photo or video, we may retain that content on our servers for a longer period of time.”  The technical paper offers no help in understanding how WhatsApp systems assess frequently shared encrypted media messages without decrypting it at its end.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;A possible explanation could be the usage of metadata by WhatsApp, which it discloses in its Privacy Policy while simultaneously being sufficiently vague about the specifics of it. That WhatsApp may be capable of reading encrypted communication through the inclusion of a backdoor bodes well for law enforcement, but not so much for unsuspecting users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The weakest link in the chain&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Concerns about backdoors in WhatsApp’s product have led the French government to start developing their &lt;a href="https://www.reuters.com/article/us-france-privacy/france-builds-whatsapp-rival-due-to-surveillance-risk-idUSKBN1HN258"&gt;own encrypted messaging service&lt;/a&gt;. This will be built using Matrix – an open protocol designed for real-time communication. Indeed, the Privacy Policy lays out that the company “may collect, use, preserve, and share your information if we have a good-faith belief that it is reasonably necessary to respond pursuant to applicable law or regulations, to legal process, or to government requests.”&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The Signal Protocol is the undisputed gold standard of E2EE implementations. It is the integration with the surrounding functionality that WhatsApp offers which leads to vulnerabilities. After all, a chain is only as strong as its weakest link. Assuming that the attachments stored on the ‘blobs’ are in encrypted form, indecipherable to all but the intended recipients, this does not pose a privacy risk for the users from a technological point of view.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;However, it is easy lose sight of the fact that the Privacy Policy is a legally binding document and it specifically states that messages are not stored on the ‘blobs’ as a matter of routine. As a side note, WhatsApp’s Privacy Policy and Terms of Service are refreshing in their readability and lack of legalese.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As we were putting the final touches to this piece, &lt;a href="https://wabetainfo.com/whatsapp-allows-to-redownload-deleted-media/#more-2781"&gt;news from &lt;i&gt;WABetaInfo&lt;/i&gt;&lt;/a&gt;, a well-reputed source of information on WhatsApp features, has broken that newer updates of WhatsApp for Android are permitting users to re-download media deleted up to three months back. WhatsApp cannot possibly achieve this without storing the media in the ‘blobs,’ or in other words, in violation of its Privacy Policy.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As the aphorism goes: “When the service is free, you are the product.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp'&gt;https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Sunil Abraham</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2018-04-23T16:45:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush">
    <title>What’s In a Name? — DNS Singularity of ICANN and The Gold Rush</title>
    <link>https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush</link>
    <description>
        &lt;b&gt;March 2013 being the 28th birthday of the first ever registered Internet domain as well as the exigent launch of the Trademark Clearing House disguised as a milestone in rights protection by the Internet Corporation for Assigned Names and Numbers (ICANN) for it’s new gTLD program, Sharath Chandra Ram, dissects the transitory role of ICANN from being a technical outfit to the Boardroom Big Brother of Internet Governance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="http://trademark-clearinghouse.com/"&gt;Click to read&lt;/a&gt; more about the &lt;b&gt;Trademark Clearing House&lt;/b&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As a non-profit organization, established in agreement with the US Department of Commerce in 1998, the current arrangement of ICANN has come under serious questions in recent years, with the United Nations wanting the ITU to oversee Internet Governance while Europe seeking more public participation in the decision making process that currently comprises a majority of private stakeholders as ICANN board members with vested interests. In this post we shall look at a few instances that give room for thought about the regulatory powers and methods adopted by ICANN as well as reparatory measures taken to reaffirm it’s image as an able governing body amidst disputes over trademarks and fair competition that might actually call for a wider and objective inclusion in future. An outline of functional and structural arrangements of ICANN maybe found at the &lt;a class="external-link" href="http://goo.gl/FijE7"&gt;CIS Knowledge Repository page&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Business Model&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Earlier this month, (March 15, 2013) was the 28&lt;sup&gt;th&lt;/sup&gt; birthday of &lt;a href="http://www.symbolics.com"&gt;symbolics.com&lt;/a&gt;, the first ever domain name registered in 1985 through the formal ICANN process. (&lt;a class="external-link" href="http://www.nordu.net/ndnweb/home.html"&gt;nordu.net&lt;/a&gt; being the first domain name created by the registry on January 1, 1985 for the first  root server, nic.nordu.net) Symbolics, that spun-off the MIT AI Lab and specialized in building workstations running LISP finally sold the domain for an undisclosed amount to XY.com, an Internet investment firm that has been proudly boasting about their acquired relic for over three years now. The golden days of fancy one word domain name resale at exorbitant prices are over, as Google’s page ranking crawler now really looks at unique content and backlinks. Nevertheless, those with the same archaic view of a real estate agent still believe that a good domain name does have a high ROI and have managed to find naïve takers who will offer ridiculous amounts. One of many such examples is the plain looking &lt;a href="http://www.business.com"&gt;www.business.com&lt;/a&gt; that was bought initially for $1,50,000 and changed hands twice from $7.5 million to an absurd $345 million of R.H. Donnelley Inc., that soon filed for bankruptcy!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The top level domain market however, is consistently lucrative. A TLD registry on an average receives $5 - $7 per domain registered under it. So the .COM registry run by VeriSign which, as of 2013 has over a 100 million registered domains, receives a revenue of $500 to $700 million per year of which a fraction is paid to ICANN periodically on a per-registration or per-renewal basis. Competing registrars and registries across TLDs, their revenue generation practices as well as the application process for new TLDs gradually began to be regulated by ICANN in mysterious ways, as we will see in the following legal case studies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;VeriSign vs. ICANN&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;VeriSign began to operate the .COM and .NET TLD after taking over Network Solutions Inc. and entering into a contractual agreement with ICANN in 2001. Let’s take a look at some methods used by VeriSign to garner internet traffic and registrant revenue, that were clamped down by the ICANN, which resulted in a lawsuit by plaintiff VeriSign claiming prevention of fair competition and revenue by impeding innovation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Clamping of Site Finder &amp;amp; WLS&lt;/i&gt;: In September 2003, VeriSign introduced a Wild Card DNS Service called Site Finder for all .com and .net domains. This meant that any user trying to access a non-existent domain name no longer received the 404 Error but were instead redirected to the VeriSign website with adverts and links to affiliate registrars. Often a result of a misspelled domain, in ICANN’s view, the redirection by VeriSign amounted to typo squatting internet users as within a month VeriSign’s traffic rose dramatically moving it to the top 20 most visited websites on the web. As seen below in this archived image of Alexa’s 2003 traffic statistic (Courtesy: &lt;a class="external-link" href="http://cyber.law.harvard.edu/"&gt;cyber.law.harvard.edu&lt;/a&gt;).&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_DailyTraffic.png" alt="Daily Traffic" class="image-inline" title="Daily Traffic" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Shortly, in October 2003, ICANN issued a suspension ultimatum pointing Site Finder in violation of the 2001 .Com agreement. This was not the first time ICANN clamped down on VeriSign’s ‘profiteering’ methods. In 2001, ICANN prevented VeriSign’s WLS (Wait Listing Service) that allowed a registrant (through selected participating affiliate registrars of VeriSign) to apply to register an already registered domain in the event that the registration is deleted – a nifty scheme considering the fact that about 25000 domains are deleted everyday!&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Remarks and Submissions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The long drawn case of VeriSign Vs. ICANN ended on a reconciliatory note, with ICANN bringing the Site Finder service to a halt at the cost of VeriSign walking away happier with a free 5 year extension on the .COM domain (2007 extended to 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the ingenious Site Finder service did pose a huge problem to spam filters, both the WLS and yet another service that VeriSign launched to allow registration of non-English language SLDs were also met with a cringe by ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;However looking closer, one may realize that the act of ICANN permitting a DNS root redirect service such as Site Finder for all TLD operators (with an acceptable template that also carried information about the 404 error besides other marketing options) meant the first step towards paving the way towards a plausible scenario of multiple competing DNS roots across TLDs being able to interact with each other  — a system often argued by network theorists to be the most efficient and competitive model that would reduce the disjoint between the demand and supply of TLDs in a decentralized infrastructure, and that definitely was not in the best interest of ICANN’s monopolistic plan. Hence, this could be seen as a move by ICANN to nip the Site Finder bud while still young&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, as brought to public notice in more than one instance (name.Space Vs. ICANN, IOD Vs. ICANN), the vested interests of ICANN board members has come under glaring light. &lt;b&gt;Can the ICANN leadership consisting of members from the very same domain name business industry be able to objectively deal with competing registry services and legal issues?&lt;/b&gt; Conspicuous targets have been chairperson Steve Crocker who owns a consulting firm Shinkuro, whose subtle investor is infact AFILIAS INC which runs the .INFO and .MOBI TLDs, provides backend services to numerous TLDs (.ORG, .ASIA, .AERO (aviation)), has applied for a further 31 new TLDs and has it’s CTO Ram Mohan on the Board of Directors of ICANN. Also ICANN Vice Chariman, Bruce Tonkin is Senior Executive at Australia’s largest domain name provider Melbourne IT, and Peter Thrush former chairman of the ICANN Board of Directors is Executive Chairman of Top Level Domain Holdings,Inc which filed 92 gTLD applications in 2012.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Trademark Protection and Domain Names&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Image Online Design (IOD) is a company that since 1996 has been providing Internet registry services using the trademark .WEB (trademark #3,177,334 including computer accessories) registered with the US Patents and Trademarks Office (USPTO).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s registry services however, were not through the primary DNS root server maintained by ICANN, but through an alternate DNS root that required prospective users to manually make changes in their browser settings in order to resolve .WEB domains registered through IOD. Despite not running the primary DNS root server for. WEB, by the year 2000 IOD had acquired about 20,000 registered .WEB customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The beacon of ‘hope’ arrived upon IOD in mid-2000 as ICANN (on advise of supporting organization GNSO) opened a call for proposals for registrations of new TLDs, with a non-refundable deposit of $50,000 for an application to be considered. By then the importance of the .WEB TLD for e-commerce was well known amongst ICANN board members with Louis Touton lobbying for his preferred applicant AFILIAS INC to be given the .WEB TLD, with others raising concerns about IOD’s preregistration of .WEB domains. One of the founding fathers of the internet, Vinton Cerf, the then Chairman of ICANN took a benevolent stance-- &lt;i&gt;"I'm still interested in IOD," he repeated over Touton's objections. "They've worked with .WEB for some time. To assign that to someone else given that they're actually functioning makes me uneasy," he said, prompting board member Linda Wilson to chime in, "I agree with Vint."&lt;/i&gt; (&lt;a href="http://goo.gl/d1v6X"&gt;http://goo.gl/d1v6X&lt;/a&gt; , &lt;a href="http://goo.gl/eV9Jd"&gt;http://goo.gl/eV9Jd&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally amidst all the contention, no one was offered the .WEB domain and ICANN announced that all applications not selected will remain pending and those who submitted will have the option of being re-considered when additional TLD selections are made in future. And the future being, 2012, when ICANN invited a new round of TLD applicants, this time with the non-refundable deposit of whopping $185,000 for a single application (1 TLD/application as opposed to the $50,000 in the year 2000 that allowed multiple TLD requests within the same application) to be considered. While 7 new applicants for the .WEB TLD registered their interest, IOD considered their application to be still pending and did not join the new pool that included AFILIAS INC. and GOOGLE.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The litigation of IOD Vs ICANN ended in Feb 2013, with IOD claiming weak causes of action under “Trademark Infringement” and “Breach of Contract” &amp;amp;“Fair Dealing” hinging on the fact that the initial $50,000 application was still pending and never was officially rejected by ICANN. Further, there was not enough room to make a valid trademark infringement, as there was no substantial room for consumer confusion in the .WEB case.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Remarks and Submissions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The IOD Vs. ICANN case not only increased concerns globally, over the uncertainty associated with the ICANN application process for generic TLDs along with questions regarding the objectivity of its board members, but at the same time has alerted ICANN to take the necessary big sister steps to ensure that it’s well in the game.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fact of the matter is that the USPTO does not provide trademark protection services for the Top level Domain industry citing the reason that TLDs trademarks do not provide a distinct service mark that can identify or differentiate the service of an applicant from others, and further cannot be used to ascertain the source of an applicant’s services.  This view is flawed, as by looking at a TLD, say BBC.com, an informed person can easily say that VeriSign INC manages the service of directing a user to a correct location on the .COM registry. With introduction of new gTLDs, perhaps BBC would shift it’s content to BBC.news, where the source may be an abstracted Registrar and the nature of service being quite evident. And to those registered trademarks, especially those that shall result in substantial brand confusion to the customer if infringed, granting a TLD like .ibm or .bbc may well be granted to the owner of the trademark who may then outsource registry services to a service provider. This shall invert the current model by relegating the role of a TLD registry holder to that of a contracted service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;So the question is, should have the US Department of Commerce, who contracted ICANN in the first place, mediated with USPTO to place the business of a registrar on par with other trades and businesses, and modify it’s trademark infringement policies? And more importantly, will ICANN view this as introducing yet another key stakeholder to the gTLD assignment process?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The answer to the latter is already clear as ICANN being in the top of it’s game decided to take matters into its own hands and on March 26, 2013) launched&lt;/b&gt; &lt;a href="http://trademark-clearinghouse.com/"&gt;&lt;b&gt;http://trademark-clearinghouse.com/&lt;/b&gt;&lt;/a&gt;&lt;b&gt; with a new set of guidelines for accepted trademarks and a mechanism that allows trademark holders to submit their application to a central repository.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Accepted trademark holders shall be given priority to register gTLDs during the ‘sunrise’ period. Deloitte Enterprise Risk Services have been assigned the responsibility of evaluating submitted trademarks while IBM shall maintain the actual database of trademarks by the later half of 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tip of the iceberg is well in scope of view. ICANN46 is currently being hosted in Beijing, at the China Internet Network Information Centre (CINIC) from April 7 to 11, 2013 while hopefully parallel discussions will happen on all other global forums to hopefully re-consider a future of multiple competing DNS root servers towards healthy competition that is decentralized.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt; Key References&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://www.icann.org/en/news/litigation"&gt;http://www.icann.org/en/news/litigation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cyber.law.harvard.edu/tlds/"&gt;http://cyber.law.harvard.edu/tlds/&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Lynn, S. [2001] “Discussion Draft: A Unique, Authoritative Root for the DNS” Internet Corporation for Assigned Names and Numbers, 28 May, 2001.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Internet Architecture Board [2000] “IAB Technical Comment on the Unique DNS Root.” RFC 2826, Internet Society, May 2000.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush'&gt;https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sharath</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-03-31T05:35:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomber-quint-may-19-2017-aayush-ailawadi-whats-hard-to-digest-about-the-zomato-hacking">
    <title>What’s Hard To Digest About The Zomato Hacking</title>
    <link>https://cis-india.org/internet-governance/news/bloomber-quint-may-19-2017-aayush-ailawadi-whats-hard-to-digest-about-the-zomato-hacking</link>
    <description>
        &lt;b&gt;Yet another day, yet another major security breach. But, this time it’s not a presidential candidate in the U.S. or the U.K.’s National Health Service. Instead. it’s Zomato, the popular Indian online food delivery and restaurant search service.&lt;/b&gt;
        &lt;div class="story__element__wrapper" style="text-align: justify; "&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;The blog post by Aayush Ailawadi was published by &lt;a class="external-link" href="https://www.bloombergquint.com/technology/2017/05/18/whats-hard-to-digest-about-the-zomato-hacking"&gt;Bloomberg Quint&lt;/a&gt; on May 19, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The company disclosed that data from 17 million user accounts was stolen in a security breach. It said in &lt;a href="http://blog.zomato.com/post/160791675411/security-notice" target="_blank"&gt;its blog&lt;/a&gt; that no financial details were at risk and only user IDs, usernames,  names, email addresses and password hashes had been compromised.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper" style="text-align: justify; "&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;Throughout the course of the day, the company kept updating its  blog post and offered different sets of advice to its users. In an  earlier post, it only recommended changing one’s password on other sites  if you are “paranoid about security like us”. Later, that post  mentioned that the passwords were “salted” and hence had an extra layer  of security but it still “strongly advises” customers to change  passwords.&lt;/p&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;In an emailed response, the company explained to BloombergQuint,  “We made our disclosure very early, soon after we discovered that it  happened. We wanted to be proactive in communicating to our users. As we  found more details about the leak, we updated the information”&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;But, that wasn’t the only problem. The data was put up on the  dark web for sale by the hacker, and the seller was apparently charging  0.5521 bitcoins, or $1001.45, for the data. According to the post, the  passwords were stored by Zomato using MD5 encryption, which according to  security experts is antiquated and unsuitable for password encryption.&lt;/p&gt;
&lt;div class="__container"&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;Late on Thursday night, the story took an interesting turn when the company updated &lt;a href="http://blog.zomato.com/post/160807042556/security-notice-update" target="_blank"&gt;its blog post yet again&lt;/a&gt;.  It said that it had gotten in touch with the hacker who was selling the  data on the dark web and that apparently the hacker had been very  cooperative and helpful. “He/she wanted us to acknowledge security  vulnerabilities in our system and work with the ethical hacker community  to plug the gaps. His/her key request was that we run a healthy bug  bounty program for security researchers,” the company said.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;Usually, when hackers around the world attack with ransomware,  they demand a massive amount of bitcoins as ransom. But, in this case  the company claims that all the hacker wants is the assurance that the  company will introduce a bug bounty program on Hackerone soon. In  return, the hacker has agreed to destroy all copies of the stolen data  and take the data off the dark web marketplace.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="card-block-qsection-technology card"&gt;
&lt;div class="__container"&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;But, while it may seem like the storm has passed for Zomato,  cybersecurity experts like Pranesh Prakash at the Centre for Internet  &amp;amp; Society believe that a lot more could have been done by the  company in such a case.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;h3&gt;&lt;b&gt;Disclose To Confuse?&lt;/b&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;Concern #1: Prakash feels that Zomato got it all wrong by issuing  multiple disclosures and not addressing the problem at hand, which was  to clearly explain what happened and immediately request customers to  change similar passwords on other websites.&lt;/p&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;h3&gt;&lt;b&gt;What’s So Scary About The Zomato Hacking?&lt;/b&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;Concern #2: BloombergQuint reached out to Zomato to confirm  whether the passwords were encrypted with “MD5”, a hashing algorithm  that Prakash and other Twitter users who accessed the seller’s page on  the dark web believe was used by the company. But, the tech company  didn’t respond to that specific question.&lt;/p&gt;
&lt;p&gt;What’s worse is that  Prakash adds that not only is this algorithm antiquated but it is also  highly unsuitable for password encryption, as it can be cracked quickly.&lt;/p&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;h3&gt;&lt;b&gt;Genuine Disclosures Vs False Promises&lt;/b&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;Concern #3: Prakash suspects that the company wasn’t honest and  forthright with its users during this episode. According to him, the  company could learn a thing or two about honest disclosures from  companies like CloudFlare and LastPass, which fell victim to similar  attacks in the past year.&lt;/p&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;h3&gt;&lt;b&gt;Where’s My Privacy And Security?&lt;/b&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="story__element__wrapper"&gt;
&lt;div class="story__element__text story__element"&gt;
&lt;div class="story-element-"&gt;
&lt;p&gt;Concern #4: According to Prakash, it’s not just about privacy,  but also one’s security that has been compromised in this instance. He  says that the Zomato hack is like a reminder that an odd section in the  Information Technology Act is not sufficient when it comes to data  protection. Instead, India needs a robust data protection law where bad  security practices can actually be prosecuted and companies can be  penalised if they don’t follow standard and reasonable security  practices.&lt;/p&gt;
&lt;p&gt;Zomato also told BloombergQuint that it has understood how the breach  happened but couldn’t share exact details at the moment. The company  said, “Our team is working to make sure we have the vulnerability  patched. All we can say right now is that it started with a password  leak on some other site. We will share more details on our blog over the  next few days.”&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomber-quint-may-19-2017-aayush-ailawadi-whats-hard-to-digest-about-the-zomato-hacking'&gt;https://cis-india.org/internet-governance/news/bloomber-quint-may-19-2017-aayush-ailawadi-whats-hard-to-digest-about-the-zomato-hacking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T09:22:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar">
    <title>What You Need To Worry About Before Linking Your Mobile Number With Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar</link>
    <description>
        &lt;b&gt;As part of the directive issued by the Department of Telecommunications (DoT) dated March 23, 2017, major telecom service providers have issued a deadline of February 6, 2018, for linking mobile numbers with Aadhaar as part of the E-KYC verification.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Roopa Raju and Shekhar Rai was published in &lt;a class="external-link" href="https://www.youthkiawaaz.com/2017/11/linking-aadhar-with-mobile-number-pros-and-cons/"&gt;Youth Ki Awaaz&lt;/a&gt; on November 8, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The landmark case referenced by the DoT in the circular was the order  issued by the Supreme Court on February 6, 2017, delivered by Justice  JS Khehar (the erstwhile Chief Justice of India) in the case of &lt;a href="https://thewire.in/109330/aadhaar-phone-legal-battle/" rel="noopener" target="_blank"&gt;Lokniti Foundation vs Union of India&lt;/a&gt;.  The petitioner &lt;a href="http://supremecourtofindia.nic.in/jonew/courtnic/rop/2016/23429/rop_885627.pdf" rel="noopener" target="_blank"&gt;contended&lt;/a&gt; that terrorists, criminals and anti-social elements frequently used SIM  cards to commit atrocious, organised and unorganised crimes across the  country. The petition called for &lt;a href="http://supremecourtofindia.nic.in/jonew/courtnic/rop/2016/23429/rop_885627.pdf" rel="noopener" target="_blank"&gt;ensuring 100% verification&lt;/a&gt; on the identity of telecom service subscribers in public interest under &lt;a href="https://indiankanoon.org/doc/981147/" rel="noopener" target="_blank"&gt;Article 32&lt;/a&gt; of the Constitution of India. The PIL added that unverified SIM cards  pose a serious threat to the country’s security as they are routinely  used  in criminal and terrorist activities, thereby affecting a  citizen’s right (as ensured under &lt;a href="https://indiankanoon.org/doc/1199182/" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt; of the Constitution). As per the CAG report tabled at the Parliament in 2014, the identities of &lt;a href="https://timesofindia.indiatimes.com/india/Identities-of-4-59-crore-mobile-users-still-unverified-CAG/articleshow/39572824.cms" rel="noopener" target="_blank"&gt;4.59 crore mobile users&lt;/a&gt; still remained unverified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 21 of the Constitution of India, 1949, &lt;a href="https://indiankanoon.org/doc/1199182/" rel="noopener" target="_blank"&gt;states&lt;/a&gt; that – &lt;i&gt;“No person shall be deprived of his life or personal liberty except according to procedure established by law.”&lt;/i&gt; While there is a threat to the common public interest through increased  acts of terrorism and atrocities due to unverified SIM cards, the  safety of information provided and linked to Aadhaar are increasingly  being questioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a study dated May 1, 2017, published by the Centre for Internet  and Society (CIS), a Bangalore-based organisation, it was observed that  data of &lt;a href="http://indiatoday.intoday.in/technology/story/aadhaar-data-of-130-millions-bank-account-details-leaked-from-govt-websites-report/1/943632.html" rel="noopener" target="_blank"&gt;over 130 million&lt;/a&gt; Aadhaar card-holders were leaked from just four government portals  dealing with the National Social Assistance programme, the National  Rural Employment Guarantee Scheme, the Chandranna Bima Scheme and the  Daily Online Payment Reports of NREGA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On October 25, 2017, the chief minister of West Bengal, Mamata Banerjee, also &lt;a href="https://thewire.in/190932/west-bengal-mamata-banerjee-bjp-aadhaar/" rel="noopener" target="_blank"&gt;strongly opposed&lt;/a&gt; the government’s plan to link mobile numbers with Aadhaar cards. She  said that it was a breach of privacy and that the ruling government was  intruding upon the citizen’s right to personal freedom. However, the  Supreme Court &lt;a href="https://www.ndtv.com/india-news/aadhaar-petitions-in-supreme-court-today-including-bengals-10-points-1768703" rel="noopener" target="_blank"&gt;questioned&lt;/a&gt; the state government’s right to challenge the Centre and asked her to file a plea with the court in her individual capacity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the data published by Telecom Regulatory Authority of India  (TRAI) on September 14, 2017, India’s telecom subscriber base &lt;a href="http://indianexpress.com/article/technology/tech-news-technology/telecom-subscriber-base-dips-marginally-to-121-crore/" rel="noopener" target="_blank"&gt;dipped by 1.3 lakh&lt;/a&gt; to 121.07 crore in July 2017. Moreover, only three operators – Reliance  Jio, Bharti Airtel and the state-run BSNL – reported additions to their  subscriber base.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Month&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Telephone subscriber base&lt;br /&gt; (in million)&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Growth rate&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Mar-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1194.58&lt;/td&gt;
&lt;td&gt;–&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Apr-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1198.89&lt;/td&gt;
&lt;td&gt;0.36%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;May-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1204.98&lt;/td&gt;
&lt;td&gt;0.51%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Jun-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1210.84&lt;/td&gt;
&lt;td&gt;0.49%&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Jul-17&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;1210.71&lt;/td&gt;
&lt;td&gt;-0.01%&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(Source: &lt;a href="http://www.trai.gov.in/release-publication/reports/telecom-subscriptions-reports" rel="noopener" target="_blank"&gt;TRAI monthly subscription data&lt;/a&gt;)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dip in the subscriber count for various telecom operators can be  accredited to the phasing of registration of SIM cards through E-KYC for  new mobile numbers. While there is a the possibility of addition of  genuine subscribers in the following months, the direct subscriber  acquisition cost (DSAC) has been significantly reduced owing to the  overall reduction in subscriber addition (assuming exclusion of sunk  cost).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to the DoT directive, telecom service providers relied heavily  on the documents provided by the subscribers for SIM registration. The  two-fold impact of this was the delay in SIM activation, owing to the  transfer of documents from the retailer to the distributor to the  company and the possibility of documents not matching with the usage  timeline of usage. Additionally, tracking the ever-changing retailers  was difficult for the service providers – and with the subscriber  documents being collected and stored at one location by the service  providers, verification of dummy subscribers was difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the introduction of Aadhaar linkage for mobile numbers,  subscribers are held accountable for its usage, thereby tagging  responsibility for any acts arising as a result. Savings from the  digitisation of documents and paper should also be considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, an increased number of job losses is possible, owing to the  ‘optimisation’ of the process by way of document verification, servicing  costs and reliance on third parties (to name just a few). Increased  compliance costs are also an issue of concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The key question that looms prominently with the approaching deadline  is how secure public data will be, given that it may possibly be linked  with bank account numbers and income tax returns. With retailers using  fingerprints of the subscribers to validate Aadhaar numbers with the  mobile numbers at the time of SIM registration, there is an increased  risk of exposure to identity theft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government is increasingly trying to bring in a seamless  process to assimilate data for transparency in analysing consumer  patterns, it is suggested that they also allocate funds for enhancing  the cyber-security of the data consolidated from this directive.  Furthermore, cyber security regulations can be strengthened to avoid  data leakages to third party organisations. Severe penalties should also  be implemented to ensure robust compliance to these measures.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar'&gt;https://cis-india.org/internet-governance/news/youth-ki-awaaz-roopa-sudarshan-what-you-need-to-worry-about-before-linking-your-mobile-number-with-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T05:55:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-abhijit-ahaskar-february-12-2019-what-the-governments-draft-it-intermediary-guidelines-say">
    <title>What the government's draft IT intermediary guidelines say</title>
    <link>https://cis-india.org/internet-governance/news/livemint-abhijit-ahaskar-february-12-2019-what-the-governments-draft-it-intermediary-guidelines-say</link>
    <description>
        &lt;b&gt;Intermediaries will have to hand over to government agencies any information within 72 hours.
Intermediaries will have to use automated tools to trace the person posting unlawful content.
&lt;/b&gt;
        &lt;p&gt;The article by Abhijit Ahaskar was &lt;a class="external-link" href="https://www.livemint.com/technology/tech-news/what-the-government-s-draft-it-intermediary-guidelines-say-1549959448471.html"&gt;published in Livemint&lt;/a&gt; on February 12, 2019. CIS research was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;With voices for regulating tech companies getting stronger in the wake of growing incidence of fake news being circulated through social media platforms, the Ministry of Electronics and Information Technology (MEITY) of India has decided to re-examine the Information Technology (IT) Intermediary Guidelines, 2011, under the IT Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Setting the wheel in motion, the ministry proposed a draft called Information Technology Intermediaries Guidelines (Amendment), 2018, and released the recommendations on its website for public comments in December 2018. The first round of comments ended on 31 January, 2019 and was made public last week. The second round of comments and counter-comments will close on 14 February, 2019.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What the draft proposes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The term intermediary refers to all tech companies that are hosting user data or are providing users with a platform for communication. This brings all internet, social media, telecom companies in its ambit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft amendment proposes that intermediaries will have to hand over to governmentagencies any information that might be related to cyber security, national security and related with the investigation, prosecution or prevention of an offence, within 72 hours.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They will have to take down or disable content considered defamatory or against national security under Article 19 (2) of the Constitution within 24 hours on being notified by the appropriate government or its agency in addition to using automated tools to identify, remove and trace the origin of such content. Intermediaries with over 55 lakh users will be required to have a permanent registered office with physical address and a senior official who would be available for coordination with law enforcement agencies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Concerns over the draft guidelines&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Microsoft notes that the problem MEITY is trying to address is of fake news. “Existing regulations provide enough powers to work with social media platforms. There may be a case to bring out additional guidelines for certain types of intermediaries like social media platforms. There may also be a case to strengthen other laws which make the punishment of fake news and misuse of social media stringent. The focus should be on the perpetrators of the crime rather than the intermediaries," it has said in response to the guidelines. Regarding deployment of tools to proactively identify and remove unlawful content, Microsoft cautions that intermediaries will have to monitor all content passing through their systems for this, which is a violation of their individual privacy and right to freedom of expression. It will also be technically impractical due to the high cost of deploying such tech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Broadband India Forum, one of the grounds for the Supreme Court striking down Section 66A of the IT Act, 2000, in Shreya Singhal vs Union of India was the vagueness of the terms used in the provision, such as offensive, menacing and dangerous, which invaded the right of free speech. However, words with a similar level of vagueness, such as grossly harmful, harassing and hateful exist in the proposed draft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) pointed out that existing laws provide enough teeth to the Indian agencies to act. For instance, Section 505 of the IPC has provisions to penalise disinformation while Sections 290 and 153A of the IPC have provisions if the disinformation is being used to create communal strife. CIS has also flagged the scope of the term unlawful as it is not clearly defined, leaving room for broad interpretation. On the traceability clause, CIS draws attention to the lack of clarity on whether it applies on just social media platforms and messaging services or all intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This can be a bit of problem for ISPs which may have no access to contents of an encrypted communication sent and received on its network.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Threat to privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The traceability clause, which requires intermediaries to use automated tools to trace the person posting unlawful content, came in for a lot of criticism. While the Ministry in an official tweet in January 2018 clarified that it only requires intermediaries to trace the origin of messages which lead to unlawful activities without breaking encryption, experts believe it isn’t possible without lowering encryption standards or building a backdoor to access encrypted communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amnesty International slammed the clause, arguing, “While governments can legitimately use electronic surveillance to protect people from crime, forcing companies to weaken encryption will affect all users’ online privacy. Such measures would be inherently disproportionate, and therefore impermissible under international human rights law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Wipro in its response rues such a traceability requirement could lead to breaking of encryption on apps such as WhatsApp and Signal, and this will be a major threat to the privacy rights of citizens as enshrined in the Puttaswamy judgment of the Supreme Court.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Undue burden on small companies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Commenting on the 72 hours timeline for furnishing user data, the Internet Freedom Foundation says that such short deadline for compliance can only be fulfilled by large social media platforms. This might make smaller companies over compliant to government demands for immunity resulting in a total disregard for user privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regarding taking down of unlawful content, technology policy researchers form National Institute of Public Finance &amp;amp; Policy (NIPFP) caution that overzealous implementation along with over reliance on technological tools for the detection of unlawful content would lead to the curtailment of online speech. They pointed out the instance where Facebook had removed posts documenting the ethnic cleansing of Rohingyas as it had classified Rohingya organisations as dangerous militant groups.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-abhijit-ahaskar-february-12-2019-what-the-governments-draft-it-intermediary-guidelines-say'&gt;https://cis-india.org/internet-governance/news/livemint-abhijit-ahaskar-february-12-2019-what-the-governments-draft-it-intermediary-guidelines-say&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-13T00:31:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-march-25-2015-what-the-experts-said-on-live-chat">
    <title>What the experts said on live chat</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-march-25-2015-what-the-experts-said-on-live-chat</link>
    <description>
        &lt;b&gt;Three eminent panellists shared their views and answered questions from readers on the Supreme Court verdict striking down Section 66 A of the IT Act that allowed the arrest of people posting “offensive content” on the Internet, in a live chat hosted by The Hindu. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.thehindu.com/news/national/what-the-experts-said-on-live-chat/article7029320.ece"&gt;Hindu&lt;/a&gt; on March 25, 2015. Geetha Hariharan was one of the panelists.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Does this now mean anything goes on the Internet, asked one reader.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“No, the standard penal laws — against defamation, hate speech (S.  153A), religious incitement (S. 295A) — continue to apply,” said Gautam  Bhatia, a practicing lawyer and author of forthcoming book “Offend,  shock or disturb: Free Speech under the Constitution.” The argument that  the Internet needed separate rules when it came to the content of  speech was what was rejected by the Court, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What was the rationale for the Court upholding Section 69 A, allowing the blocking of websites, asked another.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“One wishes that the court had paid as much attention to the blocking  orders as they did to 66A,” said Lawrence Liang, lawyer and researcher  at Alternative Law Forum working on free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Geetha Hariharan, a Programme Officer at Centre for Internet and  Society, focusing on Internet governance and freedom of expression, was  the third expert on the panel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Click &lt;a href="http://www.thehindu.com/news/national/live-chat-hope-for-free-speech/article7028037.ece?homepage=true&amp;amp;theme=true"&gt;here&lt;/a&gt; to read the full transcript of the chat&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-march-25-2015-what-the-experts-said-on-live-chat'&gt;https://cis-india.org/internet-governance/news/the-hindu-march-25-2015-what-the-experts-said-on-live-chat&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-26T02:35:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals">
    <title>What privacy? 13 crore Aadhaar numbers accessible on government portals</title>
    <link>https://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals</link>
    <description>
        &lt;b&gt;At least 13 crore Aadhaar numbers and 10 crore bank account numbers are readily accessible on government portals, a report claims.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Anusha Ravi was &lt;a href="http://www.oneindia.com/india/what-privacy-13-crore-aadhaar-numbers-accessible-on-government-portals-2422904.html"&gt;published         in Oneindia&lt;/a&gt; on May 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The centre for internet and society, in       its report, has claimed that Aadhaar numbers with sensitive       personal financial information were publicly available on four       government portals built to oversee &lt;a href="http://www.oneindia.com/topic/welfare" title="Topic: welfare schemes"&gt;welfare schemes&lt;/a&gt;. The       report said that the government portals made it easy to access       sensitive details, despite it being &lt;a href="http://www.oneindia.com/topic/illegal" title="Topic: illegal"&gt;illegal&lt;/a&gt;.     "It is extremely irresponsible on the part of       the UIDAI [Unique Identification Authority of India], the sole       governing body for this massive project, to turn a blind eye to       the lack of standards prescribed for how other bodies shall deal       with such data, such cases of massive public disclosures of this       data, and the myriad ways in which it may be used for mischief,"       said Amber Sinha and Srinivas Kodali, the authors of the report.&lt;br /&gt; &lt;br /&gt; Apart from accessing a person's details, the portals made it         possible for anyone to get data on beneficiaries of welfare         schemes. In many cases, it included bank account numbers of         beneficiaries. The report suggests that close to 23 crore         Aadhaar number could have been leaked if most of the government         portals connected to direct benefit transfers used the 'same         negligent standards for storing data as the ones examined'.         "The document shows that the breaches are an indicator of         potentially irreversible privacy harm and the data could be used         for financial fraud," the authors said in the report. The report         was documented after authors studied the National Social         Assistance Programme, National Rural Employment Guarantee         Scheme, Andhra Pradesh government's Chandranna Bima Scheme and         Andhra Pradesh's Daily Online Payment Reports of NREGA.         &lt;br /&gt; &lt;br /&gt; The report said that sensitive personal identity information         such as Aadhaar number, caste, religion, address, photographs         and financial information were easily available with a few         clicks and suggested how poorly conceived these initiatives         were. The report highlights that it was illegal to make personal         data public and also refers to # #AadhaarLeaks, a campaign on         twitter aimed at exposing the loopholes in the Aadhaar system.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals'&gt;https://cis-india.org/internet-governance/news/one-india-may-2-2017-anusha-ravi-what-privacy-13-crore-aadhaar-numbers-accessible-on-governmental-portals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-03T14:39:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network">
    <title>What lurks beneath the Network </title>
    <link>https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network</link>
    <description>
        &lt;b&gt;There is a series of buzzwords that have become a naturalised part of discussions around digital social media—participation, collaboration, peer-2-peer, mobilisation, etc. Especially in the post Arab Spring world (and our own home-grown Anna Hazare spectacles), there is this increasing belief in the innate possibilities of social media as providing ways by which the world as we know it shall change for the better. Young people are getting on to the streets and demanding their rights to the future. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's column on the North East exodus and digital networks was published in &lt;a class="external-link" href="http://www.downtoearth.org.in/content/what-lurks-beneath-network"&gt;Down to Earth&lt;/a&gt; magazine on August 24, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Citizens are mobilising themselves to overthrow authoritarian governments. Socio-economically disadvantaged people, who have always been an alternative to the mainstream, are finding ways of expressing themselves through collaborative practices. Older boundaries of nation, region and body are quickly collapsing as we all become avatars of our biological selves, occupying futures that were once available only to science fiction heroes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To this list of very diverse phenomena, I want to add the recent tragic and alarming exodus of people from the north eastern states, from the city of Bengaluru, where I live. There might not be many connections between this state of fear which instigated thousands of people, fearing their safety and security, to leave Bengaluru and return home and the global spectacles of political change that I listed earlier. And yet, there is something about the digital networks, the social web and the ways in which they shape our information societies, that needs to be thought through. In the Arab Spring like events, which are events of global spectacle, there is a certain imagination of digital technologies and its circuits that gets overturned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These events challenge the idea that digital networks are always outward looking—connecting us to somebody and someplace ‘out there’ in a world that is quickly getting flat—and show how these networks actually create new local and specific communities around information production, consumption and sharing.  These networks that connect people in their information practices, often make themselves simultaneously ubiquitous and invisible. So that the interfaces that we operate through—laptops, cellphones and other portable computing devices—become such a part of our everyday life, that we stop noticing them. They are a natural element of our everyday mechanics of urban survival, and in their omnipresence, become invisible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This invisibility or naturalisation of the digital technologies, often make us forget the intricate and inextricable way in which they are woven into our basic survival strategies. Especially with the younger generation that has ‘grown up digital’, the interface, the gadget and the network is the default space that they turn to for their everyday needs. We develop intimate relationships with these technologised circuits, making them such a part of our quotidian existence that we often forget that these technologies are external to us. Which is why we come across articulations like, “I love my computer because my friends live in it,” or “I feel amputated when you take away my cell-phone”. These are ways in which we naturalise and internalise the digital technologies that we live in and live with. However, in times of crises, we suddenly realise the separation, as the technologies make themselves present, unable to sustain the new conditions of crises. It would be fruitful to see then that the eruption in our seamless connection with the digital technologies is a sign of an external crisis –something that we have seen in the Arab Spring or the Anna Hazare campaign, where these networks became visible to signal towards an external crisis. The emergence of networks into public view is a symptom that there is something that has gone wrong and so we see the separation of the digital ecosystem from its external reality and context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The unexpected visibility of the network indicates that the regular information ecologies have been disrupted, the contexts which support community interaction at the local level have been changed, and those changes need to be accounted for and addressed in order for the network to become the transparent infrastructure of new urban communities again. In many ways, it resonates with the science fiction logic of the Matrix Trilogy where, if you can see the matrix, it means that something has gone wrong in the fabric of reality and it needs to be fixed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The exodus of the north eastern people also needs to be examined in this context. In an immigrant city like Bengaluru, the sense of belonging and community is often deeply mediated by the digital ecologies of information sharing. Beneath the veneer of a global city that is to connect with the external world, there is also a huge network of local, specific and invisible practices that do not become a part of the global spectacle of digital technologies, and operate in a condition of relative invisibility. However, when the logic of a migrant city gets disrupted because the conditions of its work force get threatened, these networks go into an overdrive. They become gossip and rumour mills. They become visible and suddenly create conditions of fear, danger and crisis that were unexpected. And so, without a warning, over-night, a huge number of people, who were a part of these networks, decided to abandon their lives and head home, because the larger social, cultural and political threats transmitted through these local networks before they could become global spectacles that we could consume.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A large part of the people fleeing the city had already crowded the trains and left their lives behind, before any attempt at regulation or control could be made. All kinds of post-facto theories about the real or perceived nature of the threat, the actual cases of violence, and the conditions of life in the IT City have emerged since then. However, in all these theories is a recognition that the crisis which led to this phenomenon lingers on and cannot be addressed. There is no particular person to hold responsible. The few scattered incidents of attacks, violence or intimidation have been recognised as strategic and opportunistic interventions by local regressive groups. All in all, we have a condition where something drastic and dramatic has happened and there is no real or material person or group of people who can be blamed for it. And so, instead of addressing the crisis and the conditions which led to the exodus, we have committed an ellipsis, where we have made technology the scape-goat of our problems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And we have done this repeatedly in the history of technology and crises in India. In the early days, when the notorious Delhi Public School MMS clip that captured two under-age students in sexual activity, became hugely visible, instead of addressing the problem at hand, we eventually set up a committee to regulate the conditions of cultural production and distribution online. During the horrifying bomb-attacks in the trains in Mumbai, we tried to block Blogspot and curtail information online as if technology was the reason that these acts were made possible. Last year, Dr. Sibal’s attempts at establishing a pre-censorship regime on information on the social web, because he encountered material that was disrespectful to the Congress party leader Mrs. Gandhi, sought to regulate the web rather than look at the political discontent and dissent that was being established through those articulations. Because there was no way by which the local situation could be controlled or contained, technology became the only site of regulation, inspiring draconian measures that limit the volume of text messaging and try and censor the web for lingering traces of the information mill that catalysed and facilitated this exodus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a remarkable ellipsis where the actual problem – the conditions of life and safety in our global cities – is hidden under a perceived problem, which is the sudden visibility of a digital information ecosystem which was not apparent to us hitherto. And while there is no denying that at the level of tactics, for immediate fire-fighting this kind of regulation is important, nay, necessary, we also need to realise that at the level of strategy, these kinds of knee-jerk regulatory mechanisms are not a resolution of the problem. These laws and attempts at censorship are neither going to correct what has happened, nor are they going to be potent enough to curb such networked information sharing in the future. They are symbolic tactics that are trying to correct the crisis – the feeling of fear and danger – and in that, they do their job well in establishing some sense of control over the quickly collapsing world. However, we need to look beyond the visibility of this network, and realise that the crisis is not its emergence or its functioning but at something else that lurks behind the facade of the network.&lt;/p&gt;
&lt;p&gt;Nishant Shah is director (research), Centre for Internet and Society, Bengaluru&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network'&gt;https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-25T07:10:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/what-is-the-problem-with-2018ethical-ai2019-an-indian-perspective">
    <title>What is the problem with ‘Ethical AI’? An Indian Perspective</title>
    <link>https://cis-india.org/internet-governance/blog/what-is-the-problem-with-2018ethical-ai2019-an-indian-perspective</link>
    <description>
        &lt;b&gt;On 22 May 2019, the OECD member countries adopted the OECD Council Recommendation on Artificial Intelligence. The Principles, meant to provide an “ethical framework” for governing Artificial Intelligence (AI), were the first set of guidelines signed by multiple governments, including non-OECD members: Argentina, Brazil, Colombia, Costa Rica, Peru, and Romania. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindrajit Basu and Pranav M.B. was &lt;a class="external-link" href="https://cyberbrics.info/what-is-the-problem-with-ethical-ai-an-indian-perspective/"&gt;published by cyberBRICS&lt;/a&gt; on July 17, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This was followed by the &lt;a href="https://g20trade-digital.go.jp/dl/Ministerial_Statement_on_Trade_and_Digital_Economy.pdf" rel="noreferrer noopener" target="_blank"&gt;G20 adopted human-centred AI Principles&lt;/a&gt; on June 9th. These are the latest in a slew of (&lt;a href="https://clinic.cyber.harvard.edu/2019/06/07/introducing-the-principled-artificial-intelligence-project/" rel="noreferrer noopener" target="_blank"&gt;at least 32!&lt;/a&gt;) public, and private ‘Ethical AI’ initiatives that seek to use ethics to guide the development, deployment and use of AI in a variety of use cases. They were conceived as a response to a range of concerns around algorithmic decision-making, including discrimination, privacy, and transparency in the decision-making process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, a noteworthy recent document that attempts to address these concerns is the &lt;a href="https://niti.gov.in/writereaddata/files/document_publication/NationalStrategy-for-AI-Discussion-Paper.pdf" rel="noreferrer noopener" target="_blank"&gt;National Strategy for Artificial Intelligence&lt;/a&gt; published by the National Institution for Transforming India, also called &lt;em&gt;NITI Aayog&lt;/em&gt;, in June 2018. As the NITI Aayog Discussion paper acknowledges, India is the fastest growing economy with the second largest population in the world and has a significant stake in understanding and taking advantage of the AI revolution. For these reasons the goal pursued by the strategy is to establish the National Program on AI, with a view to guiding the research and development in new and emerging technologies, while addressing questions on ethics, privacy and security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While such initiatives and policy measures are critical to promulgating discourse and focussing awareness on the broad socio-economic impacts of AI, we fear that they are dangerously conflating tenets of existing legal principles and frameworks, such as human rights and constitutional law, with ethical principles – thereby diluting the scope of the former. While we agree that ethics and law can co-exist, ‘Ethical AI’ principles are often drafted in a manner that posits as voluntary positive obligations various actors have taken upon themselves as opposed to legal codes they necessarily have to comply with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To have optimal impact, ‘Ethical AI’ should serve as a decision-making framework only in specific instances when human rights and constitutional law do not provide a ready and available answer.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Vague and unactionable&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Conceptually, ‘Ethical AI’ is a vague set of principles that are often difficult to define objectively. In this perspective, academics like Brett Mittelstadt of the Oxford Internet Institute &lt;a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3391293" rel="noreferrer noopener" target="_blank"&gt;argues&lt;/a&gt; that unlike in the field of medicine – where ethics has been used to design a professional code, ethics in AI suffers from four core flaws. First, developers lack a common aim or fiduciary duty to a consumer, which in the case of medicine is the health and well-being of the patient. Their primary duty lies to the company or institution that pays their bills, which often prevents them from realizing the extent of the moral obligation they owe to the consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second is a lack of professional history which can help clarify the contours of well-defined norms of ‘good behaviour.’ In medicine, ethical principles can be applied to specific contexts by considering what similarly placed medical practitioners did in analogous past scenarios. Given the relative nascent emergence of AI solutions, similar professional codes are yet to develop.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third is the absence of workable methods or sustained discourse on how these principles may be translated into practice. Fourth, and we believe most importantly, in addition to ethical codes, medicine is governed by a robust and stringent legal framework and strict legal and accountability mechanisms, which are absent in the case of ‘Ethical AI’. This absence gives both developers and policy-makers large room for manoeuvre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, such focus on ethics may be a means of avoiding government regulation and the arm of the law. Indeed, due to its inherent flexibility and non-binding nature, ethics can be exploited as a piecemeal red herring solution to the problems posed by AI. Controllers of AI development are often profit-driven private entities, that gain reputational mileage by using the opportunity to extensively deliberate on broad ethical notions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the guise of meaningful ‘self-regulation’, several organisations publish internal ‘Ethical AI’ guidelines and principles, and &lt;a href="https://www.newstatesman.com/science-tech/technology/2019/06/how-big-tech-funds-debate-ai-ethics"&gt;fund ethics research&lt;/a&gt; across the globe. In doing so, they occlude the shackles of binding obligation and deflect from attempts at tangible regulation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Comparing Law to Ethics&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This is in contrast to the well-defined jurisprudence that human rights and constitutional law offer, which should serve as the edifice of data-driven decision making in any context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the table below, we try to explain this point by looking at how three core fundamental rights enshrined both in our constitution and human rights instruments across the globe-right to privacy, right to equality/right against discrimination and due process-find themselves captured in three different sets of ‘Ethical AI frameworks.’ One of these inter-governmental &lt;a href="https://www.oecd.org/going-digital/ai/principles/" rel="noreferrer noopener" target="_blank"&gt;(OECD)&lt;/a&gt;, one devised by a private sector actor (‘&lt;a href="https://ai.google/principles/" rel="noreferrer noopener" target="_blank"&gt;Google AI&lt;/a&gt;’) and one by our very own, &lt;a href="https://niti.gov.in/writereaddata/files/document_publication/NationalStrategy-for-AI-Discussion-Paper.pdf" rel="noreferrer noopener" target="_blank"&gt;NITI AAYOG.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cyberbrics.info/wp-content/uploads/2019/07/image.png" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the exception of certain principles,most ‘Ethical AI’ principles are loosely worded as ‘‘seek to avoid’, ‘give opportunity for’, or ‘encourage’. A notable exception is the NITI AAYOG’s approach to protecting privacy in the context of AI. The document explicitly recommends the establishment of a national data protection framework for data protection, sectoral regulations that apply to specific contexts with the consideration of international standards such as GDPR as benchmarks. However, it fails to reference available constitutional standards when it discusses bias or explainability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several similar legal rules that have been enshrined in legal provisions -outlined and elucidated through years of case law and academic discourse – can be utilised to underscore and guide AI principles. However, existing AI principles do not adequately articulate how the legal rule can actually be applied to various scenarios by multiple organisations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We do not need a new “Law of Artificial Intelligence” to regulate this space. Judge Frank Easterbrook’s famous 1996 proclamation on the &lt;a href="https://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?referer=&amp;amp;httpsredir=1&amp;amp;article=2147&amp;amp;context=journal_articles"&gt;‘Law of the Horse’&lt;/a&gt; through which he opposed the creation of a niche field of ‘cyberspace law’ comes to mind. He argued that a multitude of legal rules deal with ‘horses’, including the sale of horses, individuals kicked by horses, and with the licensing and racing of horses. Like with cyberspace, any attempt to arrive at a corpus of specialised ‘law of the horse’ would be shallow and ineffective.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of fidgeting around for the next shiny regulatory tool, industry, practitioners, civil society and policy makers need to get back to the drawing board and think about applying the rich corpus of existing jurisprudence to AI governance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What is the role for ‘Ethical AI?’&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;What role can ‘ethical AI’ then play in forging robust and equitable governance of Artificial Intelligence? As it does in all other societal avenues, ‘ethical AI’ should serve as a framework for making legitimate algorithmic decisions in instances where law might not have an answer. An example of such a scenario is the &lt;a href="https://globalnews.ca/news/4125382/google-pentagon-ai-project-maven/" rel="noreferrer noopener" target="_blank"&gt;Project Maven saga&lt;/a&gt; – where 3,000 Google employees signed a petition opposing Google’s involvement with a US Department of Defense project by claiming that Google should not be involved in “the business of war.” There is no law-international or domestic that suggests that Project Maven-which was designed to study battlefield imagery using AI, was illegal. However, the debate at Google proceeded on ethical grounds and on the application of the ‘Ethical AI’ principles to this present context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We realise the importance of social norms and mores in carving out any regulatory space. We also appreciate the role of ethics in framing these norms for responsible behaviour. However, discourse across civil society, academic, industry and government circles all across the globe needs to bring law back into the discussion as a framing device. Not doing so risks diluting the debate and potential progress to a set of broad, unactionable principles that can easily be manipulated for private gain at the cost of public welfare.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/what-is-the-problem-with-2018ethical-ai2019-an-indian-perspective'&gt;https://cis-india.org/internet-governance/blog/what-is-the-problem-with-2018ethical-ai2019-an-indian-perspective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu and Pranav M.B.</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-07-21T14:57:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-january-20-2014-what-is-net-neutrality-and-why-is-it-important">
    <title>What is net neutrality and why it is important</title>
    <link>https://cis-india.org/news/times-of-india-january-20-2014-what-is-net-neutrality-and-why-is-it-important</link>
    <description>
        &lt;b&gt;Internet is built around the idea of openness. It allows people to connect and exchange information freely, if the information or service is not illegal. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2014-01-20/internet/46373677_1_net-neutrality-web-service-web-users/2"&gt;published in the Times of India&lt;/a&gt; on January 20, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Much of this is because of the idea of net neutrality. If you like the current state of the internet, you should know about net neutrality. Many web users are aware of it. But if you are not, don't worry. We explain it here:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is net neutrality?&lt;/b&gt;&lt;br /&gt;&lt;a href="http://timesofindia.indiatimes.com/topic/Net-Neutrality"&gt;Net neutrality&lt;/a&gt; is an idea derived from how telephone lines have worked since the beginning of the 20th century. In case of a telephone line, you can dial any number and connect to it. It does not matter if you are calling from operator A to operator B. It doesn't matter if you are calling a restaurant or a drug dealer. The operators neither block the access to a number nor deliberately delay connection to a particular number, unless forced by the law. Most of the countries have rules that ask telecom operators to provide an unfiltered and unrestricted phone service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When the internet started to take off in 1980s and 1990s, there 	were no specific rules that asked that internet service providers 	(ISPs) should follow the same principle. But, mostly because telecom 	operators were also ISPs, they adhered to the same principle. This 	principle is known as net neutrality. An ISP does not control the 	traffic that passes its servers. When a web user connects to a 	website or web service, he or she gets the same speed. Data rate for 	Youtube videos and Facebook photos is theoretically same. Users can 	access any legal website or web service without any interference 	from an ISP.&lt;/p&gt;
&lt;p&gt;Some countries have rules that enforce net neutrality but most 	don't. Instead, the principle is followed because that is how it has 	always been. It is more of a norm than a law.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;How did net neutrality shape the internet?&lt;/b&gt;&lt;br /&gt;Net 	neutrality has shaped the internet in two fundamental ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One, web users are free to connect to whatever website or service 	they want. ISPs do not bother with what kind of content is flowing 	from their servers. This has allowed the internet to grow into a 	truly global network and has allowed people to freely express 	themselves. For example, you can criticize your ISP on a blog post 	and the ISP will not restrict access to that post for its other 	subscribers even though the post may harm its business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But more importantly, net neutrality has enabled a level playing 	field on the internet. To start a website, you don't need lot of 	money or connections. Just host your website and you are good to go. 	If your service is good, it will find favour with web users. Unlike 	the cable TV where you have to forge alliances with cable connection 	providers to make sure that your channel reaches viewers, on 	internet you don't have to talk to ISPs to put your website online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This has led to creation Google, Facebook, Twitter and countless 	other services. All of these services had very humble beginnings. 	They started as a basic websites with modest resources. But they 	succeeded because net neutrality allowed web users to access these 	websites in an easy and unhindered way.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What will happen if there is no net neutrality?&lt;/b&gt;&lt;br /&gt;If 	there is no net neutrality, ISPs will have the power (and 	inclination) to shape internet traffic so that they can derive extra 	benefit from it. For example, several ISPs believe that they should 	be allowed to charge companies for services like YouTube and Netflix 	because these services consume more bandwidth compared to a normal 	website. Basically, these ISPs want a share in the money that 	YouTube or Netflix make.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Without net neutrality, the internet as we know it will not 	exist. Instead of free access, there could be "package plans" 	for consumers. For example, if you pay Rs 500, you will only be able 	to access websites based in India. To access international websites, 	you may have to pay a more. Or maybe there can be different 	connection speed for different type of content, depending on how 	much you are paying for the service and what "add-on package" 	you have bought.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lack of net neutrality, will also spell doom for innovation on 	the web. It is possible that ISPs will charge web companies to 	enable faster access to their websites. Those who don't pay may see 	that their websites will open slowly. This means bigger companies 	like Google will be able to pay more to make access to Youtube or 	Google+ faster for web users but a startup that wants to create a 	different and better video hosting site may not be able to do that.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of an open and free internet, without net neutrality we 	are likely to get a web that has silos in it and to enter each silo, 	you will have to pay some "tax" to ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the state of net neutrality in India?&lt;/b&gt;&lt;br /&gt; Legally, the concept of net neutrality doesn't exist in India. Sunil  Abraham, director of Centre for internet and Society in Bangalore, says  that Trai, which regulates the telecom industry, has tried to come up  with some rules regarding net neutrality several times. For example it  invited comments on the concept of net neutrality from industry bodies  and stakeholders in 2006. But no formal rules have been formed to uphold  and enforce net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, despite lack of formal  rules, ISPs in India mostly adhere to the principal of net neutrality.  There have been some incidents where Indian ISPs have ignored net  neutrality but these are few and far between.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Will the concept of net neutrality survive?&lt;/b&gt;&lt;br /&gt; Net neutrality is sort of gentlemen's agreement. It has survived so far  because few people realized the potential of internet when it took off  around 30 years ago. But now when the internet is an integral part of  the society and incredibly important, ISPs across the world are trying  to get the power to shape and control the traffic. But there are ways to  keep net neutrality alive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumers should demand that ISPs  continue their hands-off approach from the internet traffic. If  consumers see a violation of net neutrality, they ought to take a  proactive approach and register their displeasure with the ISP. They  should also reward ISPs that uphold the net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the  same time, as Abraham says, Trai needs to come out with a set of clear  and precise rules that protect the net neutrality. "We have started  seeing ISPs trying to take control of the traffic that flows from their  servers but Trai can regulate them. It can keep the internet open and  consumer-friendly by forming rules that protect net neutrality. These  are early days so it is easy to do. If ISPs manage to change the system,  it may become too late," he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-january-20-2014-what-is-net-neutrality-and-why-is-it-important'&gt;https://cis-india.org/news/times-of-india-january-20-2014-what-is-net-neutrality-and-why-is-it-important&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-02-03T08:24:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/what-is-dilligaf">
    <title>What is Dilligaf?</title>
    <link>https://cis-india.org/internet-governance/what-is-dilligaf</link>
    <description>
        &lt;b&gt;On the web, time moves at the speed of thought: Groups emerge, proliferate and are abandoned as new trends and fads take precedence. Nowhere else is this dramatic flux as apparent as in the language that evolves online. While SMS lingo – like TTYL (Talk To You Later) and LOL (Laughing Out Loud)– has endured and become a part of everyday language, new forms of speech are taking over.&lt;/b&gt;
        
&lt;p&gt;“Leetspeak” or “L33t” (derived the word “elite”), for example, incorporate numbers in words, giving geeks their own language. One that they use to bypass firewalls and filters trained to recognize certain words – so in “l33t”-speak, porn becomes Pr0n, and onwards moves mankind.&lt;/p&gt;
&lt;p&gt;These mutations are not permanent: Like organisms, they grow to form new constellations of words and expressions demanding that users keep pace. And while purists have bled their hearts out, lamenting the savage attack on the language and grammar that digital technology has spawned, there is also a recognition of the fact that these linguistic developments are not merely experiments – they capture the spirit of a democratized knowledge system and the opening up of the information highway. User-generated content sites like Wikipedia, YouTube and Tumblr embody these acronyms and attitudes, where any attempt at regulation, control or imposition of authority is usually met with the reply – DILLIGAF (Do I Look Like I Give A F***)?&lt;/p&gt;
&lt;p&gt;DILLIGAFers – people who live a significant part of their lives online – might scoff at older forms of institutional control, but they don’t necessarily live in a space of anarchy, either. For example, academic credentials, institutional affliations and geopolitical location might not bear the same weight on Wikipedia as while writing a book, but there are other ways in which digital rank can be pulled. Your overall Internet experience, editing history and ability to garner mass support for your views are more important in determining your place in Wikipedia’s hierarchy. Any attempt at pulling rank with assets like money, influence or name are casually discarded with succinct exclamations like WTF (What The F***) and BFD (Big F****ing Deal).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;One of the defining characteristics of the DILLIGAF generation is their fiercely independent spirit. While they’re constantly connected and incessantly sharing information, they are also terribly alone. When it comes to searching for information, finding people or exploring the web, personal skills with different digital tools and platforms makes one independent. In fact, one of the deterrents for the less technically inclined to join online communities is the idea that they’re supposed to find their own way as they tread unknown digital paths. Hence, DILLIGAFers often resort to acronyms like RTFM (Read The F***ing Manual) for people (read: the rest of us) who ask for information that can be easily found. And with the rapid Googlization of the world, an obvious question is met with an obvious answer – RTFG (Read The F****ing Google).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;Geeks have invented many interesting and creative acronyms to make their voices heard, and while some of the acronyms predate the Internet, they often capture the irony of online and offline existence. SNAFU (Situation Normal: All F***ed Up), an acronym that supposedly emerged in America during the Second World War, often finds its way into describing the complexity of our lives. The dramatic nature of interactions, the struggle to establish trust and the complex structure of experiences all find voice online. FML (F*** My Life), an acronym as well as a popular networking site, is a sterling example of such a space, where people share stories of how things went wrong for them, allowing other users to rate their stories on a sympathy meter.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;One of the most delicious ironies of the online space is that while irreverence might find a way into acronyms, unnecessary profanity is looked down upon. If you go around swearing on discussion pages, you will immediately be ostracized, and quite possibly asked to STFU (Shut The F*** Up).&lt;/p&gt;
&lt;p&gt;This article by Nishant Shah was&lt;a class="external-link" href="http://www.gqindia.com/content/what-dilligaf"&gt; published in GQ India &lt;/a&gt;on September 4, 2011.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/what-is-dilligaf'&gt;https://cis-india.org/internet-governance/what-is-dilligaf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-01T09:52:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
